From 0cb6acf9a26591464f5ae9012401a3b110b75ac5 Mon Sep 17 00:00:00 2001 From: WPT Sync Bot Date: Sun, 26 Jan 2020 08:23:54 +0000 Subject: [PATCH] Update web-platform-tests to revision e1edaa3dd1bea4415ee88e042affee32028d7f1d --- tests/wpt/metadata/MANIFEST.json | 28394 ++++++++++++---- .../animations/animations-001.html.ini | 3 - ...-in-regions-explicit-counters-002.html.ini | 3 - ...-in-regions-explicit-counters-003.html.ini | 3 - ...-in-regions-explicit-counters-004.html.ini | 3 - ...-in-regions-explicit-counters-005.html.ini | 3 - .../elements/canvas3d-001.html.ini | 2 - .../elements/canvas3d-002.html.ini | 2 - .../css-regions/elements/iframe-001.html.ini | 3 - .../flexbox/autoheight-flexbox-001.html.ini | 3 - .../flexbox/autoheight-flexbox-002.html.ini | 3 - .../flexbox/autoheight-flexbox-003.html.ini | 3 - .../flexbox/autoheight-flexbox-004.html.ini | 3 - ...regions-in-autoheight-flexbox-001.html.ini | 3 - ...regions-in-autoheight-flexbox-002.html.ini | 3 - ...regions-in-autoheight-flexbox-003.html.ini | 3 - ...regions-in-autoheight-flexbox-004.html.ini | 3 - ...egions-in-fixed-sized-flexbox-001.html.ini | 3 - ...egions-in-fixed-sized-flexbox-002.html.ini | 3 - ...egions-in-fixed-sized-flexbox-003.html.ini | 3 - ...egions-in-fixed-sized-flexbox-004.html.ini | 3 - ...egions-in-fixed-sized-flexbox-005.html.ini | 3 - ...egions-in-fixed-sized-flexbox-006.html.ini | 3 - ...egions-in-fixed-sized-flexbox-007.html.ini | 3 - ...egions-in-fixed-sized-flexbox-008.html.ini | 3 - .../flexbox/column-flexbox-break.html.ini | 3 - .../flexbox/regions-flexbox-001.html.ini | 3 - .../flexbox/regions-flexbox-002.html.ini | 3 - .../flexbox/regions-flexbox-003.html.ini | 3 - .../flexbox/regions-flexbox-004.html.ini | 3 - .../flexbox/row-flexbox-break.html.ini | 3 - .../visibility-regions-in-flexbox.html.ini | 3 - .../resizing/regions-resizing-003.html.ini | 3 - .../resizing/regions-resizing-007.html.ini | 3 - .../resizing/regions-resizing-009.html.ini | 3 - .../multicolumn/regions-multicol-003.html.ini | 3 - .../multicolumn/regions-multicol-004.html.ini | 3 - .../multicolumn/regions-multicol-006.html.ini | 3 - .../multicolumn/regions-multicol-008.html.ini | 3 - .../multicolumn/regions-multicol-009.html.ini | 3 - .../multicolumn/regions-multicol-011.html.ini | 3 - .../multicolumn/regions-multicol-012.html.ini | 3 - .../multicolumn/regions-multicol-013.html.ini | 3 - .../multicolumn/regions-multicol-015.html.ini | 3 - .../multicolumn/regions-multicol-016.html.ini | 3 - .../multicolumn/regions-multicol-017.html.ini | 3 - .../multicolumn/regions-multicol-019.html.ini | 3 - .../multicolumn/regions-multicol-021.html.ini | 3 - .../multicolumn/regions-multicol-022.html.ini | 3 - .../multicolumn/regions-multicol-023.html.ini | 3 - .../multicolumn/regions-multicol-024.html.ini | 3 - .../multicolumn/regions-multicol-025.html.ini | 3 - .../multicolumn/regions-multicol-026.html.ini | 3 - .../multicolumn/regions-multicol-027.html.ini | 3 - .../multicolumn/regions-multicol-028.html.ini | 3 - .../multicolumn/regions-multicol-029.html.ini | 3 - .../regions-transforms-001.html.ini | 3 - .../regions-transforms-002.html.ini | 3 - .../regions-transforms-003.html.ini | 3 - .../regions-transforms-004.html.ini | 3 - .../regions-transforms-005.html.ini | 3 - .../regions-transforms-006.html.ini | 3 - .../regions-transforms-007.html.ini | 3 - .../regions-transforms-008.html.ini | 3 - .../regions-transforms-009.html.ini | 3 - .../regions-transforms-010.html.ini | 3 - .../regions-transforms-011.html.ini | 3 - .../regions-transforms-012.html.ini | 3 - .../regions-transforms-013.html.ini | 3 - .../regions-transforms-014.html.ini | 3 - .../regions-transforms-015.html.ini | 3 - .../regions-transforms-016.html.ini | 3 - .../regions-transforms-018.html.ini | 3 - .../regions-transforms-019.html.ini | 3 - .../regions-transforms-020.html.ini | 3 - .../regions-transforms-021.html.ini | 3 - .../regions-transforms-022.html.ini | 3 - ...pace-pre-wrap-trailing-spaces-006.html.ini | 2 + ...pace-pre-wrap-trailing-spaces-007.html.ini | 2 + ...pace-pre-wrap-trailing-spaces-008.html.ini | 2 + ...pace-pre-wrap-trailing-spaces-009.html.ini | 2 + ...pace-pre-wrap-trailing-spaces-010.html.ini | 2 + ...pace-pre-wrap-trailing-spaces-011.html.ini | 2 + .../transform-scale-hittest.html.ini | 3 - .../ch-pseudo-recalc-on-font-load.html.ini | 17 + .../css-values/lh-rlh-on-root-001.html.ini | 6 + .../css/cssom-view/CaretPosition-001.html.ini | 4 + .../cssom-view/elementFromPoint-001.html.ini | 4 + .../fetch/content-type/response.window.js.ini | 14 +- .../nosniff/parsing-nosniff.window.js.ini | 6 - ...mbedded-credentials.tentative.sub.html.ini | 2 +- .../traverse_the_history_4.html.ini | 4 + .../traverse_the_history_5.html.ini | 4 - .../iframe_sandbox_popups_escaping-3.html.ini | 2 +- ...rame_sandbox_popups_nonescaping-3.html.ini | 3 +- ...ception-vs-return-origin.sub.window.js.ini | 3 - .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../a-tag/same-http.no-redirect.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../fetch/same-http.keep-origin.http.html.ini | 4 + .../fetch/same-http.no-redirect.http.html.ini | 4 + .../fetch/same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../cross-http.keep-origin.http.html.ini | 4 + .../cross-http.no-redirect.http.html.ini | 4 + .../cross-http.swap-origin.http.html.ini | 4 + .../cross-https.keep-origin.http.html.ini | 4 + .../cross-https.no-redirect.http.html.ini | 4 + .../cross-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.swap-origin.http.html.ini | 4 + .../same-https.keep-origin.http.html.ini | 4 + .../same-https.no-redirect.http.html.ini | 4 + .../same-https.swap-origin.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../same-http.keep-origin.http.html.ini | 4 + .../same-http.no-redirect.http.html.ini | 4 + .../semantics/multiple-workers/005.html.ini | 1 + .../web-platform-tests/.azure-pipelines.yml | 222 +- .../2d.missingargs.html | 186 +- .../2d.drawImage.null.html | 2 +- .../2d.drawImage.wrongtype.html | 8 +- .../2d.drawImage.zerocanvas.html | 6 +- .../2d.drawImage.zerosource.image.html | 6 +- .../2d.gradient.linear.nonfinite.html | 46 +- .../2d.gradient.object.invalidcolour.html | 24 +- .../2d.gradient.object.invalidoffset.html | 10 +- .../2d.gradient.radial.negative.html | 6 +- .../2d.gradient.radial.nonfinite.html | 150 +- .../2d.pattern.basic.zerocanvas.html | 6 +- .../2d.pattern.image.broken.html | 2 +- .../2d.pattern.image.null.html | 2 +- .../2d.pattern.image.string.html | 2 +- .../2d.pattern.image.undefined.html | 2 +- .../2d.pattern.repeat.case.html | 2 +- .../2d.pattern.repeat.nullsuffix.html | 2 +- .../2d.pattern.repeat.undefined.html | 2 +- .../2d.pattern.repeat.unrecognised.html | 2 +- .../2d.pattern.repeat.unrecognisednull.html | 2 +- .../addHitRegions-NotSupportedError-01.html | 8 +- .../createImageBitmap-drawImage-closed.html | 2 +- .../createImageBitmap-invalid-args.html | 2 +- .../createImageBitmap-origin.sub.html | 6 +- .../createImageBitmap-serializable.html | 2 +- .../createImageBitmap-transfer.html | 2 +- .../path-objects/2d.path.arc.negative.html | 2 +- .../path-objects/2d.path.arcTo.negative.html | 2 +- .../2d.imageData.create1.this.html | 6 +- .../2d.imageData.create1.zero.html | 2 +- .../2d.imageData.create2.nonfinite.html | 28 +- .../2d.imageData.create2.this.html | 6 +- .../2d.imageData.create2.zero.html | 10 +- .../2d.imageData.get.nonfinite.html | 92 +- .../2d.imageData.get.zero.html | 14 +- ...2d.imageData.object.ctor.array.bounds.html | 12 +- .../2d.imageData.object.ctor.size.bounds.html | 6 +- .../2d.imageData.put.nonfinite.html | 164 +- .../2d.imageData.put.null.html | 2 +- .../2d.imageData.put.wrongtype.html | 6 +- .../2dcontext/tools/gentestutils.py | 4 +- .../blob/Blob-constructor-endings.html | 4 +- .../FileAPI/blob/Blob-constructor.html | 26 +- .../file/File-constructor-endings.html | 4 +- .../FileAPI/file/File-constructor.html | 12 +- .../FileReader-multiple-reads.html | 8 +- .../IndexedDB/bigint_value.htm | 2 +- .../IndexedDB/clone-before-keypath-eval.html | 2 +- .../IndexedDB/close-in-upgradeneeded.html | 2 +- .../IndexedDB/idb-explicit-commit.any.js | 14 +- .../idbcursor-advance-exception-order.html | 4 +- .../IndexedDB/idbcursor-advance-invalid.htm | 38 +- .../idbcursor-continue-exception-order.htm | 6 +- ...sor-continuePrimaryKey-exception-order.htm | 34 +- ...dbcursor-continuePrimaryKey-exceptions.htm | 4 +- .../idbcursor-continuePrimaryKey.htm | 2 +- .../idbcursor-delete-exception-order.htm | 6 +- .../idbcursor-update-exception-order.htm | 8 +- .../IndexedDB/idbcursor_advance_index2.htm | 2 +- .../IndexedDB/idbcursor_advance_index3.htm | 2 +- .../IndexedDB/idbcursor_advance_index6.htm | 2 +- .../IndexedDB/idbcursor_advance_index7.htm | 2 +- .../IndexedDB/idbcursor_advance_index8.htm | 2 +- .../IndexedDB/idbcursor_advance_index9.htm | 2 +- .../idbcursor_advance_objectstore2.htm | 2 +- .../idbcursor_advance_objectstore3.htm | 2 +- .../idbcursor_advance_objectstore4.htm | 2 +- .../idbcursor_advance_objectstore5.htm | 2 +- .../IndexedDB/idbcursor_continue_index2.htm | 2 +- .../IndexedDB/idbcursor_continue_index3.htm | 2 +- .../IndexedDB/idbcursor_continue_index4.htm | 2 +- .../IndexedDB/idbcursor_continue_index7.htm | 2 +- .../IndexedDB/idbcursor_continue_index8.htm | 2 +- .../IndexedDB/idbcursor_continue_invalid.htm | 4 +- .../idbcursor_continue_objectstore2.htm | 2 +- .../idbcursor_continue_objectstore3.htm | 2 +- .../idbcursor_continue_objectstore4.htm | 2 +- .../idbcursor_continue_objectstore5.htm | 2 +- .../idbcursor_continue_objectstore6.htm | 2 +- .../IndexedDB/idbcursor_delete_index2.htm | 2 +- .../IndexedDB/idbcursor_delete_index3.htm | 2 +- .../IndexedDB/idbcursor_delete_index4.htm | 2 +- .../IndexedDB/idbcursor_delete_index5.htm | 2 +- .../idbcursor_delete_objectstore2.htm | 2 +- .../idbcursor_delete_objectstore3.htm | 2 +- .../idbcursor_delete_objectstore4.htm | 2 +- .../idbcursor_delete_objectstore5.htm | 2 +- .../IndexedDB/idbcursor_update_index2.htm | 2 +- .../IndexedDB/idbcursor_update_index3.htm | 2 +- .../IndexedDB/idbcursor_update_index4.htm | 2 +- .../IndexedDB/idbcursor_update_index5.htm | 2 +- .../IndexedDB/idbcursor_update_index6.htm | 2 +- .../IndexedDB/idbcursor_update_index7.htm | 2 +- .../IndexedDB/idbcursor_update_index8.htm | 2 +- .../idbcursor_update_objectstore2.htm | 2 +- .../idbcursor_update_objectstore3.htm | 2 +- .../idbcursor_update_objectstore5.htm | 2 +- .../idbcursor_update_objectstore6.htm | 2 +- .../idbcursor_update_objectstore7.htm | 2 +- .../idbcursor_update_objectstore8.htm | 2 +- .../idbcursor_update_objectstore9.htm | 2 +- ...base-createObjectStore-exception-order.htm | 8 +- ...base-deleteObjectStore-exception-order.htm | 4 +- ...bdatabase-transaction-exception-order.html | 6 +- .../idbdatabase_createObjectStore11.htm | 2 +- .../idbdatabase_createObjectStore3.htm | 2 +- .../idbdatabase_createObjectStore4.htm | 2 +- .../idbdatabase_createObjectStore6.htm | 4 +- ...e_createObjectStore9-invalidparameters.htm | 2 +- .../idbdatabase_deleteObjectStore2.htm | 2 +- .../idbdatabase_deleteObjectStore3.htm | 2 +- ...database_deleteObjectStore4-not_reused.htm | 2 +- .../IndexedDB/idbdatabase_transaction.htm | 2 +- .../IndexedDB/idbdatabase_transaction3.htm | 2 +- .../IndexedDB/idbdatabase_transaction4.htm | 2 +- .../IndexedDB/idbdatabase_transaction5.htm | 2 +- .../IndexedDB/idbfactory_cmp2.htm | 14 +- .../IndexedDB/idbfactory_open9.htm | 2 +- .../idbindex-getAll-enforcerange.html | 2 +- .../idbindex-getAllKeys-enforcerange.html | 2 +- .../idbindex-multientry-arraykeypath.htm | 2 +- .../idbindex-query-exception-order.html | 4 +- .../IndexedDB/idbindex-rename-errors.html | 18 +- .../IndexedDB/idbindex-rename.html | 4 +- .../IndexedDB/idbindex_count4.htm | 2 +- .../IndexedDB/idbindex_get5.htm | 2 +- .../IndexedDB/idbindex_get6.htm | 2 +- .../IndexedDB/idbindex_get7.htm | 2 +- .../IndexedDB/idbindex_get8.htm | 2 +- .../IndexedDB/idbindex_getKey5.htm | 2 +- .../IndexedDB/idbindex_getKey6.htm | 2 +- .../IndexedDB/idbindex_getKey7.htm | 2 +- .../IndexedDB/idbindex_getKey8.htm | 2 +- .../IndexedDB/idbindex_openCursor.htm | 2 +- .../IndexedDB/idbindex_openCursor2.htm | 2 +- .../IndexedDB/idbindex_openCursor3.htm | 2 +- .../IndexedDB/idbindex_openKeyCursor.htm | 2 +- .../IndexedDB/idbindex_openKeyCursor2.htm | 2 +- .../IndexedDB/idbindex_openKeyCursor3.htm | 2 +- .../IndexedDB/idbindex_openKeyCursor4.htm | 2 +- .../IndexedDB/idbkeyrange-includes.htm | 12 +- .../IndexedDB/idbkeyrange.htm | 36 +- .../IndexedDB/idbkeyrange_incorrect.htm | 24 +- ...dbobjectstore-add-put-exception-order.html | 6 +- .../idbobjectstore-clear-exception-order.html | 4 +- ...idbobjectstore-delete-exception-order.html | 6 +- ...jectstore-deleteIndex-exception-order.html | 6 +- .../idbobjectstore-getAll-enforcerange.html | 2 +- ...dbobjectstore-getAllKeys-enforcerange.html | 2 +- .../idbobjectstore-index-finished.html | 2 +- .../idbobjectstore-query-exception-order.html | 4 +- .../idbobjectstore-rename-errors.html | 17 +- .../idbobjectstore-rename-store.html | 4 +- .../IndexedDB/idbobjectstore_add10.htm | 2 +- .../IndexedDB/idbobjectstore_add11.htm | 2 +- .../IndexedDB/idbobjectstore_add12.htm | 2 +- .../IndexedDB/idbobjectstore_add13.htm | 2 +- .../IndexedDB/idbobjectstore_add15.htm | 2 +- .../IndexedDB/idbobjectstore_add16.htm | 2 +- .../IndexedDB/idbobjectstore_add9.htm | 2 +- .../IndexedDB/idbobjectstore_clear3.htm | 2 +- .../IndexedDB/idbobjectstore_clear4.htm | 2 +- .../IndexedDB/idbobjectstore_count4.htm | 2 +- .../idbobjectstore_createIndex10.htm | 2 +- .../idbobjectstore_createIndex11.htm | 2 +- .../idbobjectstore_createIndex12.htm | 2 +- .../idbobjectstore_createIndex13.htm | 2 +- ...ectstore_createIndex14-exception_order.htm | 12 +- .../IndexedDB/idbobjectstore_delete6.htm | 2 +- .../IndexedDB/idbobjectstore_delete7.htm | 2 +- .../IndexedDB/idbobjectstore_deleteIndex.htm | 2 +- .../IndexedDB/idbobjectstore_deleted.htm | 20 +- .../IndexedDB/idbobjectstore_get6.htm | 2 +- .../IndexedDB/idbobjectstore_get7.htm | 2 +- .../IndexedDB/idbobjectstore_getKey.html | 6 +- .../idbobjectstore_openCursor_invalid.htm | 6 +- .../idbobjectstore_openKeyCursor.htm | 10 +- .../IndexedDB/idbobjectstore_put10.htm | 2 +- .../IndexedDB/idbobjectstore_put11.htm | 2 +- .../IndexedDB/idbobjectstore_put12.htm | 2 +- .../IndexedDB/idbobjectstore_put13.htm | 2 +- .../IndexedDB/idbobjectstore_put15.htm | 2 +- .../IndexedDB/idbobjectstore_put16.htm | 2 +- .../IndexedDB/idbobjectstore_put9.htm | 2 +- .../IndexedDB/idbrequest_error.html | 2 +- .../IndexedDB/idbrequest_result.html | 2 +- ...ansaction-objectStore-exception-order.html | 2 +- .../idbtransaction-objectStore-finished.html | 2 +- .../IndexedDB/key-conversion-exceptions.htm | 50 +- .../IndexedDB/key_invalid.htm | 4 +- .../IndexedDB/keygenerator-inject.html | 6 +- .../IndexedDB/keypath-exceptions.htm | 71 +- .../IndexedDB/keypath_invalid.htm | 4 +- .../structured-clone-transaction-state.any.js | 6 +- .../IndexedDB/structured-clone.any.js | 2 +- ...ansaction-abort-index-metadata-revert.html | 32 +- ...action-abort-multiple-metadata-revert.html | 38 +- ...on-abort-object-store-metadata-revert.html | 16 +- .../transaction-create_in_versionchange.htm | 4 +- ...action-relaxed-durability.tentative.any.js | 2 +- ...transaction-lifecycle-backend-aborted.html | 8 +- ...grade-transaction-lifecycle-committed.html | 8 +- ...de-transaction-lifecycle-user-aborted.html | 16 +- .../WebCryptoAPI/getRandomValues.any.js | 10 +- .../wrapKey_unwrapKey/wrapKey_unwrapKey.js | 7 +- .../DOMException-custom-bindings.any.js | 10 +- .../es-exceptions/exceptions.html | 4 +- .../global-immutable-prototype.any.js | 2 +- .../iterator-prototype-object.html | 8 +- .../legacy-callback-interface-object.html | 8 +- .../legacy-platform-object.html | 24 +- .../ecmascript-binding/put-forwards.html | 6 +- .../sequence-conversion.html | 2 +- .../worklet-animation-creation.https.html | 4 +- ...t-animation-with-invalid-effect.https.html | 2 +- .../beacon/beacon-error.sub.window.js | 4 +- .../beacon/beacon-readablestream.window.js | 2 +- .../bluetooth/idl/idl-Bluetooth.https.html | 8 +- .../idl/idl-BluetoothDevice.https.html | 16 +- .../bluetooth/idl/idl-BluetoothUUID.html | 82 +- .../accept-ch-answers.sub.https.html | 62 + ... accept-ch-answers.sub.https.html.headers} | 0 .../accept-ch-cache-revalidation.https.html | 3 +- .../client-hints/accept-ch-change.https.html | 75 + .../accept-ch-feature-policy.sub.https.html | 68 + ...-ch-feature-policy.sub.https.html.headers} | 0 .../accept-ch-malformed-header.https.html | 26 + ...pt-ch-malformed-header.https.html.headers} | 0 ...accept-ch-no-feature-policy.sub.https.html | 62 + ...-no-feature-policy.sub.https.html.headers} | 0 .../accept-ch-non-secure.http.html | 35 + ...=> accept-ch-non-secure.http.html.headers} | 0 .../accept-ch-stickiness/README.md | 14 + .../resources/accept-ch-test.js | 5 +- .../client-hints/accept_ch.http.html | 35 - .../accept_ch.tentative.https.html | 65 - .../accept_ch.tentative.sub.https.html | 62 - ...ch_feature_policy.tentative.sub.https.html | 68 - .../accept_ch_malformed_header.https.html | 26 - ...no_feature_policy.tentative.sub.https.html | 62 - .../echo_client_hints_received.py | 26 - .../echo_ua_client_hints_received.py | 26 - ...quiv-accept-ch-malformed-header.https.html | 28 + .../http-equiv-accept-ch-non-secure.http.html | 36 + .../http_equiv_accept_ch.tentative.http.html | 36 - .../http_equiv_accept_ch.tentative.https.html | 48 - ...p_equiv_accept_ch.tentative.sub.https.html | 65 - ...t_ch_malformed_header.tentative.https.html | 28 - .../resources/accept-ch-different.html | 11 + .../accept-ch-different.html.headers | 2 + .../resources/accept-ch-empty.html | 11 + .../resources/accept-ch-empty.html.headers | 2 + .../client-hints/resources/accept-ch.html | 10 + .../resources/accept-ch.html.headers | 2 + .../client-hints/resources/accept_ch.html | 10 - .../resources/accept_ch.html.headers | 1 - .../resources/echo-client-hints-received.py | 26 + .../echo-ua-client-hints-received.py | 26 + .../expect-client-hints-headers.html | 22 + ...expect-different-client-hints-headers.html | 22 + .../expect_client_hints_headers.html | 22 - .../resources/open-and-add-load-event.js | 9 + .../client-hints/sec-ch-quotes.https.html | 5 +- .../clipboard-apis/clipboard-item.https.html | 8 +- .../web-platform-tests/common/stringifiers.js | 4 +- .../test-setting-immutable-prototype.js | 24 +- .../compression-stream.tentative.any.js | 2 +- ...ression-constructor-error.tentative.any.js | 6 +- .../console/console-label-conversion.any.js | 2 +- .../support/testharness-helper.sub.js | 2 +- .../support/script-src-self.sub.js | 6 +- .../script-src/script-src-1_4.html | 2 +- .../script-src/script-src-1_4_2.html | 4 +- .../script-src-strict_dynamic_eval.html | 2 +- ...cript-src-strict_dynamic_new_function.html | 2 +- .../constructor-required-fields.html | 14 +- .../support/testharness-helper.js | 4 +- .../cors/client-hint-request-headers.htm | 10 +- tests/wpt/web-platform-tests/cors/origin.htm | 4 +- .../cors/request-headers.htm | 6 +- .../animationevent-interface.js | 14 +- .../css/css-conditional/js/001.html | 2 +- .../test_group_insertRule.html | 22 +- .../element-replacement-dynamic.html | 24 + .../dynamic-change-simplified-layout-002.html | 14 + .../css/css-fonts/font-synthesis-05.html | 2 +- ...nt-parse-numeric-stretch-style-weight.html | 2 +- .../grid-align-stretching-replaced-items.html | 12 +- .../css/css-grid/chrome-bug-001.html | 21 + .../baseline/child-baseline.https.html | 58 + .../baseline/flex-baseline.https.html | 50 + .../baseline/no-baseline.https.html | 42 + .../baseline/orthogonal-baseline.https.html | 42 + .../parsing/clip-path-invalid.html | 1 - .../css-masking/parsing/clip-path-valid.html | 4 + .../register-property-syntax-parsing.html | 2 +- .../register-property.html | 26 +- .../css-properties-values-api/self-utils.html | 6 +- .../css-properties-values-api/typedom.html | 4 +- .../css-pseudo/marker-content-020-ref.html | 52 + .../css/css-pseudo/marker-content-020.html | 70 + .../css/css-regions/META.yml | 4 - .../animations/animations-001.html | 55 - .../reference/animations-001-ref.html | 39 - .../animations/support/animations.css | 80 - .../contentEditable/contentEditable-001.html | 59 - .../contentEditable/contentEditable-002.html | 74 - .../contentEditable/contentEditable-003.html | 87 - .../contentEditable/contentEditable-004.html | 81 - .../contentEditable/contentEditable-005.html | 79 - .../contentEditable/contentEditable-006.html | 79 - .../contentEditable/contentEditable-007.html | 89 - .../contentEditable/contentEditable-008.html | 67 - .../contentEditable/contentEditable-009.html | 68 - .../contentEditable/contentEditable-010.html | 66 - .../contentEditable/contentEditable-011.html | 68 - .../contentEditable/contentEditable-012.html | 83 - .../reference/contentEditable-001-ref.html | 36 - .../reference/contentEditable-002-ref.html | 51 - .../reference/contentEditable-003-ref.html | 66 - .../reference/contentEditable-004-ref.html | 54 - .../reference/contentEditable-005-ref.html | 53 - .../reference/contentEditable-006-ref.html | 51 - .../reference/contentEditable-007-ref.html | 59 - .../reference/contentEditable-008-ref.html | 40 - .../reference/contentEditable-010-ref.html | 39 - .../reference/contentEditable-011-ref.html | 39 - .../contentEditable/support/common.css | 17 - .../contentEditable/support/helpers.js | 32 - .../counters/extract-list-items-001.html | 51 - .../counters/extract-list-items-002.html | 69 - .../counters/extract-list-items-003.html | 82 - .../counters/extract-list-items-004.html | 83 - .../counters/extract-list-items-005.html | 64 - .../counters/extract-list-items-006.html | 68 - .../counters/extract-list-items-007.html | 54 - .../counters/extract-list-items-008.html | 78 - .../counters/extract-list-items-009.html | 76 - .../counters/extract-list-items-010.html | 71 - .../counters/extract-list-items-011.html | 79 - .../counters/extract-list-items-012.html | 89 - .../counters/extract-list-items-013.html | 66 - .../counters/extract-list-items-014.html | 49 - .../counters/extract-list-items-015.html | 54 - .../extract-numbered-paragraphs-divs-001.html | 49 - .../extract-numbered-paragraphs-divs-002.html | 65 - .../counters/extract-numbered-paragraphs.html | 44 - ...ract-numbered-spans-display-only-some.html | 53 - .../extract-ordered-lists-in-regions-001.html | 91 - .../extract-ordered-lists-in-regions-002.html | 89 - .../extract-ordered-lists-in-regions-003.html | 89 - ...ists-in-regions-explicit-counters-001.html | 116 - ...ists-in-regions-explicit-counters-002.html | 80 - ...ists-in-regions-explicit-counters-003.html | 104 - ...ists-in-regions-explicit-counters-004.html | 112 - ...ists-in-regions-explicit-counters-005.html | 121 - .../extract-unordered-lists-in-regions.html | 90 - .../reference/extract-list-items-001-ref.html | 40 - .../reference/extract-list-items-002-ref.html | 58 - .../reference/extract-list-items-003-ref.html | 71 - .../reference/extract-list-items-004-ref.html | 72 - .../reference/extract-list-items-005-ref.html | 57 - .../reference/extract-list-items-006-ref.html | 59 - .../reference/extract-list-items-007-ref.html | 46 - .../reference/extract-list-items-008-ref.html | 78 - .../reference/extract-list-items-009-ref.html | 73 - .../reference/extract-list-items-012-ref.html | 102 - .../reference/extract-list-items-013-ref.html | 73 - .../reference/extract-list-items-014-ref.html | 56 - .../reference/extract-list-items-015-ref.html | 47 - ...ract-numbered-paragraphs-divs-001-ref.html | 40 - ...ract-numbered-paragraphs-divs-002-ref.html | 57 - .../extract-numbered-paragraphs-ref.html | 35 - ...-numbered-spans-display-only-some-ref.html | 34 - ...ract-ordered-lists-in-regions-001-ref.html | 71 - ...ract-ordered-lists-in-regions-002-ref.html | 67 - ...ract-ordered-lists-in-regions-003-ref.html | 65 - ...-in-regions-explicit-counters-001-ref.html | 95 - ...-in-regions-explicit-counters-002-ref.html | 68 - ...-in-regions-explicit-counters-003-ref.html | 102 - ...-in-regions-explicit-counters-004-ref.html | 106 - ...-in-regions-explicit-counters-005-ref.html | 115 - ...xtract-unordered-lists-in-regions-ref.html | 70 - .../cssomview-apis-no-region-chain-001.html | 96 - .../css-regions/elements/canvas3d-001.html | 43 - .../css-regions/elements/canvas3d-002.html | 47 - .../css/css-regions/elements/iframe-001.html | 36 - .../elements/reference/canvas3d-001-ref.html | 29 - .../elements/reference/canvas3d-002-ref.html | 31 - .../elements/reference/iframe-001-ref.html | 20 - .../elements/support/3d-filler.html | 49 - .../css/css-regions/elements/support/Three.js | 682 - .../elements/support/green-at-15.mp4 | Bin 299193 -> 0 bytes .../elements/support/green-at-15.ogv | Bin 287648 -> 0 bytes .../elements/support/static-cube.js | 52 - .../css/css-regions/elements/video-001.html | 41 - .../flexbox/autoheight-flexbox-001.html | 45 - .../flexbox/autoheight-flexbox-002.html | 51 - .../flexbox/autoheight-flexbox-003.html | 55 - .../flexbox/autoheight-flexbox-004.html | 54 - ...ght-regions-in-autoheight-flexbox-001.html | 94 - ...ght-regions-in-autoheight-flexbox-002.html | 59 - ...ght-regions-in-autoheight-flexbox-003.html | 65 - ...ght-regions-in-autoheight-flexbox-004.html | 72 - ...ht-regions-in-fixed-sized-flexbox-001.html | 90 - ...ht-regions-in-fixed-sized-flexbox-002.html | 95 - ...ht-regions-in-fixed-sized-flexbox-003.html | 108 - ...ht-regions-in-fixed-sized-flexbox-004.html | 72 - ...ht-regions-in-fixed-sized-flexbox-005.html | 62 - ...ht-regions-in-fixed-sized-flexbox-006.html | 71 - ...ht-regions-in-fixed-sized-flexbox-007.html | 62 - ...ht-regions-in-fixed-sized-flexbox-008.html | 60 - .../flexbox/column-flexbox-break.html | 51 - .../reference/autoheight-flexbox-001-ref.html | 29 - .../reference/autoheight-flexbox-002-ref.html | 37 - .../reference/autoheight-flexbox-003-ref.html | 29 - ...regions-in-autoheight-flexbox-001-ref.html | 32 - ...regions-in-autoheight-flexbox-002-ref.html | 26 - ...regions-in-autoheight-flexbox-003-ref.html | 26 - ...regions-in-autoheight-flexbox-004-ref.html | 35 - ...egions-in-fixed-sized-flexbox-001-ref.html | 37 - ...egions-in-fixed-sized-flexbox-002-ref.html | 30 - ...egions-in-fixed-sized-flexbox-003-ref.html | 42 - ...egions-in-fixed-sized-flexbox-004-ref.html | 25 - ...egions-in-fixed-sized-flexbox-005-ref.html | 27 - ...egions-in-fixed-sized-flexbox-006-ref.html | 30 - ...egions-in-fixed-sized-flexbox-007-ref.html | 25 - ...egions-in-fixed-sized-flexbox-008-ref.html | 24 - .../reference/column-flexbox-break-ref.html | 30 - .../reference/regions-flexbox-001-ref.html | 30 - .../reference/regions-flexbox-002-ref.html | 43 - .../reference/row-flexbox-break-ref.html | 23 - .../visibility-regions-in-flexbox-ref.html | 25 - .../flexbox/regions-flexbox-001.html | 43 - .../flexbox/regions-flexbox-002.html | 51 - .../flexbox/regions-flexbox-003.html | 56 - .../flexbox/regions-flexbox-004.html | 56 - .../flexbox/row-flexbox-break.html | 51 - .../visibility-regions-in-flexbox.html | 64 - .../floats/floated-regions-001.html | 91 - .../floats/floated-regions-002.html | 62 - .../floats/floated-regions-003.html | 52 - .../floats/floated-regions-004.html | 73 - .../floats/floated-regions-005.html | 77 - .../floats/floats-clear-breaks-001.html | 88 - .../floats/floats-clear-breaks-002.html | 88 - .../floats/floats-in-named-flow-001.html | 49 - .../floats/floats-in-named-flow-002.html | 55 - .../floats/floats-in-named-flow-003.html | 56 - .../floats/floats-in-named-flow-004.html | 65 - .../floats/floats-in-named-flow-005.html | 70 - .../floats/floats-in-named-flow-006.html | 74 - .../floats/floats-in-named-flow-007.html | 85 - .../floats/floats-in-named-flow-008.html | 78 - .../floats/floats-in-named-flow-009.html | 71 - .../floats/floats-in-named-flow-010.html | 79 - .../floats/floats-in-named-flow-011.html | 70 - .../floats/floats-in-named-flow-012.html | 85 - .../floats/floats-in-named-flow-013.html | 63 - .../floats/floats-in-named-flow-014.html | 66 - .../floats/floats-in-named-flow-015.html | 63 - .../floats/floats-in-named-flow-016.html | 63 - .../floats/floats-in-named-flow-017.html | 83 - .../floats/floats-in-named-flow-018.html | 78 - .../floats/floats-in-named-flow-019.html | 78 - .../floats/floats-in-named-flow-020.html | 69 - .../floats/floats-in-named-flow-021.html | 86 - .../floats/floats-in-named-flow-022.html | 80 - .../floats/floats-in-named-flow-023.html | 67 - .../floats/floats-in-named-flow-024.html | 66 - .../floats/floats-in-named-flow-025.html | 71 - .../floats/floats-in-named-flow-026.html | 107 - .../floats/floats-in-named-flow-027.html | 72 - .../floats/floats-in-named-flow-028.html | 65 - .../floats/floats-in-named-flow-029.html | 92 - .../floats/floats-in-named-flow-030.html | 90 - .../floats/floats-in-named-flow-031.html | 88 - .../floats/floats-in-named-flow-032.html | 89 - .../floats/floats-in-named-flow-033.html | 92 - .../reference/floated-regions-001-ref.html | 71 - .../reference/floated-regions-002-ref.html | 47 - .../reference/floated-regions-003-ref.html | 38 - .../reference/floated-regions-004-ref.html | 54 - .../reference/floated-regions-005-ref.html | 57 - .../floats-clear-breaks-001-ref.html | 68 - .../floats-clear-breaks-002-ref.html | 61 - .../floats-in-named-flow-001-ref.html | 37 - .../floats-in-named-flow-002-ref.html | 44 - .../floats-in-named-flow-003-ref.html | 39 - .../floats-in-named-flow-004-ref.html | 51 - .../floats-in-named-flow-005-ref.html | 54 - .../floats-in-named-flow-006-ref.html | 62 - .../floats-in-named-flow-009-ref.html | 62 - .../floats-in-named-flow-011-ref.html | 53 - .../floats-in-named-flow-012-ref.html | 71 - .../floats-in-named-flow-013-ref.html | 49 - .../floats-in-named-flow-016-ref.html | 47 - .../floats-in-named-flow-017-ref.html | 70 - .../floats-in-named-flow-018-ref.html | 61 - .../floats-in-named-flow-020-ref.html | 53 - .../floats-in-named-flow-021-ref.html | 65 - .../floats-in-named-flow-023-ref.html | 49 - .../floats-in-named-flow-024-ref.html | 54 - .../floats-in-named-flow-025-ref.html | 37 - .../floats-in-named-flow-026-ref.html | 53 - .../floats-in-named-flow-027-ref.html | 57 - .../floats-in-named-flow-029-ref.html | 69 - .../floats-in-named-flow-030-ref.html | 70 - .../floats-in-named-flow-031-ref.html | 69 - .../floats-in-named-flow-032-ref.html | 70 - .../floats-in-named-flow-033-ref.html | 78 - .../css/css-regions/flow-content-001-ref.xht | 20 - .../css/css-regions/flow-content-001.xht | 35 - .../css/css-regions/flow-content-002-ref.xht | 20 - .../css/css-regions/flow-content-002.xht | 41 - .../css/css-regions/flow-from-001-ref.xht | 23 - .../css/css-regions/flow-from-001.xht | 55 - .../flow-from-block-container-001-ref.xht | 29 - .../flow-from-block-container-001.xht | 57 - .../css/css-regions/flow-into-001-ref.xht | 31 - .../css/css-regions/flow-into-001.xht | 120 - .../css/css-regions/flow-into-BFC-001-ref.xht | 29 - .../css/css-regions/flow-into-BFC-001.xht | 39 - .../flow-into-invalid-names-001-ref.xht | 34 - .../flow-into-invalid-names-001.xht | 73 - .../css-regions/flow-into-parsing-001.html | 68 - .../flow-into-region-children-001-ref.xht | 24 - .../flow-into-region-children-001.xht | 44 - .../css/css-regions/idlharness.html | 20 - .../css/css-regions/inheritance.html | 23 - .../fullscreen-region-content-001.html | 65 - .../fullscreen-region-content-002.html | 61 - .../fullscreen-region-content-003.html | 74 - .../fullscreen-region-content-004.html | 73 - .../fullscreen-region-content-005.html | 83 - .../fullscreen-region-content-006.html | 79 - .../fullscreen-region-content-007.html | 70 - .../fullscreen-region-content-008.html | 70 - .../fullscreen-region-content-009.html | 77 - .../fullscreen-region-content-010.html | 89 - .../interactivity/full-screen/support/cat.jpg | Bin 21474 -> 0 bytes .../full-screen/support/common.css | 19 - .../full-screen/support/green-at-15.mp4 | Bin 299193 -> 0 bytes .../full-screen/support/green-at-15.ogv | Bin 287648 -> 0 bytes .../interactivity/full-screen/support/util.js | 18 - .../hit-testing/css-cursor-001.html | 53 - .../hit-testing/css-cursor-002.html | 54 - .../hit-testing/css-hover-on-content-001.html | 49 - .../hit-testing/css-hover-on-content-002.html | 58 - .../hit-testing/css-hover-on-content-003.html | 58 - .../hit-testing/css-hover-on-content-004.html | 61 - .../hit-testing/css-hover-on-content-005.html | 57 - .../hit-testing/css-hover-on-region-001.html | 55 - .../hit-testing/css-hover-on-region-002.html | 56 - .../hit-testing/css-hover-on-region-003.html | 60 - .../hit-testing/css-hover-on-region-004.html | 76 - .../hit-testing/elementFromPoint-001.html | 117 - .../hit-testing/elementFromPoint-002.html | 125 - .../hit-testing/flow-change-on-hover-001.html | 65 - .../hit-testing/flow-change-on-hover-002.html | 67 - .../hit-testing/flow-change-on-hover-003.html | 57 - .../hit-testing/flow-change-on-hover-004.html | 55 - .../hit-testing/flow-change-on-hover-005.html | 63 - .../hit-testing/flow-change-on-hover-006.html | 62 - .../hit-testing/mouse-events-001.html | 129 - .../hit-testing/mouse-events-002.html | 200 - .../hit-testing/mouse-events-003.html | 101 - .../hit-testing/mouse-events-004.html | 159 - .../hit-testing/mouse-events-005.html | 191 - .../overflow-and-elementFromPoint-001.html | 97 - .../overflow-and-elementFromPoint-002.html | 106 - .../overflow-and-elementFromPoint-003.html | 96 - .../hit-testing/overflow-and-events-001.html | 110 - .../hit-testing/overflow-and-events-002.html | 115 - .../hit-testing/overflow-and-events-003.html | 112 - .../overflow-and-selection-001.html | 59 - .../overflow-and-selection-002.html | 62 - .../overflow-and-selection-003.html | 60 - .../region-chain-change-on-hover-001.html | 55 - .../region-chain-change-on-hover-002.html | 58 - .../region-chain-change-on-hover-003.html | 53 - .../keyboard/regions-keyboard-events-001.html | 67 - .../keyboard/regions-keyboard-events-002.html | 69 - .../keyboard/regions-keyboard-events-003.html | 84 - .../keyboard/regions-keyboard-events-004.html | 114 - .../keyboard/regions-keyboard-events-005.html | 108 - .../keyboard/regions-keyboard-events-006.html | 119 - .../keyboard/regions-keyboard-events-007.html | 137 - .../keyboard/regions-keyboard-events-008.html | 104 - .../keyboard/regions-keyboard-events-009.html | 116 - .../keyboard/regions-keyboard-events-010.html | 104 - .../keyboard/support/css/regions-keyboard.css | 49 - .../js/regions-keyboard-events-test-helper.js | 53 - .../mouse/regions-mouse-events-001.html | 72 - .../mouse/regions-mouse-events-002.html | 56 - .../mouse/regions-mouse-events-003.html | 57 - .../mouse/regions-mouse-events-004.html | 56 - .../mouse/regions-mouse-events-005.html | 57 - .../mouse/regions-mouse-events-006.html | 72 - .../mouse/regions-mouse-events-007.html | 72 - .../mouse/regions-mouse-events-008.html | 72 - .../mouse/regions-mouse-events-009.html | 72 - .../support/css/regions-mouse-events.css | 46 - .../js/regions-mouse-events-test-helper.js | 104 - .../reference/regions-resizing-001-ref.html | 12 - .../reference/regions-resizing-005-ref.html | 12 - .../reference/regions-resizing-011-ref.html | 12 - .../resizing/regions-resizing-001.html | 32 - .../resizing/regions-resizing-002.html | 37 - .../resizing/regions-resizing-003.html | 34 - .../resizing/regions-resizing-004.html | 33 - .../resizing/regions-resizing-005.html | 35 - .../resizing/regions-resizing-006.html | 41 - .../resizing/regions-resizing-007.html | 42 - .../resizing/regions-resizing-008.html | 36 - .../resizing/regions-resizing-009.html | 40 - .../resizing/regions-resizing-010.html | 38 - .../resizing/regions-resizing-011.html | 42 - .../resizing/regions-resizing-012.html | 48 - .../resizing/regions-resizing-013.html | 46 - .../resizing/support/2-80px-block-ref.html | 35 - .../support/80px-block-float-ref.html | 29 - .../resizing/support/80px-block-ref.html | 28 - .../resizing/support/region-in-body.html | 38 - .../resizing/support/region-in-container.html | 40 - .../support/two-regions-in-container.html | 40 - .../interactivity/resizing/support/util.js | 29 - .../selection/regions-selection-001.html | 46 - .../selection/regions-selection-002.html | 47 - .../selection/regions-selection-003.html | 45 - .../selection/regions-selection-004.html | 45 - .../selection/regions-selection-005.html | 51 - .../selection/regions-selection-006.html | 51 - .../selection/regions-selection-007.html | 52 - .../selection/regions-selection-008.html | 50 - .../selection/regions-selection-009.html | 52 - .../selection/regions-selection-010.html | 51 - .../selection/regions-selection-011.html | 49 - .../selection/regions-selection-012.html | 51 - .../selection/regions-selection-013.html | 52 - .../selection/regions-selection-014.html | 51 - .../selection/regions-selection-015.html | 48 - .../selection/regions-selection-016.html | 47 - .../selection/regions-selection-017.html | 55 - .../selection/regions-selection-018.html | 54 - .../selection/regions-selection-019.html | 57 - .../selection/regions-selection-020.html | 53 - .../selection/regions-selection-021.html | 54 - .../selection/regions-selection-022.html | 55 - .../selection/regions-selection-023.html | 57 - .../selection/regions-selection-024.html | 61 - .../selection/regions-selection-025.html | 93 - .../support/css/regions-selection.css | 22 - .../selection/support/img/cat.png | Bin 1883 -> 0 bytes .../support/js/selection-test-helper.js | 261 - .../reference/regions-multicol-003-ref.html | 33 - .../reference/regions-multicol-006-ref.html | 38 - .../reference/regions-multicol-008-ref.html | 41 - .../reference/regions-multicol-009-ref.html | 38 - .../reference/regions-multicol-012-ref.html | 58 - .../reference/regions-multicol-013-ref.html | 38 - .../reference/regions-multicol-016-ref.html | 46 - .../reference/regions-multicol-017-ref.html | 65 - .../reference/regions-multicol-019-ref.html | 43 - .../reference/regions-multicol-024-ref.html | 36 - .../reference/regions-multicol-028-ref.html | 41 - .../multicolumn/regions-multicol-003.html | 73 - .../multicolumn/regions-multicol-004.html | 70 - .../multicolumn/regions-multicol-006.html | 84 - .../multicolumn/regions-multicol-008.html | 87 - .../multicolumn/regions-multicol-009.html | 82 - .../multicolumn/regions-multicol-011.html | 87 - .../multicolumn/regions-multicol-012.html | 81 - .../multicolumn/regions-multicol-013.html | 81 - .../multicolumn/regions-multicol-015.html | 79 - .../multicolumn/regions-multicol-016.html | 82 - .../multicolumn/regions-multicol-017.html | 94 - .../multicolumn/regions-multicol-019.html | 70 - .../multicolumn/regions-multicol-021.html | 77 - .../multicolumn/regions-multicol-022.html | 68 - .../multicolumn/regions-multicol-023.html | 63 - .../multicolumn/regions-multicol-024.html | 84 - .../multicolumn/regions-multicol-025.html | 82 - .../multicolumn/regions-multicol-026.html | 81 - .../multicolumn/regions-multicol-027.html | 81 - .../multicolumn/regions-multicol-028.html | 84 - .../multicolumn/regions-multicol-029.html | 83 - .../position-relative-001.html | 79 - .../reference/position-relative-001-ref.html | 58 - .../region-fragment-break-1-ref.html | 22 - .../css-regions/region-fragment-001-ref.xht | 36 - .../css/css-regions/region-fragment-001.xht | 60 - .../css-regions/region-fragment-002-ref.xht | 51 - .../css/css-regions/region-fragment-002.xht | 73 - .../css-regions/region-fragment-break-1.html | 34 - .../region-stacking-context-001-ref.xht | 18 - .../region-stacking-context-001.xht | 56 - .../css-regions/region-styling-001-ref.xht | 17 - .../css/css-regions/region-styling-001.xht | 35 - .../content-node-layers-001.html | 38 - .../content-node-layers-002.html | 41 - .../content-node-layers-003.html | 38 - .../content-node-layers-004.html | 59 - .../content-node-layers-005.html | 57 - .../javascript-stacking-context-001.html | 137 - .../javascript-stacking-context-002.html | 123 - .../content-node-layers-001-ref.html | 31 - .../content-node-layers-002-ref.html | 34 - .../content-node-layers-003-ref.html | 37 - .../content-node-layers-004-ref.html | 51 - .../content-node-layers-005-ref.html | 39 - .../reference/regions-dialog-001-ref.html | 34 - .../reference/regions-dialog-002-ref.html | 37 - .../reference/regions-layers-001-ref.html | 32 - .../reference/regions-layers-002-ref.html | 47 - .../reference/regions-layers-003-ref.html | 41 - .../regions-modal-dialog-001-ref.html | 34 - .../regions-modal-dialog-002-ref.html | 28 - .../regions-stacking-context-001-ref.html | 68 - .../regions-stacking-context-002-ref.html | 60 - .../regions-stacking-context-003-ref.html | 64 - .../regions-stacking-context-004-ref.html | 60 - .../regions-stacking-context-005-ref.html | 43 - .../stacking-context/regions-dialog-001.html | 48 - .../stacking-context/regions-dialog-002.html | 51 - .../stacking-context/regions-layers-001.html | 51 - .../stacking-context/regions-layers-002.html | 56 - .../stacking-context/regions-layers-003.html | 62 - .../regions-modal-dialog-001.html | 48 - .../regions-modal-dialog-002.html | 37 - .../regions-stacking-context-001.html | 84 - .../regions-stacking-context-002.html | 76 - .../regions-stacking-context-003.html | 75 - .../regions-stacking-context-004.html | 74 - .../regions-stacking-context-005.html | 60 - .../css/css-regions/support/1x1-green.png | Bin 135 -> 0 bytes .../css/css-regions/support/1x1-lime.png | Bin 135 -> 0 bytes .../css/css-regions/support/1x1-maroon.png | Bin 109 -> 0 bytes .../css/css-regions/support/1x1-navy.png | Bin 109 -> 0 bytes .../css/css-regions/support/1x1-red.png | Bin 135 -> 0 bytes .../css/css-regions/support/1x1-white.png | Bin 109 -> 0 bytes .../css/css-regions/support/60x60-gg-rr.png | Bin 224 -> 0 bytes .../css/css-regions/support/60x60-green.png | Bin 218 -> 0 bytes .../css/css-regions/support/60x60-red.png | Bin 217 -> 0 bytes .../css/css-regions/support/README | 28 - .../css/css-regions/support/a-green.css | 1 - .../css/css-regions/support/b-green.css | 1 - .../css/css-regions/support/c-red.css | 1 - .../css/css-regions/support/cat.png | Bin 1883 -> 0 bytes .../support/pattern-grg-rgr-grg.png | Bin 222 -> 0 bytes .../support/pattern-grg-rrg-rgg.png | Bin 231 -> 0 bytes .../support/pattern-rgr-grg-rgr.png | Bin 223 -> 0 bytes .../css/css-regions/support/pattern-tr.png | Bin 137 -> 0 bytes .../css/css-regions/support/square-purple.png | Bin 92 -> 0 bytes .../css/css-regions/support/square-teal.png | Bin 92 -> 0 bytes .../css/css-regions/support/square-white.png | Bin 78 -> 0 bytes .../css/css-regions/support/swatch-blue.png | Bin 84 -> 0 bytes .../css/css-regions/support/swatch-green.png | Bin 84 -> 0 bytes .../css/css-regions/support/swatch-lime.png | Bin 84 -> 0 bytes .../css/css-regions/support/swatch-orange.png | Bin 84 -> 0 bytes .../css/css-regions/support/swatch-red.png | Bin 84 -> 0 bytes .../css/css-regions/support/swatch-teal.png | Bin 156 -> 0 bytes .../css/css-regions/support/swatch-white.png | Bin 85 -> 0 bytes .../css/css-regions/support/swatch-yellow.png | Bin 84 -> 0 bytes .../css/css-regions/support/test-bl.png | Bin 1368 -> 0 bytes .../css/css-regions/support/test-br.png | Bin 1045 -> 0 bytes .../css/css-regions/support/test-outer.png | Bin 2412 -> 0 bytes .../css/css-regions/support/test-tl.png | Bin 1025 -> 0 bytes .../css/css-regions/support/test-tr.png | Bin 1235 -> 0 bytes .../css/css-regions/test-plan/index.html | 377 - .../reference/regions-transforms-001-ref.html | 19 - .../reference/regions-transforms-008-ref.html | 37 - .../reference/regions-transforms-010-ref.html | 21 - .../regions-transforms-013-alt-ref.html | 21 - .../reference/regions-transforms-013-ref.html | 22 - .../reference/regions-transforms-014-ref.html | 22 - .../reference/regions-transforms-016-ref.html | 21 - .../reference/regions-transforms-017-ref.html | 25 - .../reference/regions-transforms-018-ref.html | 31 - .../reference/regions-transforms-019-ref.html | 56 - .../reference/regions-transforms-020-ref.html | 22 - .../transforms/regions-transforms-001.html | 35 - .../transforms/regions-transforms-002.html | 44 - .../transforms/regions-transforms-003.html | 44 - .../transforms/regions-transforms-004.html | 63 - .../transforms/regions-transforms-005.html | 65 - .../transforms/regions-transforms-006.html | 54 - .../transforms/regions-transforms-007.html | 52 - .../transforms/regions-transforms-008.html | 76 - .../transforms/regions-transforms-009.html | 76 - .../transforms/regions-transforms-010.html | 45 - .../transforms/regions-transforms-011.html | 54 - .../transforms/regions-transforms-012.html | 46 - .../transforms/regions-transforms-013.html | 48 - .../transforms/regions-transforms-014.html | 40 - .../transforms/regions-transforms-015.html | 41 - .../transforms/regions-transforms-016.html | 69 - .../transforms/regions-transforms-017.html | 58 - .../transforms/regions-transforms-018.html | 51 - .../transforms/regions-transforms-019.html | 62 - .../transforms/regions-transforms-020.html | 62 - .../transforms/regions-transforms-021.html | 54 - .../transforms/regions-transforms-022.html | 85 - .../css-regions/variable-width-001-ref.xht | 26 - .../css/css-regions/variable-width-001.xht | 66 - ...ered-list-direction-and-writing-modes.html | 86 - ...-list-direction-and-writing-modes-ref.html | 76 - .../css/css-syntax/escaped-eof.html | 2 +- ...te-space-pre-wrap-trailing-spaces-004.html | 4 +- ...te-space-pre-wrap-trailing-spaces-005.html | 4 +- ...te-space-pre-wrap-trailing-spaces-006.html | 28 + ...te-space-pre-wrap-trailing-spaces-007.html | 35 + ...te-space-pre-wrap-trailing-spaces-008.html | 35 + ...te-space-pre-wrap-trailing-spaces-009.html | 35 + ...te-space-pre-wrap-trailing-spaces-010.html | 28 + ...te-space-pre-wrap-trailing-spaces-011.html | 35 + .../transitionevent-interface.html | 14 +- .../stylevalue-objects/parse-invalid.html | 10 +- .../stylevalue-objects/parseAll-invalid.html | 10 +- .../cssKeywordValue-invalid.html | 2 +- .../cssKeywordValue-value.html | 2 +- .../cssPerspective.tentative.html | 4 +- .../cssPositionValue-invalid.html | 8 +- .../cssRotate.tentative.html | 14 +- .../cssScale.tentative.html | 12 +- .../cssSkew.tentative.html | 6 +- .../cssSkewX.tentative.html | 4 +- .../cssSkewY.tentative.html | 4 +- ...formComponent-toMatrix-relative-units.html | 4 +- .../cssTransformValue.tentative.html | 6 +- .../cssTranslate.tentative.html | 12 +- ...ssUnparsedValue-indexed-getter-setter.html | 2 +- .../cssVariableReferenceValue-invalid.html | 4 +- .../cssVariableReferenceValue-variable.html | 4 +- .../add-two-types.tentative.html | 4 +- .../numeric-objects/arithmetic.tentative.html | 8 +- .../cssMathValue.tentative.html | 6 +- .../numeric-objects/cssUnitValue.html | 4 +- ...ricvalue-multiply-two-types.tentative.html | 2 +- .../numeric-objects/parse.tentative.html | 8 +- .../numeric-objects/to.tentative.html | 16 +- .../numeric-objects/toSum.tentative.html | 12 +- .../computed/get-invalid.html | 2 +- .../computed/getAll.tentative.html | 2 +- .../computed/has.tentative.html | 2 +- .../declared/append.tentative.html | 2 +- .../declared/delete-invalid.html | 2 +- .../declared/get-invalid.html | 2 +- .../declared/getAll.tentative.html | 2 +- .../declared/has.tentative.html | 2 +- .../declared/set-shorthand.html | 2 +- .../declared/set.tentative.html | 10 +- .../inline/append.tentative.html | 2 +- .../inline/delete-invalid.html | 2 +- .../inline/get-invalid.html | 2 +- .../inline/getAll.tentative.html | 2 +- .../inline/has.tentative.html | 2 +- .../inline/set-shorthand.html | 2 +- .../inline/set.tentative.html | 10 +- .../properties/resources/testsuite.js | 2 +- .../ch-pseudo-recalc-on-font-load.html | 88 + .../elementFromPoint-parameters.html | 12 +- .../css/cssom/CSSGroupingRule-insertRule.html | 8 +- .../cssom/CSSStyleSheet-constructable.html | 16 +- .../css/cssom/CSSStyleSheet.html | 8 +- .../css/cssom/at-namespace.html | 4 +- .../css/cssom/computed-style-001.html | 6 +- .../cssom/computed-style-set-property.html | 8 +- .../cssom/cssstyledeclaration-mutability.html | 2 +- .../web-platform-tests/css/cssom/escape.html | 2 +- .../css/cssom/getComputedStyle-pseudo.html | 2 +- .../css/cssom/insertRule-import-no-index.html | 4 +- .../cssom/insertRule-namespace-no-index.html | 4 +- .../css/cssom/insertRule-syntax-error-01.html | 2 +- .../css/cssom/medialist-interfaces-002.html | 2 +- .../css/cssom/stylesheet-same-origin.sub.html | 6 +- .../svgfeblendelement-mode-001.html | 6 +- .../css/geometry/DOMMatrix-001.html | 6 +- .../geometry/DOMMatrix-css-string.worker.js | 4 +- .../css/geometry/DOMMatrix-stringifier.html | 4 +- .../DOMMatrix2DInit-validate-fixup.html | 4 +- .../DOMMatrixInit-validate-fixup.html | 2 +- .../css/geometry/DOMPoint-002.html | 2 +- .../css/geometry/DOMQuad-001.html | 10 +- .../css/geometry/DOMQuad-002.html | 6 +- .../css/geometry/spec-examples.html | 2 +- .../parsing/offset-path-parsing-valid.html | 4 + .../attribute-case/syntax.html | 2 +- .../css/selectors/user-invalid.html | 2 +- .../css/selectors/webkit-pseudo-element.html | 4 +- .../css/support/parsing-testcommon.js | 4 +- .../CustomElementRegistry.html | 92 +- .../Document-createElement.html | 4 +- .../HTMLElement-attachInternals.html | 20 +- .../HTMLElement-constructor.html | 18 +- .../custom-element-registry/define.html | 32 +- .../ElementInternals-NotSupportedError.html | 18 +- .../ElementInternals-validation.html | 6 +- .../htmlconstructor/newtarget.html | 9 +- .../reactions/with-exceptions.html | 2 +- ...ic-markup-insertion-counter-construct.html | 10 +- ...ic-markup-insertion-counter-reactions.html | 10 +- .../HTMLCollection-as-prototype.html | 2 +- .../collections/HTMLCollection-delete.html | 4 +- .../collections/HTMLCollection-own-props.html | 6 +- ...Collection-supported-property-indices.html | 12 +- ...MLCollection-supported-property-names.html | 8 +- .../dom/events/CustomEvent.html | 2 +- .../dom/events/Event-constructors.html | 6 +- .../dom/events/Event-dispatch-redispatch.html | 10 +- .../dom/events/Event-initEvent.html | 2 +- .../events/Event-subclasses-constructors.html | 2 +- .../dom/events/EventTarget-dispatchEvent.html | 8 +- .../dom/nodes/CharacterData-appendChild.html | 2 +- .../dom/nodes/CharacterData-appendData.html | 2 +- .../dom/nodes/CharacterData-deleteData.html | 8 +- .../dom/nodes/CharacterData-insertData.html | 8 +- .../dom/nodes/CharacterData-replaceData.html | 8 +- .../nodes/CharacterData-substringData.html | 10 +- .../DOMImplementation-createDocument.html | 12 +- .../DOMImplementation-createDocumentType.html | 2 +- .../Document-Element-getElementsByTagName.js | 2 +- .../dom/nodes/Document-adoptNode.html | 2 +- .../dom/nodes/Document-createAttribute.html | 4 +- .../dom/nodes/Document-createElement.html | 2 +- .../dom/nodes/Document-createElementNS.html | 2 +- .../dom/nodes/Document-createEvent.https.html | 12 +- .../Document-createProcessingInstruction.js | 2 +- .../dom/nodes/Document-createTreeWalker.html | 2 +- .../dom/nodes/Element-classlist.html | 4 +- .../nodes/Element-insertAdjacentElement.html | 8 +- .../dom/nodes/Element-insertAdjacentText.html | 8 +- .../dom/nodes/Element-matches.js | 4 +- .../dom/nodes/Node-appendChild.html | 10 +- .../dom/nodes/Node-contains-xml.xml | 4 +- .../dom/nodes/Node-insertBefore.html | 88 +- .../dom/nodes/Node-removeChild.html | 10 +- .../dom/nodes/Node-replaceChild.html | 58 +- .../dom/nodes/ParentNode-querySelector-All.js | 10 +- .../dom/nodes/Text-splitText.html | 2 +- .../dom/nodes/adoption.window.js | 2 +- .../dom/nodes/append-on-Document.html | 6 +- .../dom/nodes/attributes.html | 40 +- .../dom/nodes/insert-adjacent.html | 10 +- .../dom/nodes/pre-insertion-checks.js | 16 +- .../dom/nodes/prepend-on-Document.html | 6 +- .../dom/ranges/Range-cloneContents.html | 2 +- .../ranges/Range-compareBoundaryPoints.html | 4 +- .../dom/ranges/Range-comparePoint-2.html | 4 +- .../dom/ranges/Range-comparePoint.html | 6 +- .../dom/ranges/Range-extractContents.html | 2 +- .../dom/ranges/Range-insertNode.html | 2 +- .../ranges/Range-intersectsNode-binding.html | 24 +- .../dom/ranges/Range-isPointInRange.html | 4 +- .../dom/ranges/Range-selectNode.html | 8 +- .../dom/ranges/Range-set.html | 16 +- .../dom/ranges/Range-surroundContents.html | 2 +- .../dom/ranges/StaticRange-constructor.html | 18 +- .../dom/traversal/NodeIterator.html | 9 +- .../TreeWalker-acceptNode-filter.html | 20 +- .../dom/traversal/TreeWalker-basic.html | 10 +- .../dom/traversal/TreeWalker.html | 14 +- .../DOMParser-parseFromString-html.html | 2 +- .../domparsing/createContextualFragment.html | 2 +- .../domparsing/innerhtml-01.xhtml | 4 +- .../domparsing/innerhtml-05.xhtml | 2 +- .../insert_adjacent_html-xhtml.xhtml | 8 +- .../domparsing/insert_adjacent_html.html | 6 +- .../domparsing/insert_adjacent_html.js | 16 +- .../domparsing/outerhtml-01.html | 2 +- .../wpt/web-platform-tests/domxpath/001.html | 2 +- .../wpt/web-platform-tests/domxpath/002.html | 2 +- .../domxpath/evaluator-constructor.html | 2 +- .../domxpath/lexical-structure.html | 10 +- .../editing/other/non-html-document.html | 2 +- .../background-image-data-uri.html | 4 +- .../background-image-multiple-elements.html | 4 +- .../background-image-stretched.html | 4 +- .../element-timing/buffer-before-onload.html | 4 +- .../element-timing/buffered-flag.html | 4 +- .../cross-origin-element.sub.html | 4 +- .../cross-origin-iframe-element.sub.html | 4 +- .../element-timing/css-generated-text.html | 4 +- .../element-timing/disconnect-image.html | 4 +- .../element-only-when-fully-active.html | 3 + .../first-letter-background.html | 4 +- .../element-timing/fixed-id-identifier.html | 4 +- .../element-timing/image-TAO.sub.html | 4 +- .../element-timing/image-carousel.html | 4 +- .../element-timing/image-clipped-svg.html | 4 +- .../element-timing/image-data-uri.html | 4 +- .../element-timing/image-not-added.html | 4 +- .../image-not-fully-visible.html | 4 +- .../element-timing/image-rect-iframe.html | 4 +- .../element-timing/image-src-change.html | 4 +- .../element-timing/image-with-css-scale.html | 4 +- .../element-timing/image-with-rotation.html | 4 +- .../images-repeated-resource.html | 4 +- .../element-timing/invisible-images.html | 4 +- .../multiple-background-images.html | 4 +- .../observe-background-image.html | 4 +- .../element-timing/observe-child-element.html | 4 +- .../element-timing/observe-elementtiming.html | 4 +- .../observe-empty-attribute.html | 4 +- .../observe-multiple-images.html | 4 +- .../element-timing/observe-shadow-image.html | 4 +- .../element-timing/observe-shadow-text.html | 4 +- .../element-timing/observe-svg-image.html | 4 +- .../element-timing/observe-text.html | 4 +- .../element-timing/observe-video-poster.html | 4 +- .../progressively-loaded-image.html | 4 +- .../element-timing/rectangular-image.html | 4 +- .../element-timing/redirects-tao-star.html | 4 +- .../element-timing/retrievability.html | 4 +- .../element-timing/scroll-to-text.html | 4 +- .../text-with-display-style.html | 4 +- .../element-timing/toJSON.html | 4 +- .../encoding/api-invalid-label.any.js | 2 +- .../encoding/api-replacement-encodings.any.js | 2 +- .../encoding/encodeInto.any.js | 4 +- .../encoding/streams/decode-attributes.any.js | 8 +- .../textdecoder-fatal-single-byte.any.js | 2 +- .../textdecoder-fatal-streaming.any.js | 6 +- .../encoding/textdecoder-fatal.any.js | 2 +- .../textdecoder-utf16-surrogates.any.js | 2 +- .../filesystemfileentry-file-manual.html | 2 +- .../eventsource-constructor-url-bogus.any.js | 2 +- ...-disabled-by-feature-policy.https.sub.html | 2 +- .../reporting/document-write-reporting.html | 2 +- .../generic-sensor-reporting.https.html | 8 +- .../reporting/payment-reporting.https.html | 2 +- .../reporting/sync-xhr-reporting.html | 2 +- .../api/headers/header-values-normalize.html | 6 +- .../fetch/api/headers/header-values.html | 2 +- .../fetch/api/headers/headers-basic.html | 2 +- .../fetch/api/headers/headers-errors.html | 28 +- .../fetch/api/headers/headers-record.html | 4 +- .../fetch/api/request/request-cache.js | 2 +- .../fetch/api/request/request-disturbed.html | 8 +- .../fetch/api/request/request-error.html | 4 +- .../fetch/api/request/request-init-002.html | 4 +- .../api/request/request-init-stream.any.js | 2 +- .../fetch/api/request/request-keepalive.html | 2 +- .../fetch/api/response/response-clone.html | 2 +- .../fetch/api/response/response-error.html | 6 +- .../api/response/response-from-stream.any.js | 6 +- .../response/response-static-redirect.html | 4 +- .../response/response-stream-disturbed-5.html | 8 +- .../fetch/http-cache/http-cache.js | 2 +- ...vas-remote-read-remote-image-redirect.html | 2 +- .../fullscreen-pseudo-class-support.html | 4 +- .../generic-sensor-feature-policy-test.sub.js | 2 +- .../generic-sensor/generic-sensor-tests.js | 10 +- .../getCurrentPosition_TypeError.html | 12 +- .../watchPosition_TypeError.html | 12 +- .../history/the-history-interface/001.html | 16 +- .../history/the-history-interface/002.html | 16 +- .../history_properties_only_fully_active.html | 16 +- .../history_pushstate_err.html | 2 +- .../history_replacestate_err.html | 2 +- .../location-protocol-setter.html | 2 +- ...totype-setting-same-origin-domain.sub.html | 2 +- .../location_assign.html | 2 +- .../api_swapcache_error.https.html | 2 +- .../api_update_error.https.html | 2 +- ...ss-origin-due-to-document-domain-only.html | 10 +- .../cross-origin-objects.html | 68 +- .../origin/origin-of-data-document.html | 2 +- .../document_domain_setter.html | 38 +- .../sandboxed-document_domain.html | 10 +- .../sandbox-disallow-same-origin.html | 2 +- ...ripts-via-unsandboxed-popup.tentative.html | 4 +- .../window-security.https.html | 2 +- .../window-indexed-properties-strict.html | 18 +- .../window-indexed-properties.html | 12 +- ...totype-setting-same-origin-domain.sub.html | 2 +- .../document-domain-nested-navigate.window.js | 2 +- .../frameElement.sub.html | 2 +- .../require-corp-about-blank.html | 18 +- .../require-corp-about-srcdoc.html | 17 +- .../dom-tree-accessors/Document.body.html | 6 +- .../global-attributes/dataset-set.html | 6 +- .../dnd/datastore/datatransfer-types.html | 2 +- .../html/editing/dnd/synthetic/001.html | 4 +- .../editing/dnd/target-origin/001-manual.html | 40 +- .../editing/dnd/target-origin/002-manual.html | 6 +- .../contentEditable-invalidvalue.html | 2 +- ...ser-interaction-editing-designMode-svg.svg | 12 +- ...ser-interaction-editing-designMode-xml.xml | 12 +- .../collections/domstringlist.html | 4 +- .../collections/historical.html | 4 +- .../collections/htmlallcollection.html | 4 +- .../htmlformcontrolscollection.html | 2 +- .../collections/htmloptionscollection.html | 2 +- .../no-coop-coep.https.any.js | 6 +- .../no-transferring.https.html | 12 +- .../serialization-via-history.https.html | 4 +- .../serialization-via-idb.any.js | 4 +- ...serialization-via-notifications-api.any.js | 4 +- .../structuredclone_0.html | 4 +- .../transfer-errors.window.js | 8 +- .../media-elements/historical.html | 2 +- .../HTMLMediaElement/addTextTrack.html | 8 +- .../interfaces/TextTrack/removeCue.html | 14 +- .../interfaces/TextTrackCue/constructor.html | 2 +- .../interfaces/TextTrackCue/endTime.html | 6 +- .../interfaces/TextTrackCue/startTime.html | 6 +- .../interfaces/TextTrackCueList/getter.html | 4 +- .../interfaces/TextTrackList/getter.html | 2 +- .../interfaces/TrackEvent/createEvent.html | 2 +- .../track-element/track-add-remove-cue.html | 4 +- .../track-element/track-addtrack-kind.html | 2 +- .../track-element/track-cue-mutable.html | 8 +- .../media-elements/volume_nonfinite.html | 2 +- .../the-audio-element/audio_constructor.html | 6 +- .../context.arguments.missing.html | 2 +- .../the-canvas-element/historical.html | 4 +- .../the-canvas-element/imagedata.html | 12 +- .../security.drawImage.canvas.cross.html | 4 +- .../security.drawImage.canvas.redirect.html | 4 +- .../security.drawImage.image.cross.html | 4 +- .../security.drawImage.image.redirect.html | 4 +- ...curity.pattern.canvas.fillStyle.cross.html | 4 +- ...ity.pattern.canvas.fillStyle.redirect.html | 4 +- ...rity.pattern.canvas.strokeStyle.cross.html | 4 +- ...y.pattern.canvas.strokeStyle.redirect.html | 4 +- .../security.pattern.cross.cross.html | 4 +- .../security.pattern.cross.redirect.html | 4 +- .../security.pattern.fillStyle.sub.html | 4 +- ...ecurity.pattern.image.fillStyle.cross.html | 4 +- ...rity.pattern.image.fillStyle.redirect.html | 4 +- ...urity.pattern.image.strokeStyle.cross.html | 4 +- ...ty.pattern.image.strokeStyle.redirect.html | 4 +- .../security.reset.cross.html | 2 +- .../security.reset.redirect.html | 2 +- .../the-embed-element/historical.html | 2 +- .../the-object-element/historical.html | 2 +- .../form-submission-0/FormDataEvent.window.js | 17 +- .../form-submission-0/SubmitEvent.window.js | 5 +- .../selection-not-application.html | 10 +- .../textfieldselection-setRangeText.html | 4 +- .../form-indexed-element.html | 2 +- .../the-form-element/form-nameditem.html | 10 +- .../the-form-element/form-requestsubmit.html | 8 +- .../forms/the-input-element/files.html | 4 +- .../forms/the-input-element/hidden.html | 4 +- .../forms/the-input-element/maxlength.html | 2 +- .../forms/the-input-element/minlength.html | 2 +- .../forms/the-input-element/selection.html | 10 +- .../forms/the-input-element/text.html | 4 +- .../the-input-element/type-change-state.html | 2 +- .../forms/the-input-element/valueMode.html | 2 +- .../forms/the-meter-element/meter.html | 12 +- .../forms/the-select-element/select-add.html | 2 +- .../textarea-maxlength.html | 2 +- .../textarea-minlength.html | 2 +- .../the-dialog-element/dialog-showModal.html | 4 +- .../template-content-hierarcy.html | 16 +- .../the-table-element/caption-methods.html | 6 +- .../insertRow-method-01.html | 4 +- .../the-table-element/remove-row.html | 6 +- .../tabular-data/the-table-element/tFoot.html | 4 +- .../tabular-data/the-table-element/tHead.html | 6 +- .../the-tbody-element/deleteRow.html | 6 +- .../the-tbody-element/insertRow.html | 4 +- .../the-tr-element/deleteCell.html | 6 +- .../the-tr-element/insertCell.html | 4 +- .../html/webappapis/atob/base64.html | 4 +- .../document.close-01.xhtml | 2 +- .../document-write/document.write-01.xhtml | 2 +- .../document.writeln-01.xhtml | 2 +- ...t-exception-vs-return-origin.sub.window.js | 8 +- .../bailout-exception-vs-return-xml.window.js | 4 +- ...e-effects-same-origin-domain.sub.window.js | 2 +- .../bailout-side-effects-xml.window.js | 2 +- .../custom-element.window.js | 2 +- .../document.open-01.xhtml | 2 +- .../document.open-02.html | 2 +- ...-document-open-same-origin-domain.sub.html | 4 +- .../microtask-queuing/queue-microtask.any.js | 12 +- .../messageevent-constructor.https.html | 4 +- .../requires-failure.https.any.js | 2 +- .../promise-rejection-event-constructor.html | 2 +- .../the-navigator-object/protocol.https.html | 12 +- .../transferFromImageBitmap-detached.html | 2 +- .../import-maps/resources/jest-test-helper.js | 2 +- .../interfaces/css-regions.idl | 33 - .../observer-exceptions.html | 18 +- .../builtins/Array.prototype.join-order.html | 4 +- ...totype.hasOwnProperty-prototype-chain.html | 2 +- .../WeakMap.prototype-properties.html | 6 +- .../kv-storage/interface.https.html | 21 +- .../contracted-image.html | 4 +- .../cross-origin-image.sub.html | 4 +- .../expanded-image.html | 4 +- .../first-letter-background.html | 4 +- .../first-paint-equals-lcp-text.html | 8 +- .../iframe-content-not-observed.html | 4 +- .../image-src-change.html | 4 +- .../invisible-images.html | 4 +- .../larger-image.html | 4 +- .../largest-contentful-paint/larger-text.html | 4 +- .../loadTime-after-appendChild.html | 4 +- .../observe-after-untrusted-scroll.html | 4 +- .../observe-image.html | 4 +- .../observe-text.html | 4 +- .../repeated-image.html | 4 +- .../text-with-display-style.html | 4 +- .../largest-contentful-paint/toJSON.html | 4 +- .../video-poster.html | 4 +- tests/wpt/web-platform-tests/lint.whitelist | 14 - ...nal-crossorigin-applied-tentative.sub.html | 2 +- .../longtask-timing/long-microtask.window.js | 5 +- .../longtask-timing/longtask-attributes.html | 5 +- .../longtask-in-childiframe-crossorigin.html | 5 +- .../longtask-in-childiframe.html | 5 +- .../longtask-in-externalscript.html | 5 +- .../longtask-in-parentiframe.html | 5 +- .../longtask-timing/longtask-in-raf.html | 5 +- ...ongtask-in-sibling-iframe-crossorigin.html | 5 +- .../longtask-in-sibling-iframe.html | 5 +- .../longtask-timing/longtask-tojson.html | 7 +- .../longtask-in-new-window.html | 5 +- .../supported-longtask-types.window.js | 31 +- .../space-vertical-align.tentative-ref.html | 15 + .../space-vertical-align.tentative.html | 22 + .../SourceBuffer-abort-readyState.html | 2 +- .../SourceBuffer-abort-removed.html | 2 +- .../URL-createObjectURL-null.html | 2 +- .../mediasource-addsourcebuffer.html | 6 +- .../mediasource-append-buffer.html | 18 +- .../mediasource-appendwindow.html | 8 +- .../media-source/mediasource-buffered.html | 2 +- .../media-source/mediasource-changetype.html | 8 +- .../media-source/mediasource-closed.html | 16 +- .../media-source/mediasource-duration.html | 6 +- .../mediasource-endofstream-invaliderror.html | 6 +- .../mediasource-liveseekable.html | 4 +- .../media-source/mediasource-remove.html | 6 +- .../mediasource-removesourcebuffer.html | 8 +- ...iasource-sourcebuffer-mode-timestamps.html | 2 +- .../mediasource-sourcebuffer-mode.html | 8 +- ...ediasource-sourcebuffer-trackdefaults.html | 6 +- .../mediasource-timestamp-offset.html | 4 +- .../mediasource-trackdefault.html | 2 +- .../mediasource-trackdefaultlist.html | 4 +- .../ImageCapture-creation.https.html | 6 +- .../MediaRecorder-error.html | 2 +- .../MediaRecorder-events-and-exceptions.html | 16 +- .../MediaRecorder-mimetype.html | 6 +- .../MediaRecorder-stop.html | 6 +- .../historical.https.html | 2 +- .../mediasession/mediametadata.html | 14 +- .../mimesniff/mime-types/parsing.any.js | 4 +- ...ge-MessagePort-manual.https.tentative.html | 1 + ...sage-MessagePort.tentative.https.window.js | 3 +- .../notifications/constructor-invalid.html | 2 +- .../2d.missingargs.html | 162 +- .../2d.missingargs.worker.js | 162 +- .../2d.drawImage.null.html | 2 +- .../2d.drawImage.null.worker.js | 2 +- .../2d.drawImage.wrongtype.html | 6 +- .../2d.drawImage.wrongtype.worker.js | 6 +- .../2d.drawImage.zerocanvas.html | 6 +- .../2d.drawImage.zerocanvas.worker.js | 6 +- .../2d.drawImage.zerosource.html | 6 +- .../2d.drawImage.zerosource.image.html | 6 +- .../2d.drawImage.zerosource.image.worker.js | 6 +- .../2d.drawImage.zerosource.worker.js | 6 +- .../2d.gradient.linear.nonfinite.html | 46 +- .../2d.gradient.linear.nonfinite.worker.js | 46 +- .../2d.gradient.object.invalidcolour.html | 10 +- ...2d.gradient.object.invalidcolour.worker.js | 10 +- .../2d.gradient.object.invalidoffset.html | 10 +- ...2d.gradient.object.invalidoffset.worker.js | 10 +- .../2d.gradient.radial.negative.html | 6 +- .../2d.gradient.radial.negative.worker.js | 6 +- .../2d.gradient.radial.nonfinite.html | 150 +- .../2d.gradient.radial.nonfinite.worker.js | 150 +- .../2d.pattern.basic.zerocanvas.html | 6 +- .../2d.pattern.basic.zerocanvas.worker.js | 6 +- .../2d.pattern.image.null.html | 2 +- .../2d.pattern.image.null.worker.js | 2 +- .../2d.pattern.image.string.html | 2 +- .../2d.pattern.image.string.worker.js | 2 +- .../2d.pattern.image.undefined.html | 2 +- .../2d.pattern.image.undefined.worker.js | 2 +- .../2d.pattern.repeat.case.html | 2 +- .../2d.pattern.repeat.case.worker.js | 2 +- .../2d.pattern.repeat.nullsuffix.html | 2 +- .../2d.pattern.repeat.nullsuffix.worker.js | 2 +- .../2d.pattern.repeat.undefined.html | 2 +- .../2d.pattern.repeat.undefined.worker.js | 2 +- .../2d.pattern.repeat.unrecognised.html | 2 +- .../2d.pattern.repeat.unrecognised.worker.js | 2 +- .../2d.pattern.repeat.unrecognisednull.html | 2 +- ....pattern.repeat.unrecognisednull.worker.js | 2 +- .../path-objects/2d.path.arc.negative.html | 2 +- .../2d.path.arc.negative.worker.js | 2 +- .../path-objects/2d.path.arcTo.negative.html | 2 +- .../2d.path.arcTo.negative.worker.js | 2 +- .../2d.imageData.create1.zero.html | 2 +- .../2d.imageData.create1.zero.worker.js | 2 +- .../2d.imageData.create2.nonfinite.html | 28 +- .../2d.imageData.create2.nonfinite.worker.js | 28 +- .../2d.imageData.create2.zero.html | 6 +- .../2d.imageData.create2.zero.worker.js | 6 +- .../2d.imageData.get.nonfinite.html | 92 +- .../2d.imageData.get.nonfinite.worker.js | 92 +- .../2d.imageData.get.zero.html | 6 +- .../2d.imageData.get.zero.worker.js | 6 +- .../2d.imageData.put.nonfinite.html | 164 +- .../2d.imageData.put.nonfinite.worker.js | 164 +- .../2d.imageData.put.null.html | 2 +- .../2d.imageData.put.null.worker.js | 2 +- .../2d.imageData.put.wrongtype.html | 6 +- .../2d.imageData.put.wrongtype.worker.js | 6 +- .../context.arguments.missing.html | 2 +- .../context.arguments.missing.worker.js | 2 +- .../context.casesensitive.html | 2 +- .../context.casesensitive.worker.js | 2 +- .../context.emptystring.html | 2 +- .../context.emptystring.worker.js | 2 +- .../context.unrecognised.badname.html | 2 +- .../context.unrecognised.badname.worker.js | 2 +- .../context.unrecognised.badsuffix.html | 2 +- .../context.unrecognised.badsuffix.worker.js | 2 +- .../context.unrecognised.nullsuffix.html | 2 +- .../context.unrecognised.nullsuffix.worker.js | 2 +- .../context.unrecognised.unicode.html | 2 +- .../context.unrecognised.unicode.worker.js | 2 +- .../offscreencanvas.constructor.html | 12 +- .../offscreencanvas.constructor.worker.js | 12 +- .../offscreencanvas.getcontext.html | 2 +- .../offscreencanvas.getcontext.worker.js | 2 +- .../offscreencanvas.resize.html | 8 +- ...fscreencanvas.transfer.to.imagebitmap.html | 4 +- ...encanvas.transfercontrol.to.offscreen.html | 4 +- ...canvas.transfercontrol.to.offscreen.w.html | 4 +- .../offscreencanvas.transferrable.html | 8 +- .../Microsoft/history/history_000.htm | 8 +- .../orientation-sensor-tests.js | 6 +- .../paint-timing/basetest.html | 1 + .../paint-timing/buffered-flag.window.js | 1 + .../child-painting-first-image.html | 1 + .../first-contentful-bg-image.html | 1 + .../paint-timing/first-contentful-canvas.html | 1 + .../paint-timing/first-contentful-image.html | 1 + .../paint-timing/first-contentful-paint.html | 1 + .../paint-timing/first-contentful-svg.html | 1 + .../paint-timing/first-image-child.html | 1 + .../paint-timing/first-paint-bg-color.html | 1 + .../paint-timing/first-paint-only.html | 1 + .../paint-timing/paint-visited.html | 6 +- .../sibling-painting-first-image.html | 1 + .../supported-paint-type.window.js | 35 +- ...yment-request-ctor-pmi-handling.https.html | 8 +- .../complete-method.https.html | 2 +- .../constructor.https.html | 6 +- ...ibutes-and-toJSON-method-manual.https.html | 4 +- ...pdateWith-call-immediate-manual.https.html | 4 +- .../updateWith-state-checks-manual.https.html | 4 +- .../updatewith-method.https.html | 4 +- ...ctive-document-cross-origin.https.sub.html | 2 +- .../active-document-same-origin.https.html | 2 +- ...constructor_convert_method_data.https.html | 8 +- .../payment-request/historical.https.html | 2 +- .../payment-request-constructor.https.html | 44 +- ...quest-ctor-currency-code-checks.https.html | 32 +- ...yment-request-ctor-pmi-handling.https.html | 8 +- .../po-observe-type.any.js | 6 +- .../performance-timeline/po-observe.any.js | 6 +- ...leasepointercapture_invalid_pointerid.html | 2 +- ...t_setpointercapture_invalid_pointerid.html | 2 +- .../portal-activate-event-constructor.html | 2 +- ...sentationConnection_send-manual.https.html | 6 +- .../PresentationRequest_error.https.html | 12 +- ...resentationRequest_mixedcontent.https.html | 2 +- ...onRequest_mixedcontent_multiple.https.html | 2 +- .../controlling-ua/defaultRequest.https.html | 2 +- ...sentationConnection_send-manual.https.html | 2 +- .../fetch-api-request.tentative.any.js | 2 +- .../a-tag/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../a-tag/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../fetch/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../fetch/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../fetch/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../fetch/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../fetch/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../fetch/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../fetch/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../fetch/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../fetch/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../img-tag/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../img-tag/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../img-tag/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../img-tag/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../img-tag/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../img-tag/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../img-tag/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../img-tag/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../img-tag/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../xhr/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../xhr/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../xhr/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../xhr/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../xhr/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../xhr/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../xhr/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../xhr/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../a-tag/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../fetch/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../fetch/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../fetch/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../fetch/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../fetch/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../fetch/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../fetch/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../fetch/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../fetch/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../img-tag/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../img-tag/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../img-tag/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../img-tag/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../img-tag/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../img-tag/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../img-tag/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../img-tag/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../img-tag/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../xhr/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../xhr/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../xhr/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../xhr/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../xhr/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../xhr/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../xhr/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../xhr/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../a-tag/cross-http.no-redirect.http.html | 35 + .../a-tag/cross-https.no-redirect.http.html | 35 + .../a-tag/same-http.no-redirect.http.html | 35 + .../a-tag/same-https.no-redirect.http.html | 35 + .../fetch/cross-http.keep-origin.http.html | 35 + .../fetch/cross-http.no-redirect.http.html | 35 + .../fetch/cross-http.swap-origin.http.html | 35 + .../fetch/cross-https.keep-origin.http.html | 35 + .../fetch/cross-https.no-redirect.http.html | 35 + .../fetch/cross-https.swap-origin.http.html | 35 + .../fetch/same-http.keep-origin.http.html | 35 + .../fetch/same-http.no-redirect.http.html | 35 + .../fetch/same-http.swap-origin.http.html | 35 + .../fetch/same-https.keep-origin.http.html | 35 + .../fetch/same-https.no-redirect.http.html | 35 + .../fetch/same-https.swap-origin.http.html | 35 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.swap-origin.http.html | 35 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.swap-origin.http.html | 35 + .../same-https.keep-origin.http.html | 35 + .../same-https.no-redirect.http.html | 35 + .../same-https.swap-origin.http.html | 35 + .../img-tag/cross-http.keep-origin.http.html | 35 + .../img-tag/cross-http.no-redirect.http.html | 35 + .../img-tag/cross-http.swap-origin.http.html | 35 + .../img-tag/cross-https.keep-origin.http.html | 35 + .../img-tag/cross-https.no-redirect.http.html | 35 + .../img-tag/cross-https.swap-origin.http.html | 35 + .../img-tag/same-http.keep-origin.http.html | 35 + .../img-tag/same-http.no-redirect.http.html | 35 + .../img-tag/same-http.swap-origin.http.html | 35 + .../img-tag/same-https.keep-origin.http.html | 35 + .../img-tag/same-https.no-redirect.http.html | 35 + .../img-tag/same-https.swap-origin.http.html | 35 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.swap-origin.http.html | 35 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.swap-origin.http.html | 35 + .../same-https.keep-origin.http.html | 35 + .../same-https.no-redirect.http.html | 35 + .../same-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../xhr/cross-http.keep-origin.http.html | 35 + .../xhr/cross-http.no-redirect.http.html | 35 + .../xhr/cross-http.swap-origin.http.html | 35 + .../xhr/cross-https.keep-origin.http.html | 35 + .../xhr/cross-https.no-redirect.http.html | 35 + .../xhr/cross-https.swap-origin.http.html | 35 + .../unset/xhr/same-http.keep-origin.http.html | 35 + .../unset/xhr/same-http.no-redirect.http.html | 35 + .../unset/xhr/same-http.swap-origin.http.html | 35 + .../xhr/same-https.keep-origin.http.html | 35 + .../xhr/same-https.no-redirect.http.html | 35 + .../xhr/same-https.swap-origin.http.html | 35 + .../a-tag/cross-http.no-redirect.http.html | 36 + .../a-tag/cross-https.no-redirect.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../a-tag/same-https.no-redirect.http.html | 36 + .../fetch/cross-http.keep-origin.http.html | 36 + .../fetch/cross-http.no-redirect.http.html | 36 + .../fetch/cross-http.swap-origin.http.html | 36 + .../fetch/cross-https.keep-origin.http.html | 36 + .../fetch/cross-https.no-redirect.http.html | 36 + .../fetch/cross-https.swap-origin.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../fetch/same-http.swap-origin.http.html | 36 + .../fetch/same-https.keep-origin.http.html | 36 + .../fetch/same-https.no-redirect.http.html | 36 + .../fetch/same-https.swap-origin.http.html | 36 + .../cross-http.keep-origin.http.html | 36 + .../cross-http.no-redirect.http.html | 36 + .../cross-http.swap-origin.http.html | 36 + .../cross-https.keep-origin.http.html | 36 + .../cross-https.no-redirect.http.html | 36 + .../cross-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.swap-origin.http.html | 36 + .../same-https.keep-origin.http.html | 36 + .../same-https.no-redirect.http.html | 36 + .../same-https.swap-origin.http.html | 36 + .../img-tag/cross-http.keep-origin.http.html | 36 + .../img-tag/cross-http.no-redirect.http.html | 36 + .../img-tag/cross-http.swap-origin.http.html | 36 + .../img-tag/cross-https.keep-origin.http.html | 36 + .../img-tag/cross-https.no-redirect.http.html | 36 + .../img-tag/cross-https.swap-origin.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../img-tag/same-http.swap-origin.http.html | 36 + .../img-tag/same-https.keep-origin.http.html | 36 + .../img-tag/same-https.no-redirect.http.html | 36 + .../img-tag/same-https.swap-origin.http.html | 36 + .../cross-http.keep-origin.http.html | 36 + .../cross-http.no-redirect.http.html | 36 + .../cross-http.swap-origin.http.html | 36 + .../cross-https.keep-origin.http.html | 36 + .../cross-https.no-redirect.http.html | 36 + .../cross-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.swap-origin.http.html | 36 + .../same-https.keep-origin.http.html | 36 + .../same-https.no-redirect.http.html | 36 + .../same-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/cross-http.keep-origin.http.html | 36 + .../xhr/cross-http.no-redirect.http.html | 36 + .../xhr/cross-http.swap-origin.http.html | 36 + .../xhr/cross-https.keep-origin.http.html | 36 + .../xhr/cross-https.no-redirect.http.html | 36 + .../xhr/cross-https.swap-origin.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../xhr/same-http.swap-origin.http.html | 36 + .../xhr/same-https.keep-origin.http.html | 36 + .../xhr/same-https.no-redirect.http.html | 36 + .../xhr/same-https.swap-origin.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../a-tag/cross-http.no-redirect.http.html | 36 + .../a-tag/cross-https.no-redirect.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../a-tag/same-https.no-redirect.http.html | 36 + .../fetch/cross-http.keep-origin.http.html | 36 + .../fetch/cross-http.no-redirect.http.html | 36 + .../fetch/cross-http.swap-origin.http.html | 36 + .../fetch/cross-https.keep-origin.http.html | 36 + .../fetch/cross-https.no-redirect.http.html | 36 + .../fetch/cross-https.swap-origin.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../fetch/same-http.swap-origin.http.html | 36 + .../fetch/same-https.keep-origin.http.html | 36 + .../fetch/same-https.no-redirect.http.html | 36 + .../fetch/same-https.swap-origin.http.html | 36 + .../cross-http.keep-origin.http.html | 36 + .../cross-http.no-redirect.http.html | 36 + .../cross-http.swap-origin.http.html | 36 + .../cross-https.keep-origin.http.html | 36 + .../cross-https.no-redirect.http.html | 36 + .../cross-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.swap-origin.http.html | 36 + .../same-https.keep-origin.http.html | 36 + .../same-https.no-redirect.http.html | 36 + .../same-https.swap-origin.http.html | 36 + .../img-tag/cross-http.keep-origin.http.html | 36 + .../img-tag/cross-http.no-redirect.http.html | 36 + .../img-tag/cross-http.swap-origin.http.html | 36 + .../img-tag/cross-https.keep-origin.http.html | 36 + .../img-tag/cross-https.no-redirect.http.html | 36 + .../img-tag/cross-https.swap-origin.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../img-tag/same-http.swap-origin.http.html | 36 + .../img-tag/same-https.keep-origin.http.html | 36 + .../img-tag/same-https.no-redirect.http.html | 36 + .../img-tag/same-https.swap-origin.http.html | 36 + .../cross-http.keep-origin.http.html | 36 + .../cross-http.no-redirect.http.html | 36 + .../cross-http.swap-origin.http.html | 36 + .../cross-https.keep-origin.http.html | 36 + .../cross-https.no-redirect.http.html | 36 + .../cross-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.swap-origin.http.html | 36 + .../same-https.keep-origin.http.html | 36 + .../same-https.no-redirect.http.html | 36 + .../same-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/cross-http.keep-origin.http.html | 36 + .../xhr/cross-http.no-redirect.http.html | 36 + .../xhr/cross-http.swap-origin.http.html | 36 + .../xhr/cross-https.keep-origin.http.html | 36 + .../xhr/cross-https.no-redirect.http.html | 36 + .../xhr/cross-https.swap-origin.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../xhr/same-http.swap-origin.http.html | 36 + .../xhr/same-https.keep-origin.http.html | 36 + .../xhr/same-https.no-redirect.http.html | 36 + .../xhr/same-https.swap-origin.http.html | 36 + .../a-tag/cross-http.no-redirect.http.html | 35 + .../a-tag/cross-https.no-redirect.http.html | 35 + .../a-tag/same-http.no-redirect.http.html | 35 + .../a-tag/same-https.no-redirect.http.html | 35 + .../fetch/cross-http.keep-origin.http.html | 35 + .../fetch/cross-http.no-redirect.http.html | 35 + .../fetch/cross-http.swap-origin.http.html | 35 + .../fetch/cross-https.keep-origin.http.html | 35 + .../fetch/cross-https.no-redirect.http.html | 35 + .../fetch/cross-https.swap-origin.http.html | 35 + .../fetch/same-http.keep-origin.http.html | 35 + .../fetch/same-http.no-redirect.http.html | 35 + .../fetch/same-http.swap-origin.http.html | 35 + .../fetch/same-https.keep-origin.http.html | 35 + .../fetch/same-https.no-redirect.http.html | 35 + .../fetch/same-https.swap-origin.http.html | 35 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.swap-origin.http.html | 35 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.swap-origin.http.html | 35 + .../same-https.keep-origin.http.html | 35 + .../same-https.no-redirect.http.html | 35 + .../same-https.swap-origin.http.html | 35 + .../img-tag/cross-http.keep-origin.http.html | 35 + .../img-tag/cross-http.no-redirect.http.html | 35 + .../img-tag/cross-http.swap-origin.http.html | 35 + .../img-tag/cross-https.keep-origin.http.html | 35 + .../img-tag/cross-https.no-redirect.http.html | 35 + .../img-tag/cross-https.swap-origin.http.html | 35 + .../img-tag/same-http.keep-origin.http.html | 35 + .../img-tag/same-http.no-redirect.http.html | 35 + .../img-tag/same-http.swap-origin.http.html | 35 + .../img-tag/same-https.keep-origin.http.html | 35 + .../img-tag/same-https.no-redirect.http.html | 35 + .../img-tag/same-https.swap-origin.http.html | 35 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.swap-origin.http.html | 35 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.swap-origin.http.html | 35 + .../same-https.keep-origin.http.html | 35 + .../same-https.no-redirect.http.html | 35 + .../same-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../xhr/cross-http.keep-origin.http.html | 35 + .../xhr/cross-http.no-redirect.http.html | 35 + .../xhr/cross-http.swap-origin.http.html | 35 + .../xhr/cross-https.keep-origin.http.html | 35 + .../xhr/cross-https.no-redirect.http.html | 35 + .../xhr/cross-https.swap-origin.http.html | 35 + .../unset/xhr/same-http.keep-origin.http.html | 35 + .../unset/xhr/same-http.no-redirect.http.html | 35 + .../unset/xhr/same-http.swap-origin.http.html | 35 + .../xhr/same-https.keep-origin.http.html | 35 + .../xhr/same-https.no-redirect.http.html | 35 + .../xhr/same-https.swap-origin.http.html | 35 + .../a-tag/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../a-tag/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../fetch/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../fetch/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../fetch/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../fetch/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../fetch/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../fetch/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../fetch/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../fetch/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../fetch/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../img-tag/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../img-tag/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../img-tag/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../img-tag/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../img-tag/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../img-tag/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../img-tag/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../img-tag/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../img-tag/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../xhr/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../xhr/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../xhr/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../xhr/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../xhr/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../xhr/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../xhr/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../xhr/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../a-tag/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../fetch/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../fetch/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../fetch/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../fetch/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../fetch/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../fetch/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../fetch/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../fetch/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../fetch/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../img-tag/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../img-tag/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../img-tag/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../img-tag/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../img-tag/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../img-tag/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../img-tag/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../img-tag/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../img-tag/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../xhr/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../xhr/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../xhr/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../xhr/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../xhr/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../xhr/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../xhr/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../xhr/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../a-tag/cross-http.no-redirect.http.html | 35 + .../a-tag/cross-https.no-redirect.http.html | 35 + .../a-tag/same-http.no-redirect.http.html | 35 + .../a-tag/same-https.no-redirect.http.html | 35 + .../fetch/cross-http.keep-origin.http.html | 35 + .../fetch/cross-http.no-redirect.http.html | 35 + .../fetch/cross-http.swap-origin.http.html | 35 + .../fetch/cross-https.keep-origin.http.html | 35 + .../fetch/cross-https.no-redirect.http.html | 35 + .../fetch/cross-https.swap-origin.http.html | 35 + .../fetch/same-http.keep-origin.http.html | 35 + .../fetch/same-http.no-redirect.http.html | 35 + .../fetch/same-http.swap-origin.http.html | 35 + .../fetch/same-https.keep-origin.http.html | 35 + .../fetch/same-https.no-redirect.http.html | 35 + .../fetch/same-https.swap-origin.http.html | 35 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.swap-origin.http.html | 35 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.swap-origin.http.html | 35 + .../same-https.keep-origin.http.html | 35 + .../same-https.no-redirect.http.html | 35 + .../same-https.swap-origin.http.html | 35 + .../img-tag/cross-http.keep-origin.http.html | 35 + .../img-tag/cross-http.no-redirect.http.html | 35 + .../img-tag/cross-http.swap-origin.http.html | 35 + .../img-tag/cross-https.keep-origin.http.html | 35 + .../img-tag/cross-https.no-redirect.http.html | 35 + .../img-tag/cross-https.swap-origin.http.html | 35 + .../img-tag/same-http.keep-origin.http.html | 35 + .../img-tag/same-http.no-redirect.http.html | 35 + .../img-tag/same-http.swap-origin.http.html | 35 + .../img-tag/same-https.keep-origin.http.html | 35 + .../img-tag/same-https.no-redirect.http.html | 35 + .../img-tag/same-https.swap-origin.http.html | 35 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.swap-origin.http.html | 35 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.swap-origin.http.html | 35 + .../same-https.keep-origin.http.html | 35 + .../same-https.no-redirect.http.html | 35 + .../same-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../xhr/cross-http.keep-origin.http.html | 35 + .../xhr/cross-http.no-redirect.http.html | 35 + .../xhr/cross-http.swap-origin.http.html | 35 + .../xhr/cross-https.keep-origin.http.html | 35 + .../xhr/cross-https.no-redirect.http.html | 35 + .../xhr/cross-https.swap-origin.http.html | 35 + .../unset/xhr/same-http.keep-origin.http.html | 35 + .../unset/xhr/same-http.no-redirect.http.html | 35 + .../unset/xhr/same-http.swap-origin.http.html | 35 + .../xhr/same-https.keep-origin.http.html | 35 + .../xhr/same-https.no-redirect.http.html | 35 + .../xhr/same-https.swap-origin.http.html | 35 + .../a-tag/cross-http.no-redirect.http.html | 36 + .../a-tag/cross-https.no-redirect.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../a-tag/same-https.no-redirect.http.html | 36 + .../fetch/cross-http.keep-origin.http.html | 36 + .../fetch/cross-http.no-redirect.http.html | 36 + .../fetch/cross-http.swap-origin.http.html | 36 + .../fetch/cross-https.keep-origin.http.html | 36 + .../fetch/cross-https.no-redirect.http.html | 36 + .../fetch/cross-https.swap-origin.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../fetch/same-http.swap-origin.http.html | 36 + .../fetch/same-https.keep-origin.http.html | 36 + .../fetch/same-https.no-redirect.http.html | 36 + .../fetch/same-https.swap-origin.http.html | 36 + .../cross-http.keep-origin.http.html | 36 + .../cross-http.no-redirect.http.html | 36 + .../cross-http.swap-origin.http.html | 36 + .../cross-https.keep-origin.http.html | 36 + .../cross-https.no-redirect.http.html | 36 + .../cross-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.swap-origin.http.html | 36 + .../same-https.keep-origin.http.html | 36 + .../same-https.no-redirect.http.html | 36 + .../same-https.swap-origin.http.html | 36 + .../img-tag/cross-http.keep-origin.http.html | 36 + .../img-tag/cross-http.no-redirect.http.html | 36 + .../img-tag/cross-http.swap-origin.http.html | 36 + .../img-tag/cross-https.keep-origin.http.html | 36 + .../img-tag/cross-https.no-redirect.http.html | 36 + .../img-tag/cross-https.swap-origin.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../img-tag/same-http.swap-origin.http.html | 36 + .../img-tag/same-https.keep-origin.http.html | 36 + .../img-tag/same-https.no-redirect.http.html | 36 + .../img-tag/same-https.swap-origin.http.html | 36 + .../cross-http.keep-origin.http.html | 36 + .../cross-http.no-redirect.http.html | 36 + .../cross-http.swap-origin.http.html | 36 + .../cross-https.keep-origin.http.html | 36 + .../cross-https.no-redirect.http.html | 36 + .../cross-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.swap-origin.http.html | 36 + .../same-https.keep-origin.http.html | 36 + .../same-https.no-redirect.http.html | 36 + .../same-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/cross-http.keep-origin.http.html | 36 + .../xhr/cross-http.no-redirect.http.html | 36 + .../xhr/cross-http.swap-origin.http.html | 36 + .../xhr/cross-https.keep-origin.http.html | 36 + .../xhr/cross-https.no-redirect.http.html | 36 + .../xhr/cross-https.swap-origin.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../xhr/same-http.swap-origin.http.html | 36 + .../xhr/same-https.keep-origin.http.html | 36 + .../xhr/same-https.no-redirect.http.html | 36 + .../xhr/same-https.swap-origin.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../a-tag/cross-http.no-redirect.http.html | 36 + .../a-tag/cross-https.no-redirect.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../a-tag/same-https.no-redirect.http.html | 36 + .../fetch/cross-http.keep-origin.http.html | 36 + .../fetch/cross-http.no-redirect.http.html | 36 + .../fetch/cross-http.swap-origin.http.html | 36 + .../fetch/cross-https.keep-origin.http.html | 36 + .../fetch/cross-https.no-redirect.http.html | 36 + .../fetch/cross-https.swap-origin.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../fetch/same-http.swap-origin.http.html | 36 + .../fetch/same-https.keep-origin.http.html | 36 + .../fetch/same-https.no-redirect.http.html | 36 + .../fetch/same-https.swap-origin.http.html | 36 + .../cross-http.keep-origin.http.html | 36 + .../cross-http.no-redirect.http.html | 36 + .../cross-http.swap-origin.http.html | 36 + .../cross-https.keep-origin.http.html | 36 + .../cross-https.no-redirect.http.html | 36 + .../cross-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.swap-origin.http.html | 36 + .../same-https.keep-origin.http.html | 36 + .../same-https.no-redirect.http.html | 36 + .../same-https.swap-origin.http.html | 36 + .../img-tag/cross-http.keep-origin.http.html | 36 + .../img-tag/cross-http.no-redirect.http.html | 36 + .../img-tag/cross-http.swap-origin.http.html | 36 + .../img-tag/cross-https.keep-origin.http.html | 36 + .../img-tag/cross-https.no-redirect.http.html | 36 + .../img-tag/cross-https.swap-origin.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../img-tag/same-http.swap-origin.http.html | 36 + .../img-tag/same-https.keep-origin.http.html | 36 + .../img-tag/same-https.no-redirect.http.html | 36 + .../img-tag/same-https.swap-origin.http.html | 36 + .../cross-http.keep-origin.http.html | 36 + .../cross-http.no-redirect.http.html | 36 + .../cross-http.swap-origin.http.html | 36 + .../cross-https.keep-origin.http.html | 36 + .../cross-https.no-redirect.http.html | 36 + .../cross-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.swap-origin.http.html | 36 + .../same-https.keep-origin.http.html | 36 + .../same-https.no-redirect.http.html | 36 + .../same-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/cross-http.keep-origin.http.html | 36 + .../xhr/cross-http.no-redirect.http.html | 36 + .../xhr/cross-http.swap-origin.http.html | 36 + .../xhr/cross-https.keep-origin.http.html | 36 + .../xhr/cross-https.no-redirect.http.html | 36 + .../xhr/cross-https.swap-origin.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../xhr/same-http.swap-origin.http.html | 36 + .../xhr/same-https.keep-origin.http.html | 36 + .../xhr/same-https.no-redirect.http.html | 36 + .../xhr/same-https.swap-origin.http.html | 36 + .../a-tag/cross-http.no-redirect.http.html | 35 + .../a-tag/cross-https.no-redirect.http.html | 35 + .../a-tag/same-http.no-redirect.http.html | 35 + .../a-tag/same-https.no-redirect.http.html | 35 + .../fetch/cross-http.keep-origin.http.html | 35 + .../fetch/cross-http.no-redirect.http.html | 35 + .../fetch/cross-http.swap-origin.http.html | 35 + .../fetch/cross-https.keep-origin.http.html | 35 + .../fetch/cross-https.no-redirect.http.html | 35 + .../fetch/cross-https.swap-origin.http.html | 35 + .../fetch/same-http.keep-origin.http.html | 35 + .../fetch/same-http.no-redirect.http.html | 35 + .../fetch/same-http.swap-origin.http.html | 35 + .../fetch/same-https.keep-origin.http.html | 35 + .../fetch/same-https.no-redirect.http.html | 35 + .../fetch/same-https.swap-origin.http.html | 35 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.swap-origin.http.html | 35 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.swap-origin.http.html | 35 + .../same-https.keep-origin.http.html | 35 + .../same-https.no-redirect.http.html | 35 + .../same-https.swap-origin.http.html | 35 + .../img-tag/cross-http.keep-origin.http.html | 35 + .../img-tag/cross-http.no-redirect.http.html | 35 + .../img-tag/cross-http.swap-origin.http.html | 35 + .../img-tag/cross-https.keep-origin.http.html | 35 + .../img-tag/cross-https.no-redirect.http.html | 35 + .../img-tag/cross-https.swap-origin.http.html | 35 + .../img-tag/same-http.keep-origin.http.html | 35 + .../img-tag/same-http.no-redirect.http.html | 35 + .../img-tag/same-http.swap-origin.http.html | 35 + .../img-tag/same-https.keep-origin.http.html | 35 + .../img-tag/same-https.no-redirect.http.html | 35 + .../img-tag/same-https.swap-origin.http.html | 35 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.swap-origin.http.html | 35 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.swap-origin.http.html | 35 + .../same-https.keep-origin.http.html | 35 + .../same-https.no-redirect.http.html | 35 + .../same-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../xhr/cross-http.keep-origin.http.html | 35 + .../xhr/cross-http.no-redirect.http.html | 35 + .../xhr/cross-http.swap-origin.http.html | 35 + .../xhr/cross-https.keep-origin.http.html | 35 + .../xhr/cross-https.no-redirect.http.html | 35 + .../xhr/cross-https.swap-origin.http.html | 35 + .../unset/xhr/same-http.keep-origin.http.html | 35 + .../unset/xhr/same-http.no-redirect.http.html | 35 + .../unset/xhr/same-http.swap-origin.http.html | 35 + .../xhr/same-https.keep-origin.http.html | 35 + .../xhr/same-https.no-redirect.http.html | 35 + .../xhr/same-https.swap-origin.http.html | 35 + .../a-tag/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../a-tag/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../fetch/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../fetch/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../fetch/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../fetch/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../fetch/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../fetch/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../fetch/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../fetch/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../fetch/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../img-tag/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../img-tag/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../img-tag/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../img-tag/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../img-tag/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../img-tag/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../img-tag/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../img-tag/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../img-tag/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../xhr/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../xhr/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../xhr/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../xhr/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../xhr/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../xhr/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../xhr/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../xhr/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../a-tag/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../a-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../a-tag/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../fetch/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../fetch/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../fetch/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../fetch/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../fetch/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../fetch/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../fetch/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../fetch/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../fetch/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../fetch/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../fetch/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../fetch/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../img-tag/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../img-tag/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../img-tag/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../img-tag/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../img-tag/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../img-tag/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../img-tag/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../img-tag/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../img-tag/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../img-tag/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../img-tag/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../img-tag/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/cross-http.keep-origin.http.html | 35 + .../cross-http.keep-origin.http.html.headers | 2 + .../xhr/cross-http.no-redirect.http.html | 35 + .../cross-http.no-redirect.http.html.headers | 2 + .../xhr/cross-http.swap-origin.http.html | 35 + .../cross-http.swap-origin.http.html.headers | 2 + .../xhr/cross-https.keep-origin.http.html | 35 + .../cross-https.keep-origin.http.html.headers | 2 + .../xhr/cross-https.no-redirect.http.html | 35 + .../cross-https.no-redirect.http.html.headers | 2 + .../xhr/cross-https.swap-origin.http.html | 35 + .../cross-https.swap-origin.http.html.headers | 2 + .../xhr/same-http.keep-origin.http.html | 35 + .../same-http.keep-origin.http.html.headers | 2 + .../xhr/same-http.no-redirect.http.html | 35 + .../same-http.no-redirect.http.html.headers | 2 + .../xhr/same-http.swap-origin.http.html | 35 + .../same-http.swap-origin.http.html.headers | 2 + .../xhr/same-https.keep-origin.http.html | 35 + .../same-https.keep-origin.http.html.headers | 2 + .../xhr/same-https.no-redirect.http.html | 35 + .../same-https.no-redirect.http.html.headers | 2 + .../xhr/same-https.swap-origin.http.html | 35 + .../same-https.swap-origin.http.html.headers | 2 + .../a-tag/cross-http.no-redirect.http.html | 35 + .../a-tag/cross-https.no-redirect.http.html | 35 + .../a-tag/same-http.no-redirect.http.html | 35 + .../a-tag/same-https.no-redirect.http.html | 35 + .../fetch/cross-http.keep-origin.http.html | 35 + .../fetch/cross-http.no-redirect.http.html | 35 + .../fetch/cross-http.swap-origin.http.html | 35 + .../fetch/cross-https.keep-origin.http.html | 35 + .../fetch/cross-https.no-redirect.http.html | 35 + .../fetch/cross-https.swap-origin.http.html | 35 + .../fetch/same-http.keep-origin.http.html | 35 + .../fetch/same-http.no-redirect.http.html | 35 + .../fetch/same-http.swap-origin.http.html | 35 + .../fetch/same-https.keep-origin.http.html | 35 + .../fetch/same-https.no-redirect.http.html | 35 + .../fetch/same-https.swap-origin.http.html | 35 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.swap-origin.http.html | 35 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.swap-origin.http.html | 35 + .../same-https.keep-origin.http.html | 35 + .../same-https.no-redirect.http.html | 35 + .../same-https.swap-origin.http.html | 35 + .../img-tag/cross-http.keep-origin.http.html | 35 + .../img-tag/cross-http.no-redirect.http.html | 35 + .../img-tag/cross-http.swap-origin.http.html | 35 + .../img-tag/cross-https.keep-origin.http.html | 35 + .../img-tag/cross-https.no-redirect.http.html | 35 + .../img-tag/cross-https.swap-origin.http.html | 35 + .../img-tag/same-http.keep-origin.http.html | 35 + .../img-tag/same-http.no-redirect.http.html | 35 + .../img-tag/same-http.swap-origin.http.html | 35 + .../img-tag/same-https.keep-origin.http.html | 35 + .../img-tag/same-https.no-redirect.http.html | 35 + .../img-tag/same-https.swap-origin.http.html | 35 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.swap-origin.http.html | 35 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.swap-origin.http.html | 35 + .../same-https.keep-origin.http.html | 35 + .../same-https.no-redirect.http.html | 35 + .../same-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../xhr/cross-http.keep-origin.http.html | 35 + .../xhr/cross-http.no-redirect.http.html | 35 + .../xhr/cross-http.swap-origin.http.html | 35 + .../xhr/cross-https.keep-origin.http.html | 35 + .../xhr/cross-https.no-redirect.http.html | 35 + .../xhr/cross-https.swap-origin.http.html | 35 + .../unset/xhr/same-http.keep-origin.http.html | 35 + .../unset/xhr/same-http.no-redirect.http.html | 35 + .../unset/xhr/same-http.swap-origin.http.html | 35 + .../xhr/same-https.keep-origin.http.html | 35 + .../xhr/same-https.no-redirect.http.html | 35 + .../xhr/same-https.swap-origin.http.html | 35 + .../a-tag/cross-http.no-redirect.http.html | 36 + .../a-tag/cross-https.no-redirect.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../a-tag/same-https.no-redirect.http.html | 36 + .../fetch/cross-http.keep-origin.http.html | 36 + .../fetch/cross-http.no-redirect.http.html | 36 + .../fetch/cross-http.swap-origin.http.html | 36 + .../fetch/cross-https.keep-origin.http.html | 36 + .../fetch/cross-https.no-redirect.http.html | 36 + .../fetch/cross-https.swap-origin.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../fetch/same-http.swap-origin.http.html | 36 + .../fetch/same-https.keep-origin.http.html | 36 + .../fetch/same-https.no-redirect.http.html | 36 + .../fetch/same-https.swap-origin.http.html | 36 + .../cross-http.keep-origin.http.html | 36 + .../cross-http.no-redirect.http.html | 36 + .../cross-http.swap-origin.http.html | 36 + .../cross-https.keep-origin.http.html | 36 + .../cross-https.no-redirect.http.html | 36 + .../cross-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.swap-origin.http.html | 36 + .../same-https.keep-origin.http.html | 36 + .../same-https.no-redirect.http.html | 36 + .../same-https.swap-origin.http.html | 36 + .../img-tag/cross-http.keep-origin.http.html | 36 + .../img-tag/cross-http.no-redirect.http.html | 36 + .../img-tag/cross-http.swap-origin.http.html | 36 + .../img-tag/cross-https.keep-origin.http.html | 36 + .../img-tag/cross-https.no-redirect.http.html | 36 + .../img-tag/cross-https.swap-origin.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../img-tag/same-http.swap-origin.http.html | 36 + .../img-tag/same-https.keep-origin.http.html | 36 + .../img-tag/same-https.no-redirect.http.html | 36 + .../img-tag/same-https.swap-origin.http.html | 36 + .../cross-http.keep-origin.http.html | 36 + .../cross-http.no-redirect.http.html | 36 + .../cross-http.swap-origin.http.html | 36 + .../cross-https.keep-origin.http.html | 36 + .../cross-https.no-redirect.http.html | 36 + .../cross-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.swap-origin.http.html | 36 + .../same-https.keep-origin.http.html | 36 + .../same-https.no-redirect.http.html | 36 + .../same-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/cross-http.keep-origin.http.html | 36 + .../xhr/cross-http.no-redirect.http.html | 36 + .../xhr/cross-http.swap-origin.http.html | 36 + .../xhr/cross-https.keep-origin.http.html | 36 + .../xhr/cross-https.no-redirect.http.html | 36 + .../xhr/cross-https.swap-origin.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../xhr/same-http.swap-origin.http.html | 36 + .../xhr/same-https.keep-origin.http.html | 36 + .../xhr/same-https.no-redirect.http.html | 36 + .../xhr/same-https.swap-origin.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../a-tag/cross-http.no-redirect.http.html | 36 + .../a-tag/cross-https.no-redirect.http.html | 36 + .../a-tag/same-http.no-redirect.http.html | 36 + .../a-tag/same-https.no-redirect.http.html | 36 + .../fetch/cross-http.keep-origin.http.html | 36 + .../fetch/cross-http.no-redirect.http.html | 36 + .../fetch/cross-http.swap-origin.http.html | 36 + .../fetch/cross-https.keep-origin.http.html | 36 + .../fetch/cross-https.no-redirect.http.html | 36 + .../fetch/cross-https.swap-origin.http.html | 36 + .../fetch/same-http.keep-origin.http.html | 36 + .../fetch/same-http.no-redirect.http.html | 36 + .../fetch/same-http.swap-origin.http.html | 36 + .../fetch/same-https.keep-origin.http.html | 36 + .../fetch/same-https.no-redirect.http.html | 36 + .../fetch/same-https.swap-origin.http.html | 36 + .../cross-http.keep-origin.http.html | 36 + .../cross-http.no-redirect.http.html | 36 + .../cross-http.swap-origin.http.html | 36 + .../cross-https.keep-origin.http.html | 36 + .../cross-https.no-redirect.http.html | 36 + .../cross-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.swap-origin.http.html | 36 + .../same-https.keep-origin.http.html | 36 + .../same-https.no-redirect.http.html | 36 + .../same-https.swap-origin.http.html | 36 + .../img-tag/cross-http.keep-origin.http.html | 36 + .../img-tag/cross-http.no-redirect.http.html | 36 + .../img-tag/cross-http.swap-origin.http.html | 36 + .../img-tag/cross-https.keep-origin.http.html | 36 + .../img-tag/cross-https.no-redirect.http.html | 36 + .../img-tag/cross-https.swap-origin.http.html | 36 + .../img-tag/same-http.keep-origin.http.html | 36 + .../img-tag/same-http.no-redirect.http.html | 36 + .../img-tag/same-http.swap-origin.http.html | 36 + .../img-tag/same-https.keep-origin.http.html | 36 + .../img-tag/same-https.no-redirect.http.html | 36 + .../img-tag/same-https.swap-origin.http.html | 36 + .../cross-http.keep-origin.http.html | 36 + .../cross-http.no-redirect.http.html | 36 + .../cross-http.swap-origin.http.html | 36 + .../cross-https.keep-origin.http.html | 36 + .../cross-https.no-redirect.http.html | 36 + .../cross-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.swap-origin.http.html | 36 + .../same-https.keep-origin.http.html | 36 + .../same-https.no-redirect.http.html | 36 + .../same-https.swap-origin.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../same-http.keep-origin.http.html | 36 + .../same-http.no-redirect.http.html | 36 + .../xhr/cross-http.keep-origin.http.html | 36 + .../xhr/cross-http.no-redirect.http.html | 36 + .../xhr/cross-http.swap-origin.http.html | 36 + .../xhr/cross-https.keep-origin.http.html | 36 + .../xhr/cross-https.no-redirect.http.html | 36 + .../xhr/cross-https.swap-origin.http.html | 36 + .../xhr/same-http.keep-origin.http.html | 36 + .../xhr/same-http.no-redirect.http.html | 36 + .../xhr/same-http.swap-origin.http.html | 36 + .../xhr/same-https.keep-origin.http.html | 36 + .../xhr/same-https.no-redirect.http.html | 36 + .../xhr/same-https.swap-origin.http.html | 36 + .../a-tag/cross-http.no-redirect.http.html | 35 + .../a-tag/cross-https.no-redirect.http.html | 35 + .../a-tag/same-http.no-redirect.http.html | 35 + .../a-tag/same-https.no-redirect.http.html | 35 + .../fetch/cross-http.keep-origin.http.html | 35 + .../fetch/cross-http.no-redirect.http.html | 35 + .../fetch/cross-http.swap-origin.http.html | 35 + .../fetch/cross-https.keep-origin.http.html | 35 + .../fetch/cross-https.no-redirect.http.html | 35 + .../fetch/cross-https.swap-origin.http.html | 35 + .../fetch/same-http.keep-origin.http.html | 35 + .../fetch/same-http.no-redirect.http.html | 35 + .../fetch/same-http.swap-origin.http.html | 35 + .../fetch/same-https.keep-origin.http.html | 35 + .../fetch/same-https.no-redirect.http.html | 35 + .../fetch/same-https.swap-origin.http.html | 35 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.swap-origin.http.html | 35 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.swap-origin.http.html | 35 + .../same-https.keep-origin.http.html | 35 + .../same-https.no-redirect.http.html | 35 + .../same-https.swap-origin.http.html | 35 + .../img-tag/cross-http.keep-origin.http.html | 35 + .../img-tag/cross-http.no-redirect.http.html | 35 + .../img-tag/cross-http.swap-origin.http.html | 35 + .../img-tag/cross-https.keep-origin.http.html | 35 + .../img-tag/cross-https.no-redirect.http.html | 35 + .../img-tag/cross-https.swap-origin.http.html | 35 + .../img-tag/same-http.keep-origin.http.html | 35 + .../img-tag/same-http.no-redirect.http.html | 35 + .../img-tag/same-http.swap-origin.http.html | 35 + .../img-tag/same-https.keep-origin.http.html | 35 + .../img-tag/same-https.no-redirect.http.html | 35 + .../img-tag/same-https.swap-origin.http.html | 35 + .../cross-http.keep-origin.http.html | 35 + .../cross-http.no-redirect.http.html | 35 + .../cross-http.swap-origin.http.html | 35 + .../cross-https.keep-origin.http.html | 35 + .../cross-https.no-redirect.http.html | 35 + .../cross-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.swap-origin.http.html | 35 + .../same-https.keep-origin.http.html | 35 + .../same-https.no-redirect.http.html | 35 + .../same-https.swap-origin.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../same-http.keep-origin.http.html | 35 + .../same-http.no-redirect.http.html | 35 + .../xhr/cross-http.keep-origin.http.html | 35 + .../xhr/cross-http.no-redirect.http.html | 35 + .../xhr/cross-http.swap-origin.http.html | 35 + .../xhr/cross-https.keep-origin.http.html | 35 + .../xhr/cross-https.no-redirect.http.html | 35 + .../xhr/cross-https.swap-origin.http.html | 35 + .../unset/xhr/same-http.keep-origin.http.html | 35 + .../unset/xhr/same-http.no-redirect.http.html | 35 + .../unset/xhr/same-http.swap-origin.http.html | 35 + .../xhr/same-https.keep-origin.http.html | 35 + .../xhr/same-https.no-redirect.http.html | 35 + .../xhr/same-https.swap-origin.http.html | 35 + .../resize-observer/observe.html | 2 +- .../resources/idlharness.js | 4 + .../tests/unit/IdlArray/is_json_type.html | 4 +- .../IdlDictionary/get_inheritance_stack.html | 2 +- .../IdlInterface/get_inheritance_stack.html | 2 +- ...nherited_and_consequential_interfaces.html | 4 +- .../scroll-animations/constructor.html | 12 +- .../setting-current-time.html | 2 +- .../web-platform-tests/selection/collapse.js | 4 +- .../selection/collapseToStartEnd.html | 2 +- .../web-platform-tests/selection/extend.js | 6 +- .../selection/getRangeAt.html | 4 +- .../selection/removeRange.html | 6 +- .../selection/selectAllChildren.html | 2 +- .../cache-storage/script-tests/cache-put.js | 2 +- ...ndable-message-event-constructor-worker.js | 50 +- .../service-worker/client-navigate.https.html | 4 +- .../detached-context.https.html | 6 +- ...ch-canvas-tainting-double-write.https.html | 2 +- .../fetch-request-css-cross-origin.https.html | 2 +- .../service-worker/multipart-image.https.html | 2 +- .../import-scripts-mime-types-worker.js | 2 +- .../resources/service-worker-csp-worker.py | 8 +- .../Document-prototype-adoptNode.html | 2 +- .../Document-prototype-importNode.html | 2 +- ...interface-attachShadow-custom-element.html | 14 +- .../Element-interface-attachShadow.html | 18 +- .../shadow-dom/Node-prototype-cloneNode.html | 4 +- .../shadow-dom/ShadowRoot-interface.html | 2 +- ...SpeechSynthesisErrorEvent-constructor.html | 16 +- .../SpeechSynthesisEvent-constructor.html | 8 +- .../web-platform-tests/std-toast/actions.html | 6 +- .../web-platform-tests/std-toast/options.html | 4 +- .../byte-length-queuing-strategy.any.js | 12 +- .../streams/count-queuing-strategy.any.js | 6 +- .../streams/piping/pipe-through.any.js | 26 +- .../streams/piping/throwing-options.any.js | 4 +- .../readable-byte-streams/brand-checks.any.js | 8 +- .../construct-byob-request.any.js | 2 +- .../detached-buffers.any.js | 10 +- .../readable-byte-streams/general.any.js | 44 +- .../readable-byte-streams/properties.any.js | 6 +- .../readable-streams/async-iterator.any.js | 2 +- .../readable-streams/bad-strategies.any.js | 12 +- .../bad-underlying-sources.any.js | 26 +- .../readable-streams/brand-checks.any.js | 6 +- .../readable-streams/default-reader.any.js | 20 +- .../garbage-collection.any.js | 4 +- .../streams/readable-streams/general.any.js | 24 +- .../reentrant-strategies.any.js | 2 +- .../streams/resources/rs-test-templates.js | 20 +- .../streams/resources/test-utils.js | 6 +- .../streams/transform-streams/errors.any.js | 8 +- .../streams/transform-streams/general.any.js | 8 +- .../transform-streams/strategies.any.js | 10 +- .../transform-streams/terminate.any.js | 2 +- .../writable-streams/bad-strategies.any.js | 10 +- .../bad-underlying-sinks.any.js | 16 +- .../writable-streams/brand-checks.any.js | 2 +- .../writable-streams/constructor.any.js | 8 +- .../streams/writable-streams/general.any.js | 2 +- .../streams/writable-streams/start.any.js | 2 +- .../streams/writable-streams/write.any.js | 2 +- .../SVGAnimationElement-exceptions.html | 4 +- .../SVGAnimationElement-getStartTime.html | 4 +- .../svg/path/distance/pathLength-positive.svg | 3 +- .../distance/pathlength-path-mutating.svg | 15 + .../distance/pathlength-path-negative.svg | 7 + .../path/distance/pathlength-path-zero.svg | 7 + .../svg/path/distance/pathlength-path.svg | 8 + .../distance/pathlength-rect-mutating.svg | 17 + .../svg/path/distance/pathlength-rect.svg | 7 + .../pathlength-path-mutating-ref.svg | 5 + .../pathlength-path-negative-ref.svg | 5 + .../reference/pathlength-path-ref.svg | 5 + .../reference/pathlength-path-zero-ref.svg | 4 + .../pathlength-rect-mutating-ref.svg | 3 + .../reference/pathlength-rect-ref.svg | 5 + .../svg/types/scripted/SVGAnimatedNumber.html | 8 +- ...SVGGeometryElement.getPointAtLength-02.svg | 20 + .../SVGGeometryElement.getTotalLength-01.svg | 14 + .../svg/types/scripted/SVGLength.html | 60 +- .../types/scripted/SVGLengthList-basics.html | 64 +- .../types/scripted/SVGLengthList-getItem.html | 8 +- .../resources/SVGLengthList-helper.js | 2 +- tests/wpt/web-platform-tests/tools/META.yml | 4 + .../tools/ci/azure/pip_install.yml | 14 +- .../tools/ci/tc/decision.py | 1 + .../tools/ci/tc/tasks/test.yml | 73 +- .../tools/ci/tc/tests/test_valid.py | 7 +- .../tools/requirements_mypy.txt | 2 +- tests/wpt/web-platform-tests/tools/tox.ini | 13 +- .../web-platform-tests/tools/wpt/browser.py | 4 +- .../web-platform-tests/tools/wpt/install.py | 1 - .../tools/wpt/tests/test_browser.py | 20 +- .../tools/wpt/tests/test_revlist.py | 5 + .../tools/wpt/tests/test_run.py | 2 + .../tools/wpt/tests/test_wpt.py | 13 +- .../wpt/web-platform-tests/tools/wpt/tox.ini | 3 +- tests/wpt/web-platform-tests/tools/wpt/wpt.py | 3 +- .../tools/wptrunner/requirements.txt | 2 +- .../tools/wptrunner/test/test.py | 4 +- .../tools/wptrunner/tox.ini | 4 +- .../wptrunner/browsers/firefox_android.py | 4 + .../tools/wptrunner/wptrunner/metadata.py | 4 +- .../tools/wptrunner/wptrunner/testloader.py | 8 +- .../wptrunner/tests/test_products.py | 8 +- .../tools/wptrunner/wptrunner/update/tree.py | 4 +- .../wptrunner/wptrunner/wptmanifest/node.py | 4 +- .../wptrunner/wptrunner/wptmanifest/parser.py | 4 +- .../tools/wptserve/tests/test_stash.py | 7 +- .../tools/wptserve/wptserve/handlers.py | 17 +- .../tools/wptserve/wptserve/pipes.py | 11 +- .../touch-touchevent-constructor.html | 18 +- ...FromString-regression.tentative.https.html | 2 +- ...ustedTypePolicy-CSP-no-name.tentative.html | 2 +- .../TrustedTypePolicy-CSP.tentative.html | 2 +- ...TrustedTypePolicy-createXXX.tentative.html | 20 +- ...createPolicy-createXYZTests.tentative.html | 30 +- ...olicy-cspTests-noNamesGiven.tentative.html | 2 +- ...ctory-createPolicy-cspTests.tentative.html | 2 +- ...tory-createPolicy-nameTests.tentative.html | 2 +- ...dTypePolicyFactory-metadata.tentative.html | 6 +- .../Window-TrustedTypes.tentative.html | 2 +- ...ock-Node-multiple-arguments.tentative.html | 4 +- ...o-DOMParser-parseFromString.tentative.html | 4 +- ...mers-setTimeout-setInterval.tentative.html | 8 +- ...ssignment-to-Document-write.tentative.html | 8 +- ...-Element-insertAdjacentHTML.tentative.html | 16 +- ...gnment-to-Element-outerHTML.tentative.html | 4 +- ...ent-to-Element-setAttribute.tentative.html | 2 +- ...t-to-Element-setAttributeNS.tentative.html | 2 +- ...ge-createContextualFragment.tentative.html | 4 +- ...sertion-into-script-element.tentative.html | 4 +- .../csp-block-eval.tentative.html | 4 +- .../default-policy-report-only.tentative.html | 4 +- .../default-policy.tentative.html | 10 +- .../empty-default-policy.tentative.html | 2 +- ...al-csp-tt-no-default-policy.tentative.html | 2 +- .../eval-with-permissive-csp.tentative.html | 2 +- .../require-trusted-types-for.tentative.html | 8 +- .../WorkerGlobalScope-importScripts.https.js | 8 +- .../trusted-types/support/helper.sub.js | 6 +- ...ed-types-createHTMLDocument.tentative.html | 4 +- ...-types-duplicate-names-list.tentative.html | 4 +- ...usted-types-duplicate-names.tentative.html | 2 +- ...-types-eval-reporting.tentative.https.html | 2 +- .../tt-block-eval.tentative.html | 2 +- .../legacy/Event-subclasses-init.html | 2 +- tests/wpt/web-platform-tests/url/failure.html | 6 +- .../web-platform-tests/url/historical.any.js | 2 +- .../url/url-constructor.html | 2 +- .../url/url-searchparams.any.js | 2 +- .../invoke_with_timing_attributes.html | 2 +- .../user-timing/invoke_without_parameter.html | 4 +- .../user-timing/mark-errors.any.js | 8 +- .../user-timing/mark_exceptions.html | 4 +- .../user-timing/measure-exceptions.html | 4 +- .../user-timing/measure-with-dict.any.js | 8 +- .../measure_exceptions_navigation_timing.html | 8 +- .../user-timing/measure_syntax_err.any.js | 8 +- .../performance-measure-invalid.worker.js | 2 +- .../structured-serialize-detail.any.js | 4 +- .../vibration/invalid-values.html | 2 +- .../wasm/jsapi/constructor/validate.any.js | 4 +- .../wasm/jsapi/global/constructor.any.js | 12 +- .../wasm/jsapi/global/value-get-set.any.js | 18 +- .../wasm/jsapi/global/valueOf.any.js | 2 +- .../wasm/jsapi/instance/constructor.any.js | 6 +- .../wasm/jsapi/instance/exports.any.js | 4 +- .../wasm/jsapi/interface.any.js | 4 +- .../wasm/jsapi/memory/buffer.any.js | 4 +- .../wasm/jsapi/memory/constructor.any.js | 16 +- .../wasm/jsapi/memory/grow.any.js | 8 +- .../wasm/jsapi/module/constructor.any.js | 6 +- .../wasm/jsapi/module/customSections.any.js | 6 +- .../wasm/jsapi/module/exports.any.js | 4 +- .../wasm/jsapi/module/imports.any.js | 4 +- .../wasm/jsapi/table/assertions.js | 6 +- .../wasm/jsapi/table/constructor.any.js | 18 +- .../wasm/jsapi/table/get-set.any.js | 26 +- .../table/grow-reftypes.tentative.any.js | 4 +- .../wasm/jsapi/table/grow.any.js | 8 +- .../wasm/jsapi/table/length.any.js | 4 +- .../arraybuffer/transfer.window.js | 2 +- .../module/broadcastchannel-success.html | 2 +- .../serialization/module/no-transferring.html | 12 +- .../module/serialization-via-history.html | 4 +- .../module/serialization-via-idb.any.js | 4 +- ...serialization-via-notifications-api.any.js | 4 +- .../wasm/webapi/historical.any.js | 2 +- .../web-animations/README.md | 2 +- .../interfaces/Animation/commitStyles.html | 14 +- .../interfaces/Animation/pause.html | 2 +- .../interfaces/Animation/play.html | 2 +- .../AnimationEffect/updateTiming.html | 10 +- .../KeyframeEffect/constructor.html | 2 +- .../processing-a-keyframes-argument-001.html | 10 +- .../processing-a-keyframes-argument-002.html | 4 +- .../animations/finishing-an-animation.html | 8 +- .../animations/reversing-an-animation.html | 6 +- ...ting-the-current-time-of-an-animation.html | 4 +- .../web-nfc/NDEFRecord_constructor.https.html | 30 +- .../canShare-files.tentative.https.html | 2 +- .../test-analysernode.html | 64 +- .../test-constantsourcenode.html | 6 +- .../destination.html | 4 +- .../test-iirfilternode.html | 2 +- .../mediastreamaudiosourcenode-ctor.html | 8 +- .../wpt/web-platform-tests/webauthn/META.yml | 1 + ...ecredential-badargs-attestation.https.html | 10 +- ...dential-badargs-authnrselection.https.html | 24 +- ...atecredential-badargs-challenge.https.html | 10 +- .../createcredential-badargs-rp.https.html | 22 +- .../createcredential-badargs-user.https.html | 49 +- ...tecredential-excludecredentials.https.html | 4 +- .../createcredential-extensions.https.html | 14 +- ...eatecredential-pubkeycredparams.https.html | 14 +- .../createcredential-timeout.https.html | 4 +- ...ential-badargs-userverification.https.html | 8 +- .../getcredential-extensions.https.html | 14 +- .../webauthn/getcredential-timeout.https.html | 4 +- .../web-platform-tests/webauthn/helpers.js | 8 +- .../webgl/compressedTexImage2D.html | 2 +- .../webgl/compressedTexSubImage2D.html | 2 +- .../web-platform-tests/webgl/texImage2D.html | 4 +- .../webgl/texSubImage2D.html | 4 +- .../Channel_postMessage_DataCloneErr.htm | 2 +- .../Channel_postMessage_clone_port_error.htm | 2 +- ...annel_postMessage_ports_readonly_array.htm | 2 +- .../webmessaging/MessageEvent.html | 2 +- .../broadcastchannel/interface.html | 10 +- .../webmessaging/message-channels/close.html | 2 +- .../webmessaging/postMessage_Document.htm | 2 +- .../webmessaging/postMessage_Function.htm | 2 +- .../postMessage_dup_transfer_objects.htm | 2 +- .../postMessage_invalid_targetOrigin.htm | 2 +- .../with-options/broken-origin.html | 2 +- .../webmessaging/with-ports/001.html | 2 +- .../webmessaging/with-ports/003.html | 2 +- .../webmessaging/with-ports/025.html | 2 +- .../webmessaging/with-ports/026.html | 2 +- .../webmessaging/with-ports/027.html | 2 +- .../webmessaging/without-ports/001.html | 2 +- .../webmessaging/without-ports/003.html | 2 +- .../webmessaging/without-ports/009.html | 2 +- .../webmessaging/without-ports/024.html | 2 +- .../webmessaging/without-ports/025-1.js | 2 +- .../webmessaging/without-ports/025.html | 2 +- .../webmessaging/without-ports/026.html | 5 +- .../RTCRtpReceiver-playoutDelayHint.html | 4 +- .../webrtc-quic/RTCQuicStream.https.html | 20 +- .../webrtc-quic/RTCQuicTransport.https.html | 30 +- .../webrtc/RTCCertificate-postMessage.html | 2 +- .../webrtc/RTCCertificate.html | 6 +- .../webrtc/RTCConfiguration-bundlePolicy.html | 8 +- ...RTCConfiguration-iceCandidatePoolSize.html | 8 +- .../webrtc/RTCConfiguration-iceServers.html | 44 +- .../RTCConfiguration-iceTransportPolicy.html | 6 +- .../RTCConfiguration-rtcpMuxPolicy.html | 10 +- .../RTCDTMFSender-insertDTMF.https.html | 14 +- .../webrtc/RTCDataChannel-id.html | 4 +- .../webrtc/RTCDataChannel-send.html | 4 +- .../RTCDataChannelEvent-constructor.html | 12 +- .../web-platform-tests/webrtc/RTCError.html | 12 +- .../webrtc/RTCIceCandidate-constructor.html | 14 +- .../RTCIceTransport-extension.https.html | 20 +- .../RTCPeerConnection-addTrack.https.html | 4 +- ...TCPeerConnection-addTransceiver.https.html | 8 +- .../webrtc/RTCPeerConnection-constructor.html | 10 +- .../RTCPeerConnection-createDataChannel.html | 8 +- .../RTCPeerConnection-removeTrack.https.html | 12 +- ...TCPeerConnection-setRemoteDescription.html | 4 +- ...RTCPeerConnectionIceEvent-constructor.html | 4 +- .../webrtc/RTCRtpSender-setStreams.https.html | 2 +- ...RTCRtpTransceiver-setCodecPreferences.html | 16 +- .../webrtc/RTCTrackEvent-constructor.html | 6 +- .../websockets/Close-Reason-124Bytes.any.js | 2 +- .../Create-Secure-url-with-space.any.js | 2 +- .../Create-asciiSep-protocol-string.any.js | 2 +- .../websockets/Create-invalid-urls.any.js | 10 +- .../websockets/Create-non-absolute-url.any.js | 2 +- .../Create-nonAscii-protocol-string.any.js | 2 +- .../Create-protocol-with-space.any.js | 2 +- ...protocols-repeated-case-insensitive.any.js | 2 +- .../Create-protocols-repeated.any.js | 2 +- .../websockets/Create-wrong-scheme.any.js | 2 +- .../websockets/Secure-Close-1005.any.js | 2 +- .../Secure-Close-2999-reason.any.js | 2 +- .../Secure-Close-Reason-124Bytes.any.js | 2 +- .../websockets/Secure-Close-onlyReason.any.js | 2 +- .../websockets/Send-before-open.any.js | 2 +- .../websockets/close-invalid.any.js | 2 +- .../websockets/constructor/001.html | 2 +- .../websockets/constructor/002.html | 20 +- .../websockets/constructor/004.html | 6 +- .../websockets/constructor/007.html | 2 +- .../websockets/constructor/021.html | 2 +- .../interfaces/WebSocket/constants/005.html | 2 +- .../interfaces/WebSocket/constants/006.html | 2 +- .../interfaces/WebSocket/send/001.html | 2 +- .../interfaces/WebSocket/send/003.html | 2 +- .../interfaces/WebSocket/send/004.html | 6 +- .../websockets/stream-tentative/close.any.js | 6 +- .../stream-tentative/constructor.any.js | 10 +- .../webstorage/missing_arguments.html | 2 +- ...torage_local_setitem_quotaexceedederr.html | 2 +- ...rage_session_setitem_quotaexceedederr.html | 2 +- .../webstorage/storage_setitem.html | 4 +- .../webusb/usbConnectionEvent.https.any.js | 4 +- .../webusb/usbInTransferResult.https.any.js | 4 +- ...sbIsochronousInTransferPacket.https.any.js | 4 +- ...sbIsochronousInTransferResult.https.any.js | 2 +- ...bIsochronousOutTransferPacket.https.any.js | 4 +- ...bIsochronousOutTransferResult.https.any.js | 2 +- .../webusb/usbOutTransferResult.https.any.js | 4 +- .../webvtt/api/VTTCue/position.html | 2 +- .../webvtt/api/VTTCue/size.html | 2 +- .../webvtt/api/VTTRegion/constructor.html | 21 +- .../webvtt/api/VTTRegion/regionAnchorX.html | 2 +- .../webvtt/api/VTTRegion/regionAnchorY.html | 2 +- .../webvtt/api/VTTRegion/viewportAnchorX.html | 2 +- .../webvtt/api/VTTRegion/viewportAnchorY.html | 2 +- .../webvtt/api/VTTRegion/width.html | 2 +- .../webxr/events_session_select.https.html | 2 +- ...xrDevice_requestSession_no_mode.https.html | 2 +- .../webxr/xrFrame_lifetime.https.html | 4 +- .../xrRigidTransform_constructor.https.html | 4 +- .../workers/SharedWorker-constructor.html | 6 +- .../workers/Worker-formdata.any.js | 2 +- .../workers/Worker-multi-port.html | 10 +- .../Worker_cross_origin_security_err.htm | 4 +- .../SharedWorker/no-arguments-ctor.html | 2 +- .../SharedWorker/same-origin.html | 4 +- .../SharedWorker/undefined-arguments.html | 4 +- .../SharedWorker/unresolvable-url.html | 2 +- .../Worker/Worker-constructor.html | 6 +- .../constructors/Worker/same-origin.html | 4 +- .../workers/importscripts_mime.any.js | 2 +- .../WorkerUtils/importScripts/002.worker.js | 2 +- .../dedicated-worker-import-failure.html | 4 +- .../modules/dedicated-worker-import-meta.html | 4 +- .../dedicated-worker-options-type.html | 8 +- .../dynamic-import-given-url-worker.js | 22 +- .../resources/import-meta-url-export.js | 1 + .../resources/import-meta-url-worker.js | 11 +- .../modules/shared-worker-import-failure.html | 8 +- .../modules/shared-worker-import-meta.html | 49 + .../modules/shared-worker-options-type.html | 8 +- .../workers/postMessage_clone_port_error.htm | 2 +- .../postMessage_ports_readonly_array.htm | 2 +- .../support/ImportScriptsNosniffErr.js | 2 +- tests/wpt/web-platform-tests/wpt | 9 +- .../x-frame-options/deny.sub.html | 27 + .../x-frame-options/support/xfo.py | 7 +- .../xhr/FormData-append.html | 4 +- .../xhr/XMLHttpRequest-withCredentials.any.js | 6 +- .../xhr/access-control-basic-denied.htm | 2 +- ...cess-control-basic-get-fail-non-simple.htm | 2 +- ...basic-non-cors-safelisted-content-type.htm | 2 +- ...-with-non-cors-safelisted-content-type.htm | 2 +- ...s-control-preflight-sync-header-denied.htm | 2 +- ...s-control-preflight-sync-method-denied.htm | 2 +- ...s-control-preflight-sync-not-supported.htm | 2 +- .../web-platform-tests/xhr/formdata-blob.htm | 2 +- .../web-platform-tests/xhr/formdata-set.htm | 4 +- tests/wpt/web-platform-tests/xhr/formdata.htm | 6 +- .../xhr/headers-normalize-response.htm | 2 +- .../xhr/loadstart-and-state.html | 6 +- .../xhr/open-method-bogus.htm | 2 +- .../xhr/open-method-insecure.htm | 2 +- .../xhr/open-method-responsetype-set-sync.htm | 2 +- .../xhr/open-url-multi-window-2.htm | 2 +- .../xhr/open-url-multi-window-3.htm | 2 +- .../xhr/open-url-multi-window-5.htm | 2 +- .../xhr/open-url-multi-window-6.htm | 2 +- .../xhr/overridemimetype-done-state.any.js | 2 +- .../xhr/overridemimetype-loading-state.htm | 2 +- .../xhr/progressevent-interface.html | 4 +- ...after-setting-document-domain-window-2.htm | 2 +- ...r-setting-document-domain-window-helper.js | 5 +- .../xhr/responsetype.any.js | 8 +- .../xhr/responsexml-non-document-types.htm | 4 +- ...-authentication-basic-cors-not-enabled.htm | 2 +- .../xhr/send-data-es-object.any.js | 17 +- .../xhr/send-data-readablestream.any.js | 2 +- .../xhr/send-data-unexpected-tostring.htm | 2 +- .../send-network-error-sync-events.sub.htm | 4 +- .../xhr/send-non-same-origin.htm | 2 +- .../xhr/send-redirect-bogus-sync.htm | 2 +- .../xhr/send-redirect-infinite-sync.htm | 2 +- .../web-platform-tests/xhr/send-send.any.js | 2 +- .../xhr/setrequestheader-after-send.htm | 2 +- .../xhr/setrequestheader-before-open.htm | 2 +- .../xhr/setrequestheader-bogus-name.htm | 4 +- .../xhr/setrequestheader-bogus-value.htm | 6 +- .../web-platform-tests/xhr/timeout-sync.htm | 4 +- .../xhr/xmlhttprequest-network-error-sync.htm | 2 +- .../xhr/xmlhttprequest-unsent.htm | 4 +- 4828 files changed, 87680 insertions(+), 41620 deletions(-) delete mode 100644 tests/wpt/metadata/css/css-regions/animations/animations-001.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-002.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-003.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-004.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-005.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/elements/canvas3d-001.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/elements/canvas3d-002.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/elements/iframe-001.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-001.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-002.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-003.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-004.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-001.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-002.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-003.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-004.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-001.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-002.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-003.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-004.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-005.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-006.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-007.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-008.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/column-flexbox-break.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-001.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-002.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-003.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-004.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/row-flexbox-break.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/flexbox/visibility-regions-in-flexbox.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/interactivity/resizing/regions-resizing-003.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/interactivity/resizing/regions-resizing-007.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/interactivity/resizing/regions-resizing-009.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-003.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-004.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-006.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-008.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-009.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-011.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-012.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-013.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-015.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-016.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-017.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-019.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-021.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-022.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-023.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-024.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-025.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-026.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-027.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-028.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-029.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-001.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-002.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-003.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-004.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-005.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-006.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-007.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-008.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-009.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-010.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-011.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-012.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-013.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-014.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-015.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-016.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-018.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-019.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-020.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-021.html.ini delete mode 100644 tests/wpt/metadata/css/css-regions/transforms/regions-transforms-022.html.ini create mode 100644 tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-006.html.ini create mode 100644 tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-007.html.ini create mode 100644 tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-008.html.ini create mode 100644 tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-009.html.ini create mode 100644 tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-010.html.ini create mode 100644 tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-011.html.ini create mode 100644 tests/wpt/metadata/css/css-values/ch-pseudo-recalc-on-font-load.html.ini create mode 100644 tests/wpt/metadata/css/cssom-view/CaretPosition-001.html.ini create mode 100644 tests/wpt/metadata/css/cssom-view/elementFromPoint-001.html.ini create mode 100644 tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_4.html.ini delete mode 100644 tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_5.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html.ini create mode 100644 tests/wpt/metadata/referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html.ini create mode 100644 tests/wpt/web-platform-tests/client-hints/accept-ch-answers.sub.https.html rename tests/wpt/web-platform-tests/client-hints/{accept_ch.http.html.headers => accept-ch-answers.sub.https.html.headers} (100%) create mode 100644 tests/wpt/web-platform-tests/client-hints/accept-ch-change.https.html create mode 100644 tests/wpt/web-platform-tests/client-hints/accept-ch-feature-policy.sub.https.html rename tests/wpt/web-platform-tests/client-hints/{accept_ch_feature_policy.tentative.sub.https.html.headers => accept-ch-feature-policy.sub.https.html.headers} (100%) create mode 100644 tests/wpt/web-platform-tests/client-hints/accept-ch-malformed-header.https.html rename tests/wpt/web-platform-tests/client-hints/{accept_ch_malformed_header.https.html.headers => accept-ch-malformed-header.https.html.headers} (100%) create mode 100644 tests/wpt/web-platform-tests/client-hints/accept-ch-no-feature-policy.sub.https.html rename tests/wpt/web-platform-tests/client-hints/{accept_ch_no_feature_policy.tentative.sub.https.html.headers => accept-ch-no-feature-policy.sub.https.html.headers} (100%) create mode 100644 tests/wpt/web-platform-tests/client-hints/accept-ch-non-secure.http.html rename tests/wpt/web-platform-tests/client-hints/{accept_ch.tentative.sub.https.html.headers => accept-ch-non-secure.http.html.headers} (100%) create mode 100644 tests/wpt/web-platform-tests/client-hints/accept-ch-stickiness/README.md delete mode 100644 tests/wpt/web-platform-tests/client-hints/accept_ch.http.html delete mode 100644 tests/wpt/web-platform-tests/client-hints/accept_ch.tentative.https.html delete mode 100644 tests/wpt/web-platform-tests/client-hints/accept_ch.tentative.sub.https.html delete mode 100644 tests/wpt/web-platform-tests/client-hints/accept_ch_feature_policy.tentative.sub.https.html delete mode 100644 tests/wpt/web-platform-tests/client-hints/accept_ch_malformed_header.https.html delete mode 100644 tests/wpt/web-platform-tests/client-hints/accept_ch_no_feature_policy.tentative.sub.https.html delete mode 100644 tests/wpt/web-platform-tests/client-hints/echo_client_hints_received.py delete mode 100644 tests/wpt/web-platform-tests/client-hints/echo_ua_client_hints_received.py create mode 100644 tests/wpt/web-platform-tests/client-hints/http-equiv-accept-ch-malformed-header.https.html create mode 100644 tests/wpt/web-platform-tests/client-hints/http-equiv-accept-ch-non-secure.http.html delete mode 100644 tests/wpt/web-platform-tests/client-hints/http_equiv_accept_ch.tentative.http.html delete mode 100644 tests/wpt/web-platform-tests/client-hints/http_equiv_accept_ch.tentative.https.html delete mode 100644 tests/wpt/web-platform-tests/client-hints/http_equiv_accept_ch.tentative.sub.https.html delete mode 100644 tests/wpt/web-platform-tests/client-hints/http_equiv_accept_ch_malformed_header.tentative.https.html create mode 100644 tests/wpt/web-platform-tests/client-hints/resources/accept-ch-different.html create mode 100644 tests/wpt/web-platform-tests/client-hints/resources/accept-ch-different.html.headers create mode 100644 tests/wpt/web-platform-tests/client-hints/resources/accept-ch-empty.html create mode 100644 tests/wpt/web-platform-tests/client-hints/resources/accept-ch-empty.html.headers create mode 100644 tests/wpt/web-platform-tests/client-hints/resources/accept-ch.html create mode 100644 tests/wpt/web-platform-tests/client-hints/resources/accept-ch.html.headers delete mode 100644 tests/wpt/web-platform-tests/client-hints/resources/accept_ch.html delete mode 100644 tests/wpt/web-platform-tests/client-hints/resources/accept_ch.html.headers create mode 100644 tests/wpt/web-platform-tests/client-hints/resources/echo-client-hints-received.py create mode 100644 tests/wpt/web-platform-tests/client-hints/resources/echo-ua-client-hints-received.py create mode 100644 tests/wpt/web-platform-tests/client-hints/resources/expect-client-hints-headers.html create mode 100644 tests/wpt/web-platform-tests/client-hints/resources/expect-different-client-hints-headers.html delete mode 100644 tests/wpt/web-platform-tests/client-hints/resources/expect_client_hints_headers.html create mode 100644 tests/wpt/web-platform-tests/client-hints/resources/open-and-add-load-event.js create mode 100644 tests/wpt/web-platform-tests/css/css-content/element-replacement-dynamic.html create mode 100644 tests/wpt/web-platform-tests/css/css-flexbox/dynamic-change-simplified-layout-002.html create mode 100644 tests/wpt/web-platform-tests/css/css-grid/chrome-bug-001.html create mode 100644 tests/wpt/web-platform-tests/css/css-layout-api/baseline/child-baseline.https.html create mode 100644 tests/wpt/web-platform-tests/css/css-layout-api/baseline/flex-baseline.https.html create mode 100644 tests/wpt/web-platform-tests/css/css-layout-api/baseline/no-baseline.https.html create mode 100644 tests/wpt/web-platform-tests/css/css-layout-api/baseline/orthogonal-baseline.https.html create mode 100644 tests/wpt/web-platform-tests/css/css-pseudo/marker-content-020-ref.html create mode 100644 tests/wpt/web-platform-tests/css/css-pseudo/marker-content-020.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/META.yml delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/animations/animations-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/animations/reference/animations-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/animations/support/animations.css delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/contentEditable-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/contentEditable-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/contentEditable-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/contentEditable-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/contentEditable-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/contentEditable-006.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/contentEditable-007.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/contentEditable-008.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/contentEditable-009.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/contentEditable-010.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/contentEditable-011.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/contentEditable-012.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/reference/contentEditable-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/reference/contentEditable-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/reference/contentEditable-003-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/reference/contentEditable-004-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/reference/contentEditable-005-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/reference/contentEditable-006-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/reference/contentEditable-007-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/reference/contentEditable-008-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/reference/contentEditable-010-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/reference/contentEditable-011-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/support/common.css delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/contentEditable/support/helpers.js delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-006.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-007.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-008.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-009.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-010.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-011.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-012.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-013.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-014.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-list-items-015.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-numbered-paragraphs-divs-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-numbered-paragraphs-divs-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-numbered-paragraphs.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-numbered-spans-display-only-some.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-ordered-lists-in-regions-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-ordered-lists-in-regions-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-ordered-lists-in-regions-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/extract-unordered-lists-in-regions.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-list-items-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-list-items-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-list-items-003-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-list-items-004-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-list-items-005-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-list-items-006-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-list-items-007-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-list-items-008-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-list-items-009-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-list-items-012-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-list-items-013-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-list-items-014-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-list-items-015-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-numbered-paragraphs-divs-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-numbered-paragraphs-divs-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-numbered-paragraphs-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-numbered-spans-display-only-some-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-ordered-lists-in-regions-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-ordered-lists-in-regions-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-ordered-lists-in-regions-003-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-003-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-004-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-005-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/counters/reference/extract-unordered-lists-in-regions-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/cssomview-apis-no-region-chain-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/elements/canvas3d-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/elements/canvas3d-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/elements/iframe-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/elements/reference/canvas3d-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/elements/reference/canvas3d-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/elements/reference/iframe-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/elements/support/3d-filler.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/elements/support/Three.js delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/elements/support/green-at-15.mp4 delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/elements/support/green-at-15.ogv delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/elements/support/static-cube.js delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/elements/video-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-006.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-007.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-008.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/column-flexbox-break.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-flexbox-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-flexbox-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-flexbox-003-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-003-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-004-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-003-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-004-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-005-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-006-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-007-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-008-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/column-flexbox-break-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/regions-flexbox-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/regions-flexbox-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/row-flexbox-break-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/visibility-regions-in-flexbox-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/row-flexbox-break.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flexbox/visibility-regions-in-flexbox.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-clear-breaks-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-clear-breaks-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-006.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-007.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-008.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-009.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-010.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-011.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-012.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-013.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-014.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-015.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-016.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-017.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-018.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-019.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-020.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-021.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-022.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-023.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-024.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-025.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-026.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-027.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-028.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-029.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-030.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-031.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-032.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-033.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-003-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-004-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-005-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-clear-breaks-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-clear-breaks-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-003-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-004-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-005-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-006-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-009-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-011-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-012-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-013-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-016-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-017-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-018-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-020-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-021-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-023-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-024-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-025-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-026-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-027-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-029-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-030-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-031-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-032-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-033-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-content-001-ref.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-content-001.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-content-002-ref.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-content-002.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-from-001-ref.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-from-001.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-from-block-container-001-ref.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-from-block-container-001.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-into-001-ref.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-into-001.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-into-BFC-001-ref.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-into-BFC-001.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-into-invalid-names-001-ref.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-into-invalid-names-001.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-into-parsing-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-into-region-children-001-ref.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/flow-into-region-children-001.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/idlharness.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/inheritance.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-006.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-007.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-008.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-009.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-010.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/support/cat.jpg delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/support/common.css delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/support/green-at-15.mp4 delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/support/green-at-15.ogv delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/support/util.js delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-cursor-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-cursor-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/elementFromPoint-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/elementFromPoint-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-006.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-events-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-events-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-events-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-selection-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-selection-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-selection-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-006.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-007.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-008.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-009.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-010.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/support/css/regions-keyboard.css delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/support/js/regions-keyboard-events-test-helper.js delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-006.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-007.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-008.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-009.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/support/css/regions-mouse-events.css delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/support/js/regions-mouse-events-test-helper.js delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/reference/regions-resizing-005-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/reference/regions-resizing-011-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-006.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-007.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-008.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-009.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-010.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-011.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-012.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-013.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/2-80px-block-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/80px-block-float-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/80px-block-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/region-in-body.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/region-in-container.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/two-regions-in-container.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/util.js delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-006.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-007.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-008.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-009.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-010.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-011.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-012.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-013.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-014.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-015.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-016.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-017.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-018.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-019.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-020.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-021.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-022.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-023.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-024.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-025.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/support/css/regions-selection.css delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/support/img/cat.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/support/js/selection-test-helper.js delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-003-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-006-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-008-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-009-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-012-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-013-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-016-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-017-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-019-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-024-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-028-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-006.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-008.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-009.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-011.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-012.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-013.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-015.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-016.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-017.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-019.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-021.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-022.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-023.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-024.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-025.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-026.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-027.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-028.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-029.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/positioned-content/position-relative-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/positioned-content/reference/position-relative-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/reference/region-fragment-break-1-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/region-fragment-001-ref.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/region-fragment-001.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/region-fragment-002-ref.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/region-fragment-002.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/region-fragment-break-1.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/region-stacking-context-001-ref.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/region-stacking-context-001.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/region-styling-001-ref.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/region-styling-001.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/javascript-stacking-context-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/javascript-stacking-context-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-003-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-004-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-005-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-dialog-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-dialog-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-layers-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-layers-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-layers-003-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-modal-dialog-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-modal-dialog-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-002-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-003-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-004-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-005-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-dialog-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-dialog-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-layers-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-layers-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-layers-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-modal-dialog-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-modal-dialog-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/1x1-green.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/1x1-lime.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/1x1-maroon.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/1x1-navy.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/1x1-red.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/1x1-white.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/60x60-gg-rr.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/60x60-green.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/60x60-red.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/README delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/a-green.css delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/b-green.css delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/c-red.css delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/cat.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/pattern-grg-rgr-grg.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/pattern-grg-rrg-rgg.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/pattern-rgr-grg-rgr.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/pattern-tr.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/square-purple.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/square-teal.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/square-white.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/swatch-blue.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/swatch-green.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/swatch-lime.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/swatch-orange.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/swatch-red.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/swatch-teal.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/swatch-white.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/swatch-yellow.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/test-bl.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/test-br.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/test-outer.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/test-tl.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/support/test-tr.png delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/test-plan/index.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-001-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-008-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-010-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-013-alt-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-013-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-014-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-016-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-017-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-018-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-019-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-020-ref.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-001.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-002.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-003.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-004.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-005.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-006.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-007.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-008.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-009.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-010.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-011.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-012.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-013.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-014.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-015.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-016.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-017.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-018.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-019.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-020.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-021.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-022.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/variable-width-001-ref.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/variable-width-001.xht delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/writing-modes/extract-ordered-list-direction-and-writing-modes.html delete mode 100644 tests/wpt/web-platform-tests/css/css-regions/writing-modes/reference/extract-ordered-list-direction-and-writing-modes-ref.html create mode 100644 tests/wpt/web-platform-tests/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-006.html create mode 100644 tests/wpt/web-platform-tests/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-007.html create mode 100644 tests/wpt/web-platform-tests/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-008.html create mode 100644 tests/wpt/web-platform-tests/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-009.html create mode 100644 tests/wpt/web-platform-tests/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-010.html create mode 100644 tests/wpt/web-platform-tests/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-011.html create mode 100644 tests/wpt/web-platform-tests/css/css-values/ch-pseudo-recalc-on-font-load.html delete mode 100644 tests/wpt/web-platform-tests/interfaces/css-regions.idl create mode 100644 tests/wpt/web-platform-tests/mathml/presentation-markup/spaces/space-vertical-align.tentative-ref.html create mode 100644 tests/wpt/web-platform-tests/mathml/presentation-markup/spaces/space-vertical-align.tentative.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-http.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-http.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-http.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-https.keep-origin.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-https.no-redirect.http.html create mode 100644 tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-https.swap-origin.http.html create mode 100644 tests/wpt/web-platform-tests/svg/path/distance/pathlength-path-mutating.svg create mode 100644 tests/wpt/web-platform-tests/svg/path/distance/pathlength-path-negative.svg create mode 100644 tests/wpt/web-platform-tests/svg/path/distance/pathlength-path-zero.svg create mode 100644 tests/wpt/web-platform-tests/svg/path/distance/pathlength-path.svg create mode 100644 tests/wpt/web-platform-tests/svg/path/distance/pathlength-rect-mutating.svg create mode 100644 tests/wpt/web-platform-tests/svg/path/distance/pathlength-rect.svg create mode 100644 tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-mutating-ref.svg create mode 100644 tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-negative-ref.svg create mode 100644 tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-ref.svg create mode 100644 tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-zero-ref.svg create mode 100644 tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-rect-mutating-ref.svg create mode 100644 tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-rect-ref.svg create mode 100644 tests/wpt/web-platform-tests/svg/types/scripted/SVGGeometryElement.getPointAtLength-02.svg create mode 100644 tests/wpt/web-platform-tests/svg/types/scripted/SVGGeometryElement.getTotalLength-01.svg create mode 100644 tests/wpt/web-platform-tests/workers/modules/resources/import-meta-url-export.js create mode 100644 tests/wpt/web-platform-tests/workers/modules/shared-worker-import-meta.html diff --git a/tests/wpt/metadata/MANIFEST.json b/tests/wpt/metadata/MANIFEST.json index 7d506aa5cea..30bcbebc207 100644 --- a/tests/wpt/metadata/MANIFEST.json +++ b/tests/wpt/metadata/MANIFEST.json @@ -8367,558 +8367,6 @@ {} ] ], - "css/css-regions/animations/animations-001.html": [ - [ - "css/css-regions/animations/animations-001.html", - {} - ] - ], - "css/css-regions/contentEditable/contentEditable-012.html": [ - [ - "css/css-regions/contentEditable/contentEditable-012.html", - {} - ] - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-001.html": [ - [ - "css/css-regions/interactivity/full-screen/fullscreen-region-content-001.html", - {} - ] - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-002.html": [ - [ - "css/css-regions/interactivity/full-screen/fullscreen-region-content-002.html", - {} - ] - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-003.html": [ - [ - "css/css-regions/interactivity/full-screen/fullscreen-region-content-003.html", - {} - ] - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-004.html": [ - [ - "css/css-regions/interactivity/full-screen/fullscreen-region-content-004.html", - {} - ] - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-005.html": [ - [ - "css/css-regions/interactivity/full-screen/fullscreen-region-content-005.html", - {} - ] - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-006.html": [ - [ - "css/css-regions/interactivity/full-screen/fullscreen-region-content-006.html", - {} - ] - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-007.html": [ - [ - "css/css-regions/interactivity/full-screen/fullscreen-region-content-007.html", - {} - ] - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-008.html": [ - [ - "css/css-regions/interactivity/full-screen/fullscreen-region-content-008.html", - {} - ] - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-009.html": [ - [ - "css/css-regions/interactivity/full-screen/fullscreen-region-content-009.html", - {} - ] - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-010.html": [ - [ - "css/css-regions/interactivity/full-screen/fullscreen-region-content-010.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/css-cursor-001.html": [ - [ - "css/css-regions/interactivity/hit-testing/css-cursor-001.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/css-cursor-002.html": [ - [ - "css/css-regions/interactivity/hit-testing/css-cursor-002.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-content-001.html": [ - [ - "css/css-regions/interactivity/hit-testing/css-hover-on-content-001.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-content-002.html": [ - [ - "css/css-regions/interactivity/hit-testing/css-hover-on-content-002.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-content-003.html": [ - [ - "css/css-regions/interactivity/hit-testing/css-hover-on-content-003.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-content-004.html": [ - [ - "css/css-regions/interactivity/hit-testing/css-hover-on-content-004.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-content-005.html": [ - [ - "css/css-regions/interactivity/hit-testing/css-hover-on-content-005.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-region-001.html": [ - [ - "css/css-regions/interactivity/hit-testing/css-hover-on-region-001.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-region-002.html": [ - [ - "css/css-regions/interactivity/hit-testing/css-hover-on-region-002.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-region-003.html": [ - [ - "css/css-regions/interactivity/hit-testing/css-hover-on-region-003.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-region-004.html": [ - [ - "css/css-regions/interactivity/hit-testing/css-hover-on-region-004.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/elementFromPoint-001.html": [ - [ - "css/css-regions/interactivity/hit-testing/elementFromPoint-001.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/elementFromPoint-002.html": [ - [ - "css/css-regions/interactivity/hit-testing/elementFromPoint-002.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-001.html": [ - [ - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-001.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-002.html": [ - [ - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-002.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-003.html": [ - [ - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-003.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-004.html": [ - [ - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-004.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-005.html": [ - [ - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-005.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-006.html": [ - [ - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-006.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/mouse-events-001.html": [ - [ - "css/css-regions/interactivity/hit-testing/mouse-events-001.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/mouse-events-002.html": [ - [ - "css/css-regions/interactivity/hit-testing/mouse-events-002.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/mouse-events-003.html": [ - [ - "css/css-regions/interactivity/hit-testing/mouse-events-003.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/mouse-events-004.html": [ - [ - "css/css-regions/interactivity/hit-testing/mouse-events-004.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/mouse-events-005.html": [ - [ - "css/css-regions/interactivity/hit-testing/mouse-events-005.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-001.html": [ - [ - "css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-001.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-002.html": [ - [ - "css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-002.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-003.html": [ - [ - "css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-003.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/overflow-and-events-001.html": [ - [ - "css/css-regions/interactivity/hit-testing/overflow-and-events-001.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/overflow-and-events-002.html": [ - [ - "css/css-regions/interactivity/hit-testing/overflow-and-events-002.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/overflow-and-events-003.html": [ - [ - "css/css-regions/interactivity/hit-testing/overflow-and-events-003.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/overflow-and-selection-001.html": [ - [ - "css/css-regions/interactivity/hit-testing/overflow-and-selection-001.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/overflow-and-selection-002.html": [ - [ - "css/css-regions/interactivity/hit-testing/overflow-and-selection-002.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/overflow-and-selection-003.html": [ - [ - "css/css-regions/interactivity/hit-testing/overflow-and-selection-003.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-001.html": [ - [ - "css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-001.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-002.html": [ - [ - "css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-002.html", - {} - ] - ], - "css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-003.html": [ - [ - "css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-003.html", - {} - ] - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-001.html": [ - [ - "css/css-regions/interactivity/keyboard/regions-keyboard-events-001.html", - {} - ] - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-002.html": [ - [ - "css/css-regions/interactivity/keyboard/regions-keyboard-events-002.html", - {} - ] - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-003.html": [ - [ - "css/css-regions/interactivity/keyboard/regions-keyboard-events-003.html", - {} - ] - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-004.html": [ - [ - "css/css-regions/interactivity/keyboard/regions-keyboard-events-004.html", - {} - ] - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-005.html": [ - [ - "css/css-regions/interactivity/keyboard/regions-keyboard-events-005.html", - {} - ] - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-006.html": [ - [ - "css/css-regions/interactivity/keyboard/regions-keyboard-events-006.html", - {} - ] - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-007.html": [ - [ - "css/css-regions/interactivity/keyboard/regions-keyboard-events-007.html", - {} - ] - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-008.html": [ - [ - "css/css-regions/interactivity/keyboard/regions-keyboard-events-008.html", - {} - ] - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-009.html": [ - [ - "css/css-regions/interactivity/keyboard/regions-keyboard-events-009.html", - {} - ] - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-010.html": [ - [ - "css/css-regions/interactivity/keyboard/regions-keyboard-events-010.html", - {} - ] - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-001.html": [ - [ - "css/css-regions/interactivity/mouse/regions-mouse-events-001.html", - {} - ] - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-002.html": [ - [ - "css/css-regions/interactivity/mouse/regions-mouse-events-002.html", - {} - ] - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-003.html": [ - [ - "css/css-regions/interactivity/mouse/regions-mouse-events-003.html", - {} - ] - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-004.html": [ - [ - "css/css-regions/interactivity/mouse/regions-mouse-events-004.html", - {} - ] - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-005.html": [ - [ - "css/css-regions/interactivity/mouse/regions-mouse-events-005.html", - {} - ] - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-006.html": [ - [ - "css/css-regions/interactivity/mouse/regions-mouse-events-006.html", - {} - ] - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-007.html": [ - [ - "css/css-regions/interactivity/mouse/regions-mouse-events-007.html", - {} - ] - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-008.html": [ - [ - "css/css-regions/interactivity/mouse/regions-mouse-events-008.html", - {} - ] - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-009.html": [ - [ - "css/css-regions/interactivity/mouse/regions-mouse-events-009.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-001.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-001.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-002.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-002.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-003.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-003.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-004.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-004.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-005.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-005.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-006.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-006.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-007.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-007.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-008.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-008.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-009.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-009.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-010.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-010.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-011.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-011.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-012.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-012.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-013.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-013.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-014.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-014.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-015.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-015.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-016.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-016.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-017.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-017.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-018.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-018.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-019.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-019.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-020.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-020.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-021.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-021.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-022.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-022.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-023.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-023.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-024.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-024.html", - {} - ] - ], - "css/css-regions/interactivity/selection/regions-selection-025.html": [ - [ - "css/css-regions/interactivity/selection/regions-selection-025.html", - {} - ] - ], "css/css-scroll-snap/snap-at-user-scroll-end-manual.html": [ [ "css/css-scroll-snap/snap-at-user-scroll-end-manual.html", @@ -115853,6 +115301,18 @@ {} ] ], + "css/css-content/element-replacement-dynamic.html": [ + [ + "css/css-content/element-replacement-dynamic.html", + [ + [ + "/css/css-content/element-replacement-ref.html", + "==" + ] + ], + {} + ] + ], "css/css-content/element-replacement.html": [ [ "css/css-content/element-replacement.html", @@ -119465,6 +118925,18 @@ {} ] ], + "css/css-flexbox/dynamic-change-simplified-layout-002.html": [ + [ + "css/css-flexbox/dynamic-change-simplified-layout-002.html", + [ + [ + "/css/reference/ref-filled-green-100px-square.xht", + "==" + ] + ], + {} + ] + ], "css/css-flexbox/dynamic-change-simplified-layout.html": [ [ "css/css-flexbox/dynamic-change-simplified-layout.html", @@ -124556,7 +124028,7 @@ "css/css-fonts/font-synthesis-05.html", [ [ - "/css/css-fonts/font-synthesis-03-ref.html", + "/css/css-fonts/font-synthesis-05-ref.html", "==" ] ], @@ -127395,6 +126867,18 @@ {} ] ], + "css/css-grid/chrome-bug-001.html": [ + [ + "css/css-grid/chrome-bug-001.html", + [ + [ + "/css/reference/ref-filled-green-100px-square-only.html", + "==" + ] + ], + {} + ] + ], "css/css-grid/grid-child-percent-basis-resize-1.html": [ [ "css/css-grid/grid-child-percent-basis-resize-1.html", @@ -130611,6 +130095,54 @@ {} ] ], + "css/css-layout-api/baseline/child-baseline.https.html": [ + [ + "css/css-layout-api/baseline/child-baseline.https.html", + [ + [ + "/css/css-layout-api/green-square-ref.html", + "==" + ] + ], + {} + ] + ], + "css/css-layout-api/baseline/flex-baseline.https.html": [ + [ + "css/css-layout-api/baseline/flex-baseline.https.html", + [ + [ + "/css/css-layout-api/green-square-ref.html", + "==" + ] + ], + {} + ] + ], + "css/css-layout-api/baseline/no-baseline.https.html": [ + [ + "css/css-layout-api/baseline/no-baseline.https.html", + [ + [ + "/css/css-layout-api/green-square-ref.html", + "==" + ] + ], + {} + ] + ], + "css/css-layout-api/baseline/orthogonal-baseline.https.html": [ + [ + "css/css-layout-api/baseline/orthogonal-baseline.https.html", + [ + [ + "/css/css-layout-api/green-square-ref.html", + "==" + ] + ], + {} + ] + ], "css/css-layout-api/box-tree-registered.https.html": [ [ "css/css-layout-api/box-tree-registered.https.html", @@ -141319,6 +140851,18 @@ {} ] ], + "css/css-pseudo/marker-content-020.html": [ + [ + "css/css-pseudo/marker-content-020.html", + [ + [ + "/css/css-pseudo/marker-content-020-ref.html", + "==" + ] + ], + {} + ] + ], "css/css-pseudo/marker-display-dynamic-001.html": [ [ "css/css-pseudo/marker-display-dynamic-001.html", @@ -141523,2338 +141067,6 @@ {} ] ], - "css/css-regions/contentEditable/contentEditable-001.html": [ - [ - "css/css-regions/contentEditable/contentEditable-001.html", - [ - [ - "/css/css-regions/contentEditable/reference/contentEditable-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/contentEditable/contentEditable-002.html": [ - [ - "css/css-regions/contentEditable/contentEditable-002.html", - [ - [ - "/css/css-regions/contentEditable/reference/contentEditable-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/contentEditable/contentEditable-003.html": [ - [ - "css/css-regions/contentEditable/contentEditable-003.html", - [ - [ - "/css/css-regions/contentEditable/reference/contentEditable-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/contentEditable/contentEditable-004.html": [ - [ - "css/css-regions/contentEditable/contentEditable-004.html", - [ - [ - "/css/css-regions/contentEditable/reference/contentEditable-004-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/contentEditable/contentEditable-005.html": [ - [ - "css/css-regions/contentEditable/contentEditable-005.html", - [ - [ - "/css/css-regions/contentEditable/reference/contentEditable-005-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/contentEditable/contentEditable-006.html": [ - [ - "css/css-regions/contentEditable/contentEditable-006.html", - [ - [ - "/css/css-regions/contentEditable/reference/contentEditable-006-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/contentEditable/contentEditable-007.html": [ - [ - "css/css-regions/contentEditable/contentEditable-007.html", - [ - [ - "/css/css-regions/contentEditable/reference/contentEditable-007-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/contentEditable/contentEditable-008.html": [ - [ - "css/css-regions/contentEditable/contentEditable-008.html", - [ - [ - "/css/css-regions/contentEditable/reference/contentEditable-008-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/contentEditable/contentEditable-009.html": [ - [ - "css/css-regions/contentEditable/contentEditable-009.html", - [ - [ - "/css/css-regions/contentEditable/reference/contentEditable-008-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/contentEditable/contentEditable-010.html": [ - [ - "css/css-regions/contentEditable/contentEditable-010.html", - [ - [ - "/css/css-regions/contentEditable/reference/contentEditable-010-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/contentEditable/contentEditable-011.html": [ - [ - "css/css-regions/contentEditable/contentEditable-011.html", - [ - [ - "/css/css-regions/contentEditable/reference/contentEditable-011-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-001.html": [ - [ - "css/css-regions/counters/extract-list-items-001.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-002.html": [ - [ - "css/css-regions/counters/extract-list-items-002.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-003.html": [ - [ - "css/css-regions/counters/extract-list-items-003.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-004.html": [ - [ - "css/css-regions/counters/extract-list-items-004.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-004-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-005.html": [ - [ - "css/css-regions/counters/extract-list-items-005.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-005-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-006.html": [ - [ - "css/css-regions/counters/extract-list-items-006.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-006-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-007.html": [ - [ - "css/css-regions/counters/extract-list-items-007.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-007-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-008.html": [ - [ - "css/css-regions/counters/extract-list-items-008.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-008-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-009.html": [ - [ - "css/css-regions/counters/extract-list-items-009.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-009-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-010.html": [ - [ - "css/css-regions/counters/extract-list-items-010.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-009-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-011.html": [ - [ - "css/css-regions/counters/extract-list-items-011.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-009-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-012.html": [ - [ - "css/css-regions/counters/extract-list-items-012.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-012-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-013.html": [ - [ - "css/css-regions/counters/extract-list-items-013.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-009-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-014.html": [ - [ - "css/css-regions/counters/extract-list-items-014.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-014-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-list-items-015.html": [ - [ - "css/css-regions/counters/extract-list-items-015.html", - [ - [ - "/css/css-regions/counters/reference/extract-list-items-015-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-numbered-paragraphs-divs-001.html": [ - [ - "css/css-regions/counters/extract-numbered-paragraphs-divs-001.html", - [ - [ - "/css/css-regions/counters/reference/extract-numbered-paragraphs-divs-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-numbered-paragraphs-divs-002.html": [ - [ - "css/css-regions/counters/extract-numbered-paragraphs-divs-002.html", - [ - [ - "/css/css-regions/counters/reference/extract-numbered-paragraphs-divs-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-numbered-paragraphs.html": [ - [ - "css/css-regions/counters/extract-numbered-paragraphs.html", - [ - [ - "/css/css-regions/counters/reference/extract-numbered-paragraphs-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-numbered-spans-display-only-some.html": [ - [ - "css/css-regions/counters/extract-numbered-spans-display-only-some.html", - [ - [ - "/css/css-regions/counters/reference/extract-numbered-spans-display-only-some-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-001.html": [ - [ - "css/css-regions/counters/extract-ordered-lists-in-regions-001.html", - [ - [ - "/css/css-regions/counters/reference/extract-ordered-lists-in-regions-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-002.html": [ - [ - "css/css-regions/counters/extract-ordered-lists-in-regions-002.html", - [ - [ - "/css/css-regions/counters/reference/extract-ordered-lists-in-regions-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-003.html": [ - [ - "css/css-regions/counters/extract-ordered-lists-in-regions-003.html", - [ - [ - "/css/css-regions/counters/reference/extract-ordered-lists-in-regions-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-001.html": [ - [ - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-001.html", - [ - [ - "/css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-002.html": [ - [ - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-002.html", - [ - [ - "/css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-003.html": [ - [ - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-003.html", - [ - [ - "/css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-004.html": [ - [ - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-004.html", - [ - [ - "/css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-004-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-005.html": [ - [ - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-005.html", - [ - [ - "/css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-005-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/counters/extract-unordered-lists-in-regions.html": [ - [ - "css/css-regions/counters/extract-unordered-lists-in-regions.html", - [ - [ - "/css/css-regions/counters/reference/extract-unordered-lists-in-regions-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/elements/canvas3d-001.html": [ - [ - "css/css-regions/elements/canvas3d-001.html", - [ - [ - "/css/css-regions/elements/reference/canvas3d-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/elements/canvas3d-002.html": [ - [ - "css/css-regions/elements/canvas3d-002.html", - [ - [ - "/css/css-regions/elements/reference/canvas3d-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/elements/iframe-001.html": [ - [ - "css/css-regions/elements/iframe-001.html", - [ - [ - "/css/css-regions/elements/reference/iframe-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-flexbox-001.html": [ - [ - "css/css-regions/flexbox/autoheight-flexbox-001.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-flexbox-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-flexbox-002.html": [ - [ - "css/css-regions/flexbox/autoheight-flexbox-002.html", - [ - [ - "/css/css-regions/flexbox/reference/regions-flexbox-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-flexbox-003.html": [ - [ - "css/css-regions/flexbox/autoheight-flexbox-003.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-flexbox-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-flexbox-004.html": [ - [ - "css/css-regions/flexbox/autoheight-flexbox-004.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-flexbox-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-001.html": [ - [ - "css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-001.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-002.html": [ - [ - "css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-002.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-003.html": [ - [ - "css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-003.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-004.html": [ - [ - "css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-004.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-004-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-001.html": [ - [ - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-001.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-002.html": [ - [ - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-002.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-003.html": [ - [ - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-003.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-004.html": [ - [ - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-004.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-004-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-005.html": [ - [ - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-005.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-005-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-006.html": [ - [ - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-006.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-006-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-007.html": [ - [ - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-007.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-007-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-008.html": [ - [ - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-008.html", - [ - [ - "/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-008-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/column-flexbox-break.html": [ - [ - "css/css-regions/flexbox/column-flexbox-break.html", - [ - [ - "/css/css-regions/flexbox/reference/column-flexbox-break-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/regions-flexbox-001.html": [ - [ - "css/css-regions/flexbox/regions-flexbox-001.html", - [ - [ - "/css/css-regions/flexbox/reference/regions-flexbox-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/regions-flexbox-002.html": [ - [ - "css/css-regions/flexbox/regions-flexbox-002.html", - [ - [ - "/css/css-regions/flexbox/reference/regions-flexbox-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/regions-flexbox-003.html": [ - [ - "css/css-regions/flexbox/regions-flexbox-003.html", - [ - [ - "/css/css-regions/flexbox/reference/regions-flexbox-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/regions-flexbox-004.html": [ - [ - "css/css-regions/flexbox/regions-flexbox-004.html", - [ - [ - "/css/css-regions/flexbox/reference/regions-flexbox-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/row-flexbox-break.html": [ - [ - "css/css-regions/flexbox/row-flexbox-break.html", - [ - [ - "/css/css-regions/flexbox/reference/row-flexbox-break-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flexbox/visibility-regions-in-flexbox.html": [ - [ - "css/css-regions/flexbox/visibility-regions-in-flexbox.html", - [ - [ - "/css/css-regions/flexbox/reference/visibility-regions-in-flexbox-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floated-regions-001.html": [ - [ - "css/css-regions/floats/floated-regions-001.html", - [ - [ - "/css/css-regions/floats/reference/floated-regions-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floated-regions-002.html": [ - [ - "css/css-regions/floats/floated-regions-002.html", - [ - [ - "/css/css-regions/floats/reference/floated-regions-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floated-regions-003.html": [ - [ - "css/css-regions/floats/floated-regions-003.html", - [ - [ - "/css/css-regions/floats/reference/floated-regions-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floated-regions-004.html": [ - [ - "css/css-regions/floats/floated-regions-004.html", - [ - [ - "/css/css-regions/floats/reference/floated-regions-004-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floated-regions-005.html": [ - [ - "css/css-regions/floats/floated-regions-005.html", - [ - [ - "/css/css-regions/floats/reference/floated-regions-005-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-clear-breaks-001.html": [ - [ - "css/css-regions/floats/floats-clear-breaks-001.html", - [ - [ - "/css/css-regions/floats/reference/floats-clear-breaks-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-clear-breaks-002.html": [ - [ - "css/css-regions/floats/floats-clear-breaks-002.html", - [ - [ - "/css/css-regions/floats/reference/floats-clear-breaks-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-001.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-001.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-002.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-002.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-003.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-003.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-004.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-004.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-004-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-005.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-005.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-005-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-006.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-006.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-006-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-007.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-007.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-006-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-008.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-008.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-006-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-009.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-009.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-009-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-010.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-010.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-006-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-011.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-011.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-011-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-012.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-012.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-012-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-013.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-013.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-013-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-014.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-014.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-013-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-015.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-015.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-013-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-016.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-016.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-016-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-017.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-017.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-017-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-018.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-018.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-018-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-019.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-019.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-018-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-020.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-020.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-020-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-021.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-021.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-021-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-022.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-022.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-021-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-023.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-023.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-023-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-024.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-024.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-024-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-025.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-025.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-025-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-026.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-026.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-026-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-027.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-027.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-027-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-028.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-028.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-023-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-029.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-029.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-029-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-030.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-030.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-030-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-031.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-031.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-031-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-032.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-032.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-032-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/floats/floats-in-named-flow-033.html": [ - [ - "css/css-regions/floats/floats-in-named-flow-033.html", - [ - [ - "/css/css-regions/floats/reference/floats-in-named-flow-033-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flow-content-001.xht": [ - [ - "css/css-regions/flow-content-001.xht", - [ - [ - "/css/css-regions/flow-content-001-ref.xht", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flow-content-002.xht": [ - [ - "css/css-regions/flow-content-002.xht", - [ - [ - "/css/css-regions/flow-content-002-ref.xht", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flow-from-001.xht": [ - [ - "css/css-regions/flow-from-001.xht", - [ - [ - "/css/css-regions/flow-from-001-ref.xht", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flow-from-block-container-001.xht": [ - [ - "css/css-regions/flow-from-block-container-001.xht", - [ - [ - "/css/css-regions/flow-from-block-container-001-ref.xht", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flow-into-001.xht": [ - [ - "css/css-regions/flow-into-001.xht", - [ - [ - "/css/css-regions/flow-into-001-ref.xht", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flow-into-BFC-001.xht": [ - [ - "css/css-regions/flow-into-BFC-001.xht", - [ - [ - "/css/css-regions/flow-into-BFC-001-ref.xht", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flow-into-invalid-names-001.xht": [ - [ - "css/css-regions/flow-into-invalid-names-001.xht", - [ - [ - "/css/css-regions/flow-into-invalid-names-001-ref.xht", - "==" - ] - ], - {} - ] - ], - "css/css-regions/flow-into-region-children-001.xht": [ - [ - "css/css-regions/flow-into-region-children-001.xht", - [ - [ - "/css/css-regions/flow-into-region-children-001-ref.xht", - "==" - ] - ], - {} - ] - ], - "css/css-regions/interactivity/resizing/regions-resizing-001.html": [ - [ - "css/css-regions/interactivity/resizing/regions-resizing-001.html", - [ - [ - "/css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/interactivity/resizing/regions-resizing-002.html": [ - [ - "css/css-regions/interactivity/resizing/regions-resizing-002.html", - [ - [ - "/css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/interactivity/resizing/regions-resizing-003.html": [ - [ - "css/css-regions/interactivity/resizing/regions-resizing-003.html", - [ - [ - "/css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/interactivity/resizing/regions-resizing-004.html": [ - [ - "css/css-regions/interactivity/resizing/regions-resizing-004.html", - [ - [ - "/css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/interactivity/resizing/regions-resizing-005.html": [ - [ - "css/css-regions/interactivity/resizing/regions-resizing-005.html", - [ - [ - "/css/css-regions/interactivity/resizing/reference/regions-resizing-005-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/interactivity/resizing/regions-resizing-006.html": [ - [ - "css/css-regions/interactivity/resizing/regions-resizing-006.html", - [ - [ - "/css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/interactivity/resizing/regions-resizing-007.html": [ - [ - "css/css-regions/interactivity/resizing/regions-resizing-007.html", - [ - [ - "/css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/interactivity/resizing/regions-resizing-008.html": [ - [ - "css/css-regions/interactivity/resizing/regions-resizing-008.html", - [ - [ - "/css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/interactivity/resizing/regions-resizing-009.html": [ - [ - "css/css-regions/interactivity/resizing/regions-resizing-009.html", - [ - [ - "/css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/interactivity/resizing/regions-resizing-010.html": [ - [ - "css/css-regions/interactivity/resizing/regions-resizing-010.html", - [ - [ - "/css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/interactivity/resizing/regions-resizing-011.html": [ - [ - "css/css-regions/interactivity/resizing/regions-resizing-011.html", - [ - [ - "/css/css-regions/interactivity/resizing/reference/regions-resizing-011-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/interactivity/resizing/regions-resizing-012.html": [ - [ - "css/css-regions/interactivity/resizing/regions-resizing-012.html", - [ - [ - "/css/css-regions/interactivity/resizing/reference/regions-resizing-011-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/interactivity/resizing/regions-resizing-013.html": [ - [ - "css/css-regions/interactivity/resizing/regions-resizing-013.html", - [ - [ - "/css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-003.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-003.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-004.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-004.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-006.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-006.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-006-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-008.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-008.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-008-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-009.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-009.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-009-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-011.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-011.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-009-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-012.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-012.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-012-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-013.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-013.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-013-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-015.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-015.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-013-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-016.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-016.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-016-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-017.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-017.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-017-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-019.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-019.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-019-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-021.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-021.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-019-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-022.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-022.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-023.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-023.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-024.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-024.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-024-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-025.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-025.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-024-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-026.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-026.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-024-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-027.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-027.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-024-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-028.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-028.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-028-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/multicolumn/regions-multicol-029.html": [ - [ - "css/css-regions/multicolumn/regions-multicol-029.html", - [ - [ - "/css/css-regions/multicolumn/reference/regions-multicol-028-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/positioned-content/position-relative-001.html": [ - [ - "css/css-regions/positioned-content/position-relative-001.html", - [ - [ - "/css/css-regions/positioned-content/reference/position-relative-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/region-fragment-001.xht": [ - [ - "css/css-regions/region-fragment-001.xht", - [ - [ - "/css/css-regions/region-fragment-001-ref.xht", - "==" - ] - ], - {} - ] - ], - "css/css-regions/region-fragment-002.xht": [ - [ - "css/css-regions/region-fragment-002.xht", - [ - [ - "/css/css-regions/region-fragment-002-ref.xht", - "==" - ] - ], - {} - ] - ], - "css/css-regions/region-fragment-break-1.html": [ - [ - "css/css-regions/region-fragment-break-1.html", - [ - [ - "/css/css-regions/reference/region-fragment-break-1-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/region-stacking-context-001.xht": [ - [ - "css/css-regions/region-stacking-context-001.xht", - [ - [ - "/css/css-regions/region-stacking-context-001-ref.xht", - "==" - ] - ], - {} - ] - ], - "css/css-regions/region-styling-001.xht": [ - [ - "css/css-regions/region-styling-001.xht", - [ - [ - "/css/css-regions/region-styling-001-ref.xht", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/content-node-layers-001.html": [ - [ - "css/css-regions/stacking-context/content-node-layers-001.html", - [ - [ - "/css/css-regions/stacking-context/reference/content-node-layers-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/content-node-layers-002.html": [ - [ - "css/css-regions/stacking-context/content-node-layers-002.html", - [ - [ - "/css/css-regions/stacking-context/reference/content-node-layers-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/content-node-layers-003.html": [ - [ - "css/css-regions/stacking-context/content-node-layers-003.html", - [ - [ - "/css/css-regions/stacking-context/reference/content-node-layers-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/content-node-layers-004.html": [ - [ - "css/css-regions/stacking-context/content-node-layers-004.html", - [ - [ - "/css/css-regions/stacking-context/reference/content-node-layers-004-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/content-node-layers-005.html": [ - [ - "css/css-regions/stacking-context/content-node-layers-005.html", - [ - [ - "/css/css-regions/stacking-context/reference/content-node-layers-005-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/regions-dialog-001.html": [ - [ - "css/css-regions/stacking-context/regions-dialog-001.html", - [ - [ - "/css/css-regions/stacking-context/reference/regions-dialog-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/regions-dialog-002.html": [ - [ - "css/css-regions/stacking-context/regions-dialog-002.html", - [ - [ - "/css/css-regions/stacking-context/reference/regions-dialog-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/regions-layers-001.html": [ - [ - "css/css-regions/stacking-context/regions-layers-001.html", - [ - [ - "/css/css-regions/stacking-context/reference/regions-layers-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/regions-layers-002.html": [ - [ - "css/css-regions/stacking-context/regions-layers-002.html", - [ - [ - "/css/css-regions/stacking-context/reference/regions-layers-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/regions-layers-003.html": [ - [ - "css/css-regions/stacking-context/regions-layers-003.html", - [ - [ - "/css/css-regions/stacking-context/reference/regions-layers-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/regions-modal-dialog-001.html": [ - [ - "css/css-regions/stacking-context/regions-modal-dialog-001.html", - [ - [ - "/css/css-regions/stacking-context/reference/regions-modal-dialog-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/regions-modal-dialog-002.html": [ - [ - "css/css-regions/stacking-context/regions-modal-dialog-002.html", - [ - [ - "/css/css-regions/stacking-context/reference/regions-modal-dialog-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/regions-stacking-context-001.html": [ - [ - "css/css-regions/stacking-context/regions-stacking-context-001.html", - [ - [ - "/css/css-regions/stacking-context/reference/regions-stacking-context-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/regions-stacking-context-002.html": [ - [ - "css/css-regions/stacking-context/regions-stacking-context-002.html", - [ - [ - "/css/css-regions/stacking-context/reference/regions-stacking-context-002-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/regions-stacking-context-003.html": [ - [ - "css/css-regions/stacking-context/regions-stacking-context-003.html", - [ - [ - "/css/css-regions/stacking-context/reference/regions-stacking-context-003-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/regions-stacking-context-004.html": [ - [ - "css/css-regions/stacking-context/regions-stacking-context-004.html", - [ - [ - "/css/css-regions/stacking-context/reference/regions-stacking-context-004-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/stacking-context/regions-stacking-context-005.html": [ - [ - "css/css-regions/stacking-context/regions-stacking-context-005.html", - [ - [ - "/css/css-regions/stacking-context/reference/regions-stacking-context-005-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-001.html": [ - [ - "css/css-regions/transforms/regions-transforms-001.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-002.html": [ - [ - "css/css-regions/transforms/regions-transforms-002.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-003.html": [ - [ - "css/css-regions/transforms/regions-transforms-003.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-004.html": [ - [ - "css/css-regions/transforms/regions-transforms-004.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-005.html": [ - [ - "css/css-regions/transforms/regions-transforms-005.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-006.html": [ - [ - "css/css-regions/transforms/regions-transforms-006.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-007.html": [ - [ - "css/css-regions/transforms/regions-transforms-007.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-001-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-008.html": [ - [ - "css/css-regions/transforms/regions-transforms-008.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-008-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-009.html": [ - [ - "css/css-regions/transforms/regions-transforms-009.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-008-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-010.html": [ - [ - "css/css-regions/transforms/regions-transforms-010.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-010-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-011.html": [ - [ - "css/css-regions/transforms/regions-transforms-011.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-010-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-012.html": [ - [ - "css/css-regions/transforms/regions-transforms-012.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-010-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-013.html": [ - [ - "css/css-regions/transforms/regions-transforms-013.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-013-ref.html", - "==" - ], - [ - "/css/css-regions/transforms/reference/regions-transforms-013-alt-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-014.html": [ - [ - "css/css-regions/transforms/regions-transforms-014.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-014-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-015.html": [ - [ - "css/css-regions/transforms/regions-transforms-015.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-014-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-016.html": [ - [ - "css/css-regions/transforms/regions-transforms-016.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-016-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-017.html": [ - [ - "css/css-regions/transforms/regions-transforms-017.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-017-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-018.html": [ - [ - "css/css-regions/transforms/regions-transforms-018.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-018-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-019.html": [ - [ - "css/css-regions/transforms/regions-transforms-019.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-019-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-020.html": [ - [ - "css/css-regions/transforms/regions-transforms-020.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-020-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-021.html": [ - [ - "css/css-regions/transforms/regions-transforms-021.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-020-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/transforms/regions-transforms-022.html": [ - [ - "css/css-regions/transforms/regions-transforms-022.html", - [ - [ - "/css/css-regions/transforms/reference/regions-transforms-020-ref.html", - "==" - ] - ], - {} - ] - ], - "css/css-regions/variable-width-001.xht": [ - [ - "css/css-regions/variable-width-001.xht", - [ - [ - "/css/css-regions/variable-width-001-ref.xht", - "==" - ] - ], - {} - ] - ], - "css/css-regions/writing-modes/extract-ordered-list-direction-and-writing-modes.html": [ - [ - "css/css-regions/writing-modes/extract-ordered-list-direction-and-writing-modes.html", - [ - [ - "/css/css-regions/writing-modes/reference/extract-ordered-list-direction-and-writing-modes-ref.html", - "==" - ] - ], - {} - ] - ], "css/css-rhythm/line-height-step-basic-001.html": [ [ "css/css-rhythm/line-height-step-basic-001.html", @@ -158231,6 +155443,78 @@ {} ] ], + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-006.html": [ + [ + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-006.html", + [ + [ + "/css/css-text/white-space/reference/white-space-pre-wrap-trailing-spaces-004-ref.html", + "==" + ] + ], + {} + ] + ], + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-007.html": [ + [ + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-007.html", + [ + [ + "/css/css-text/white-space/reference/white-space-pre-wrap-trailing-spaces-004-ref.html", + "==" + ] + ], + {} + ] + ], + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-008.html": [ + [ + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-008.html", + [ + [ + "/css/css-text/white-space/reference/white-space-pre-wrap-trailing-spaces-004-ref.html", + "==" + ] + ], + {} + ] + ], + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-009.html": [ + [ + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-009.html", + [ + [ + "/css/css-text/white-space/reference/white-space-pre-wrap-trailing-spaces-004-ref.html", + "==" + ] + ], + {} + ] + ], + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-010.html": [ + [ + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-010.html", + [ + [ + "/css/css-text/white-space/reference/white-space-pre-wrap-trailing-spaces-004-ref.html", + "==" + ] + ], + {} + ] + ], + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-011.html": [ + [ + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-011.html", + [ + [ + "/css/css-text/white-space/reference/white-space-pre-wrap-trailing-spaces-004-ref.html", + "==" + ] + ], + {} + ] + ], "css/css-text/white-space/white-space-wrap-after-nowrap-001.html": [ [ "css/css-text/white-space/white-space-wrap-after-nowrap-001.html", @@ -209885,6 +207169,18 @@ {} ] ], + "mathml/presentation-markup/spaces/space-vertical-align.tentative.html": [ + [ + "mathml/presentation-markup/spaces/space-vertical-align.tentative.html", + [ + [ + "/mathml/presentation-markup/spaces/space-vertical-align.tentative-ref.html", + "==" + ] + ], + {} + ] + ], "mathml/presentation-markup/tokens/ms-001.html": [ [ "mathml/presentation-markup/tokens/ms-001.html", @@ -211877,6 +209173,78 @@ {} ] ], + "svg/path/distance/pathlength-path-mutating.svg": [ + [ + "svg/path/distance/pathlength-path-mutating.svg", + [ + [ + "/svg/path/distance/reference/pathlength-path-mutating-ref.svg", + "==" + ] + ], + {} + ] + ], + "svg/path/distance/pathlength-path-negative.svg": [ + [ + "svg/path/distance/pathlength-path-negative.svg", + [ + [ + "/svg/path/distance/reference/pathlength-path-negative-ref.svg", + "==" + ] + ], + {} + ] + ], + "svg/path/distance/pathlength-path-zero.svg": [ + [ + "svg/path/distance/pathlength-path-zero.svg", + [ + [ + "/svg/path/distance/reference/pathlength-path-zero-ref.svg", + "==" + ] + ], + {} + ] + ], + "svg/path/distance/pathlength-path.svg": [ + [ + "svg/path/distance/pathlength-path.svg", + [ + [ + "/svg/path/distance/reference/pathlength-path-ref.svg", + "==" + ] + ], + {} + ] + ], + "svg/path/distance/pathlength-rect-mutating.svg": [ + [ + "svg/path/distance/pathlength-rect-mutating.svg", + [ + [ + "/svg/path/distance/reference/pathlength-rect-mutating-ref.svg", + "==" + ] + ], + {} + ] + ], + "svg/path/distance/pathlength-rect.svg": [ + [ + "svg/path/distance/pathlength-rect.svg", + [ + [ + "/svg/path/distance/reference/pathlength-rect-ref.svg", + "==" + ] + ], + {} + ] + ], "svg/path/error-handling/render-until-error.svg": [ [ "svg/path/error-handling/render-until-error.svg", @@ -218685,15 +216053,33 @@ "client-hints/META.yml": [ [] ], + "client-hints/accept-ch-answers.sub.https.html.headers": [ + [] + ], "client-hints/accept-ch-cache-revalidation.https.html.headers": [ [] ], "client-hints/accept-ch-feature-policy-navigation.https.html.headers": [ [] ], + "client-hints/accept-ch-feature-policy.sub.https.html.headers": [ + [] + ], + "client-hints/accept-ch-malformed-header.https.html.headers": [ + [] + ], "client-hints/accept-ch-no-feature-policy-navigation.https.html.headers": [ [] ], + "client-hints/accept-ch-no-feature-policy.sub.https.html.headers": [ + [] + ], + "client-hints/accept-ch-non-secure.http.html.headers": [ + [] + ], + "client-hints/accept-ch-stickiness/README.md": [ + [] + ], "client-hints/accept-ch-stickiness/resources/accept-ch-test.js": [ [] ], @@ -218724,37 +216110,37 @@ "client-hints/accept-ch-stickiness/resources/http-equiv-accept-ch.html.headers": [ [] ], - "client-hints/accept_ch.http.html.headers": [ + "client-hints/resources/accept-ch-different.html": [ [] ], - "client-hints/accept_ch.tentative.sub.https.html.headers": [ + "client-hints/resources/accept-ch-different.html.headers": [ [] ], - "client-hints/accept_ch_feature_policy.tentative.sub.https.html.headers": [ + "client-hints/resources/accept-ch-empty.html": [ [] ], - "client-hints/accept_ch_malformed_header.https.html.headers": [ + "client-hints/resources/accept-ch-empty.html.headers": [ [] ], - "client-hints/accept_ch_no_feature_policy.tentative.sub.https.html.headers": [ + "client-hints/resources/accept-ch.html": [ [] ], - "client-hints/echo_client_hints_received.py": [ + "client-hints/resources/accept-ch.html.headers": [ [] ], - "client-hints/echo_ua_client_hints_received.py": [ + "client-hints/resources/echo-client-hints-received.py": [ [] ], - "client-hints/resources/accept_ch.html": [ - [] - ], - "client-hints/resources/accept_ch.html.headers": [ + "client-hints/resources/echo-ua-client-hints-received.py": [ [] ], "client-hints/resources/expect-client-hints-headers-iframe.py": [ [] ], - "client-hints/resources/expect_client_hints_headers.html": [ + "client-hints/resources/expect-client-hints-headers.html": [ + [] + ], + "client-hints/resources/expect-different-client-hints-headers.html": [ [] ], "client-hints/resources/feature-policy-navigation.js": [ @@ -218766,6 +216152,9 @@ "client-hints/resources/iframe-accept-ch-lifetime.html.headers": [ [] ], + "client-hints/resources/open-and-add-load-event.js": [ + [] + ], "client-hints/resources/sec-ch-ua.py": [ [] ], @@ -257988,6 +255377,9 @@ "css/css-pseudo/marker-content-019-ref.html": [ [] ], + "css/css-pseudo/marker-content-020-ref.html": [ + [] + ], "css/css-pseudo/marker-font-properties-ref.html": [ [] ], @@ -258015,645 +255407,6 @@ "css/css-pseudo/textpath-selection-011-ref.html": [ [] ], - "css/css-regions/META.yml": [ - [] - ], - "css/css-regions/animations/reference/animations-001-ref.html": [ - [] - ], - "css/css-regions/animations/support/animations.css": [ - [] - ], - "css/css-regions/contentEditable/reference/contentEditable-001-ref.html": [ - [] - ], - "css/css-regions/contentEditable/reference/contentEditable-002-ref.html": [ - [] - ], - "css/css-regions/contentEditable/reference/contentEditable-003-ref.html": [ - [] - ], - "css/css-regions/contentEditable/reference/contentEditable-004-ref.html": [ - [] - ], - "css/css-regions/contentEditable/reference/contentEditable-005-ref.html": [ - [] - ], - "css/css-regions/contentEditable/reference/contentEditable-006-ref.html": [ - [] - ], - "css/css-regions/contentEditable/reference/contentEditable-007-ref.html": [ - [] - ], - "css/css-regions/contentEditable/reference/contentEditable-008-ref.html": [ - [] - ], - "css/css-regions/contentEditable/reference/contentEditable-010-ref.html": [ - [] - ], - "css/css-regions/contentEditable/reference/contentEditable-011-ref.html": [ - [] - ], - "css/css-regions/contentEditable/support/common.css": [ - [] - ], - "css/css-regions/contentEditable/support/helpers.js": [ - [] - ], - "css/css-regions/counters/reference/extract-list-items-001-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-list-items-002-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-list-items-003-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-list-items-004-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-list-items-005-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-list-items-006-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-list-items-007-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-list-items-008-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-list-items-009-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-list-items-012-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-list-items-013-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-list-items-014-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-list-items-015-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-numbered-paragraphs-divs-001-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-numbered-paragraphs-divs-002-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-numbered-paragraphs-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-numbered-spans-display-only-some-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-001-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-002-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-003-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-001-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-002-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-003-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-004-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-005-ref.html": [ - [] - ], - "css/css-regions/counters/reference/extract-unordered-lists-in-regions-ref.html": [ - [] - ], - "css/css-regions/elements/reference/canvas3d-001-ref.html": [ - [] - ], - "css/css-regions/elements/reference/canvas3d-002-ref.html": [ - [] - ], - "css/css-regions/elements/reference/iframe-001-ref.html": [ - [] - ], - "css/css-regions/elements/support/3d-filler.html": [ - [] - ], - "css/css-regions/elements/support/Three.js": [ - [] - ], - "css/css-regions/elements/support/green-at-15.mp4": [ - [] - ], - "css/css-regions/elements/support/green-at-15.ogv": [ - [] - ], - "css/css-regions/elements/support/static-cube.js": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-flexbox-001-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-flexbox-002-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-flexbox-003-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-001-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-002-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-003-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-004-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-001-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-002-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-003-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-004-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-005-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-006-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-007-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-008-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/column-flexbox-break-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/regions-flexbox-001-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/regions-flexbox-002-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/row-flexbox-break-ref.html": [ - [] - ], - "css/css-regions/flexbox/reference/visibility-regions-in-flexbox-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floated-regions-001-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floated-regions-002-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floated-regions-003-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floated-regions-004-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floated-regions-005-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-clear-breaks-001-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-clear-breaks-002-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-001-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-002-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-003-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-004-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-005-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-006-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-009-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-011-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-012-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-013-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-016-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-017-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-018-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-020-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-021-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-023-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-024-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-025-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-026-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-027-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-029-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-030-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-031-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-032-ref.html": [ - [] - ], - "css/css-regions/floats/reference/floats-in-named-flow-033-ref.html": [ - [] - ], - "css/css-regions/flow-content-001-ref.xht": [ - [] - ], - "css/css-regions/flow-content-002-ref.xht": [ - [] - ], - "css/css-regions/flow-from-001-ref.xht": [ - [] - ], - "css/css-regions/flow-from-block-container-001-ref.xht": [ - [] - ], - "css/css-regions/flow-into-001-ref.xht": [ - [] - ], - "css/css-regions/flow-into-BFC-001-ref.xht": [ - [] - ], - "css/css-regions/flow-into-invalid-names-001-ref.xht": [ - [] - ], - "css/css-regions/flow-into-region-children-001-ref.xht": [ - [] - ], - "css/css-regions/interactivity/full-screen/support/cat.jpg": [ - [] - ], - "css/css-regions/interactivity/full-screen/support/common.css": [ - [] - ], - "css/css-regions/interactivity/full-screen/support/green-at-15.mp4": [ - [] - ], - "css/css-regions/interactivity/full-screen/support/green-at-15.ogv": [ - [] - ], - "css/css-regions/interactivity/full-screen/support/util.js": [ - [] - ], - "css/css-regions/interactivity/keyboard/support/css/regions-keyboard.css": [ - [] - ], - "css/css-regions/interactivity/keyboard/support/js/regions-keyboard-events-test-helper.js": [ - [] - ], - "css/css-regions/interactivity/mouse/support/css/regions-mouse-events.css": [ - [] - ], - "css/css-regions/interactivity/mouse/support/js/regions-mouse-events-test-helper.js": [ - [] - ], - "css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html": [ - [] - ], - "css/css-regions/interactivity/resizing/reference/regions-resizing-005-ref.html": [ - [] - ], - "css/css-regions/interactivity/resizing/reference/regions-resizing-011-ref.html": [ - [] - ], - "css/css-regions/interactivity/resizing/support/2-80px-block-ref.html": [ - [] - ], - "css/css-regions/interactivity/resizing/support/80px-block-float-ref.html": [ - [] - ], - "css/css-regions/interactivity/resizing/support/80px-block-ref.html": [ - [] - ], - "css/css-regions/interactivity/resizing/support/region-in-body.html": [ - [] - ], - "css/css-regions/interactivity/resizing/support/region-in-container.html": [ - [] - ], - "css/css-regions/interactivity/resizing/support/two-regions-in-container.html": [ - [] - ], - "css/css-regions/interactivity/resizing/support/util.js": [ - [] - ], - "css/css-regions/interactivity/selection/support/css/regions-selection.css": [ - [] - ], - "css/css-regions/interactivity/selection/support/img/cat.png": [ - [] - ], - "css/css-regions/interactivity/selection/support/js/selection-test-helper.js": [ - [] - ], - "css/css-regions/multicolumn/reference/regions-multicol-003-ref.html": [ - [] - ], - "css/css-regions/multicolumn/reference/regions-multicol-006-ref.html": [ - [] - ], - "css/css-regions/multicolumn/reference/regions-multicol-008-ref.html": [ - [] - ], - "css/css-regions/multicolumn/reference/regions-multicol-009-ref.html": [ - [] - ], - "css/css-regions/multicolumn/reference/regions-multicol-012-ref.html": [ - [] - ], - "css/css-regions/multicolumn/reference/regions-multicol-013-ref.html": [ - [] - ], - "css/css-regions/multicolumn/reference/regions-multicol-016-ref.html": [ - [] - ], - "css/css-regions/multicolumn/reference/regions-multicol-017-ref.html": [ - [] - ], - "css/css-regions/multicolumn/reference/regions-multicol-019-ref.html": [ - [] - ], - "css/css-regions/multicolumn/reference/regions-multicol-024-ref.html": [ - [] - ], - "css/css-regions/multicolumn/reference/regions-multicol-028-ref.html": [ - [] - ], - "css/css-regions/positioned-content/reference/position-relative-001-ref.html": [ - [] - ], - "css/css-regions/reference/region-fragment-break-1-ref.html": [ - [] - ], - "css/css-regions/region-fragment-001-ref.xht": [ - [] - ], - "css/css-regions/region-fragment-002-ref.xht": [ - [] - ], - "css/css-regions/region-stacking-context-001-ref.xht": [ - [] - ], - "css/css-regions/region-styling-001-ref.xht": [ - [] - ], - "css/css-regions/stacking-context/reference/content-node-layers-001-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/content-node-layers-002-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/content-node-layers-003-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/content-node-layers-004-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/content-node-layers-005-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/regions-dialog-001-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/regions-dialog-002-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/regions-layers-001-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/regions-layers-002-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/regions-layers-003-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/regions-modal-dialog-001-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/regions-modal-dialog-002-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/regions-stacking-context-001-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/regions-stacking-context-002-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/regions-stacking-context-003-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/regions-stacking-context-004-ref.html": [ - [] - ], - "css/css-regions/stacking-context/reference/regions-stacking-context-005-ref.html": [ - [] - ], - "css/css-regions/support/1x1-green.png": [ - [] - ], - "css/css-regions/support/1x1-lime.png": [ - [] - ], - "css/css-regions/support/1x1-maroon.png": [ - [] - ], - "css/css-regions/support/1x1-navy.png": [ - [] - ], - "css/css-regions/support/1x1-red.png": [ - [] - ], - "css/css-regions/support/1x1-white.png": [ - [] - ], - "css/css-regions/support/60x60-gg-rr.png": [ - [] - ], - "css/css-regions/support/60x60-green.png": [ - [] - ], - "css/css-regions/support/60x60-red.png": [ - [] - ], - "css/css-regions/support/README": [ - [] - ], - "css/css-regions/support/a-green.css": [ - [] - ], - "css/css-regions/support/b-green.css": [ - [] - ], - "css/css-regions/support/c-red.css": [ - [] - ], - "css/css-regions/support/cat.png": [ - [] - ], - "css/css-regions/support/pattern-grg-rgr-grg.png": [ - [] - ], - "css/css-regions/support/pattern-grg-rrg-rgg.png": [ - [] - ], - "css/css-regions/support/pattern-rgr-grg-rgr.png": [ - [] - ], - "css/css-regions/support/pattern-tr.png": [ - [] - ], - "css/css-regions/support/square-purple.png": [ - [] - ], - "css/css-regions/support/square-teal.png": [ - [] - ], - "css/css-regions/support/square-white.png": [ - [] - ], - "css/css-regions/support/swatch-blue.png": [ - [] - ], - "css/css-regions/support/swatch-green.png": [ - [] - ], - "css/css-regions/support/swatch-lime.png": [ - [] - ], - "css/css-regions/support/swatch-orange.png": [ - [] - ], - "css/css-regions/support/swatch-red.png": [ - [] - ], - "css/css-regions/support/swatch-teal.png": [ - [] - ], - "css/css-regions/support/swatch-white.png": [ - [] - ], - "css/css-regions/support/swatch-yellow.png": [ - [] - ], - "css/css-regions/support/test-bl.png": [ - [] - ], - "css/css-regions/support/test-br.png": [ - [] - ], - "css/css-regions/support/test-outer.png": [ - [] - ], - "css/css-regions/support/test-tl.png": [ - [] - ], - "css/css-regions/support/test-tr.png": [ - [] - ], - "css/css-regions/test-plan/index.html": [ - [] - ], - "css/css-regions/transforms/reference/regions-transforms-001-ref.html": [ - [] - ], - "css/css-regions/transforms/reference/regions-transforms-008-ref.html": [ - [] - ], - "css/css-regions/transforms/reference/regions-transforms-010-ref.html": [ - [] - ], - "css/css-regions/transforms/reference/regions-transforms-013-alt-ref.html": [ - [] - ], - "css/css-regions/transforms/reference/regions-transforms-013-ref.html": [ - [] - ], - "css/css-regions/transforms/reference/regions-transforms-014-ref.html": [ - [] - ], - "css/css-regions/transforms/reference/regions-transforms-016-ref.html": [ - [] - ], - "css/css-regions/transforms/reference/regions-transforms-017-ref.html": [ - [] - ], - "css/css-regions/transforms/reference/regions-transforms-018-ref.html": [ - [] - ], - "css/css-regions/transforms/reference/regions-transforms-019-ref.html": [ - [] - ], - "css/css-regions/transforms/reference/regions-transforms-020-ref.html": [ - [] - ], - "css/css-regions/variable-width-001-ref.xht": [ - [] - ], - "css/css-regions/writing-modes/reference/extract-ordered-list-direction-and-writing-modes-ref.html": [ - [] - ], "css/css-rhythm/META.yml": [ [] ], @@ -280374,9 +277127,6 @@ "interfaces/css-pseudo.idl": [ [] ], - "interfaces/css-regions.idl": [ - [] - ], "interfaces/css-shadow-parts.idl": [ [] ], @@ -281022,6 +277772,9 @@ "mathml/presentation-markup/spaces/space-2-ref.html": [ [] ], + "mathml/presentation-markup/spaces/space-vertical-align.tentative-ref.html": [ + [] + ], "mathml/presentation-markup/tokens/ms-001-ref.html": [ [] ], @@ -283107,6 +279860,579 @@ "quirks/unitless-length/support/common.js": [ [] ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers": [ + [] + ], "referrer-policy/4K+1/generic/spec_json.js": [ [] ], @@ -283116,6 +280442,579 @@ "referrer-policy/4K+1/spec.src.json": [ [] ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers": [ + [] + ], "referrer-policy/4K-1/generic/spec_json.js": [ [] ], @@ -283125,6 +281024,579 @@ "referrer-policy/4K-1/spec.src.json": [ [] ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers": [ + [] + ], "referrer-policy/4K/generic/spec_json.js": [ [] ], @@ -288321,6 +286793,24 @@ "svg/path/distance/pathLength-zero-ref.svg": [ [] ], + "svg/path/distance/reference/pathlength-path-mutating-ref.svg": [ + [] + ], + "svg/path/distance/reference/pathlength-path-negative-ref.svg": [ + [] + ], + "svg/path/distance/reference/pathlength-path-ref.svg": [ + [] + ], + "svg/path/distance/reference/pathlength-path-zero-ref.svg": [ + [] + ], + "svg/path/distance/reference/pathlength-rect-mutating-ref.svg": [ + [] + ], + "svg/path/distance/reference/pathlength-rect-ref.svg": [ + [] + ], "svg/path/error-handling/render-until-error-ref.svg": [ [] ], @@ -296742,6 +295232,9 @@ "workers/modules/resources/export-on-static-import-script.js.headers": [ [] ], + "workers/modules/resources/import-meta-url-export.js": [ + [] + ], "workers/modules/resources/import-meta-url-worker.js": [ [] ], @@ -316167,24 +314660,60 @@ {} ] ], + "client-hints/accept-ch-answers.sub.https.html": [ + [ + "client-hints/accept-ch-answers.sub.https.html", + {} + ] + ], "client-hints/accept-ch-cache-revalidation.https.html": [ [ "client-hints/accept-ch-cache-revalidation.https.html", {} ] ], + "client-hints/accept-ch-change.https.html": [ + [ + "client-hints/accept-ch-change.https.html", + {} + ] + ], "client-hints/accept-ch-feature-policy-navigation.https.html": [ [ "client-hints/accept-ch-feature-policy-navigation.https.html", {} ] ], + "client-hints/accept-ch-feature-policy.sub.https.html": [ + [ + "client-hints/accept-ch-feature-policy.sub.https.html", + {} + ] + ], + "client-hints/accept-ch-malformed-header.https.html": [ + [ + "client-hints/accept-ch-malformed-header.https.html", + {} + ] + ], "client-hints/accept-ch-no-feature-policy-navigation.https.html": [ [ "client-hints/accept-ch-no-feature-policy-navigation.https.html", {} ] ], + "client-hints/accept-ch-no-feature-policy.sub.https.html": [ + [ + "client-hints/accept-ch-no-feature-policy.sub.https.html", + {} + ] + ], + "client-hints/accept-ch-non-secure.http.html": [ + [ + "client-hints/accept-ch-non-secure.http.html", + {} + ] + ], "client-hints/accept-ch-stickiness/cross-origin-iframe-not-setting-other-origins.https.html": [ [ "client-hints/accept-ch-stickiness/cross-origin-iframe-not-setting-other-origins.https.html", @@ -316295,63 +314824,15 @@ } ] ], - "client-hints/accept_ch.http.html": [ + "client-hints/http-equiv-accept-ch-malformed-header.https.html": [ [ - "client-hints/accept_ch.http.html", + "client-hints/http-equiv-accept-ch-malformed-header.https.html", {} ] ], - "client-hints/accept_ch.tentative.https.html": [ + "client-hints/http-equiv-accept-ch-non-secure.http.html": [ [ - "client-hints/accept_ch.tentative.https.html", - {} - ] - ], - "client-hints/accept_ch.tentative.sub.https.html": [ - [ - "client-hints/accept_ch.tentative.sub.https.html", - {} - ] - ], - "client-hints/accept_ch_feature_policy.tentative.sub.https.html": [ - [ - "client-hints/accept_ch_feature_policy.tentative.sub.https.html", - {} - ] - ], - "client-hints/accept_ch_malformed_header.https.html": [ - [ - "client-hints/accept_ch_malformed_header.https.html", - {} - ] - ], - "client-hints/accept_ch_no_feature_policy.tentative.sub.https.html": [ - [ - "client-hints/accept_ch_no_feature_policy.tentative.sub.https.html", - {} - ] - ], - "client-hints/http_equiv_accept_ch.tentative.http.html": [ - [ - "client-hints/http_equiv_accept_ch.tentative.http.html", - {} - ] - ], - "client-hints/http_equiv_accept_ch.tentative.https.html": [ - [ - "client-hints/http_equiv_accept_ch.tentative.https.html", - {} - ] - ], - "client-hints/http_equiv_accept_ch.tentative.sub.https.html": [ - [ - "client-hints/http_equiv_accept_ch.tentative.sub.https.html", - {} - ] - ], - "client-hints/http_equiv_accept_ch_malformed_header.tentative.https.html": [ - [ - "client-hints/http_equiv_accept_ch_malformed_header.tentative.https.html", + "client-hints/http-equiv-accept-ch-non-secure.http.html", {} ] ], @@ -330352,36 +328833,6 @@ {} ] ], - "css/css-regions/cssomview-apis-no-region-chain-001.html": [ - [ - "css/css-regions/cssomview-apis-no-region-chain-001.html", - {} - ] - ], - "css/css-regions/flow-into-parsing-001.html": [ - [ - "css/css-regions/flow-into-parsing-001.html", - {} - ] - ], - "css/css-regions/idlharness.html": [ - [ - "css/css-regions/idlharness.html", - {} - ] - ], - "css/css-regions/inheritance.html": [ - [ - "css/css-regions/inheritance.html", - {} - ] - ], - "css/css-regions/stacking-context/javascript-stacking-context-001.html": [ - [ - "css/css-regions/stacking-context/javascript-stacking-context-001.html", - {} - ] - ], "css/css-rhythm/inheritance.html": [ [ "css/css-rhythm/inheritance.html", @@ -338312,6 +336763,12 @@ {} ] ], + "css/css-values/ch-pseudo-recalc-on-font-load.html": [ + [ + "css/css-values/ch-pseudo-recalc-on-font-load.html", + {} + ] + ], "css/css-values/ch-recalc-on-font-load.html": [ [ "css/css-values/ch-recalc-on-font-load.html", @@ -382626,8 +381083,13 @@ [ "script", "script-tests/FileSystemBaseHandle-postMessage-MessagePort.js" + ], + [ + "timeout", + "long" ] - ] + ], + "timeout": "long" } ] ], @@ -395999,6 +394461,9402 @@ {} ] ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/4K/gen/top.meta/unset/xhr/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/css-integration/child-css/external-import-stylesheet.html": [ [ "referrer-policy/css-integration/child-css/external-import-stylesheet.html", @@ -422623,6 +430481,18 @@ {} ] ], + "svg/types/scripted/SVGGeometryElement.getPointAtLength-02.svg": [ + [ + "svg/types/scripted/SVGGeometryElement.getPointAtLength-02.svg", + {} + ] + ], + "svg/types/scripted/SVGGeometryElement.getTotalLength-01.svg": [ + [ + "svg/types/scripted/SVGGeometryElement.getTotalLength-01.svg", + {} + ] + ], "svg/types/scripted/SVGGeometryElement.isPointInFill-01.svg": [ [ "svg/types/scripted/SVGGeometryElement.isPointInFill-01.svg", @@ -442384,6 +450254,12 @@ {} ] ], + "workers/modules/shared-worker-import-meta.html": [ + [ + "workers/modules/shared-worker-import-meta.html", + {} + ] + ], "workers/modules/shared-worker-import.any.js": [ [ "workers/modules/shared-worker-import.any.html", @@ -463571,18 +471447,6 @@ {} ] ], - "css/css-regions/elements/video-001.html": [ - [ - "css/css-regions/elements/video-001.html", - {} - ] - ], - "css/css-regions/stacking-context/javascript-stacking-context-002.html": [ - [ - "css/css-regions/stacking-context/javascript-stacking-context-002.html", - {} - ] - ], "css/css-round-display/polar-anchor-center-001.html": [ [ "css/css-round-display/polar-anchor-center-001.html", @@ -466481,7 +474345,7 @@ }, "paths": { ".azure-pipelines.yml": [ - "7e1732fd45b186682e93932068f8840ba00d9caf", + "4dd3e115a61679737bef67e1c10a9842941ebc08", "support" ], ".codecov.yml": [ @@ -467297,7 +475161,7 @@ "support" ], "2dcontext/conformance-requirements/2d.missingargs.html": [ - "1056eb078f43b15717e6b642132161035bcef08b", + "5acee165ba915f3feecf7f745aa5bf6375e5a0f2", "testharness" ], "2dcontext/conformance-requirements/2d.type.delete.html": [ @@ -467417,7 +475281,7 @@ "testharness" ], "2dcontext/drawing-images-to-the-canvas/2d.drawImage.null.html": [ - "9a74700e159cd7e7f0becb78d636e971af2f4f25", + "e68f16ff8b02dec49c63c68edca8985c52abcd5b", "testharness" ], "2dcontext/drawing-images-to-the-canvas/2d.drawImage.path.html": [ @@ -467441,11 +475305,11 @@ "testharness" ], "2dcontext/drawing-images-to-the-canvas/2d.drawImage.wrongtype.html": [ - "5caea5974eac23c9c9986b2d158c7c29129b705a", + "5370c4d859cc8f6e8d9506760e850f142d3ff203", "testharness" ], "2dcontext/drawing-images-to-the-canvas/2d.drawImage.zerocanvas.html": [ - "23778452599ba79c522a16873cbd1ef0788477d3", + "6ff6bae53e6330fe82686aea87e4ae07fad975df", "testharness" ], "2dcontext/drawing-images-to-the-canvas/2d.drawImage.zerosource.html": [ @@ -467453,7 +475317,7 @@ "testharness" ], "2dcontext/drawing-images-to-the-canvas/2d.drawImage.zerosource.image.html": [ - "6cd5bfb4c023950c2140ce1bf616ac1e826beeb0", + "8618c1b6c53dbccaa21a087e049088fd6ab79790", "testharness" ], "2dcontext/drawing-images-to-the-canvas/drawimage_canvas.html": [ @@ -468705,7 +476569,7 @@ "testharness" ], "2dcontext/fill-and-stroke-styles/2d.gradient.linear.nonfinite.html": [ - "546859be21f0bc02631404ec9541ad333ec6bb18", + "345868901711268026d8f7ba86fb70895333f38d", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.gradient.linear.transform.1.html": [ @@ -468737,11 +476601,11 @@ "support" ], "2dcontext/fill-and-stroke-styles/2d.gradient.object.invalidcolour.html": [ - "73c2bc05d5407eeb907836ea0be3b33293024f98", + "265829fad474d7739f66428943f33eb57180ac44", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.gradient.object.invalidoffset.html": [ - "a165c55c3abb3247f920118d0e5d35458a9efb5f", + "989d89ee67e5e55d39100c910e25700ec44ac00c", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.gradient.object.return.html": [ @@ -468805,11 +476669,11 @@ "testharness" ], "2dcontext/fill-and-stroke-styles/2d.gradient.radial.negative.html": [ - "d02876d42c3c0ff52b284fa15fbad81e250862d8", + "5146f44fe4fca3879031920d536649be7e426236", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.gradient.radial.nonfinite.html": [ - "08f60db93a2af09c1f89348c1f701cc81a2e5068", + "9c17cb40813afe44cb4afe330e52d6fdfd7ed720", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.gradient.radial.outside1.html": [ @@ -468869,7 +476733,7 @@ "testharness" ], "2dcontext/fill-and-stroke-styles/2d.pattern.basic.zerocanvas.html": [ - "04615b78988e264e5b49a94fe9109ed5ddc1a32b", + "5a64551e39f69b3516fbad06c730a244ec552103", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.pattern.crosscanvas.html": [ @@ -468877,7 +476741,7 @@ "testharness" ], "2dcontext/fill-and-stroke-styles/2d.pattern.image.broken.html": [ - "7040de466e4734690d5899c1e12ade2aa76bb1a6", + "6384aa4443d23eef3dffa9774b2b432aad575a08", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.pattern.image.incomplete.emptysrc.html": [ @@ -468901,15 +476765,15 @@ "testharness" ], "2dcontext/fill-and-stroke-styles/2d.pattern.image.null.html": [ - "0df01543779b1e68ed3a169a1ec9b7c99a335135", + "992e889b680c47e19332bdb036ca9303d9725939", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.pattern.image.string.html": [ - "896df5038982aad7547d3dac19b2f28bee9bd7b3", + "09dd31db5c550f3a0899a22ab965ce5a1b0735a7", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.pattern.image.undefined.html": [ - "04a13779ad56f8a0476f22103d3c9a19293543cf", + "f0ca10ed7f67f123857f3bf1f97ffce95ba77639", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.pattern.modify.canvas1.html": [ @@ -469001,7 +476865,7 @@ "testharness" ], "2dcontext/fill-and-stroke-styles/2d.pattern.repeat.case.html": [ - "c7383cca9982324e1a4d386bd71d74758efcc709", + "496b91ad2a322f2f3119f8703b7f60b98103d6b3", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.pattern.repeat.empty.html": [ @@ -469013,19 +476877,19 @@ "testharness" ], "2dcontext/fill-and-stroke-styles/2d.pattern.repeat.nullsuffix.html": [ - "0b92f58007eaa12c4c9c09e604c501d01bdaf2fb", + "9cccbdb5b4178c8eb109cf26941b00f16062dc41", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.pattern.repeat.undefined.html": [ - "c04697ad6cd698c400f4cf548562ef7743b71918", + "53e9623a70cca92b0563fc8de040e7c3e8b07808", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.pattern.repeat.unrecognised.html": [ - "1497870ed5d6d7ca32d31dd13876d2973a19a147", + "2c573b8e602a34fc8585022ce3870f2632c709ca", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.pattern.repeat.unrecognisednull.html": [ - "9b53e46cf2df312952705ae2397c73f97eee24e5", + "53df375de33db15e95f101f68378b6293f266d82", "testharness" ], "2dcontext/fill-and-stroke-styles/2d.strokeStyle.default.html": [ @@ -469041,7 +476905,7 @@ "support" ], "2dcontext/hit-regions/addHitRegions-NotSupportedError-01.html": [ - "05818aeb8bb66f24e91c83fdad9502b2a06285cc", + "5e4502fd8dbe73bffa25a3e8116ec40ef57605c5", "testharness" ], "2dcontext/hit-regions/hitregions-members-exist.html": [ @@ -469073,7 +476937,7 @@ "testharness" ], "2dcontext/imagebitmap/createImageBitmap-drawImage-closed.html": [ - "e320c6763feaf3b97b5c8627a7bfcb9079fa517a", + "afe1b0ae0aa90e39e889cacebcf9497297f150a2", "testharness" ], "2dcontext/imagebitmap/createImageBitmap-drawImage.html": [ @@ -469089,15 +476953,15 @@ "testharness" ], "2dcontext/imagebitmap/createImageBitmap-invalid-args.html": [ - "c200ce36f98658ef0dae6f654f892105a7e7aca1", + "3330cfb9189d42e43d79caf9669b5c05d5620379", "testharness" ], "2dcontext/imagebitmap/createImageBitmap-origin.sub.html": [ - "0d903b14b46e94ab9614fa91eb33f536a6bd79ae", + "4b8ebc1587afeae57cab8f170e14ccc9656063a1", "testharness" ], "2dcontext/imagebitmap/createImageBitmap-serializable.html": [ - "a4434aec6e43cefe0f78a56f748f4a37709b1cea", + "c185cd9cbd9c4964fac8a1f9d0a899d945a206c7", "testharness" ], "2dcontext/imagebitmap/createImageBitmap-sizeOverflow.html": [ @@ -469105,7 +476969,7 @@ "testharness" ], "2dcontext/imagebitmap/createImageBitmap-transfer.html": [ - "708f97097c16e9074cc3cbf54dad0ee75df7967c", + "6e836db9b96eea6668fd703c1f6ab090e8d88323", "testharness" ], "2dcontext/imagebitmap/createImageBitmap-worker.js": [ @@ -469297,7 +477161,7 @@ "testharness" ], "2dcontext/path-objects/2d.path.arc.negative.html": [ - "7aabd464a9bdd18617bc8814bf14d5d00e5bcbd9", + "d5f963a2117e4afdb1960f9bc22e50a0a5224361", "testharness" ], "2dcontext/path-objects/2d.path.arc.nonempty.html": [ @@ -469401,7 +477265,7 @@ "testharness" ], "2dcontext/path-objects/2d.path.arcTo.negative.html": [ - "0fb3f77a43ef6ff29c5ee65a540e350e78ba088a", + "232e34874a74d35771656df35f4a4a691bd1c82e", "testharness" ], "2dcontext/path-objects/2d.path.arcTo.nonfinite.html": [ @@ -469809,7 +477673,7 @@ "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.create1.this.html": [ - "b3a3334f7ca9296740b0d4ab51687b632c23175f", + "9e6cc56c0b8c91b7e957fba2ab0383c719f50d9b", "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.create1.type.html": [ @@ -469817,7 +477681,7 @@ "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.create1.zero.html": [ - "1f7ad7a1ce1b4ac2d72cc42f2133d3ad918f8fea", + "581ca179a03be8d54554cd7166da4db3e3b814c5", "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.create2.basic.html": [ @@ -469841,11 +477705,11 @@ "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.create2.nonfinite.html": [ - "2722b30f5e23114e3561a8f68d6e94614a76e47d", + "b9f008a659765120b7c7e042fc3d70d8a69a5fb3", "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.create2.this.html": [ - "670345eee51ef70e3a631152c6a02df96d8289e1", + "9d766256e3cdb77361ed7f38839bc9d918d35405", "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.create2.type.html": [ @@ -469853,7 +477717,7 @@ "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.create2.zero.html": [ - "f93583cf7cdc7df9279c3161e1dfb434f80f6439", + "a104c33236ef355acd39489348af9fc8bf04c638", "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.get.basic.html": [ @@ -469873,7 +477737,7 @@ "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.get.nonfinite.html": [ - "92623500f4a393ad4486a3fc7307c56c9c5b977b", + "64fd0d90ae5c8fc58db2a9ed55b412360046bb73", "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.get.nonpremul.html": [ @@ -469921,7 +477785,7 @@ "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.get.zero.html": [ - "da279aef1e8d7280e04aa1e1e990eabace9dbbe0", + "c6d7ef98048f5ee811ffed0a2442dfb8ba4a21f7", "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.object.clamp.html": [ @@ -469929,7 +477793,7 @@ "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.object.ctor.array.bounds.html": [ - "5ac7af5dd90074e1b47a73046debe90008ee1b4d", + "b5bc1a57a846fefbb9d4322baa325cfc5f11a29a", "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.object.ctor.array.html": [ @@ -469937,7 +477801,7 @@ "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.object.ctor.size.bounds.html": [ - "4b6735e4f384f4571fbe04a39c50a7aa305c130a", + "461ea069304606cf779e61c8f34b374eb5d9cf12", "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.object.ctor.size.html": [ @@ -470021,11 +477885,11 @@ "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.put.nonfinite.html": [ - "c4cbb4ab9d5842d1df8bf58fcca3566644d66a0f", + "8adafed9db6b183e0e5cbe361792a5960ad57efc", "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.put.null.html": [ - "851bc0ddc483123ff3d169f4c38f003be8b9a9b8", + "c8d1990d78093978503d9fd6e9a67bd20c8db85e", "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.put.path.html": [ @@ -470041,7 +477905,7 @@ "testharness" ], "2dcontext/pixel-manipulation/2d.imageData.put.wrongtype.html": [ - "4f3fe49dbfbf7038307ac99a6a2364c4b0f45bf7", + "a032b216a9eecd7d44a83b31cf9b9cb2203376ff", "testharness" ], "2dcontext/resources/canvas-frame.css": [ @@ -470621,7 +478485,7 @@ "support" ], "2dcontext/tools/gentestutils.py": [ - "1f6792d71b6b991d93e09c21783187a6b06a7708", + "bd1e3c75768a2644ad772578e6f6ee2266db7fb9", "support" ], "2dcontext/tools/name2dir.yaml": [ @@ -471069,11 +478933,11 @@ "testharness" ], "FileAPI/blob/Blob-constructor-endings.html": [ - "1dee99ff775da3562194719be06b711c246b30ef", + "e5426bb979d6fbec0c0693ec6de1dd70fde38135", "testharness" ], "FileAPI/blob/Blob-constructor.html": [ - "4d39ed78e0ef791c9d2d1ce493e4b5f1c77f1101", + "d2b1777b86bed3d54303de9be0cd85d51d8ace92", "testharness" ], "FileAPI/blob/Blob-in-worker.worker.js": [ @@ -471097,11 +478961,11 @@ "testharness" ], "FileAPI/file/File-constructor-endings.html": [ - "f0f9090768f48e25fb7fd47e5cd182bf11f065e4", + "f76d33295218c50553edab8a3075b9d192b35f10", "testharness" ], "FileAPI/file/File-constructor.html": [ - "646ed99c2124a2f7329f84fbbff7bf5a132969a2", + "60dbb233f018f0bab078daf6969218aff2bff73b", "testharness" ], "FileAPI/file/Worker-read-file-constructor.worker.js": [ @@ -471181,7 +479045,7 @@ "testharness" ], "FileAPI/reading-data-section/FileReader-multiple-reads.html": [ - "310fa85a00d02732265f2b1c9c02f1c6dbc2504d", + "e7279fe4bd445e9fec2495b6682054dc91c97fe9", "testharness" ], "FileAPI/reading-data-section/filereader_abort.html": [ @@ -471357,7 +479221,7 @@ "testharness" ], "IndexedDB/bigint_value.htm": [ - "589eeabe6c6e6798406759e2d40fd28be2645473", + "9ce980a2d6eddfc514950543524dab9aa8f91325", "testharness" ], "IndexedDB/bindings-inject-keys-bypass-setters.html": [ @@ -471389,11 +479253,11 @@ "testharness" ], "IndexedDB/clone-before-keypath-eval.html": [ - "bf67c5d6d732f6dfcf7687d9b12f3d313eb61707", + "8b99e1ae16c47a4b34e4c3c579ce7d1fea863d27", "testharness" ], "IndexedDB/close-in-upgradeneeded.html": [ - "402906fc1c196b74057529585fdf1298e940e517", + "fb278f91dba35fa496c5221027f9fd0337e09d1a", "testharness" ], "IndexedDB/cursor-overloads.htm": [ @@ -471457,7 +479321,7 @@ "testharness" ], "IndexedDB/idb-explicit-commit.any.js": [ - "ec72e1ae9583eb227652a193ff589212fd10cd82", + "038c04720f8d949dc611c981659e6b5428b8574e", "testharness" ], "IndexedDB/idb_binary_key_conversion.htm": [ @@ -471473,11 +479337,11 @@ "testharness" ], "IndexedDB/idbcursor-advance-exception-order.html": [ - "1e05c9074d6b1e5c86c46cc1f91bdbd0ecb26ad9", + "893c179e24f588249d075f9b8583b8c6984dd189", "testharness" ], "IndexedDB/idbcursor-advance-invalid.htm": [ - "ee911cc9e4bc2525a931e4d6a81891334ee902e9", + "02c7fde0c4959b6524f9385a0b29dfa389ddf474", "testharness" ], "IndexedDB/idbcursor-advance.htm": [ @@ -471485,7 +479349,7 @@ "testharness" ], "IndexedDB/idbcursor-continue-exception-order.htm": [ - "8002476f115d731f7ddd574db4d13286936c002d", + "4e697bc43024524c478ebc5ae19577968ffae407", "testharness" ], "IndexedDB/idbcursor-continue.htm": [ @@ -471493,19 +479357,19 @@ "testharness" ], "IndexedDB/idbcursor-continuePrimaryKey-exception-order.htm": [ - "56a23a1123ffcdfa9f05e0b5858425079bbebd40", + "0df6e3a3a92426c71a7fec00f56d6f70f5dd64c4", "testharness" ], "IndexedDB/idbcursor-continuePrimaryKey-exceptions.htm": [ - "9393e2fbf24f2775526ba9a173dca8809ac04ccd", + "862c9c951b5e7976fc8a48ef8677451358c4096b", "testharness" ], "IndexedDB/idbcursor-continuePrimaryKey.htm": [ - "773141cf436bd1758a44571d139a2ec85736704f", + "df292ce3e230de45edfbce959d42639882465dae", "testharness" ], "IndexedDB/idbcursor-delete-exception-order.htm": [ - "cc2791c7f21425319ef87a1dfd25f9ffb32bf1d4", + "96c7297b93ff11de22bcf3acd9bc43589d8e4681", "testharness" ], "IndexedDB/idbcursor-direction-index-keyrange.htm": [ @@ -471557,7 +479421,7 @@ "testharness" ], "IndexedDB/idbcursor-update-exception-order.htm": [ - "4e18731ff9d260a5aa2c5b1b85775c5d158c29ed", + "22c2940ac4ad6b5df73d5cd2973a35e8037acca9", "testharness" ], "IndexedDB/idbcursor_advance_index.htm": [ @@ -471565,11 +479429,11 @@ "testharness" ], "IndexedDB/idbcursor_advance_index2.htm": [ - "77b812e180a6cf2f922439d99818f846b2783b4d", + "93660566f84d7c47d021aff7ad0504aacad51ea2", "testharness" ], "IndexedDB/idbcursor_advance_index3.htm": [ - "b41427f960adc57ca14a3ca2c28903eaa207b72e", + "27e040d4fece4be28f78b0b7ea9dd8bee33bd9b7", "testharness" ], "IndexedDB/idbcursor_advance_index5.htm": [ @@ -471577,19 +479441,19 @@ "testharness" ], "IndexedDB/idbcursor_advance_index6.htm": [ - "826cb1e1a0e148e70d6e5bd248006572521a4c27", + "ed4c8f3dadacdcacf70f688a98e736bada2d3182", "testharness" ], "IndexedDB/idbcursor_advance_index7.htm": [ - "8da5b618d45296461d5df17703a3d4209bb90d39", + "52f8ea2ba6929acb3116c8caca2e20676ae0e031", "testharness" ], "IndexedDB/idbcursor_advance_index8.htm": [ - "b5e64d4cdced12ecefb1ff41b193c9ed1aee9ebb", + "a3420b162bee67f65e53a0b4c5226c1f5b30138c", "testharness" ], "IndexedDB/idbcursor_advance_index9.htm": [ - "517a573c49eb36919087baa98379c678e7232ce6", + "9aba54b1fa1c8df49f66b3e32d5019b46d7627bc", "testharness" ], "IndexedDB/idbcursor_advance_objectstore.htm": [ @@ -471597,19 +479461,19 @@ "testharness" ], "IndexedDB/idbcursor_advance_objectstore2.htm": [ - "32478c141eaee5d6a86e7ba52084015b8de0c193", + "9af1925cdefec5e7ae4fad065ebd8245f2d17088", "testharness" ], "IndexedDB/idbcursor_advance_objectstore3.htm": [ - "1accd6631a009052eea7a006d6bf263f42769705", + "d2f2f84719e933e112bfa482d91a9267e47e04a8", "testharness" ], "IndexedDB/idbcursor_advance_objectstore4.htm": [ - "387973169d0a13463be4759c4f19b86cf28ce9b7", + "57e4f589c41aab907a90afc0f63d2b4503d9d8df", "testharness" ], "IndexedDB/idbcursor_advance_objectstore5.htm": [ - "cb0859c636e5f9d426f1a553991115561ebb729f", + "454329d260cacd40ca18649056d50c0253a1950c", "testharness" ], "IndexedDB/idbcursor_continue_delete_objectstore.htm": [ @@ -471621,15 +479485,15 @@ "testharness" ], "IndexedDB/idbcursor_continue_index2.htm": [ - "d0eaef3d074f9cc4cc581e19b8b9feab514019f4", + "84a01092444f68715f668d5edb1b83e96c1ba5d2", "testharness" ], "IndexedDB/idbcursor_continue_index3.htm": [ - "357dc157f35f707840bb1826f7bb069f85fe940d", + "f2bd4fc62e827e909038d9c63804629755b09f93", "testharness" ], "IndexedDB/idbcursor_continue_index4.htm": [ - "c5cfd85ebdbb4c459844d2d0c7feae16ff8fad56", + "6196bb0137560a5248fe6e9adefdce95bee3187e", "testharness" ], "IndexedDB/idbcursor_continue_index5.htm": [ @@ -471641,15 +479505,15 @@ "testharness" ], "IndexedDB/idbcursor_continue_index7.htm": [ - "fed235685c735a2e215dc787a86243a09648a477", + "7db922d6b840ca39013a7048c1df927616373557", "testharness" ], "IndexedDB/idbcursor_continue_index8.htm": [ - "4a574ec90f4055c457aca4a78ac8ebe674d63992", + "b4c69aa08fe74dbeba82a4ec2caace8cc7466052", "testharness" ], "IndexedDB/idbcursor_continue_invalid.htm": [ - "bd22cfecf9a98979521d8885e5536dab7723d0f1", + "f9df05aa533b4c127010b88f14e5d7111e403740", "testharness" ], "IndexedDB/idbcursor_continue_objectstore.htm": [ @@ -471657,23 +479521,23 @@ "testharness" ], "IndexedDB/idbcursor_continue_objectstore2.htm": [ - "14502330b80aad694866440c240f4185d891e72b", + "8cff47088fcfcaf2777396c0816ad18f0c59f760", "testharness" ], "IndexedDB/idbcursor_continue_objectstore3.htm": [ - "a059b62e53a293034430d861b9b58b5a14da0b47", + "385dceaaef736db1584fec082bdae57df05fecdb", "testharness" ], "IndexedDB/idbcursor_continue_objectstore4.htm": [ - "b4819c73300bf7ec1dbec27054385556dd9c9e0f", + "480bd2f1f066d32a1bfcce225812d725ce2537b6", "testharness" ], "IndexedDB/idbcursor_continue_objectstore5.htm": [ - "3c1943336c38d6cf0851df6bb4bb163563c9b9bc", + "5dff6d8f763d6c95c5b044a303651cf4f3d2dfb9", "testharness" ], "IndexedDB/idbcursor_continue_objectstore6.htm": [ - "f9d656ebf893282b1743ee2ef7e19ab211ed1f38", + "7f56f838ea51bfaa6558ef514307829d3df9f174", "testharness" ], "IndexedDB/idbcursor_delete_index.htm": [ @@ -471681,19 +479545,19 @@ "testharness" ], "IndexedDB/idbcursor_delete_index2.htm": [ - "a5147f75450f0a3a357952fe9f78c02bddb906b5", + "7b9970d3ee0035eadf0bc9f55cb01b5ba7e7cf69", "testharness" ], "IndexedDB/idbcursor_delete_index3.htm": [ - "bb5722ee351cf579a0fefe8c1d16c97be5b55d45", + "3b4241d50f99e89de1d251eef715fe3b297e5f6e", "testharness" ], "IndexedDB/idbcursor_delete_index4.htm": [ - "9b57bd681a94eb79ecad09e19075e806bae2ec1a", + "cccce2be271c5ef7580522b9afa4d3628376e5b1", "testharness" ], "IndexedDB/idbcursor_delete_index5.htm": [ - "66eacdebe663899f9f6f524995f015917586615e", + "af08367c4cccf1a97aae5e0348bee894b7056286", "testharness" ], "IndexedDB/idbcursor_delete_objectstore.htm": [ @@ -471701,19 +479565,19 @@ "testharness" ], "IndexedDB/idbcursor_delete_objectstore2.htm": [ - "69521e66b7914c4128634ad558b2f7a13eda602a", + "b4eac9b675f2e4ea96e1d7ba912fda7765528b20", "testharness" ], "IndexedDB/idbcursor_delete_objectstore3.htm": [ - "bdb8d93c34fba4545b38cd53a85f5b55159ff572", + "05fa9edb723f1211a3344f8d437d94d52c2f3c94", "testharness" ], "IndexedDB/idbcursor_delete_objectstore4.htm": [ - "47bcd8b0057bd5b7c30f00e9aaec78f4ed64ed9a", + "b0d993ab961a41e4c736cadf0ca90d483c899f58", "testharness" ], "IndexedDB/idbcursor_delete_objectstore5.htm": [ - "b37e26126a9d43352e621c10935f08f0d968ec2d", + "94a0926a50c2f4f7e1f17e91de4610fe1a174bdc", "testharness" ], "IndexedDB/idbcursor_iterating.htm": [ @@ -471741,31 +479605,31 @@ "testharness" ], "IndexedDB/idbcursor_update_index2.htm": [ - "03f9c2712cbcdef1c1f5538ca1b33ce1aacdd021", + "9ec247b01bd4a23f92bbbf25f3592b5bb3ff77d7", "testharness" ], "IndexedDB/idbcursor_update_index3.htm": [ - "0f7b2a1dbe58f52ca524e6f4e77b84419ceeaa27", + "9386583a06affb768db99f8437d7f976c3c9b52e", "testharness" ], "IndexedDB/idbcursor_update_index4.htm": [ - "ee60da0d214ad85c501de2d9422238ca18c5afe3", + "463b2f9025622af7b2f21308f3f6d717e9b97674", "testharness" ], "IndexedDB/idbcursor_update_index5.htm": [ - "a31528d16587cc0e9b5336466f40abcd63979ceb", + "564d904f9fe86511161fe82c2eb2d6ac70846371", "testharness" ], "IndexedDB/idbcursor_update_index6.htm": [ - "1e51b1354cf3003838644d004d2716c1166bdc8b", + "9639fb9f7337e347cdfb813a10d34f708bdcaa96", "testharness" ], "IndexedDB/idbcursor_update_index7.htm": [ - "1d464fbcdee65e8c728acd839b7d1c7c6a71483d", + "25f59a1e32c6dd0487e0b5ea58d6453fc51b58cf", "testharness" ], "IndexedDB/idbcursor_update_index8.htm": [ - "3b9266dbeda32c18bf81e917bf33d28a490b8bee", + "cf33e1d75040fd1156b63cd56f17dec1384f46a0", "testharness" ], "IndexedDB/idbcursor_update_objectstore.htm": [ @@ -471773,11 +479637,11 @@ "testharness" ], "IndexedDB/idbcursor_update_objectstore2.htm": [ - "65c87bd95369a16565ec32760d5b154cc04297c7", + "6c7a13370a996d87b925b9086018971888c60a3c", "testharness" ], "IndexedDB/idbcursor_update_objectstore3.htm": [ - "0ce59de29c9d58ae3c9b68f8b2c2f855707f6d13", + "e19f5853bc41becf9c50631631858171b193c3ef", "testharness" ], "IndexedDB/idbcursor_update_objectstore4.htm": [ @@ -471785,35 +479649,35 @@ "testharness" ], "IndexedDB/idbcursor_update_objectstore5.htm": [ - "5dfb82ca19dd3704c5f4a4900c16a4df91872ee0", + "2b73a51d42e79fb32e1f1a241f362fd75e3e2de8", "testharness" ], "IndexedDB/idbcursor_update_objectstore6.htm": [ - "16aa00dfae01599a3a66fdc3f5ad58aaec04d2fe", + "a2f8140829a78a5039dc6b3fa8dab4330146ee05", "testharness" ], "IndexedDB/idbcursor_update_objectstore7.htm": [ - "b1b736cf0ced1fbb583a77c80f0ba832af5de81d", + "4751289e6dfe197d2e52a41e8761ade655c0ff03", "testharness" ], "IndexedDB/idbcursor_update_objectstore8.htm": [ - "f0b8900d4b0a9603ac2413131c73fae7e5019d1e", + "3dcb94e9fbb23208dd85ef126f0007409d8be4b2", "testharness" ], "IndexedDB/idbcursor_update_objectstore9.htm": [ - "34aa78e6be84f372f951961732ba55a80827dd4e", + "c112b073fc7b09fdf94dd7e51a83029760da82fa", "testharness" ], "IndexedDB/idbdatabase-createObjectStore-exception-order.htm": [ - "8705501e535e12fefc9472b90f63da40eb580945", + "1d6cbe8ea45dce9def0a2d60ee482379b83a8b65", "testharness" ], "IndexedDB/idbdatabase-deleteObjectStore-exception-order.htm": [ - "23a3e1fd7015842866491ef8d53b581796d596c8", + "dc1bdf34015f0f14b8c9a70bd2a2bc3b00764c6e", "testharness" ], "IndexedDB/idbdatabase-transaction-exception-order.html": [ - "c0021d926a83255fc434f81e702912f42d7ef10f", + "759685b642a03d819c568f7fdcb74e969c620972", "testharness" ], "IndexedDB/idbdatabase_close.htm": [ @@ -471841,7 +479705,7 @@ "testharness" ], "IndexedDB/idbdatabase_createObjectStore11.htm": [ - "ae78d46ba078182b2847dcfda49f79153a1b2fe1", + "ca04f21d6d0f57ffc6f738a602cd6225a0e64827", "testharness" ], "IndexedDB/idbdatabase_createObjectStore2.htm": [ @@ -471849,11 +479713,11 @@ "testharness" ], "IndexedDB/idbdatabase_createObjectStore3.htm": [ - "ccf4a2b5fde00832e144a2fbd79cfdcf5f72cc12", + "0eeefd613c2209fda26847f1232424f37f44e946", "testharness" ], "IndexedDB/idbdatabase_createObjectStore4.htm": [ - "07d787bd9a1635793525c84261730c290d1d1fa7", + "9c7279929ebea4a925713a05f46297513d0ea1e9", "testharness" ], "IndexedDB/idbdatabase_createObjectStore5.htm": [ @@ -471861,7 +479725,7 @@ "testharness" ], "IndexedDB/idbdatabase_createObjectStore6.htm": [ - "c1200c5f93a332761191357216b93a2570292879", + "6c7a542db0d688bfb7f985f31fcadc60787fa527", "testharness" ], "IndexedDB/idbdatabase_createObjectStore7.htm": [ @@ -471873,7 +479737,7 @@ "testharness" ], "IndexedDB/idbdatabase_createObjectStore9-invalidparameters.htm": [ - "4a28d4033c08834783171d9a9bbc39312b9e2854", + "1fdad86308563bddf89f0c06de80fcaa102bd82c", "testharness" ], "IndexedDB/idbdatabase_deleteObjectStore.htm": [ @@ -471881,19 +479745,19 @@ "testharness" ], "IndexedDB/idbdatabase_deleteObjectStore2.htm": [ - "3c1abe63232de97f2698443eb55c056fd5dae218", + "531b3d37aaae4a230ab6e21972b220cde4fb3a06", "testharness" ], "IndexedDB/idbdatabase_deleteObjectStore3.htm": [ - "cae00f9d220e37d1a8f1fcc771a32bc409ed3322", + "a8db5b49cbbe984788b7000e9679f24cf3228e40", "testharness" ], "IndexedDB/idbdatabase_deleteObjectStore4-not_reused.htm": [ - "cc59f9d2025d73c05f02276e902b5d3f96c70882", + "729fce6db5a8df7177dde6027020daa6fad9cd19", "testharness" ], "IndexedDB/idbdatabase_transaction.htm": [ - "94de8b43342ae39bb83a70d76369b9bf264a32ee", + "c883167a62a4d8a4291057d7079f18fa50a8354e", "testharness" ], "IndexedDB/idbdatabase_transaction2.htm": [ @@ -471901,15 +479765,15 @@ "testharness" ], "IndexedDB/idbdatabase_transaction3.htm": [ - "9b353c7108f4fd81cff9daad16c8f3c0b6e2ef9f", + "4d2542a5eeff7b4a3642570b355fe94bcf9df8f3", "testharness" ], "IndexedDB/idbdatabase_transaction4.htm": [ - "ca3369f7bd0d6cc5adb76aaa47a0305c620e7430", + "1df37ab373934525f0fb878521d7100f44180d10", "testharness" ], "IndexedDB/idbdatabase_transaction5.htm": [ - "b6b45ab9f28cca7f41ed99186a997347c67eef8e", + "4d2bdcbe4bb22508c9cccfabb04418580695be32", "testharness" ], "IndexedDB/idbfactory-databases-opaque-origin.html": [ @@ -471949,7 +479813,7 @@ "testharness" ], "IndexedDB/idbfactory_cmp2.htm": [ - "446bb465ce64ebeb6ecd43cb99bc1c2855b0d7b1", + "1932bbab49e09acc90358b9a44d800c30fb61ca3", "testharness" ], "IndexedDB/idbfactory_cmp3.htm": [ @@ -472021,19 +479885,19 @@ "testharness" ], "IndexedDB/idbfactory_open9.htm": [ - "98b1ddeef1326462ccce296e5209f958947a9ce3", + "36a9ef814cb121dd70da5bb265b3b6a6e15001c8", "testharness" ], "IndexedDB/idbindex-getAll-enforcerange.html": [ - "d0cbe28872097baf1d723ecb82bb3e590898aa0e", + "198253550042120a94dea1f8cf74c4ded9bd3aad", "testharness" ], "IndexedDB/idbindex-getAllKeys-enforcerange.html": [ - "e36a69f495d10d481b228b2ef7cabf6d6ffaf45a", + "40cad527bb0893f8191f337fc58880eb3cb41306", "testharness" ], "IndexedDB/idbindex-multientry-arraykeypath.htm": [ - "e99c8ad99853c8940de72500c0ca083c1fc16fda", + "c23f96d8456b31b3c0e59e7651c7c4379ddc1dfc", "testharness" ], "IndexedDB/idbindex-multientry-big.htm": [ @@ -472049,7 +479913,7 @@ "testharness" ], "IndexedDB/idbindex-query-exception-order.html": [ - "fb4aa9c9953000a7f3270af42af9891b93b81ee2", + "2c3e9b23c5b3637960ebf0feda0e0caf1f1f8751", "testharness" ], "IndexedDB/idbindex-rename-abort.html": [ @@ -472057,11 +479921,11 @@ "testharness" ], "IndexedDB/idbindex-rename-errors.html": [ - "b9cbaf2f292495ab29735385d1338f3c6797725b", + "b314b5495799fe57d3ecfba408d84073460081a7", "testharness" ], "IndexedDB/idbindex-rename.html": [ - "7eb182f7ce7eb489d62f00f07a085d0ee7c6620c", + "da1d6c9ce9cb32f44d53c5c25c162869e66102fb", "testharness" ], "IndexedDB/idbindex-request-source.html": [ @@ -472081,7 +479945,7 @@ "testharness" ], "IndexedDB/idbindex_count4.htm": [ - "addd99260d4746eb5a9dd22a4aaf56011a881f61", + "ce25412a25f529e138cb2077f4dd87d085909d67", "testharness" ], "IndexedDB/idbindex_get.htm": [ @@ -472101,19 +479965,19 @@ "testharness" ], "IndexedDB/idbindex_get5.htm": [ - "65e2623cdd9505f85fb1fefd99bc6bdb0ee4a258", + "f1f3386cd22935d6b0912aeac490e2c14d68ce66", "testharness" ], "IndexedDB/idbindex_get6.htm": [ - "c7f6b92febed6ea06e85f26a674cafdb942abf7d", + "5304b18b1a0646595c5c9f3655d7ca767b99288d", "testharness" ], "IndexedDB/idbindex_get7.htm": [ - "e28fed4c591f420f2384e2255c33e5c12be66fac", + "9008c50184b995b60445e85ffc4a528b0edb4eb5", "testharness" ], "IndexedDB/idbindex_get8.htm": [ - "ef67c6d6d227ec2a87c2af83a4e202b3f558c799", + "9bfc48422fe0fd821362c15bec118fa0c9558643", "testharness" ], "IndexedDB/idbindex_getAll.html": [ @@ -472141,19 +480005,19 @@ "testharness" ], "IndexedDB/idbindex_getKey5.htm": [ - "96af868beafe8ff9c5edce282863d18c6921d9fb", + "5fa33087cd6c045d0d3ed8f717d29d0786410c24", "testharness" ], "IndexedDB/idbindex_getKey6.htm": [ - "6e9680da9edf3ed3cce0e2abc3f47be20da3d8ae", + "18cdeb9e939227388cafc9140c1bbcac5f7ae4ea", "testharness" ], "IndexedDB/idbindex_getKey7.htm": [ - "c949d39b3aaf94789368620b904c003cb4788f4a", + "4b005739caca87e4d6b17cd20f0372ccd9e5305b", "testharness" ], "IndexedDB/idbindex_getKey8.htm": [ - "e46f7bc3617265560d6bf403d51a9351bca7dd3d", + "316da6a7d19d51d6c6cf9407aa70e9d8c5c819a8", "testharness" ], "IndexedDB/idbindex_indexNames.htm": [ @@ -472165,31 +480029,31 @@ "testharness" ], "IndexedDB/idbindex_openCursor.htm": [ - "0efff9325f762ca35cbba00947f0db905e90d106", + "17d9e6841571e4dbc380e1768a4c667a365de5f9", "testharness" ], "IndexedDB/idbindex_openCursor2.htm": [ - "7ce967e0b98274789842d39825258e80aad7704e", + "13e55fff1d6fdb5a22adcfbe17f3b9aa1422734b", "testharness" ], "IndexedDB/idbindex_openCursor3.htm": [ - "fea479e9cc16d6588762db5213d1c364cfbb4177", + "02beb0042ab180bae1ad91d68a3c4f34e7b8b181", "testharness" ], "IndexedDB/idbindex_openKeyCursor.htm": [ - "e158802911e599760b9715ec63896eb71a0508a2", + "c88a13db07685cf14ecb983a129026d08e27be64", "testharness" ], "IndexedDB/idbindex_openKeyCursor2.htm": [ - "d8354c2fdaadcee917c967d2dc47c4057d6e5c34", + "9153b11b8df6e445c8918aab50c09418bf14cf91", "testharness" ], "IndexedDB/idbindex_openKeyCursor3.htm": [ - "f009cef49ac7a14209b4c09b7026a31d955b85ef", + "1c7f86f8d98df3f042a1958e0046c712d4758dc5", "testharness" ], "IndexedDB/idbindex_openKeyCursor4.htm": [ - "bf134dff18a3bf6278b0c659b32e01652e4b984b", + "32bc088f257e212703b8478e6eee53cbd11374d0", "testharness" ], "IndexedDB/idbindex_reverse_cursor.any.js": [ @@ -472201,47 +480065,47 @@ "testharness" ], "IndexedDB/idbkeyrange-includes.htm": [ - "9a408e888a42d2f79eaf2ed2f30311fbaa596625", + "96769ae0a909f1234893331e4d3c4c8ceb832873", "testharness" ], "IndexedDB/idbkeyrange.htm": [ - "a7f4934e0957063b114f4ba8851d6ec523733b4b", + "7a2db3e9c2b0a2f49ea6753c4d2d02aa1f16f0b4", "testharness" ], "IndexedDB/idbkeyrange_incorrect.htm": [ - "0449ca8073231489345e9d6b32a8ac047278ce95", + "931ed518b9e3c38827f6536ea501d4f0f0d8a87e", "testharness" ], "IndexedDB/idbobjectstore-add-put-exception-order.html": [ - "6c76b6220cb62a78a4ace3b0e54469c2d2bcd16d", + "71ea2a07f4efc1cbc4ed766f23882b331053962f", "testharness" ], "IndexedDB/idbobjectstore-clear-exception-order.html": [ - "e2a77073fcdecf22dd4d82be45c1f470be265fcd", + "b5678d98afdc5b0c7596c8d9c96573424fbad77d", "testharness" ], "IndexedDB/idbobjectstore-delete-exception-order.html": [ - "9a383e39140ba88028996d79a3a551b427bf34a6", + "671dfa4b35eaec7d6d1a12a0fe3692fed7ff0bae", "testharness" ], "IndexedDB/idbobjectstore-deleteIndex-exception-order.html": [ - "5b069c6474bfaab81700475e0384554bd8fb3f71", + "389e7a32393b126fb9c89f99a092df3cb03b3afb", "testharness" ], "IndexedDB/idbobjectstore-getAll-enforcerange.html": [ - "14e8b27e9013a2afb58518a221d5e4e4b8a82771", + "80c653b38642443b595487b35e2e838ad249e584", "testharness" ], "IndexedDB/idbobjectstore-getAllKeys-enforcerange.html": [ - "15b45ac97d2ba5e004024af7494eaf2e9037bb95", + "3653d1d5a1f41f3a0e23a7d5b18c51dfea9c0f1e", "testharness" ], "IndexedDB/idbobjectstore-index-finished.html": [ - "75677cf39dc33736e848d9369c8f6a1cb33055b9", + "cc8dceaf42e6094bb613f27ffd1d9749d86fe859", "testharness" ], "IndexedDB/idbobjectstore-query-exception-order.html": [ - "b4d134fea85151f30ccbdfb914cdb2427a258532", + "24d10555b75d9332c52908928625f7c3d4b5c72a", "testharness" ], "IndexedDB/idbobjectstore-rename-abort.html": [ @@ -472249,11 +480113,11 @@ "testharness" ], "IndexedDB/idbobjectstore-rename-errors.html": [ - "9c791f9d9b2b41d39e9a7127df0c15ecbc5f9d22", + "3a90955ae762d38903585b80e4db2710abbc636f", "testharness" ], "IndexedDB/idbobjectstore-rename-store.html": [ - "d21cb92148328f071b209ff1d1526d9a84e8dfd5", + "7556ec192e81ba09aeff7521ffff3e12a90a7274", "testharness" ], "IndexedDB/idbobjectstore-request-source.html": [ @@ -472269,19 +480133,19 @@ "testharness" ], "IndexedDB/idbobjectstore_add10.htm": [ - "f2bf447500da299b91c9ebbe5a118798ce9d8593", + "59594f828876a02d61f32b9f7b26305bfa6687ff", "testharness" ], "IndexedDB/idbobjectstore_add11.htm": [ - "99ff14c31b391f13495a8b453f25463712350093", + "ba2450fb2508302bffa75e8344c263c143f584aa", "testharness" ], "IndexedDB/idbobjectstore_add12.htm": [ - "d679af08b41fc92814e341e43e06c2eb078f5a2b", + "6ffa9db79a0695d5aa22b51781fcd23034018a15", "testharness" ], "IndexedDB/idbobjectstore_add13.htm": [ - "943a6cf9bafe61023f3c255a0b53f281b898bf64", + "fb4fc2dbab6a35c9c18deed6403a016eccc24d68", "testharness" ], "IndexedDB/idbobjectstore_add14.htm": [ @@ -472289,11 +480153,11 @@ "testharness" ], "IndexedDB/idbobjectstore_add15.htm": [ - "268ed72e935dc80818e85f7756785ac4ca5b001c", + "ff7483892444e3bd20fb69249158baa92d5064b4", "testharness" ], "IndexedDB/idbobjectstore_add16.htm": [ - "391b9445802023ef7b42b94c01ef3ff73c246762", + "f20d7962705ecc7fa0162dd743f7d513e647fddf", "testharness" ], "IndexedDB/idbobjectstore_add2.htm": [ @@ -472325,7 +480189,7 @@ "testharness" ], "IndexedDB/idbobjectstore_add9.htm": [ - "6e027a11dc4bb3a77bb70b38df6eb3acc5f7225a", + "5babf368cbc23db7a1b18a5ec5c7ee1ad4bfe0ac", "testharness" ], "IndexedDB/idbobjectstore_clear.htm": [ @@ -472337,11 +480201,11 @@ "testharness" ], "IndexedDB/idbobjectstore_clear3.htm": [ - "fc0fa4d8dffe057be81a5d8c1e4a10ebbe746044", + "41e6566b6c2625d6bf3fba9961250ef45637d881", "testharness" ], "IndexedDB/idbobjectstore_clear4.htm": [ - "4e08f6738719245c412698d5b75b7d86649dd5d9", + "9812c3d33b1a57aa4cb9d844c1303fb59cc8d385", "testharness" ], "IndexedDB/idbobjectstore_count.htm": [ @@ -472357,7 +480221,7 @@ "testharness" ], "IndexedDB/idbobjectstore_count4.htm": [ - "50dd6fe5489ffbefcadb9aa2f409ed578cb86509", + "8c9170e7e3bc5c77c3b2d70bda0f85bfde183036", "testharness" ], "IndexedDB/idbobjectstore_createIndex.htm": [ @@ -472365,23 +480229,23 @@ "testharness" ], "IndexedDB/idbobjectstore_createIndex10.htm": [ - "757296253d490449449c5dec972e9f06f0d0621a", + "bb91b7c17bc300390f5491c06c0925c53a3da703", "testharness" ], "IndexedDB/idbobjectstore_createIndex11.htm": [ - "7da1169e4c2fab27f806c353ad8dd50642e33272", + "47f06c3e1e4a3d9900fb243dc65b1a1e6d229092", "testharness" ], "IndexedDB/idbobjectstore_createIndex12.htm": [ - "18296b4adbea9ef5cf1128e48b7e8f9fec0531c7", + "68214e54e941c78f6c951eb05bffa99bb87a97b1", "testharness" ], "IndexedDB/idbobjectstore_createIndex13.htm": [ - "ac32df6629087da9dcf651a8c4d3e3b1b40e7a82", + "839abdb009e9bf1bc368ca0943556676b73e0b59", "testharness" ], "IndexedDB/idbobjectstore_createIndex14-exception_order.htm": [ - "a0ec288cb3808d7e32e3100bb9c537d30895bbd5", + "c0e6c6f838743ca8cafbd2db4cbe708e6cbdba19", "testharness" ], "IndexedDB/idbobjectstore_createIndex15-autoincrement.htm": [ @@ -472441,19 +480305,19 @@ "testharness" ], "IndexedDB/idbobjectstore_delete6.htm": [ - "01d54dee93b3084b948a65f3f4cf3b627f12e940", + "4481387ccfd191102f2bad1ca754f186a3b55e78", "testharness" ], "IndexedDB/idbobjectstore_delete7.htm": [ - "98831c5da8ab1d18fbc37a7b91c2ad901d387837", + "aa7eb1ac6a255a4e777f457b5e01ba9d8c9e23f6", "testharness" ], "IndexedDB/idbobjectstore_deleteIndex.htm": [ - "ebebbb7db486a35669f255b5349b2675dd0b7245", + "f4fccd61309641ca97b5a5f5cfd4c11d67b0fb4f", "testharness" ], "IndexedDB/idbobjectstore_deleted.htm": [ - "4a5c0cca2b7d61fbbd80822dafdba4ada7d7b0d3", + "f5a383e75cbc4dd292dbe93299ce388c55449266", "testharness" ], "IndexedDB/idbobjectstore_get.htm": [ @@ -472477,11 +480341,11 @@ "testharness" ], "IndexedDB/idbobjectstore_get6.htm": [ - "33381a684b6966f0a33f979ed3b29b49681aa39c", + "c996ec4946c69c603fc0cd7df509a2005e70aa8c", "testharness" ], "IndexedDB/idbobjectstore_get7.htm": [ - "570441b66342fc8d6617b23d98d3f02f9316b799", + "dbbfa0d46f567bf972af1b0fdf737f6b79ac25a7", "testharness" ], "IndexedDB/idbobjectstore_getAll.html": [ @@ -472493,7 +480357,7 @@ "testharness" ], "IndexedDB/idbobjectstore_getKey.html": [ - "ddb78b11213238cf946c9a53321606fa0a08c40e", + "9e3662502de0a2ef86d3a0d61960d168f1c8ab06", "testharness" ], "IndexedDB/idbobjectstore_index.htm": [ @@ -472509,11 +480373,11 @@ "testharness" ], "IndexedDB/idbobjectstore_openCursor_invalid.htm": [ - "a142a3a455982e53831f21f4e091894af1417ab6", + "5911686d3528da68ad548a79b5e4533225f306fa", "testharness" ], "IndexedDB/idbobjectstore_openKeyCursor.htm": [ - "345845965fe009b11ebfa2cde83d169e573e11b8", + "0880a23c37d930bd526bf30da01bff67443d743f", "testharness" ], "IndexedDB/idbobjectstore_put.htm": [ @@ -472521,19 +480385,19 @@ "testharness" ], "IndexedDB/idbobjectstore_put10.htm": [ - "d0de11c3e30ce2fb63c3b530d6a75519619a1524", + "cc8770ef9b52323e589e699b477964ed1bc2712d", "testharness" ], "IndexedDB/idbobjectstore_put11.htm": [ - "9a13757ef200d2df11c8e76a541e3ced3f15fa5d", + "d9802aa01745eb88ae72384307716492eace6173", "testharness" ], "IndexedDB/idbobjectstore_put12.htm": [ - "24970dff080b2dbe17284b779728b0c0fa8fff8d", + "5d4f544cdbd318a2a6196dc92bbc8a87ad066f20", "testharness" ], "IndexedDB/idbobjectstore_put13.htm": [ - "870c8e4a718420542aaa767217520505846f889e", + "ecd0515b87129759638f22fbbfe93f99fad6a4d0", "testharness" ], "IndexedDB/idbobjectstore_put14.htm": [ @@ -472541,11 +480405,11 @@ "testharness" ], "IndexedDB/idbobjectstore_put15.htm": [ - "cf2c35435cf513c3a329411bc9b0c44b8e3944e2", + "5d1b8d409167b66545af086e4858248b1021380f", "testharness" ], "IndexedDB/idbobjectstore_put16.htm": [ - "4818dd25dd9105403db2c9f7c576fa651a065b9d", + "fe187e5508f607e1c357a229462656ff91c42450", "testharness" ], "IndexedDB/idbobjectstore_put2.htm": [ @@ -472577,7 +480441,7 @@ "testharness" ], "IndexedDB/idbobjectstore_put9.htm": [ - "6e50a0b296d3ffe2496d0e8b155e36daa89f5cca", + "0fa6dc75797c2b522d329946a8a9136bab98ab44", "testharness" ], "IndexedDB/idbrequest-onupgradeneeded.htm": [ @@ -472585,11 +480449,11 @@ "testharness" ], "IndexedDB/idbrequest_error.html": [ - "ae16b695a3fa15f003bb0af2db2b2693e705fb95", + "651a844d29dae291da08af72fa704860c5b913fd", "testharness" ], "IndexedDB/idbrequest_result.html": [ - "297862901633197efa4edc07601cca1cddfe3103", + "f77aba7dfe4114d56eebcea895dd00f919324209", "testharness" ], "IndexedDB/idbtransaction-db-SameObject.html": [ @@ -472597,11 +480461,11 @@ "testharness" ], "IndexedDB/idbtransaction-objectStore-exception-order.html": [ - "6bae783ecd783cf67a04c358d26197b98abcbeb3", + "4b7659ff0bf9ea671bb43488a231760db7656baa", "testharness" ], "IndexedDB/idbtransaction-objectStore-finished.html": [ - "5e363ea3bb0b9bc7077ebbf72c3aa51d614dfd8e", + "e1a8500b17a915a787ece533b2803d805410d901", "testharness" ], "IndexedDB/idbtransaction-oncomplete.htm": [ @@ -472649,7 +480513,7 @@ "testharness" ], "IndexedDB/key-conversion-exceptions.htm": [ - "4dd5d9005b6cb6e4c2c7dccaef62804bfcdb73ec", + "36d67d8f07dcaf8becc68d1e96711c6d98534a18", "testharness" ], "IndexedDB/key-generators/reading-autoincrement-common.js": [ @@ -472673,7 +480537,7 @@ "testharness" ], "IndexedDB/key_invalid.htm": [ - "98c9140df9ff56f6304d0b997433048d0836a186", + "c3c61ead23cf434a8a9806cc3d5f5489833d8280", "testharness" ], "IndexedDB/key_valid.html": [ @@ -472689,7 +480553,7 @@ "testharness" ], "IndexedDB/keygenerator-inject.html": [ - "fcdd7d6f4a6563be0c66361be515d1e670f76ca0", + "301e92304370591237a5ab50ca0e260f37234c2a", "testharness" ], "IndexedDB/keygenerator-overflow.htm": [ @@ -472705,7 +480569,7 @@ "testharness" ], "IndexedDB/keypath-exceptions.htm": [ - "6d7937c522f62c609b6089558cadf7e3c4b13558", + "62fce352baffd1c183a36376b50234b6bf1b5822", "testharness" ], "IndexedDB/keypath-special-identifiers.htm": [ @@ -472717,7 +480581,7 @@ "testharness" ], "IndexedDB/keypath_invalid.htm": [ - "1a4357bb5d5f3bf072daf40ccf9c9ffe45c7488d", + "470ff2681b343b9c32be94fb5bf2bd5709c46c48", "testharness" ], "IndexedDB/keypath_maxsize.htm": [ @@ -472785,11 +480649,11 @@ "testharness" ], "IndexedDB/structured-clone-transaction-state.any.js": [ - "8c41d3b72bfc4b72565745531b832b4320729af1", + "5494bc51eb02848a8cbe9cf1a07fca4839edd3d9", "testharness" ], "IndexedDB/structured-clone.any.js": [ - "e03ba7aeee47bcd8ae75e2210fc2165581c0a82f", + "d21e64d37c169e841b666c25d8bd7b315b118d49", "testharness" ], "IndexedDB/support-promises.js": [ @@ -472805,15 +480669,15 @@ "testharness" ], "IndexedDB/transaction-abort-index-metadata-revert.html": [ - "0b216f633e6ee4ace276f86a5bd7f7c036298b9a", + "355fbbc31feb6218b2ffd08f7b54cff34cd89ce1", "testharness" ], "IndexedDB/transaction-abort-multiple-metadata-revert.html": [ - "ac61788822dd8969915e421b803fdd8167432f38", + "ca63eaaad3714a4a7bf4ae5942a094cfb9f3614a", "testharness" ], "IndexedDB/transaction-abort-object-store-metadata-revert.html": [ - "decc45a5ee41cdcc04213fa5581eda31101ff7a8", + "bcdcd1a22fd79791c212c4cc9eabe74b595316d7", "testharness" ], "IndexedDB/transaction-abort-request-error.html": [ @@ -472821,7 +480685,7 @@ "testharness" ], "IndexedDB/transaction-create_in_versionchange.htm": [ - "4d98c000408c2cbc39d8e4dd44b6309beefb122d", + "0bfb4a87b911b841cdb7efd25c20f1d203ba07e2", "testharness" ], "IndexedDB/transaction-deactivation-timing.html": [ @@ -472841,7 +480705,7 @@ "testharness" ], "IndexedDB/transaction-relaxed-durability.tentative.any.js": [ - "865c28ce163c2dea2f55b25ec1145cb8bcc6bb45", + "7e17403eb0c202c5cccbee19b8cffd0d9de98ac2", "testharness" ], "IndexedDB/transaction-requestqueue.htm": [ @@ -472857,15 +480721,15 @@ "testharness" ], "IndexedDB/upgrade-transaction-lifecycle-backend-aborted.html": [ - "9a7c4b42f50376fb71527ba62a583c37f3e9068b", + "b516788e0959380ce30a7635a1fa9ee438d57aac", "testharness" ], "IndexedDB/upgrade-transaction-lifecycle-committed.html": [ - "366ed38cb8aea1b2329bdacb52054cb6ddda58fa", + "53afc13259ed654f6db345ecfa78c898f56db821", "testharness" ], "IndexedDB/upgrade-transaction-lifecycle-user-aborted.html": [ - "9db93db93d3b187e5587c82edfb557c1c12187d3", + "8dff86196cf5db54f6148d4e9876ba9beb5828cf", "testharness" ], "IndexedDB/value.htm": [ @@ -473109,7 +480973,7 @@ "testharness" ], "WebCryptoAPI/getRandomValues.any.js": [ - "dd970ebfa60cdc96c64da1c9d7f326bc1bcaad01", + "473d57fc460917535719607a4bd13fe8f8e9547f", "testharness" ], "WebCryptoAPI/historical.any.js": [ @@ -473241,7 +481105,7 @@ "testharness" ], "WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.js": [ - "d584c25f81e517051adff7ffc4c469d2bee1fe3e", + "8f1a60287c205ef3bd529442d7f706806c2b4bb3", "support" ], "WebIDL/META.yml": [ @@ -473273,15 +481137,15 @@ "testharness" ], "WebIDL/ecmascript-binding/es-exceptions/DOMException-custom-bindings.any.js": [ - "8d69c6e0707a53a31aebb604d696a7255a83f77d", + "ed05d27646f606f379fa821bd9358d1be3455f65", "testharness" ], "WebIDL/ecmascript-binding/es-exceptions/exceptions.html": [ - "396d0a4c6c6de3fc00dd60467e46a20844de6f4e", + "d26c66266994b2e349b4c81d42bc2f66353e6840", "testharness" ], "WebIDL/ecmascript-binding/global-immutable-prototype.any.js": [ - "7b97e062c9d7c7b6ae705ef8432dfb5481595beb", + "6291c3ae935608185385e87f769e4f8b5be6cf19", "testharness" ], "WebIDL/ecmascript-binding/has-instance.html": [ @@ -473301,15 +481165,15 @@ "testharness" ], "WebIDL/ecmascript-binding/iterator-prototype-object.html": [ - "5a935fa20135d88a7268b872b68ab7fe548ab5c7", + "466973dc08f0e309ef847283d7fd4fb46a528d0b", "testharness" ], "WebIDL/ecmascript-binding/legacy-callback-interface-object.html": [ - "01a008d108cd57f2cc6c862644bdab366fdefb9d", + "f5b49e221f78556c8d425331244e114b933090e2", "testharness" ], "WebIDL/ecmascript-binding/legacy-platform-object.html": [ - "a5327e97d049136df87fca44146aa5f158b02fb4", + "55e3c08addd7cdf91f590524646ff15bfec3dcc6", "testharness" ], "WebIDL/ecmascript-binding/no-regexp-special-casing.any.js": [ @@ -473317,11 +481181,11 @@ "testharness" ], "WebIDL/ecmascript-binding/put-forwards.html": [ - "83ec534b2b358d47cdc4498155dbbca565fc3883", + "6a13587899b3ada1fcd661eccf49e49f04deb54b", "testharness" ], "WebIDL/ecmascript-binding/sequence-conversion.html": [ - "3b45310dd5faa9bc5277e8d6032d159f375eefcd", + "cdd3bac2ec92fb8627bc9d804f67838beb9c64f9", "testharness" ], "WebIDL/ecmascript-binding/support/constructors-support.html": [ @@ -474773,7 +482637,7 @@ "reftest" ], "animation-worklet/worklet-animation-creation.https.html": [ - "5d033b30099dc34017f54d0a3afd10278bbb31a6", + "ae90fa288149e675725f960f3a739effa0406af1", "testharness" ], "animation-worklet/worklet-animation-duration.https.html": [ @@ -474857,7 +482721,7 @@ "testharness" ], "animation-worklet/worklet-animation-with-invalid-effect.https.html": [ - "8b72d4e487c455f5e3d4d535a4ddf277fd988d01", + "75261d251cc1938e7999a76438dd3db64a27fe0d", "testharness" ], "animation-worklet/worklet-animation-with-non-ascii-name-ref.html": [ @@ -476581,7 +484445,7 @@ "testharness" ], "beacon/beacon-error.sub.window.js": [ - "f2c5e95a276c257387e1cd85c2bcb70090d1132c", + "499fa3b27213f2b5958c0c90cd76eaa382bb0bee", "testharness" ], "beacon/beacon-navigate.html": [ @@ -476589,7 +484453,7 @@ "testharness" ], "beacon/beacon-readablestream.window.js": [ - "fc7f81f884bdf47b6eb76f6d9b237bc38556efa4", + "46e30fcda5cc85f94d08b612236d952cb316dfb8", "testharness" ], "beacon/beacon-redirect.window.js": [ @@ -476833,15 +484697,15 @@ "support" ], "bluetooth/idl/idl-Bluetooth.https.html": [ - "9578fd6af21b0c39e51ee7d94ff6bfda677695b3", + "7322df53e5c227571d5155550e07aca4ed3688e5", "testharness" ], "bluetooth/idl/idl-BluetoothDevice.https.html": [ - "707ac1ab03a92ceca6a0c327132dcf54728327b8", + "6030d4e5acdcda0ac80d63100c8e6573c6194ae2", "testharness" ], "bluetooth/idl/idl-BluetoothUUID.html": [ - "14463127e06b422a2830042bb887e5108e200753", + "13e00226ade144f66161dde76f5584514874b1c7", "testharness" ], "bluetooth/idl/idl-NavigatorBluetooth.html": [ @@ -477520,14 +485384,26 @@ "e3a5edae1c7f9541c6309181f274ff2a4c4e2f80", "support" ], + "client-hints/accept-ch-answers.sub.https.html": [ + "8070d8bb297e94fce242d5df27d5e286d37fd289", + "testharness" + ], + "client-hints/accept-ch-answers.sub.https.html.headers": [ + "4f3a57b865b8b58fd5c037976880de8e6cc184da", + "support" + ], "client-hints/accept-ch-cache-revalidation.https.html": [ - "6133e8ad2d7ca0c9c806af364255deb7688c79fd", + "1bbf5aa6de67221968a6c6029e88e7202aff8544", "testharness" ], "client-hints/accept-ch-cache-revalidation.https.html.headers": [ "05b7a4a6f6fcb91b18f2a0e767010e81c9329fb8", "support" ], + "client-hints/accept-ch-change.https.html": [ + "3d291e3f0665d08257f8fcabdb1bc8ffa5fbc671", + "testharness" + ], "client-hints/accept-ch-feature-policy-navigation.https.html": [ "dff960d28709ae6888f0da0b221e93c7b160e7e6", "testharness" @@ -477536,6 +485412,22 @@ "f9595a794d9c93dca09f371f5797399a9204ed53", "support" ], + "client-hints/accept-ch-feature-policy.sub.https.html": [ + "4444dc428e0576777912ffb17e739210a2f96710", + "testharness" + ], + "client-hints/accept-ch-feature-policy.sub.https.html.headers": [ + "cf453cf368ddfb8096a62ad9720af877480bcc07", + "support" + ], + "client-hints/accept-ch-malformed-header.https.html": [ + "b35e4768dcb8370db505537f1011d6f3073e87f4", + "testharness" + ], + "client-hints/accept-ch-malformed-header.https.html.headers": [ + "6d23758273ba2cc4a7ec865a523b549cd8a49875", + "support" + ], "client-hints/accept-ch-no-feature-policy-navigation.https.html": [ "5fb6c22f50873ce597e6d5ed04c1ebeef64a17c1", "testharness" @@ -477544,6 +485436,26 @@ "7eb28a000bdde9634e618701e2ba512e4a9ebc49", "support" ], + "client-hints/accept-ch-no-feature-policy.sub.https.html": [ + "8d786b877f1c8ba6677e2d836d1407dd127e71fe", + "testharness" + ], + "client-hints/accept-ch-no-feature-policy.sub.https.html.headers": [ + "c6391a863e698c68b206c2c06311ae85d161d285", + "support" + ], + "client-hints/accept-ch-non-secure.http.html": [ + "707108a12b20798dc3259342d60cc228beea3f7f", + "testharness" + ], + "client-hints/accept-ch-non-secure.http.html.headers": [ + "4f3a57b865b8b58fd5c037976880de8e6cc184da", + "support" + ], + "client-hints/accept-ch-stickiness/README.md": [ + "7dd1c6ddaf795769ce06682ef9abd68eeff1ddc4", + "support" + ], "client-hints/accept-ch-stickiness/cross-origin-iframe-not-setting-other-origins.https.html": [ "5316c2874cf624751f846d554b35b57e8630af40", "testharness" @@ -477589,7 +485501,7 @@ "testharness" ], "client-hints/accept-ch-stickiness/resources/accept-ch-test.js": [ - "0ee5059cb677090c65cdb8b5cade69df7578f901", + "46b499a5e4180f0ec1548f37ed2230af3eb7c5a8", "support" ], "client-hints/accept-ch-stickiness/resources/accept-ch.html": [ @@ -477640,88 +485552,56 @@ "0b7151a2cca08d941d313e014e41769c08c350cc", "testharness" ], - "client-hints/accept_ch.http.html": [ - "50d77646f89aea13c212c6ecee4e7f32107007e9", + "client-hints/http-equiv-accept-ch-malformed-header.https.html": [ + "d7c6b8dfb063f256a0f2442cad7f866ddd401ec1", "testharness" ], - "client-hints/accept_ch.http.html.headers": [ - "4f3a57b865b8b58fd5c037976880de8e6cc184da", + "client-hints/http-equiv-accept-ch-non-secure.http.html": [ + "909ab5f5f2a563348da0d0bb3377961f1015d031", + "testharness" + ], + "client-hints/resources/accept-ch-different.html": [ + "05cc0b61b07c36fca5816e277df1dc98e70d9ba1", "support" ], - "client-hints/accept_ch.tentative.https.html": [ - "0f8b525576e0d67baa2ca23381c620909d12e539", - "testharness" - ], - "client-hints/accept_ch.tentative.sub.https.html": [ - "43c1fb12c2005e08b75f7cdfb24e6ad1a90ead1a", - "testharness" - ], - "client-hints/accept_ch.tentative.sub.https.html.headers": [ - "4f3a57b865b8b58fd5c037976880de8e6cc184da", + "client-hints/resources/accept-ch-different.html.headers": [ + "255a362f0bfe42dc14271fc9b996341b9c47d106", "support" ], - "client-hints/accept_ch_feature_policy.tentative.sub.https.html": [ - "1df308ab2f82628fc251c5db21929d55193897f0", - "testharness" - ], - "client-hints/accept_ch_feature_policy.tentative.sub.https.html.headers": [ - "cf453cf368ddfb8096a62ad9720af877480bcc07", + "client-hints/resources/accept-ch-empty.html": [ + "27393e5a1ab2d9eb883e1a9e0da0e92cedef3a11", "support" ], - "client-hints/accept_ch_malformed_header.https.html": [ - "70ccab8c80d0576a1f745703c77351fe21785fb6", - "testharness" - ], - "client-hints/accept_ch_malformed_header.https.html.headers": [ - "6d23758273ba2cc4a7ec865a523b549cd8a49875", + "client-hints/resources/accept-ch-empty.html.headers": [ + "25215abdf7376ede28190981f543ae339552284d", "support" ], - "client-hints/accept_ch_no_feature_policy.tentative.sub.https.html": [ - "02fbf8975b85a4525867c969028a6bcdbd1f7606", - "testharness" - ], - "client-hints/accept_ch_no_feature_policy.tentative.sub.https.html.headers": [ - "c6391a863e698c68b206c2c06311ae85d161d285", + "client-hints/resources/accept-ch.html": [ + "1f1da26cebe45d3e55fe4aea8af6cefcae94adb5", "support" ], - "client-hints/echo_client_hints_received.py": [ - "7427a3878e1a41aa7b8f589834bc1b5139f693a3", + "client-hints/resources/accept-ch.html.headers": [ + "833b8d0e4c2f514efc31b4c409266f981695c201", "support" ], - "client-hints/echo_ua_client_hints_received.py": [ - "a713047ede62874d33bc62540166303e8a7fc444", + "client-hints/resources/echo-client-hints-received.py": [ + "d978754a20509a5b488d06af73efc9806d67537e", "support" ], - "client-hints/http_equiv_accept_ch.tentative.http.html": [ - "03c5799908b971ec6e6057fb8e5325e1bc2e203d", - "testharness" - ], - "client-hints/http_equiv_accept_ch.tentative.https.html": [ - "2830cb714fad4be98ddcf0ccf7594b749e77b50d", - "testharness" - ], - "client-hints/http_equiv_accept_ch.tentative.sub.https.html": [ - "16617dccaf8c9c99011849b48d93e41f35ca374a", - "testharness" - ], - "client-hints/http_equiv_accept_ch_malformed_header.tentative.https.html": [ - "dd516a97c965f4a248fa27ed8ce71dae6251e106", - "testharness" - ], - "client-hints/resources/accept_ch.html": [ - "48d09f2d95c57875b71b088c2db8ce9585f5a237", - "support" - ], - "client-hints/resources/accept_ch.html.headers": [ - "91ee40652f06508478bb776bf4068fd61277cef3", + "client-hints/resources/echo-ua-client-hints-received.py": [ + "9cf1f8e32ffe3e1079a9ae48303ff314210aa145", "support" ], "client-hints/resources/expect-client-hints-headers-iframe.py": [ "e72d77c47d9aae36c619e8e065e5685f7a9c166b", "support" ], - "client-hints/resources/expect_client_hints_headers.html": [ - "8e64b1989ab2046952f91920245423caebb2a706", + "client-hints/resources/expect-client-hints-headers.html": [ + "1c2062ec6c10d94ffb3aa17957dd12153b7f8b35", + "support" + ], + "client-hints/resources/expect-different-client-hints-headers.html": [ + "951781124a250595d8d72f803930dc8d6357f390", "support" ], "client-hints/resources/feature-policy-navigation.js": [ @@ -477736,6 +485616,10 @@ "8e6dc72dda620dc0508d02009e6cc58631a00e7b", "support" ], + "client-hints/resources/open-and-add-load-event.js": [ + "7100c3f48a5b643c66434efdb180ea0ccb3a7dc3", + "support" + ], "client-hints/resources/sec-ch-ua.py": [ "a14a27dadf9e333784a5c636c821634b387e475f", "support" @@ -477745,7 +485629,7 @@ "support" ], "client-hints/sec-ch-quotes.https.html": [ - "86dce18904b0636092247c42ecb06fdd4fc7bc32", + "edf4fce785e83a349a57c94371e5d22f867977ed", "testharness" ], "client-hints/sec-ch-quotes.https.html.headers": [ @@ -477789,7 +485673,7 @@ "testharness" ], "clipboard-apis/clipboard-item.https.html": [ - "fe5e76ccbb4379ed3a29bdea43d56d882b5d041b", + "3a2ade564c785fc3c1144d331742bb614e2371f4", "testharness" ], "clipboard-apis/events/copy-event-manual.html": [ @@ -478077,7 +485961,7 @@ "support" ], "common/stringifiers.js": [ - "b59ca9c246f75a72d532d58ef628824f8905ff7a", + "63544f9ed00f1edfd459ee7c8e9ee77aff7e0110", "support" ], "common/stringifiers.js.headers": [ @@ -478093,7 +485977,7 @@ "support" ], "common/test-setting-immutable-prototype.js": [ - "de619b1d76663d0f41f13b720609bd4cc28747c2", + "de9bdd5919a794b765e4f5bdd8c0b0ac524227f2", "support" ], "common/test-setting-immutable-prototype.js.headers": [ @@ -478317,7 +486201,7 @@ "testharness" ], "compression/compression-stream.tentative.any.js": [ - "47df70f7cd3979c1a3eab45581376fd38a6b2367", + "cf645c41c722f4f92fac0a1199881d3fe683b50f", "testharness" ], "compression/decompression-bad-chunks.tentative.any.js": [ @@ -478329,7 +486213,7 @@ "testharness" ], "compression/decompression-constructor-error.tentative.any.js": [ - "9ffdb08ce2ff365f70af8121f82e5856c6de9533", + "7840b3a36cdd95cb5b97a489fefd6753317415c7", "testharness" ], "compression/decompression-correct-input.tentative.any.js": [ @@ -495917,7 +503801,7 @@ "testharness" ], "console/console-label-conversion.any.js": [ - "1fb269d4061c61112f4c3cbe609dafd80a4e0591", + "4d48df3b1d0d00c1f0dd8778306db4b7bb00285d", "testharness" ], "console/console-number-format-specifiers-symbol-manual.html": [ @@ -496285,7 +504169,7 @@ "support" ], "content-security-policy/embedded-enforcement/support/testharness-helper.sub.js": [ - "3b84db0852249ef0ed38ef6053086561cf83bde8", + "238daef65d2fb7b3cdce104699038d3456bb8de6", "support" ], "content-security-policy/font-src/font-match-allowed.sub.html": [ @@ -496917,7 +504801,7 @@ "support" ], "content-security-policy/inside-worker/support/script-src-self.sub.js": [ - "b0d557645da187864fa446c0ac3ecd552a7041ff", + "c5733d64cc9691a8bf1dcc6497134bfea39f7263", "support" ], "content-security-policy/media-src/media-src-7_1.html": [ @@ -497845,7 +505729,7 @@ "testharness" ], "content-security-policy/script-src/script-src-1_4.html": [ - "bfc66b2a8d048dcf21e9b9216f298368ce158677", + "4c975471161972f34ba7a96f486b0344dd7b8898", "testharness" ], "content-security-policy/script-src/script-src-1_4_1.html": [ @@ -497853,7 +505737,7 @@ "testharness" ], "content-security-policy/script-src/script-src-1_4_2.html": [ - "0ee6f587c5ce1683ba0f2887d3865dae820f7d63", + "6d6f23e741c3a9015bd1f9b2bae9253f8cd99206", "testharness" ], "content-security-policy/script-src/script-src-multiple-policies-multiple-hashing-algorithms.html": [ @@ -497949,7 +505833,7 @@ "support" ], "content-security-policy/script-src/script-src-strict_dynamic_eval.html": [ - "62fda4f3d23051be27e377c4bfb3699068ba0460", + "459d69aefe89fac5ff1b4819f1a533e7958334e0", "testharness" ], "content-security-policy/script-src/script-src-strict_dynamic_eval.html.headers": [ @@ -497989,7 +505873,7 @@ "support" ], "content-security-policy/script-src/script-src-strict_dynamic_new_function.html": [ - "2b75276588f28f41764403a62a3659bbf0dc8471", + "263d5d1d874260ef02547a55cc9fdad32b98a1c4", "testharness" ], "content-security-policy/script-src/script-src-strict_dynamic_new_function.html.headers": [ @@ -498193,7 +506077,7 @@ "testharness" ], "content-security-policy/securitypolicyviolation/constructor-required-fields.html": [ - "1260c491fc2501b080850b5e523a847d37200127", + "1424cdcd7ffafaba543f7b4986c61b4f51a611a3", "testharness" ], "content-security-policy/securitypolicyviolation/idlharness.window.js": [ @@ -498609,7 +506493,7 @@ "support" ], "content-security-policy/support/testharness-helper.js": [ - "d475d05115a59d0d4630894227e7c0a1ae4304ce", + "c071a68931562dae4b9862c71f35418efcc69b65", "support" ], "content-security-policy/support/var-a.js": [ @@ -502193,7 +510077,7 @@ "testharness" ], "cors/client-hint-request-headers.htm": [ - "251be668b7dcfd9e9595d7fbcb5b2b4c5d2a2c16", + "17fbd3daa3f979e93eea43eb4347fd3d3624c805", "testharness" ], "cors/cors-safelisted-request-header.any.js": [ @@ -502213,7 +510097,7 @@ "testharness" ], "cors/origin.htm": [ - "bd7349e486e1886356342e2b1e0dadc4e8c074a6", + "3d46002933bb3ce6e21da8cf6a4cbcd06d50602f", "testharness" ], "cors/preflight-cache.htm": [ @@ -502245,7 +510129,7 @@ "testharness" ], "cors/request-headers.htm": [ - "289f402191ebbd7d47d70e13a58f30b8db62520f", + "7634eca9fc8bf1a714bfb355c7e42b38b511d809", "testharness" ], "cors/resources/304.py": [ @@ -562545,7 +570429,7 @@ "testharness" ], "css/css-animations/animationevent-interface.js": [ - "e35b7fcb0f98656cdeff41d8d7f4a7620fa52eea", + "fcb7ceba20574691d7d817ee12af3e20f455c20e", "support" ], "css/css-animations/animationevent-marker-pseudoelement.html": [ @@ -568177,7 +576061,7 @@ "testharness" ], "css/css-conditional/js/001.html": [ - "fd9968ded449938cdfa5a10df0acd4a96dcad37c", + "5907a492e5736a035d2c92be6764608ee2f73d84", "testharness" ], "css/css-conditional/reference/background-lime.html": [ @@ -568185,7 +576069,7 @@ "support" ], "css/css-conditional/test_group_insertRule.html": [ - "5326501913db15e90a80e5ffc4eb93d62dc2e732", + "3818108ac6015616c39b92256305a379c8c7a9f0", "testharness" ], "css/css-contain/META.yml": [ @@ -569232,6 +577116,10 @@ "6c61da381803221837b084831bb0f2709ebc88d6", "reftest" ], + "css/css-content/element-replacement-dynamic.html": [ + "c025759094e8fa1d0ce5d876474477d50877a050", + "reftest" + ], "css/css-content/element-replacement-ref.html": [ "d301f1d6a1b047daff753ff2fcb28d626e2f70dd", "support" @@ -572084,6 +579972,10 @@ "7148f26e2770b669dfcc69435e3a506882ffd457", "reftest" ], + "css/css-flexbox/dynamic-change-simplified-layout-002.html": [ + "d419bb3c700cd18b972a741fe0a03454445b80a4", + "reftest" + ], "css/css-flexbox/dynamic-change-simplified-layout.html": [ "5d15e22c5eba93488c8e6e667b61306669c32026", "reftest" @@ -575897,7 +583789,7 @@ "support" ], "css/css-fonts/font-synthesis-05.html": [ - "bdbc22f9cfcb3dec401654bc991c9e78a3afacb8", + "e521e6c67cf2c69d32c31bab763ca9a644bc7766", "reftest" ], "css/css-fonts/font-variant-01-ref.html": [ @@ -583145,7 +591037,7 @@ "testharness" ], "css/css-fonts/variations/font-parse-numeric-stretch-style-weight.html": [ - "fed4aa508dee7f255cda1a466ed4c2c6a9a271bf", + "95fbb9c6994c7a81a18a6d4701a1843276e619eb", "testharness" ], "css/css-fonts/variations/font-shorthand.html": [ @@ -584105,7 +591997,7 @@ "testharness" ], "css/css-grid/alignment/grid-align-stretching-replaced-items.html": [ - "f9b455d4c163af1ffd6cf03a7361316ce1a21246", + "6ac50527cd4668dd7edc6c66c07028ac4d8ec6c1", "testharness" ], "css/css-grid/alignment/grid-align.html": [ @@ -585232,6 +593124,10 @@ "c1ff70c49ec1e77ba0e794c7537ae90cd503498e", "testharness" ], + "css/css-grid/chrome-bug-001.html": [ + "7b24f41a47eeb090ec53e9a6e37a4f8a977ca802", + "reftest" + ], "css/css-grid/chrome-crash-001.html": [ "c9ea9332a1e49f300c0520b798653869ad82b5c6", "testharness" @@ -587576,6 +595472,22 @@ "d321f030023a8e59b8cdd265ae974d01da07e64e", "reftest" ], + "css/css-layout-api/baseline/child-baseline.https.html": [ + "a871d690117ad00ec83022f72295d0d93d44ec28", + "reftest" + ], + "css/css-layout-api/baseline/flex-baseline.https.html": [ + "0b0e147a2cfed61fc0bec2e73982d8b89946e958", + "reftest" + ], + "css/css-layout-api/baseline/no-baseline.https.html": [ + "0bc08552bc5a665e9577a440bf3d5ed798006f59", + "reftest" + ], + "css/css-layout-api/baseline/orthogonal-baseline.https.html": [ + "c83560b57e85189d5d3e82f5fe5055b305a4c963", + "reftest" + ], "css/css-layout-api/box-tree-registered-ref.html": [ "0ba9862015743c319720dd4d97c15d4808565d00", "support" @@ -590157,11 +598069,11 @@ "testharness" ], "css/css-masking/parsing/clip-path-invalid.html": [ - "cf8aa251c38c8888329843cdce0564d54d6f1d3f", + "6b91f74ad484d4d0d70fa679db378d04e238125f", "testharness" ], "css/css-masking/parsing/clip-path-valid.html": [ - "895cdfacac6cc8ac56e67738aed53e55be7b2fcf", + "ec6ac5ae9bc349c8cb1dd473e9f9dc65f4002c97", "testharness" ], "css/css-masking/parsing/clip-rule-computed.html": [ @@ -594397,11 +602309,11 @@ "testharness" ], "css/css-properties-values-api/register-property-syntax-parsing.html": [ - "6d7dbc63a1d38f108a3a10e99b09cddd84b135f7", + "31094d25b7965de3402c3e5774847c8abc21d0c2", "testharness" ], "css/css-properties-values-api/register-property.html": [ - "5842b83b0a48715f12effa6212cc0cccbd890861", + "feb6c28d47e3aa921dc9f5c97c8ee9bcfa00eef9", "testharness" ], "css/css-properties-values-api/registered-properties-inheritance.html": [ @@ -594425,7 +602337,7 @@ "support" ], "css/css-properties-values-api/self-utils.html": [ - "05aa4b2fb03b29feee47177624715230768a44a0", + "b770c86c38269656d77c3e382d3fe0391cdd8cd0", "testharness" ], "css/css-properties-values-api/support/alt/alt.css": [ @@ -594449,7 +602361,7 @@ "support" ], "css/css-properties-values-api/typedom.html": [ - "b8e6f4aaf840c017ff7e49c14333c635c8483c50", + "51940e298d07707288d9ad6c023f274952966f21", "testharness" ], "css/css-properties-values-api/unit-cycles.html": [ @@ -594872,6 +602784,14 @@ "4921ca7d283e99ea426772ffc47b3a9c86329e9a", "reftest" ], + "css/css-pseudo/marker-content-020-ref.html": [ + "902c8425154b47643fb8f9fac0d8f14cff1263c6", + "support" + ], + "css/css-pseudo/marker-content-020.html": [ + "5211506d8a17ce278407d2337d760b16f3fd34be", + "reftest" + ], "css/css-pseudo/marker-default-styles.html": [ "05da6f89a9e2f858eadfdfb63e5194feda5ce3fc", "testharness" @@ -595008,2030 +602928,6 @@ "2e42c6be8fbcfc756c578986517efc0b1739d1f3", "visual" ], - "css/css-regions/META.yml": [ - "37bdc98c84c0f4c9a32d3cc5b2f4e3494eb63999", - "support" - ], - "css/css-regions/animations/animations-001.html": [ - "665fae56212ffd54863abf700d5d0e5aa83ab746", - "manual" - ], - "css/css-regions/animations/reference/animations-001-ref.html": [ - "bf8490f1d6a29e649bcd30048e8bc4973f5ef1e3", - "support" - ], - "css/css-regions/animations/support/animations.css": [ - "44e3ad9cbde49db9bc0e48c723956cc6eb933b00", - "support" - ], - "css/css-regions/contentEditable/contentEditable-001.html": [ - "204d23eee2afc3955585b83ade7af482a44d3ef5", - "reftest" - ], - "css/css-regions/contentEditable/contentEditable-002.html": [ - "f455178fcba7aa3a5271e1b308a2a2d8240ae40c", - "reftest" - ], - "css/css-regions/contentEditable/contentEditable-003.html": [ - "746316c6bc45ed186579144b9da4664fd5312d8c", - "reftest" - ], - "css/css-regions/contentEditable/contentEditable-004.html": [ - "d6c34b99d69f79be72fba1b605329ac6367c192a", - "reftest" - ], - "css/css-regions/contentEditable/contentEditable-005.html": [ - "d13b42cbf2b7304bd293e8b941631885e1ed3893", - "reftest" - ], - "css/css-regions/contentEditable/contentEditable-006.html": [ - "2a7b4170095a4f598854d72271b11bad397dc6ee", - "reftest" - ], - "css/css-regions/contentEditable/contentEditable-007.html": [ - "c80957f6ed914e637b16ded3c74dcd9e0c058432", - "reftest" - ], - "css/css-regions/contentEditable/contentEditable-008.html": [ - "9aad4956d40dbe381776f35bdeb26a86e0128122", - "reftest" - ], - "css/css-regions/contentEditable/contentEditable-009.html": [ - "e709d2e7e9e6c2d7ad2ef860e8586cb57e022c80", - "reftest" - ], - "css/css-regions/contentEditable/contentEditable-010.html": [ - "2e3bc624f9da7f2e215bf13df76cdb4c01f7cb39", - "reftest" - ], - "css/css-regions/contentEditable/contentEditable-011.html": [ - "087287eddd6ae588c40e14ace3036efc853d1f1d", - "reftest" - ], - "css/css-regions/contentEditable/contentEditable-012.html": [ - "496b849167df133a421bdcbc3cc967a4888249a3", - "manual" - ], - "css/css-regions/contentEditable/reference/contentEditable-001-ref.html": [ - "15f20c178b31f3f3e6a33f5304cb380d7a5f080d", - "support" - ], - "css/css-regions/contentEditable/reference/contentEditable-002-ref.html": [ - "0b9853a7c9f5d99aa7c79bff39928ed8356f28c7", - "support" - ], - "css/css-regions/contentEditable/reference/contentEditable-003-ref.html": [ - "e4e6a0fd7a23b1183a51b487e69adb00e64ddafc", - "support" - ], - "css/css-regions/contentEditable/reference/contentEditable-004-ref.html": [ - "393f0ed6e001d667dfae4d8f9142a3660745c02e", - "support" - ], - "css/css-regions/contentEditable/reference/contentEditable-005-ref.html": [ - "73c3e13e6cc7a0feac03468820bc9a0e0ad464f0", - "support" - ], - "css/css-regions/contentEditable/reference/contentEditable-006-ref.html": [ - "74bcd605de69fd612c32d4712590e8ea37f79fc0", - "support" - ], - "css/css-regions/contentEditable/reference/contentEditable-007-ref.html": [ - "cdbef3af385362c786a7cc0b9d917bad951b4790", - "support" - ], - "css/css-regions/contentEditable/reference/contentEditable-008-ref.html": [ - "e2da2a0f2632ee1d32745c7514be6ea8beec631a", - "support" - ], - "css/css-regions/contentEditable/reference/contentEditable-010-ref.html": [ - "4e9cbc633f28c4ed6b48ff1b79f6f52b5345781c", - "support" - ], - "css/css-regions/contentEditable/reference/contentEditable-011-ref.html": [ - "248323cd5db251d6e5cacaa4f3f1a328ac482a45", - "support" - ], - "css/css-regions/contentEditable/support/common.css": [ - "30c65805873317b5bf559abf345d33e89dc68c50", - "support" - ], - "css/css-regions/contentEditable/support/helpers.js": [ - "cd3b2e7065e8deb2274b093020dfe705465502a8", - "support" - ], - "css/css-regions/counters/extract-list-items-001.html": [ - "c790a4e0167b877457ad61e7791956092e2c7177", - "reftest" - ], - "css/css-regions/counters/extract-list-items-002.html": [ - "eea50b64101ebf3e5c4dac4b64d01217be431242", - "reftest" - ], - "css/css-regions/counters/extract-list-items-003.html": [ - "aa6a68009fe1e5347d9ce045af1959d7dc220941", - "reftest" - ], - "css/css-regions/counters/extract-list-items-004.html": [ - "b019900d33307483c276a6c78fcd0d177c808d31", - "reftest" - ], - "css/css-regions/counters/extract-list-items-005.html": [ - "bc30be0fb9981cd36a49a37ee6b09b8bc3c98094", - "reftest" - ], - "css/css-regions/counters/extract-list-items-006.html": [ - "cb4c6780d7a31e6aad29d20d99e0bcce4f15a228", - "reftest" - ], - "css/css-regions/counters/extract-list-items-007.html": [ - "b852751f75c2b48716d15141b8043155699f4323", - "reftest" - ], - "css/css-regions/counters/extract-list-items-008.html": [ - "807b3d155d5afcf21968b15f08d349c31cca00ae", - "reftest" - ], - "css/css-regions/counters/extract-list-items-009.html": [ - "27d77d468fd34a2501e1a4c890c45ce0e72cfd9d", - "reftest" - ], - "css/css-regions/counters/extract-list-items-010.html": [ - "d5384442f72ef63b966a2152c0cb24e804eed78e", - "reftest" - ], - "css/css-regions/counters/extract-list-items-011.html": [ - "bd09072e2d803588f47f3fe0c7eb6f84491797d6", - "reftest" - ], - "css/css-regions/counters/extract-list-items-012.html": [ - "fb6fbe81820d11f0fdf52b6ae9614fedefedbf53", - "reftest" - ], - "css/css-regions/counters/extract-list-items-013.html": [ - "c74f987339b52d762cda1b95302f2a32392902d9", - "reftest" - ], - "css/css-regions/counters/extract-list-items-014.html": [ - "89d0503095d514540c3d16fd24810ab9b7a49f6b", - "reftest" - ], - "css/css-regions/counters/extract-list-items-015.html": [ - "95e6ba09e85a4fcf8adcb640aded3f3fea8d116c", - "reftest" - ], - "css/css-regions/counters/extract-numbered-paragraphs-divs-001.html": [ - "b56046041390a34731b297324c6eb963d6a223a2", - "reftest" - ], - "css/css-regions/counters/extract-numbered-paragraphs-divs-002.html": [ - "a9b6f290abb2ee58b1a3e1f82a525de21475e007", - "reftest" - ], - "css/css-regions/counters/extract-numbered-paragraphs.html": [ - "af4648afccec1b8143f57a3499cdcb5cef883749", - "reftest" - ], - "css/css-regions/counters/extract-numbered-spans-display-only-some.html": [ - "2630311b5661b8539734b53626015ebbaafbfdc8", - "reftest" - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-001.html": [ - "e426ba76652fc613515bb70d6dede4345fb4e659", - "reftest" - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-002.html": [ - "799867d6d81475c9b194dc2540ccfa2f2c5df468", - "reftest" - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-003.html": [ - "3d499ad1972cfe384aa4c5b23ca30249b39ae361", - "reftest" - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-001.html": [ - "56f8a2f1d08213706ca37e7aad43a9df7db431a8", - "reftest" - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-002.html": [ - "86a69047587c396bd6e2b54bcb991a083ca53722", - "reftest" - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-003.html": [ - "11d2dc000f468be6b636b61bc08f3ca65f779d44", - "reftest" - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-004.html": [ - "fc975df57a891953b892b3d7f8ad3c475450dbdd", - "reftest" - ], - "css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-005.html": [ - "c7044a7082c2f0cb6d6aedc59ab4c523709e577f", - "reftest" - ], - "css/css-regions/counters/extract-unordered-lists-in-regions.html": [ - "3079af2d7afdd420f55a17d70f030c404d28f9a3", - "reftest" - ], - "css/css-regions/counters/reference/extract-list-items-001-ref.html": [ - "8534f5f3af24f7855d8b9458983e435343be2a48", - "support" - ], - "css/css-regions/counters/reference/extract-list-items-002-ref.html": [ - "4cbe060c462f2a9ea98d2ce7aa5ea755ffe88dca", - "support" - ], - "css/css-regions/counters/reference/extract-list-items-003-ref.html": [ - "8c9e3ab84a7f3976d8728c343b2d864324f7bfc2", - "support" - ], - "css/css-regions/counters/reference/extract-list-items-004-ref.html": [ - "f466c094cd085dcd59e050dd13d50183e0f46c59", - "support" - ], - "css/css-regions/counters/reference/extract-list-items-005-ref.html": [ - "f77e52c611c032ef6586cae69b7d76682909a8a5", - "support" - ], - "css/css-regions/counters/reference/extract-list-items-006-ref.html": [ - "a5fbc7bb0b0ef23d434a8a0dfdb3a7e54a80ed5c", - "support" - ], - "css/css-regions/counters/reference/extract-list-items-007-ref.html": [ - "f7021b54dfa632cb4b6963429468612195561aa7", - "support" - ], - "css/css-regions/counters/reference/extract-list-items-008-ref.html": [ - "1fe6736777ecc5c12d8ba445173589fc8c8a8874", - "support" - ], - "css/css-regions/counters/reference/extract-list-items-009-ref.html": [ - "03553ac89e7f56af74fd1f32977e7a4b04d28164", - "support" - ], - "css/css-regions/counters/reference/extract-list-items-012-ref.html": [ - "d8185a1a81a2244b2af48ba965eafbe626332d3f", - "support" - ], - "css/css-regions/counters/reference/extract-list-items-013-ref.html": [ - "e370e38ffcdf004f709ed85f3742fbce12c8fb97", - "support" - ], - "css/css-regions/counters/reference/extract-list-items-014-ref.html": [ - "2d232a9fd32cf3f661ab458e17b221edb0d39bd5", - "support" - ], - "css/css-regions/counters/reference/extract-list-items-015-ref.html": [ - "cc0a5ed66f2b5bc38294960f61b8e963d13167a3", - "support" - ], - "css/css-regions/counters/reference/extract-numbered-paragraphs-divs-001-ref.html": [ - "95080570eb605a13b0768d176b22be73158540b2", - "support" - ], - "css/css-regions/counters/reference/extract-numbered-paragraphs-divs-002-ref.html": [ - "0900b28ab06bb721f754ec970c009520acf2426b", - "support" - ], - "css/css-regions/counters/reference/extract-numbered-paragraphs-ref.html": [ - "0e43bc4d835315da9f3660437e69d43758832d14", - "support" - ], - "css/css-regions/counters/reference/extract-numbered-spans-display-only-some-ref.html": [ - "cfbc9e0bb38d7853b535172f402d6ecbcbeb4924", - "support" - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-001-ref.html": [ - "9a9268bede7a8e0af6ebc3c0f850669b983da248", - "support" - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-002-ref.html": [ - "f72e368aec8533ce3fd61ebe5ced0916d75c1885", - "support" - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-003-ref.html": [ - "29396b40160a42f58f787802f471d94c78a0bd0a", - "support" - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-001-ref.html": [ - "6fceac57c8cd9e3399b633ef4abbf2c3f2b74161", - "support" - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-002-ref.html": [ - "59ffd424fc7874c592d836b47edfc2942f5bc428", - "support" - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-003-ref.html": [ - "4ebc8d2a4c5657afd1032091dee3f6842bc9882c", - "support" - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-004-ref.html": [ - "db766225565a5db2a5f2b5136f08072f4050678c", - "support" - ], - "css/css-regions/counters/reference/extract-ordered-lists-in-regions-explicit-counters-005-ref.html": [ - "fdca5850e77dfd1d5d288d9c88c87c18291fae74", - "support" - ], - "css/css-regions/counters/reference/extract-unordered-lists-in-regions-ref.html": [ - "b1b1fb534b68a6fd7a50ca8a0ecd8134850b4a64", - "support" - ], - "css/css-regions/cssomview-apis-no-region-chain-001.html": [ - "841862899fbaff1c65ff7e61fb86dc971b3d5c35", - "testharness" - ], - "css/css-regions/elements/canvas3d-001.html": [ - "eff860c84414dd74c8df3cb6034c4686a9885208", - "reftest" - ], - "css/css-regions/elements/canvas3d-002.html": [ - "04c01be65dda612e48ac7da0b73cb26506ea635f", - "reftest" - ], - "css/css-regions/elements/iframe-001.html": [ - "66c50f57bf369a15a1298db51c6803984f820906", - "reftest" - ], - "css/css-regions/elements/reference/canvas3d-001-ref.html": [ - "d17694470f2fc8202116394cbba6afd186d3dc61", - "support" - ], - "css/css-regions/elements/reference/canvas3d-002-ref.html": [ - "3c743a3b2c01f7f3d696c135d5668e40106d663c", - "support" - ], - "css/css-regions/elements/reference/iframe-001-ref.html": [ - "17d5b5a1f32e61652ea248cc1fc2e36feb5dafcf", - "support" - ], - "css/css-regions/elements/support/3d-filler.html": [ - "1ff6323f7eba6916a8bde25a8ef835e3461d3299", - "support" - ], - "css/css-regions/elements/support/Three.js": [ - "6074714847437e237bb76639b5f8da874b10c3ee", - "support" - ], - "css/css-regions/elements/support/green-at-15.mp4": [ - "a9d2b979d412dbd223df0768fac8d751a2c51808", - "support" - ], - "css/css-regions/elements/support/green-at-15.ogv": [ - "50d59dfb38b065d9250b7c0e43e0cba7eac82904", - "support" - ], - "css/css-regions/elements/support/static-cube.js": [ - "10b045301c457c198f12f28082cb3b75ba021af3", - "support" - ], - "css/css-regions/elements/video-001.html": [ - "4f092bc63d70c08d1d8fcb3e9a62ea7a26d1c605", - "visual" - ], - "css/css-regions/flexbox/autoheight-flexbox-001.html": [ - "6bf9668fd2c015af927ccb4a6ba663bc7ea34f2d", - "reftest" - ], - "css/css-regions/flexbox/autoheight-flexbox-002.html": [ - "5c430d5b26c6274b241c4ed3fe21fff3c6f228d6", - "reftest" - ], - "css/css-regions/flexbox/autoheight-flexbox-003.html": [ - "291d92dfba96b550c0f62cc479c9eacbc0a626e8", - "reftest" - ], - "css/css-regions/flexbox/autoheight-flexbox-004.html": [ - "11549d176f5499c552f2d728a9703e4c80b2bd90", - "reftest" - ], - "css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-001.html": [ - "9431fa52cebcf45111ba051c7f4e4fb64e778f1f", - "reftest" - ], - "css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-002.html": [ - "768567dfb3b0d418d325937b368c43b271aca122", - "reftest" - ], - "css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-003.html": [ - "8a4a4a9966ad1f42ce590aa728b82015f4f9873e", - "reftest" - ], - "css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-004.html": [ - "c636bd9e9eb43ca227554a5c1b9ae201f21bb87d", - "reftest" - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-001.html": [ - "6a5287d9296e5869e31ef4a4daa17119ca5abb62", - "reftest" - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-002.html": [ - "3cfd9bb5dd1c9f72f0cb01c76f8f962fb5780607", - "reftest" - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-003.html": [ - "d6062aa21e6cd8b34ee6ae94e3fac86c330edbd5", - "reftest" - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-004.html": [ - "2317391169fe777482434261e0ddfea348875805", - "reftest" - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-005.html": [ - "9c54fbed41f9956ea0146d0d200d59a3091b0814", - "reftest" - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-006.html": [ - "cc863d657e308ab0a30ce504dcbc4905dec5cdbd", - "reftest" - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-007.html": [ - "185ab3ddb03186bcb55cced56d0f1454fc32381b", - "reftest" - ], - "css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-008.html": [ - "d8f59720c9e36b1ef9257b9d4e60948bfed0f728", - "reftest" - ], - "css/css-regions/flexbox/column-flexbox-break.html": [ - "c1ae090169390fc78f1acb330419bdf5cfd3d856", - "reftest" - ], - "css/css-regions/flexbox/reference/autoheight-flexbox-001-ref.html": [ - "eec91745a23f73d40ce96f8d1f248b9ff9fff6b4", - "support" - ], - "css/css-regions/flexbox/reference/autoheight-flexbox-002-ref.html": [ - "67eaeb881a4c801913ac291ab15b1034ba804685", - "support" - ], - "css/css-regions/flexbox/reference/autoheight-flexbox-003-ref.html": [ - "5b1455c3f806ec72e1c51c62261f83f6fec3dc73", - "support" - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-001-ref.html": [ - "6fca3fe2008d58079c8593273a5c528f7a568c3f", - "support" - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-002-ref.html": [ - "399b70455c472cc4c8f0c958920ced50ac666748", - "support" - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-003-ref.html": [ - "d0df028dc61f29410b11c8653d38e048226532b0", - "support" - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-004-ref.html": [ - "97feebd2060ba49922af17277f31269570f38699", - "support" - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-001-ref.html": [ - "7f270fbf7bce90d598d45e1c727cfbd8ea111485", - "support" - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-002-ref.html": [ - "d623729da7369062da56eb6830bd4696c2d4011e", - "support" - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-003-ref.html": [ - "6d64025eb82dd033d492c0840c34a53eeee1cd24", - "support" - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-004-ref.html": [ - "0687bd345658f4b243bba027038d00519c3ff3d1", - "support" - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-005-ref.html": [ - "318f7ad70bd1305921e035fe9ebb0578ce269b76", - "support" - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-006-ref.html": [ - "2966e51de9eae83b3a9c1dcc70dbc7656843606d", - "support" - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-007-ref.html": [ - "2e8c850db372f29291b847ded605173a90c2aa83", - "support" - ], - "css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-008-ref.html": [ - "6b83e0fb3f84123a5ad6188cc02cf0ff5a2454f2", - "support" - ], - "css/css-regions/flexbox/reference/column-flexbox-break-ref.html": [ - "563217f2a76871eda73b64023704171d5294009c", - "support" - ], - "css/css-regions/flexbox/reference/regions-flexbox-001-ref.html": [ - "a0337adbe55d2aecff5f2cf3f6c518dfdb2a06e4", - "support" - ], - "css/css-regions/flexbox/reference/regions-flexbox-002-ref.html": [ - "5dd4b7513bc28a76412fc3187818d396d2e98230", - "support" - ], - "css/css-regions/flexbox/reference/row-flexbox-break-ref.html": [ - "ad6650d30634da01da98e5903d922e06faabe39d", - "support" - ], - "css/css-regions/flexbox/reference/visibility-regions-in-flexbox-ref.html": [ - "1e46f07680f306b122bf0d0ea96bb4065079cae2", - "support" - ], - "css/css-regions/flexbox/regions-flexbox-001.html": [ - "0f56db981c0a44e04cd7fa4a6c16c1aba2f35bda", - "reftest" - ], - "css/css-regions/flexbox/regions-flexbox-002.html": [ - "7e0635d766796b41a0cc68e50056d11e577ad459", - "reftest" - ], - "css/css-regions/flexbox/regions-flexbox-003.html": [ - "314ea5943469fc8b8304f400bfbdad5bf3cd81b6", - "reftest" - ], - "css/css-regions/flexbox/regions-flexbox-004.html": [ - "ae80bbc8accad233d4efcd5baee81ca9bfe02f14", - "reftest" - ], - "css/css-regions/flexbox/row-flexbox-break.html": [ - "402242284c328d0ec349824bdbe635b3af47d2a5", - "reftest" - ], - "css/css-regions/flexbox/visibility-regions-in-flexbox.html": [ - "230af22d1c3956993023c8ae3aff50c9f2d4a53a", - "reftest" - ], - "css/css-regions/floats/floated-regions-001.html": [ - "f0cc63139cc033da233f5aeec7a5e9c916ad7655", - "reftest" - ], - "css/css-regions/floats/floated-regions-002.html": [ - "b7a2f796dc0a94b5e5bae160c15f789993576a72", - "reftest" - ], - "css/css-regions/floats/floated-regions-003.html": [ - "5e7f16ff469b9e278f0349e0ccafa7545752054e", - "reftest" - ], - "css/css-regions/floats/floated-regions-004.html": [ - "c62000f014b13010cdebf1a9000862a5a06b2d74", - "reftest" - ], - "css/css-regions/floats/floated-regions-005.html": [ - "7257ffbbc9786895f8833bcee2d86eeb3135b847", - "reftest" - ], - "css/css-regions/floats/floats-clear-breaks-001.html": [ - "4e03aa46a3851e1bdd0a11b804706f4c065214f0", - "reftest" - ], - "css/css-regions/floats/floats-clear-breaks-002.html": [ - "1a8a97334d4776ef237e369f80849dad5b855499", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-001.html": [ - "0e59a21fc72936ea80e7b24ba8462ff0b5943da4", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-002.html": [ - "03081e52bde0ea36fbb79a1b245b81d0c317a3d6", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-003.html": [ - "6f95a8c402bf9fec23afba5129d64878f941a87e", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-004.html": [ - "afa1b769537a915e12c5ffc9e1cff1711a853103", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-005.html": [ - "bdb6266cacc3384475a3c5d2fb913aee2f8de385", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-006.html": [ - "6f0cf067bc0edc57eac1b90e5bb40bf3867cbc3b", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-007.html": [ - "4fb9bcb713bda31cc68719964625c189721a4c51", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-008.html": [ - "8de84c11c01af548dd31aa30eee569ff8377bbf8", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-009.html": [ - "8ae60c334b756a05f989e4264a4cd2b07d9ea320", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-010.html": [ - "068e7b85d1826ae89cae2c93a949c79d82e453dd", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-011.html": [ - "5a70d452a09ddd496377dbf613bb66045ae2512c", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-012.html": [ - "1a7e610bc7d455d2dda969c68fb1a0babb5cf2a8", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-013.html": [ - "0ed9d360455d3117f63e549087304e4aa8c02242", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-014.html": [ - "56387e6db8e263daa5266695bfeee851cc1dc51d", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-015.html": [ - "d94dc521cf8d5f68df76e7392517fe0393ab1a98", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-016.html": [ - "511836617ab98e72f1695a4368f57bd74e8f0af6", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-017.html": [ - "62ec78d496e7fba48f26dcc50cabc7f738376b22", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-018.html": [ - "f9990d3303ffab02a229c5b98f73c88241a0682f", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-019.html": [ - "f5bcdbab2f16c148a8839c3eb9774b3f68ead525", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-020.html": [ - "f83b9bb96ffeb8429b17ec4c6ddd22ed298f6311", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-021.html": [ - "e7a19b40de6e2e8c597c8e3cbbbdeee4295c0346", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-022.html": [ - "4a3566668705c42907551d9a5778ace6f6eb246e", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-023.html": [ - "19386d87444b538bbd9f43397837c2858a836878", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-024.html": [ - "fd472b55d9acb4a48d66256696bdeb3cf1633f86", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-025.html": [ - "c5ed63f52481a1a1fd71cfb589a2b764fecff3cf", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-026.html": [ - "f0daf87d445693976fa51073f1bc45bb8ca5a799", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-027.html": [ - "e87cdafb021a45b47010060cdabc47152993477c", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-028.html": [ - "1d2bbb10388cb7dccf8e73e5795d9d6a14e95d2d", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-029.html": [ - "5ed45e5d2e6e08561f0f61a837aa18452cb59524", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-030.html": [ - "3527149b668762c852f08c1bfa4f953095c47f40", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-031.html": [ - "819185d311b385289facdae2dd0861904b47fab8", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-032.html": [ - "d2263281ba5dff45bb74bcecb803bda294754be9", - "reftest" - ], - "css/css-regions/floats/floats-in-named-flow-033.html": [ - "4374e7145cd957a96f5db545f54fd6286cebff6e", - "reftest" - ], - "css/css-regions/floats/reference/floated-regions-001-ref.html": [ - "31cd9ad49d719f1830d7cefc1edcf55a9f142b6f", - "support" - ], - "css/css-regions/floats/reference/floated-regions-002-ref.html": [ - "25a261179d9ef6129c88f929ab88e5a778711153", - "support" - ], - "css/css-regions/floats/reference/floated-regions-003-ref.html": [ - "45dfa2c7fd8b37e59cc37edf088de4c642a0797e", - "support" - ], - "css/css-regions/floats/reference/floated-regions-004-ref.html": [ - "3dbe4d5654f446b826d8986304ea30a7d7bb5429", - "support" - ], - "css/css-regions/floats/reference/floated-regions-005-ref.html": [ - "84e636ba12fdd8dba0048f350bb6a232323f3232", - "support" - ], - "css/css-regions/floats/reference/floats-clear-breaks-001-ref.html": [ - "8c9cf1982cf180b16e08540f1ce3c8a256629201", - "support" - ], - "css/css-regions/floats/reference/floats-clear-breaks-002-ref.html": [ - "eb4dd9442f1c5b745ad71232a04d3ecbcdab6eb3", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-001-ref.html": [ - "454de85b43d4a2f10c125783fce30e38a66c35de", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-002-ref.html": [ - "3b668e88e0903a0ac341807894a76688a96d1ffd", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-003-ref.html": [ - "0a517ab65bb024637dbb8d0e617bce027d108438", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-004-ref.html": [ - "da9c45425e1c0a830c19168d3183151776ee658c", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-005-ref.html": [ - "16e97261c86adc2cfbacc496c056572ca789da54", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-006-ref.html": [ - "aeba68a527c27aca9f8a13846337ccd1bb02f4c4", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-009-ref.html": [ - "b1d011b364a05987aa4b96ea5451996b16869a4e", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-011-ref.html": [ - "5044c77fa23db9e4769500eeff5e2774d88caf0c", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-012-ref.html": [ - "ec4eeff7d91ec91191e0276ded913e250dbcd430", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-013-ref.html": [ - "e974e3feaf2a0864ad793536532befe470ebc1ff", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-016-ref.html": [ - "c91451cc7bc619e48d384d8969ad5a83bf517fe0", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-017-ref.html": [ - "2998a3af57c8096ca288b98fc4deabebed37ae2a", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-018-ref.html": [ - "2961fdd0e2817b351c81277bc3077ca7e2eff0be", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-020-ref.html": [ - "a85e0e00ec130dc6b7f7047bedd7051f32e32dca", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-021-ref.html": [ - "37e5b42c94e23ae1c3ac4b87613a4474f1ef1f6f", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-023-ref.html": [ - "14699180ef0dbb540164243f22c07449d32e40ae", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-024-ref.html": [ - "865fdbef7609ce7b291937660b239caf5895c971", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-025-ref.html": [ - "285a96836f05c5171dc26fc45a992623b21fb7de", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-026-ref.html": [ - "efc23cc638197caaf91ce03321660ff9c7b43d65", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-027-ref.html": [ - "ff55dc55ea126aa1b990b95b5ae10205440cdb3a", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-029-ref.html": [ - "adffd0f2d4a51f9c3fd393930885eb2b92b5fcd1", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-030-ref.html": [ - "424d73aee03c2dd165a355ec272816ebeb730669", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-031-ref.html": [ - "f5135cf6f796feda759109e44d8a93f0c017b843", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-032-ref.html": [ - "cd997eeaa1630affc489faa3303f71d667bbed38", - "support" - ], - "css/css-regions/floats/reference/floats-in-named-flow-033-ref.html": [ - "892fc993b58d2b718f120f0647e5fb22f20e7733", - "support" - ], - "css/css-regions/flow-content-001-ref.xht": [ - "2a6f3282d93d0a9084a0627009207bdd4a24fc6c", - "support" - ], - "css/css-regions/flow-content-001.xht": [ - "83b8785a79dbb70e76cbaf4396e505049f85008b", - "reftest" - ], - "css/css-regions/flow-content-002-ref.xht": [ - "262d8ed66ea8e78c6b77eb0f9b39c4b7c7ee173f", - "support" - ], - "css/css-regions/flow-content-002.xht": [ - "efa39f5500561e6255c84dfaf2e49d73b081e1c6", - "reftest" - ], - "css/css-regions/flow-from-001-ref.xht": [ - "bf4eb591dcc9ae8cece92a18cc0f1878c546a359", - "support" - ], - "css/css-regions/flow-from-001.xht": [ - "65a38c9d71c89030c189db6df99e4268e45a25d1", - "reftest" - ], - "css/css-regions/flow-from-block-container-001-ref.xht": [ - "cfccb15c7862c7ff691b6e9570f1f2f06da14caa", - "support" - ], - "css/css-regions/flow-from-block-container-001.xht": [ - "491a977c500fe32435239764693e01429280cbf1", - "reftest" - ], - "css/css-regions/flow-into-001-ref.xht": [ - "8b1078464cf32b2e2b40806dbe66de582a3a3772", - "support" - ], - "css/css-regions/flow-into-001.xht": [ - "858928e9dd99b8f1553ca6b6d16d85fbabf9b812", - "reftest" - ], - "css/css-regions/flow-into-BFC-001-ref.xht": [ - "66773da47cb4f2b45263ca21c96abb87fb7b62bf", - "support" - ], - "css/css-regions/flow-into-BFC-001.xht": [ - "b8fc34b7d382612fb3880716d2d5b1bf9153785f", - "reftest" - ], - "css/css-regions/flow-into-invalid-names-001-ref.xht": [ - "faddfcdf5e2fb0a57051edf0698e6ca358834ce7", - "support" - ], - "css/css-regions/flow-into-invalid-names-001.xht": [ - "21241516bd35c882364f4fe5ff6bc3e30df522d4", - "reftest" - ], - "css/css-regions/flow-into-parsing-001.html": [ - "1827dc52cb93b4d2de1228f055c95ed14bc7259f", - "testharness" - ], - "css/css-regions/flow-into-region-children-001-ref.xht": [ - "468b5a88c02f450c484d609176731411d49e0a32", - "support" - ], - "css/css-regions/flow-into-region-children-001.xht": [ - "1d5966cc4474b2a64dbebca50ee04165acac0ee6", - "reftest" - ], - "css/css-regions/idlharness.html": [ - "3d6f55c8073a2387745b9093eb0d5b9f3f96dc22", - "testharness" - ], - "css/css-regions/inheritance.html": [ - "865a1b6b1c13e15ad12fd4cd378b0f32b486354b", - "testharness" - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-001.html": [ - "ecd99200f43e05b126192a711939e69fe78fbec5", - "manual" - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-002.html": [ - "865792d176b1c5adc12a10ac6db3aba7db62c949", - "manual" - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-003.html": [ - "2430052bd19b0ecd8eaf6575e5d3255bc117b4c1", - "manual" - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-004.html": [ - "7e18319a1b417854608f255db1d9e4f8bd48852b", - "manual" - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-005.html": [ - "ccaefdfa8ad324bb75f29d2b7008d7dcc9da5d6c", - "manual" - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-006.html": [ - "eb824172f74aa56bec2e5b7a235da200fae559e3", - "manual" - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-007.html": [ - "4b6f3310565f5c9ca2d75a32c075616d2a76e9af", - "manual" - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-008.html": [ - "ef97e32bf9d67a48cff9a0ae8bd714afb46c12c2", - "manual" - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-009.html": [ - "08c586c6d5247ac881f3fdf84c22ff41feb0c6d1", - "manual" - ], - "css/css-regions/interactivity/full-screen/fullscreen-region-content-010.html": [ - "d2f4b13b058e7a7f69aab7596e28c124019e47e8", - "manual" - ], - "css/css-regions/interactivity/full-screen/support/cat.jpg": [ - "a4f14f54d60e592f3ca8b44360931898602ba6fe", - "support" - ], - "css/css-regions/interactivity/full-screen/support/common.css": [ - "f15133dcbc6fe517d78744c23172ab1635ad3ae1", - "support" - ], - "css/css-regions/interactivity/full-screen/support/green-at-15.mp4": [ - "a9d2b979d412dbd223df0768fac8d751a2c51808", - "support" - ], - "css/css-regions/interactivity/full-screen/support/green-at-15.ogv": [ - "50d59dfb38b065d9250b7c0e43e0cba7eac82904", - "support" - ], - "css/css-regions/interactivity/full-screen/support/util.js": [ - "9d62d223d15fe933c6acf9060037d78687e030c1", - "support" - ], - "css/css-regions/interactivity/hit-testing/css-cursor-001.html": [ - "9ef2efb9e47e8031b79e09484aee866b0b9dfab6", - "manual" - ], - "css/css-regions/interactivity/hit-testing/css-cursor-002.html": [ - "29248365a54972f26409bfc769c887a420af7285", - "manual" - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-content-001.html": [ - "0774957c4c8c0c98e7fe5fe475015b76a82c19ae", - "manual" - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-content-002.html": [ - "0d0c849bf177f74fa983d18cbcaae1da324eb067", - "manual" - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-content-003.html": [ - "dc85598769975393a0e5dd11c3c50a074b5f0aaa", - "manual" - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-content-004.html": [ - "76d73eb40ab853b4aaada9c51a2183f11c5cc891", - "manual" - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-content-005.html": [ - "f13cd0fbaed730192141d6434ef4fb575c4c2fa4", - "manual" - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-region-001.html": [ - "d28c79b052638de11905a948955e7b7383df4cd0", - "manual" - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-region-002.html": [ - "347319195e0b6aa47110f5161f53063aa6d579c0", - "manual" - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-region-003.html": [ - "103800a73dd958b342b2357bf6f6db4f99f24320", - "manual" - ], - "css/css-regions/interactivity/hit-testing/css-hover-on-region-004.html": [ - "4dc41bf7c5f492d2ed1f3672331fc88215d0ad01", - "manual" - ], - "css/css-regions/interactivity/hit-testing/elementFromPoint-001.html": [ - "a59fc54aa30f50409688167b767d5fd38eab824f", - "manual" - ], - "css/css-regions/interactivity/hit-testing/elementFromPoint-002.html": [ - "e36d0ac275b1a1928c21917fd3b48cc9b57bb727", - "manual" - ], - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-001.html": [ - "b23cb0e78c34b51c370495eb0f5fceaceb0e5a1e", - "manual" - ], - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-002.html": [ - "852af75109ef1a610fe5e5f9f20195c74e706a89", - "manual" - ], - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-003.html": [ - "d43b4e257cd72217b0f0d040b5d0d5ef15482ca9", - "manual" - ], - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-004.html": [ - "dc1d8ee008a0851bac9b8c60240a2d57d5862cab", - "manual" - ], - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-005.html": [ - "b421fa91a742dd50d1a9c9497a243ec1011a3ff7", - "manual" - ], - "css/css-regions/interactivity/hit-testing/flow-change-on-hover-006.html": [ - "26e82a33edc9f5f33177d497eeeb506acf0c751a", - "manual" - ], - "css/css-regions/interactivity/hit-testing/mouse-events-001.html": [ - "b461082768c03632e2d7b16af89919c5b3b023a9", - "manual" - ], - "css/css-regions/interactivity/hit-testing/mouse-events-002.html": [ - "4f6fd4d8e77b2937d2308aca1b405faa8efcfba7", - "manual" - ], - "css/css-regions/interactivity/hit-testing/mouse-events-003.html": [ - "ea0d5433a33bb8d60f316a149b7e77f5aefa5212", - "manual" - ], - "css/css-regions/interactivity/hit-testing/mouse-events-004.html": [ - "790c1432560c2afb57a34a98a143f93537083ffc", - "manual" - ], - "css/css-regions/interactivity/hit-testing/mouse-events-005.html": [ - "09557a08eccdd96c89a07b6d134d9924fab95bc0", - "manual" - ], - "css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-001.html": [ - "af039fefd0560a5fbeeee0808e99ed3ec6cc47f3", - "manual" - ], - "css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-002.html": [ - "9f7b88f6dcf43690a27679d7eab01708ae1cb8cd", - "manual" - ], - "css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-003.html": [ - "3562c8443e602d855c3d19ebf4a655e1a49e1136", - "manual" - ], - "css/css-regions/interactivity/hit-testing/overflow-and-events-001.html": [ - "513dc5d05a1af3c60bd0bc298b002c13209badbe", - "manual" - ], - "css/css-regions/interactivity/hit-testing/overflow-and-events-002.html": [ - "f769d3c5c1a406151590fa2459690e2603925afd", - "manual" - ], - "css/css-regions/interactivity/hit-testing/overflow-and-events-003.html": [ - "16425ef49bcadde4b9db3a1c715c24a94d063f9d", - "manual" - ], - "css/css-regions/interactivity/hit-testing/overflow-and-selection-001.html": [ - "be6d3ce960f91826121da4964375d31f112db0f0", - "manual" - ], - "css/css-regions/interactivity/hit-testing/overflow-and-selection-002.html": [ - "6a11f8b0ca6a68688689637d4b90762fe4fb6e23", - "manual" - ], - "css/css-regions/interactivity/hit-testing/overflow-and-selection-003.html": [ - "b512b311af1cfcf7b51d45345a28eb253ff8c92f", - "manual" - ], - "css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-001.html": [ - "a5ddbb4cf80defe7481ba2c6df522b896202265d", - "manual" - ], - "css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-002.html": [ - "da102188567f2c81bec9d80b2ed123ad756c7fa7", - "manual" - ], - "css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-003.html": [ - "e3a980aa1a290cecc70dad1f10c327cbd3ff6a3e", - "manual" - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-001.html": [ - "46199c4b2d6d39669dc388c7af9bb47715d823f7", - "manual" - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-002.html": [ - "d5c804015ec274b5006c130d90813e1862152888", - "manual" - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-003.html": [ - "f268cf114222ba2b760a4c8f2c29359565c6c610", - "manual" - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-004.html": [ - "8a43f30e9b88214dab7a24b95aed4530ac165921", - "manual" - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-005.html": [ - "645979cdec09e075473eb4972ae7ce31df7a62cd", - "manual" - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-006.html": [ - "bf6dadd9a7ad89add33da278493548368cd18cbc", - "manual" - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-007.html": [ - "dfeb2316129ab646b6d36d9452bdca9ac40a47bb", - "manual" - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-008.html": [ - "ba4c800553f669071f2ee86f5e0dc1fb5b8aefe4", - "manual" - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-009.html": [ - "4f1ac1cd37afe1fd335a9c9f41f9b16ae36a19e2", - "manual" - ], - "css/css-regions/interactivity/keyboard/regions-keyboard-events-010.html": [ - "d4a6a8a1221643721a301fc06bfecb83c7b9e273", - "manual" - ], - "css/css-regions/interactivity/keyboard/support/css/regions-keyboard.css": [ - "bdcc5b92fcf7779994b5829610f3c4b4208bcdf6", - "support" - ], - "css/css-regions/interactivity/keyboard/support/js/regions-keyboard-events-test-helper.js": [ - "0fc5d664cefebf3dad987741141faa566d246417", - "support" - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-001.html": [ - "30c2e35bd4e182564bab3351f3d521f229ebe922", - "manual" - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-002.html": [ - "81fee6722f163bc7977e13c443dda5d5fa2e267a", - "manual" - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-003.html": [ - "fc206aa0259a3b49165c63d638b8c680e2e9b2e4", - "manual" - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-004.html": [ - "cd57f96fc12b388141e462829005cb72688ca8f6", - "manual" - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-005.html": [ - "1e728935e593faf95ed6f0347f30d89d309825cb", - "manual" - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-006.html": [ - "de5751bdd4341a1dda2a6b2b2d235cbe34ca44ab", - "manual" - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-007.html": [ - "95547892b051eb0eebd2fedd8b4837fc83cc33d9", - "manual" - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-008.html": [ - "a374cae7293f2a33efd88d92e3c633edfa7e1c59", - "manual" - ], - "css/css-regions/interactivity/mouse/regions-mouse-events-009.html": [ - "5b224addddf4fe91090d1376ff75df31036d1fbd", - "manual" - ], - "css/css-regions/interactivity/mouse/support/css/regions-mouse-events.css": [ - "8d5cbce46c2125e3ef035d132310100b7a77fefd", - "support" - ], - "css/css-regions/interactivity/mouse/support/js/regions-mouse-events-test-helper.js": [ - "efbffb7f4ac63a7483bb56658f04c76c7b27d294", - "support" - ], - "css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html": [ - "2ec81b0d81f04ed622185543988787aa6603ccb2", - "support" - ], - "css/css-regions/interactivity/resizing/reference/regions-resizing-005-ref.html": [ - "afc4cd74ca649d746a6441065d3e30d39429ee54", - "support" - ], - "css/css-regions/interactivity/resizing/reference/regions-resizing-011-ref.html": [ - "5399cdc8bbde6c41576d7c2ce008e41f3d6ecc33", - "support" - ], - "css/css-regions/interactivity/resizing/regions-resizing-001.html": [ - "04ef0e0a945846a2c2a069abbdcf478c592a2f7e", - "reftest" - ], - "css/css-regions/interactivity/resizing/regions-resizing-002.html": [ - "caec60defb3e8d3e72209100daaaac9886cac09a", - "reftest" - ], - "css/css-regions/interactivity/resizing/regions-resizing-003.html": [ - "d9e3225e51465735cffa55c6cd7513a64b7d0ab2", - "reftest" - ], - "css/css-regions/interactivity/resizing/regions-resizing-004.html": [ - "67437c64d7592f178fd230f55821895b75619348", - "reftest" - ], - "css/css-regions/interactivity/resizing/regions-resizing-005.html": [ - "e2653ecf56b959521bdfd2ce6967047f5e4e5ac7", - "reftest" - ], - "css/css-regions/interactivity/resizing/regions-resizing-006.html": [ - "00ae9855047f2a89e778ba2539432e63ebd154e0", - "reftest" - ], - "css/css-regions/interactivity/resizing/regions-resizing-007.html": [ - "ff716cf008b3391d4be980e472b266da23339400", - "reftest" - ], - "css/css-regions/interactivity/resizing/regions-resizing-008.html": [ - "6b79ddaef29bccd37b80f5a0864b3ae59b32f96a", - "reftest" - ], - "css/css-regions/interactivity/resizing/regions-resizing-009.html": [ - "45dc975b5d323206135d4f9e60eeba1449748e5e", - "reftest" - ], - "css/css-regions/interactivity/resizing/regions-resizing-010.html": [ - "95630558aa45cfa61426972fde88d0b42c77be03", - "reftest" - ], - "css/css-regions/interactivity/resizing/regions-resizing-011.html": [ - "e1c146f12480bc27170ec850df91aaeb0461f524", - "reftest" - ], - "css/css-regions/interactivity/resizing/regions-resizing-012.html": [ - "d587cf14d082d28bdc01338c758aa1ba95740bd1", - "reftest" - ], - "css/css-regions/interactivity/resizing/regions-resizing-013.html": [ - "bec40648295a4a02619813ff51cf2de6e835a902", - "reftest" - ], - "css/css-regions/interactivity/resizing/support/2-80px-block-ref.html": [ - "7bbc641de955a45ac66065212f97f95ca71320ef", - "support" - ], - "css/css-regions/interactivity/resizing/support/80px-block-float-ref.html": [ - "2643db0627f2cbb21d2abb90b79d28c86b70bbd2", - "support" - ], - "css/css-regions/interactivity/resizing/support/80px-block-ref.html": [ - "77d3795068f8595a8ac04e25160910f4b204d2b2", - "support" - ], - "css/css-regions/interactivity/resizing/support/region-in-body.html": [ - "9b9c9c68b81a055ed4a6270ce0223e44568cb80b", - "support" - ], - "css/css-regions/interactivity/resizing/support/region-in-container.html": [ - "5e1c1c6ef36a5fc12934a70a207e0ca7ce511c33", - "support" - ], - "css/css-regions/interactivity/resizing/support/two-regions-in-container.html": [ - "2db4c048fc3852c090a47efa0d776e0d7d9b5331", - "support" - ], - "css/css-regions/interactivity/resizing/support/util.js": [ - "b2fa69a97ecbd0a4a9018e3fad583a181081cdb9", - "support" - ], - "css/css-regions/interactivity/selection/regions-selection-001.html": [ - "29bf67ef1b882c8e85bb3b8f8d563795ee562dc4", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-002.html": [ - "dd7d0304136480fceda465fa82b90672213d590b", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-003.html": [ - "b77f3543d36f27b1cc9764d6c8e9e12f9546944b", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-004.html": [ - "7d2cdd2b560b48deacd0d5c94e061c7cf0f70fbf", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-005.html": [ - "8b7091fbf0b8bc9864dd0b2172dfcc1b41ebc4b7", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-006.html": [ - "6eb176bb11d81a93700cc3f3b9b7a3d9b3e2b533", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-007.html": [ - "8173226ba75e7b24a7532ca874b404277ad75bd2", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-008.html": [ - "d5e8b7e80db12d266480fb544763cb9412f8dba0", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-009.html": [ - "9712f6dbf8d3b5370962cfc6a88bba055d60999f", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-010.html": [ - "0b53764b6888cd9c36816033e459ff5acb0e79cb", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-011.html": [ - "7ecdb5480efaac7c84cc87967234157b6b0f957d", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-012.html": [ - "9770a4b8d1b5b1ccd694f343bba3dcb7a673db00", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-013.html": [ - "5594a516451f9644a331107a389f20cb946a9f14", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-014.html": [ - "822b364e8f25692b5fd978ca236d4d48cfdecc4f", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-015.html": [ - "4db2a873c98331c716940c5a55c53783c6073c3a", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-016.html": [ - "967308e633dab2ceb0841748f521830cb01533f4", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-017.html": [ - "9497ce245ddfb473d0abda561215df569eb1f9db", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-018.html": [ - "6cb10b50a3332b9ee4979bcb92b9a1770376cb41", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-019.html": [ - "0c4d7fb982933ec2a428ca830f221f28a6abb4a6", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-020.html": [ - "e74895065769c6deeef9b2d4dd6e8ff6e1daf538", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-021.html": [ - "fd7d4c068a8eda648dc820225c0f956d2a5c00ae", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-022.html": [ - "6053a40d17302c0136642b5ff4790cb63e197e6a", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-023.html": [ - "0afcc1e687ae9742dce3b2d065498b35d5626773", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-024.html": [ - "03b40048fe02a75dcc2637e465d11d1ad226c646", - "manual" - ], - "css/css-regions/interactivity/selection/regions-selection-025.html": [ - "9ed1dd8b312ed0c7d2da84761c562a5d5adb8c12", - "manual" - ], - "css/css-regions/interactivity/selection/support/css/regions-selection.css": [ - "081d200386e72916d25731f8ff25c38e81963c35", - "support" - ], - "css/css-regions/interactivity/selection/support/img/cat.png": [ - "85dd7324815b8f8ef1a1d0496224c1a0661db9d8", - "support" - ], - "css/css-regions/interactivity/selection/support/js/selection-test-helper.js": [ - "0dba0ef5fb3aaa4c6390023c16d1387937e1476a", - "support" - ], - "css/css-regions/multicolumn/reference/regions-multicol-003-ref.html": [ - "f99644ae3025dab03b5f7e33c35269450e14a3fc", - "support" - ], - "css/css-regions/multicolumn/reference/regions-multicol-006-ref.html": [ - "c76c3bbe467d904fb5f71ae75b92646522e046f5", - "support" - ], - "css/css-regions/multicolumn/reference/regions-multicol-008-ref.html": [ - "c7e2d981b31736a86d8eb58c2f5be6e5cf714012", - "support" - ], - "css/css-regions/multicolumn/reference/regions-multicol-009-ref.html": [ - "d157f2848280ef702206457e50fe0d880d109174", - "support" - ], - "css/css-regions/multicolumn/reference/regions-multicol-012-ref.html": [ - "7e17aeb8d4d9b56abc531a4498c22f92d401d926", - "support" - ], - "css/css-regions/multicolumn/reference/regions-multicol-013-ref.html": [ - "54e40694df46fbf01e33cf7251348dbda87237b5", - "support" - ], - "css/css-regions/multicolumn/reference/regions-multicol-016-ref.html": [ - "35b46b530540b855bbe899d2600cfcb3ee681b77", - "support" - ], - "css/css-regions/multicolumn/reference/regions-multicol-017-ref.html": [ - "64ae5b5a307702db16ab681fe470535c6ebd8a02", - "support" - ], - "css/css-regions/multicolumn/reference/regions-multicol-019-ref.html": [ - "bbad3a6ac44bcdc0fdb6ab25f19de03c68690e3d", - "support" - ], - "css/css-regions/multicolumn/reference/regions-multicol-024-ref.html": [ - "584b410311d536621340298d7c3f6db7c0ce100c", - "support" - ], - "css/css-regions/multicolumn/reference/regions-multicol-028-ref.html": [ - "36f296f06e472ec40da31f6a21c379952852eae3", - "support" - ], - "css/css-regions/multicolumn/regions-multicol-003.html": [ - "5952996076c3b406e3cc2018011fc741ead7f30d", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-004.html": [ - "4e00e0ffdeab8608573d5a1f147e18b162a42de6", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-006.html": [ - "94f9e2d58d44ea5d4debc5cf51a4f8b7be7b29b3", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-008.html": [ - "46a341280ddb27ad01a17e64bbc80892725c53bc", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-009.html": [ - "f4c59682874776fb579ee6f6edacbf4696ea5cc5", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-011.html": [ - "222ef24c69f167dc2a6eaa0ff3aa1ad441774180", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-012.html": [ - "1dab35e1a7496cf3e7f7ce37aa4e605e0564b5c8", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-013.html": [ - "2020ec50ef328a8e118456a8688145bfb3b9d575", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-015.html": [ - "41fe6cfa940aca06d3a6e4fe2424d2c728520cfd", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-016.html": [ - "4d2e7814a70331a3165428e3d141ccb5e1cb99e5", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-017.html": [ - "6f7b89998cff7c1b948a6ddb3d52cc3d05b6f547", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-019.html": [ - "8b96fb73aa2e630659d2ec2c36c8135642e2b5df", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-021.html": [ - "486b39dbe9e91651de86f3ff924ff53f7e6ceae8", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-022.html": [ - "d48d3d700fe71e9512cb9a51f0186bd0f049367b", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-023.html": [ - "1f3a6c9d448c9813aa0bcd5274c931cd37fcc44f", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-024.html": [ - "d0c14307e01a1b01a6c55a3de59e5cbfdf6eac66", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-025.html": [ - "806791b31866ee5795fe5bd54bd84cf6625a1694", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-026.html": [ - "c08188f7c10c0ae75c2ee55c977afa7467fc8933", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-027.html": [ - "eea5189c9cf1e871a4b4c78934b9373df68db0d8", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-028.html": [ - "0e10c81c1c8d1cfb24a92536d8f685390c95f7d5", - "reftest" - ], - "css/css-regions/multicolumn/regions-multicol-029.html": [ - "c26ddc200177c68fb8c6a3c042bfb548853985a2", - "reftest" - ], - "css/css-regions/positioned-content/position-relative-001.html": [ - "3daff7885b956ec2976d533d9555d0d4495d2518", - "reftest" - ], - "css/css-regions/positioned-content/reference/position-relative-001-ref.html": [ - "024160c237a849fbbf179c29107d2c2eb5a4797c", - "support" - ], - "css/css-regions/reference/region-fragment-break-1-ref.html": [ - "089a6e1ec1dad069bda97b5f40d3c5cf1be75d46", - "support" - ], - "css/css-regions/region-fragment-001-ref.xht": [ - "f628ebd7af70eee88a936ce2973a65c11b4c12de", - "support" - ], - "css/css-regions/region-fragment-001.xht": [ - "f8f7d17c1f2c1e534c113fd997348ee0ef5add42", - "reftest" - ], - "css/css-regions/region-fragment-002-ref.xht": [ - "a8113fae213a655b6d66601c2c084fe1666c32b1", - "support" - ], - "css/css-regions/region-fragment-002.xht": [ - "b2b3d86d53430782c605bd2a5ed4d51d5bbcaab1", - "reftest" - ], - "css/css-regions/region-fragment-break-1.html": [ - "919f60a5a3042e9e150b8ecb9f23c6fc4242761d", - "reftest" - ], - "css/css-regions/region-stacking-context-001-ref.xht": [ - "718fef5f220c19a8e6d50525b962e1a543f6256b", - "support" - ], - "css/css-regions/region-stacking-context-001.xht": [ - "5d9c1d0cb4367617c43c48303524845fbde06ad6", - "reftest" - ], - "css/css-regions/region-styling-001-ref.xht": [ - "592f600d828d1ee1a6f9fb471a7e56526088bf8f", - "support" - ], - "css/css-regions/region-styling-001.xht": [ - "7fa401a3303d2f52ba54806d00b5a4603da1fe4b", - "reftest" - ], - "css/css-regions/stacking-context/content-node-layers-001.html": [ - "c1e5f19bc368aa55165e59950c23d648fa909df6", - "reftest" - ], - "css/css-regions/stacking-context/content-node-layers-002.html": [ - "cabacb20ba43f162c5ea7a9958dec3f0240ec7ef", - "reftest" - ], - "css/css-regions/stacking-context/content-node-layers-003.html": [ - "a6e3e6afb57945c307e79457231dfb5e3360ae22", - "reftest" - ], - "css/css-regions/stacking-context/content-node-layers-004.html": [ - "26eb37b9596da2abbae7ec965f86ac7ff9deac00", - "reftest" - ], - "css/css-regions/stacking-context/content-node-layers-005.html": [ - "a79197a4749133970ce40ac425cca3f026ebe757", - "reftest" - ], - "css/css-regions/stacking-context/javascript-stacking-context-001.html": [ - "5caff8062a913e032fdcee941f5bb68b342cade5", - "testharness" - ], - "css/css-regions/stacking-context/javascript-stacking-context-002.html": [ - "2b4a076f250fc04e95c462cb904915a88cfa0ce3", - "visual" - ], - "css/css-regions/stacking-context/reference/content-node-layers-001-ref.html": [ - "488665c8e717f5c3eeec876daefebcabb600940e", - "support" - ], - "css/css-regions/stacking-context/reference/content-node-layers-002-ref.html": [ - "934f8d2976ff169c1c17b32a41400b799f277786", - "support" - ], - "css/css-regions/stacking-context/reference/content-node-layers-003-ref.html": [ - "5b18aefe1e0c6c79d15b126fc2e517a079a54f7e", - "support" - ], - "css/css-regions/stacking-context/reference/content-node-layers-004-ref.html": [ - "7621b56607e469e640d6d0405b258d38e0f8e8b8", - "support" - ], - "css/css-regions/stacking-context/reference/content-node-layers-005-ref.html": [ - "2b81b709fa0bf644c633fbb30f25909605601c9b", - "support" - ], - "css/css-regions/stacking-context/reference/regions-dialog-001-ref.html": [ - "0a1060bf9ceb1587e4652f492eb355d71fde5d45", - "support" - ], - "css/css-regions/stacking-context/reference/regions-dialog-002-ref.html": [ - "4ec63450d57aa8564520a60e9311b412dfebc3f2", - "support" - ], - "css/css-regions/stacking-context/reference/regions-layers-001-ref.html": [ - "2a31645a856fe2b5d2ce54f7ad550e4e2f17d49b", - "support" - ], - "css/css-regions/stacking-context/reference/regions-layers-002-ref.html": [ - "463e7abad568a8cad77c380c4903dce669238f23", - "support" - ], - "css/css-regions/stacking-context/reference/regions-layers-003-ref.html": [ - "1f08f67f0d83fa0d0f6a991f2837dc90fb2ae9f4", - "support" - ], - "css/css-regions/stacking-context/reference/regions-modal-dialog-001-ref.html": [ - "82e3ff55b85b0d9379eb0d0a4d2e0be5fdedcd59", - "support" - ], - "css/css-regions/stacking-context/reference/regions-modal-dialog-002-ref.html": [ - "daef4795223fcf919d3f821b209d000fa5a7dbaf", - "support" - ], - "css/css-regions/stacking-context/reference/regions-stacking-context-001-ref.html": [ - "2b94886c3871fcbbdb18cf3c0ad9a73a173b1b9b", - "support" - ], - "css/css-regions/stacking-context/reference/regions-stacking-context-002-ref.html": [ - "d1b08ddce66586c2b45340d502425e441bfe3af4", - "support" - ], - "css/css-regions/stacking-context/reference/regions-stacking-context-003-ref.html": [ - "f06d531eb8c457e49b839b46997edacf05a50d3d", - "support" - ], - "css/css-regions/stacking-context/reference/regions-stacking-context-004-ref.html": [ - "004b6a81b7274cd26ce695f724568c3aab0e0a3f", - "support" - ], - "css/css-regions/stacking-context/reference/regions-stacking-context-005-ref.html": [ - "0ea90faca54b0bacd9c1ec40a175a6cb9bb9d901", - "support" - ], - "css/css-regions/stacking-context/regions-dialog-001.html": [ - "3522593b069dbefb92ec1be96694c1a03a6fb0d9", - "reftest" - ], - "css/css-regions/stacking-context/regions-dialog-002.html": [ - "b0744e270ca56c3a757d3dc92110e2913dc7dcdf", - "reftest" - ], - "css/css-regions/stacking-context/regions-layers-001.html": [ - "ded5bfe0ca918c2ee2e977ecbdeda8a59e4761ec", - "reftest" - ], - "css/css-regions/stacking-context/regions-layers-002.html": [ - "f494e8fda781206c50c3c3a6b0cbcd3372e1c763", - "reftest" - ], - "css/css-regions/stacking-context/regions-layers-003.html": [ - "9908c40bdba1ce0b820c101f3d7d6a2a5e2d3d12", - "reftest" - ], - "css/css-regions/stacking-context/regions-modal-dialog-001.html": [ - "f20c9b5e5cc382da2d5523c1571df3d64f686cfe", - "reftest" - ], - "css/css-regions/stacking-context/regions-modal-dialog-002.html": [ - "3be9e4df6bac603cd816dd4c3e3d043e9c972c73", - "reftest" - ], - "css/css-regions/stacking-context/regions-stacking-context-001.html": [ - "c1b2380fef6022b3e4d907cfae3c65ceb8f13efd", - "reftest" - ], - "css/css-regions/stacking-context/regions-stacking-context-002.html": [ - "9d4f3a35b840d34776bf54d3a477b2f9f934b052", - "reftest" - ], - "css/css-regions/stacking-context/regions-stacking-context-003.html": [ - "70885aaa2a5f75d7bac8d27364da7c2c51f42202", - "reftest" - ], - "css/css-regions/stacking-context/regions-stacking-context-004.html": [ - "73756dab1a49a93770da4efb6cbd271720da7e85", - "reftest" - ], - "css/css-regions/stacking-context/regions-stacking-context-005.html": [ - "9a34d3c6a1b4795e3ec3a7fba3cae839e0aaf3ed", - "reftest" - ], - "css/css-regions/support/1x1-green.png": [ - "b98ca0ba0a03c580ac339e4a3653539cfa8edc71", - "support" - ], - "css/css-regions/support/1x1-lime.png": [ - "cb397fb090e199c51e80e4243d1ede03a79aa8d9", - "support" - ], - "css/css-regions/support/1x1-maroon.png": [ - "3f86b0721955eb4e0f014102c68c2a9764ef7593", - "support" - ], - "css/css-regions/support/1x1-navy.png": [ - "9b9a03955baea7abde9e056e8604e18694e49b66", - "support" - ], - "css/css-regions/support/1x1-red.png": [ - "6bd73ac101874f306d007e9cea8fa3a1f62dce16", - "support" - ], - "css/css-regions/support/1x1-white.png": [ - "dd43faec54ae60a210f1eab6ff4e7c88b8e34c97", - "support" - ], - "css/css-regions/support/60x60-gg-rr.png": [ - "84f5b2a4f1d1865d763cac875bfa6a8c5c576c91", - "support" - ], - "css/css-regions/support/60x60-green.png": [ - "b3c8cf3eb4c89bd8f2d1ffde051856f375e3a3de", - "support" - ], - "css/css-regions/support/60x60-red.png": [ - "823f125b8e4a60f780f00443c9c9a10b9fa1f447", - "support" - ], - "css/css-regions/support/README": [ - "2e5f2ad0738c58dfdf7b368d1fff7aca4f797156", - "support" - ], - "css/css-regions/support/a-green.css": [ - "b0dbb071d5b05d1c574cd5c9a660f1e3d62c573b", - "support" - ], - "css/css-regions/support/b-green.css": [ - "a0473f5ca26652c1229290bbf1f81eabc1e37280", - "support" - ], - "css/css-regions/support/c-red.css": [ - "d4ba5c64e95406f541e2f8cc19e192e9f521ed6b", - "support" - ], - "css/css-regions/support/cat.png": [ - "85dd7324815b8f8ef1a1d0496224c1a0661db9d8", - "support" - ], - "css/css-regions/support/pattern-grg-rgr-grg.png": [ - "9b88fbd81149891234185f54f8b4a0431759f181", - "support" - ], - "css/css-regions/support/pattern-grg-rrg-rgg.png": [ - "fcf4f3fd7d95431b8cd1bc5f5129fcb724c5e40f", - "support" - ], - "css/css-regions/support/pattern-rgr-grg-rgr.png": [ - "d454e3a630cd98146c241537dbb3d4cef313f465", - "support" - ], - "css/css-regions/support/pattern-tr.png": [ - "8b4b25364e0ffbe09e563e13b567fa57330e48d5", - "support" - ], - "css/css-regions/support/square-purple.png": [ - "0f522d78728417b0f74b694e2e47cd41c00359d1", - "support" - ], - "css/css-regions/support/square-teal.png": [ - "e567f51b91bbe40754cb0e0cae066201219cbb4a", - "support" - ], - "css/css-regions/support/square-white.png": [ - "5853cbb238cb2d4aba3dd49af3f2ba64d6c7a2de", - "support" - ], - "css/css-regions/support/swatch-blue.png": [ - "bf2759634d45dbe3df13868341eddb7e4bf24172", - "support" - ], - "css/css-regions/support/swatch-green.png": [ - "0aa79b0c86bd72c2220ecce39b9553e2cd3605b9", - "support" - ], - "css/css-regions/support/swatch-lime.png": [ - "55fd7fdaedfc1ed505b111f20fabbca568c68fa5", - "support" - ], - "css/css-regions/support/swatch-orange.png": [ - "d3cd498b52bd88ea6c991f050f1ecb1cfdd136bb", - "support" - ], - "css/css-regions/support/swatch-red.png": [ - "1caf25c992aa8e23483cddb3334b5f51ec967f4a", - "support" - ], - "css/css-regions/support/swatch-teal.png": [ - "0293ce89dea5c9413e4c829cc83a4e39d8f23300", - "support" - ], - "css/css-regions/support/swatch-white.png": [ - "1a7d4323d77287d8eb03a89c635b09d099d94869", - "support" - ], - "css/css-regions/support/swatch-yellow.png": [ - "1591aa0e2e274854ed836cf582235ea0202f9c8e", - "support" - ], - "css/css-regions/support/test-bl.png": [ - "904e24e996a3e5da93bef89e10c49e24c07d0ed2", - "support" - ], - "css/css-regions/support/test-br.png": [ - "f413ff5c1a0f2ad9f9a345d3e07be57a59a82207", - "support" - ], - "css/css-regions/support/test-outer.png": [ - "82eeace7fc0c4202f79610978ab423e62abf8939", - "support" - ], - "css/css-regions/support/test-tl.png": [ - "f6ac0ef7e8f6e192c9c26239884bf92b13cf67b8", - "support" - ], - "css/css-regions/support/test-tr.png": [ - "59843ae54b64f6ce4f7e616d4be491c911ea84cf", - "support" - ], - "css/css-regions/test-plan/index.html": [ - "388d1c78689b62bc7d6582cedab8a7ce9ec2a788", - "support" - ], - "css/css-regions/transforms/reference/regions-transforms-001-ref.html": [ - "d5373898308aaaa1da4b8cb33fff76867ada1ac9", - "support" - ], - "css/css-regions/transforms/reference/regions-transforms-008-ref.html": [ - "c11a78aa3b5b3dbed1d508dcb8665c40df768f7f", - "support" - ], - "css/css-regions/transforms/reference/regions-transforms-010-ref.html": [ - "c0945e56342332d342eb1706af0cea502efc3fcf", - "support" - ], - "css/css-regions/transforms/reference/regions-transforms-013-alt-ref.html": [ - "d5bb4cfbcdf64666a7b3837e1522aa9c03e5ec3a", - "support" - ], - "css/css-regions/transforms/reference/regions-transforms-013-ref.html": [ - "e16c0abd0eb9626b66d62e3cd166a9e4e4e1fff2", - "support" - ], - "css/css-regions/transforms/reference/regions-transforms-014-ref.html": [ - "887362633cd2a32d737929cdef1cd68973c9de87", - "support" - ], - "css/css-regions/transforms/reference/regions-transforms-016-ref.html": [ - "c445b93d12524f492731f58aa10c7d55859ba060", - "support" - ], - "css/css-regions/transforms/reference/regions-transforms-017-ref.html": [ - "8928057ebf60126970b5e4dec535e945e877cdc9", - "support" - ], - "css/css-regions/transforms/reference/regions-transforms-018-ref.html": [ - "96004c186caca72dfd48e7270c74d130912fc9b4", - "support" - ], - "css/css-regions/transforms/reference/regions-transforms-019-ref.html": [ - "2de61e6570b4f22f09871929d7efa81e9ff680eb", - "support" - ], - "css/css-regions/transforms/reference/regions-transforms-020-ref.html": [ - "bfc3c79eb80866aa6cb23ab859e8551eb6d462bd", - "support" - ], - "css/css-regions/transforms/regions-transforms-001.html": [ - "dc35614862f2e799c4d497d9558b513b9f56f0c5", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-002.html": [ - "3dca430d66e390b7bc0e441b61d580dae4b3e221", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-003.html": [ - "87ec4d31e62d11302c834a1efd0d6393245e28ad", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-004.html": [ - "3cf43cb54579f69dd092b3ca80a3a87ee844f698", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-005.html": [ - "8a0ff4d1e21542f810e4fb688fb58a486bb0c244", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-006.html": [ - "d451ed2c067b07fa9414cdf6d93525355cabbf04", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-007.html": [ - "dddc7b5b367e31e52cbc7c228a8b576212d2707f", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-008.html": [ - "70964f3e877b1380eea383dae311b10576b1daa7", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-009.html": [ - "7a26bdf512b53db28d213e5bb67cbaa215e62caa", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-010.html": [ - "3803890c9c00bb586e41adf36e92c544fe807912", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-011.html": [ - "7272c1c34fc2f0d42e391b070435dfdca9a10285", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-012.html": [ - "972894daacdf23e70f0dea39a952e67b6ecd0be7", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-013.html": [ - "c03496e405043561d91c58d02fb6e23b0aded6b1", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-014.html": [ - "38b65c10f1deb9b2672848cc6f9985d090ab9317", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-015.html": [ - "3362c46d82044b87d7d9e2badbb0b819e9cc4b42", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-016.html": [ - "ba0628e931fe7e7460ba0e3062b0c9248d26954b", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-017.html": [ - "7a3f69f7af43dd93ff05240ed2f2958a9378b6d1", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-018.html": [ - "b267886a40569d326ef4efdb2dcc4bcd4e73a582", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-019.html": [ - "7114a97e3dd14c634e5551ccbe824a15fbc067b0", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-020.html": [ - "e2e7d7d09bc9a99a102918d765ea84bb9abe8eaa", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-021.html": [ - "0c5ceddc4629d0d8f2401bb9a2f394181c368662", - "reftest" - ], - "css/css-regions/transforms/regions-transforms-022.html": [ - "8dbaf902eb97ee45aa2af896016ab650f3e18e12", - "reftest" - ], - "css/css-regions/variable-width-001-ref.xht": [ - "05522170e61d182692f5d8edaae3971c28307540", - "support" - ], - "css/css-regions/variable-width-001.xht": [ - "1049b421c115f57a1774ebbc3a9b89a28839b2bd", - "reftest" - ], - "css/css-regions/writing-modes/extract-ordered-list-direction-and-writing-modes.html": [ - "8bbdb97de055017354cfe8f8da4ff787b2f920d1", - "reftest" - ], - "css/css-regions/writing-modes/reference/extract-ordered-list-direction-and-writing-modes-ref.html": [ - "e713238bfec5b4dd11df310c7747748941b8b37d", - "support" - ], "css/css-rhythm/META.yml": [ "9858c1c56efdadac206e7494fbf47d95ddb75b23", "support" @@ -600817,7 +606713,7 @@ "testharness" ], "css/css-syntax/escaped-eof.html": [ - "5d47c34ac512fab7eb9c37e64b0c677d09a8e3d3", + "b4450ea730f75d95838188aa09f652c9e91adc08", "testharness" ], "css/css-syntax/ident-three-code-points.html": [ @@ -609205,11 +615101,35 @@ "reftest" ], "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-004.html": [ - "d271057c43cc7b232c00fa0f3426e2ef5a7666f3", + "cde64415b7b074d0efe35ffa189b27f0b0327ded", "reftest" ], "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-005.html": [ - "e10b4e19033ea81edd8aefb8131db8a8b49828d3", + "fccb3f48e465f81aa1154a81f9891a2d3f451738", + "reftest" + ], + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-006.html": [ + "7b6630c7d00cef1178bb54f9819982d300fcc2f7", + "reftest" + ], + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-007.html": [ + "11e3e3d675875683c46e0bf4a68ecedfca94710c", + "reftest" + ], + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-008.html": [ + "75d8b2000648b339416c469e22b57230db224cbb", + "reftest" + ], + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-009.html": [ + "fad383233b31b29633bc08ec61472f179e74555f", + "reftest" + ], + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-010.html": [ + "ba0c5364884acf7afc87140ea36cdd68e590150a", + "reftest" + ], + "css/css-text/white-space/white-space-pre-wrap-trailing-spaces-011.html": [ + "00f97f0360977a582e2e16057445dc47f34198e8", "reftest" ], "css/css-text/white-space/white-space-wrap-after-nowrap-001.html": [ @@ -615193,7 +621113,7 @@ "testharness" ], "css/css-transitions/transitionevent-interface.html": [ - "cd47469ec742106ace7d904dc588d746ac514ba5", + "a40ba4537518361c13aab1d9b0648387f7c88aaa", "testharness" ], "css/css-transitions/zero-duration-multiple-transition.html": [ @@ -615269,7 +621189,7 @@ "testharness" ], "css/css-typed-om/stylevalue-objects/parse-invalid.html": [ - "ea1d56442b1ecbc29128e5a32e04402b05144e66", + "13ee2df1a6e042b545a6b1c4ec05c769ec532f97", "testharness" ], "css/css-typed-om/stylevalue-objects/parse.html": [ @@ -615277,7 +621197,7 @@ "testharness" ], "css/css-typed-om/stylevalue-objects/parseAll-invalid.html": [ - "c18095435595df9a7e157b6663c8f2916d6e6e3a", + "45fad409bbfea4b8485514ed43087df62680dd24", "testharness" ], "css/css-typed-om/stylevalue-objects/parseAll.html": [ @@ -615321,11 +621241,11 @@ "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssKeywordValue-invalid.html": [ - "b923f380bda98f2334616cc6855909e210f841a2", + "69007a1c590ca4c5b5f6ef2388353392321f293d", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssKeywordValue-value.html": [ - "1af557fb08678754179d00597352975959b549ef", + "ceb39bce5d21733cce08b9cd678a8b5ddd483f17", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssKeywordValue.html": [ @@ -615337,11 +621257,11 @@ "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssPerspective.tentative.html": [ - "4fbd7ca0ae452e31da4f27765b496143020f6e79", + "5edf5bb5b01fa15abeba7eac529078da8c9f17ef", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssPositionValue-invalid.html": [ - "d63c0c78694aa7f4476ebeb7680e36951e9d729f", + "9ff9f014e19f9780f09191f3b879126a91c4efff", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssPositionValue.html": [ @@ -615349,27 +621269,27 @@ "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssRotate.tentative.html": [ - "17490dcea90c8ac797c55dc4b5f973e0f040967e", + "6c234bc4724e70410a61e5f6397f6a3fa2d53be1", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssScale.tentative.html": [ - "d52a8f1a2261ee7d0fe660b73b43205eff75030d", + "9bbe6c92f115b15b9c97602ace7c1ce4762beea1", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssSkew.tentative.html": [ - "2b22d9bcd218169279956993bc8beb9605469aa7", + "0a410859b2297635e494ebe856cdd29580f8ff31", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssSkewX.tentative.html": [ - "1e614146563fb994cad20e255e77fa14819b54ad", + "59d7c064edd40190bcf2abc0b6bd0385fc5e1a14", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssSkewY.tentative.html": [ - "643d2f686bb81465ddb6c5eb8140cc2265f45598", + "6a6fe55a97672a73146e9917ae2cd7b6c2907432", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssTransformComponent-toMatrix-relative-units.html": [ - "67b63a6b6661c2271fe9314d46607bd393a1ee03", + "432943b6da03c1ea6587587007cc9e778096db86", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssTransformComponent-toMatrix.html": [ @@ -615381,15 +621301,15 @@ "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssTransformValue.tentative.html": [ - "47dc05dbec6a77584c56826922830d7ce32dbfe8", + "4c1a4861fe8dd66fb7f88a19fc1a739d9739ecc9", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssTranslate.tentative.html": [ - "7ce281d43b6c4ca46e6a20460cdc4dfa607d4224", + "0554351db3b320e5d19e65a2f2fe2e093bc739c6", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssUnparsedValue-indexed-getter-setter.html": [ - "9f0403fbae406e605548d4a345737fa66332d23c", + "65a65ac0dfe681d1d9155f8565b52eba0b1baf80", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssUnparsedValue-iterable.html": [ @@ -615405,11 +621325,11 @@ "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssVariableReferenceValue-invalid.html": [ - "3696e9997edf7bb265cf88f93dc365879e2d33a8", + "4da6a322bd63c0af0e121295c154841c611b0761", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssVariableReferenceValue-variable.html": [ - "236758bf1f281b9b1290d2cb304a878e26378515", + "51b60a8df5527b67f86ebee1d0e563711bdc6435", "testharness" ], "css/css-typed-om/stylevalue-subclasses/cssVariableReferenceValue.html": [ @@ -615417,11 +621337,11 @@ "testharness" ], "css/css-typed-om/stylevalue-subclasses/numeric-objects/add-two-types.tentative.html": [ - "313ff5acfdb2279729e8265468d855ce3971b21f", + "3571d542f8cb85c69a2e12c89e0df96e2001791d", "testharness" ], "css/css-typed-om/stylevalue-subclasses/numeric-objects/arithmetic.tentative.html": [ - "d58bb075ce292c8d42d3fc9d046873b2239764c4", + "cb9a7a71027df149eaa478b13ae3d147e906befc", "testharness" ], "css/css-typed-om/stylevalue-subclasses/numeric-objects/create-a-type.tentative.html": [ @@ -615437,7 +621357,7 @@ "testharness" ], "css/css-typed-om/stylevalue-subclasses/numeric-objects/cssMathValue.tentative.html": [ - "574043e84d8171529ba41be478a2eef48cb12ad8", + "2be200eea95812c6a753da8da176fc8ebeb15fce", "testharness" ], "css/css-typed-om/stylevalue-subclasses/numeric-objects/cssUnitValue-value.html": [ @@ -615445,11 +621365,11 @@ "testharness" ], "css/css-typed-om/stylevalue-subclasses/numeric-objects/cssUnitValue.html": [ - "411b36fe1ed717e3d4d5fe49fd1a5456f4c545de", + "b44c67129fc465a590f76bdf7d3dba55383e76bf", "testharness" ], "css/css-typed-om/stylevalue-subclasses/numeric-objects/cssnumericvalue-multiply-two-types.tentative.html": [ - "38045ee0fe5a78287a2c15c94f866c67bc4176ab", + "e09c57e641b998a6d53f3d0259ea1fb6324297b2", "testharness" ], "css/css-typed-om/stylevalue-subclasses/numeric-objects/equals.tentative.html": [ @@ -615461,7 +621381,7 @@ "testharness" ], "css/css-typed-om/stylevalue-subclasses/numeric-objects/parse.tentative.html": [ - "c4904ded6b6e12618852369dcba0aaebe4620d13", + "9b9f2f601ae5e796abe6f34b1ea0cc6930fd373a", "testharness" ], "css/css-typed-om/stylevalue-subclasses/numeric-objects/resources/testhelper.js": [ @@ -615469,11 +621389,11 @@ "support" ], "css/css-typed-om/stylevalue-subclasses/numeric-objects/to.tentative.html": [ - "57ac63118c433b2275b35ac24cba2f44601dc18a", + "bf78c509c8d03b94bd9944de876a41c3584bea19", "testharness" ], "css/css-typed-om/stylevalue-subclasses/numeric-objects/toSum.tentative.html": [ - "3d67f7d88bc7ecadd6938d91bf4c3bf1d113d36f", + "1e5e1c9b76a606cf18c1b8fd8f18add62e7fb91f", "testharness" ], "css/css-typed-om/the-stylepropertymap/computed/computed.tentative.html": [ @@ -615485,7 +621405,7 @@ "testharness" ], "css/css-typed-om/the-stylepropertymap/computed/get-invalid.html": [ - "8117d18b764ced36e845b20e0de6f358d5ed363c", + "403c2691f405bdad35cef42fea29eb8951836bfc", "testharness" ], "css/css-typed-om/the-stylepropertymap/computed/get-shorthand.html": [ @@ -615501,11 +621421,11 @@ "testharness" ], "css/css-typed-om/the-stylepropertymap/computed/getAll.tentative.html": [ - "ca7d3b6a65f550fd296311ff6edf158c3d11eeba", + "1673a52bc0c124f6c759b3c946d4b9baaa003757", "testharness" ], "css/css-typed-om/the-stylepropertymap/computed/has.tentative.html": [ - "d387304d43a93e6f1617220c426f112eb5e46267", + "53924c4a4834b14cd76e0239c217448419d18f46", "testharness" ], "css/css-typed-om/the-stylepropertymap/computed/iterable.tentative.html": [ @@ -615513,7 +621433,7 @@ "testharness" ], "css/css-typed-om/the-stylepropertymap/declared/append.tentative.html": [ - "3f94a899ea5213a8f22f386a074c42b9f8f16557", + "ced6e81aaad39031adb68e87e7f2b20babaccb58", "testharness" ], "css/css-typed-om/the-stylepropertymap/declared/clear.html": [ @@ -615525,7 +621445,7 @@ "testharness" ], "css/css-typed-om/the-stylepropertymap/declared/delete-invalid.html": [ - "547ea26976252c2aea77d483dfa8cb59ea73296b", + "04dcccf5e895840fc3c36ee5a84a6063947ce5bb", "testharness" ], "css/css-typed-om/the-stylepropertymap/declared/delete-shorthand.html": [ @@ -615537,7 +621457,7 @@ "testharness" ], "css/css-typed-om/the-stylepropertymap/declared/get-invalid.html": [ - "a91d1978130ac57a52a4fe404edd1d0ef2ac5f97", + "0cd1412945be25f7776d207b467dd50576f2c36e", "testharness" ], "css/css-typed-om/the-stylepropertymap/declared/get-shorthand.html": [ @@ -615553,11 +621473,11 @@ "testharness" ], "css/css-typed-om/the-stylepropertymap/declared/getAll.tentative.html": [ - "dd4e90b22f48ef71173d2877ac957f45c32d3d9d", + "97baf08a784e701c9a368b698ab83516278b33dd", "testharness" ], "css/css-typed-om/the-stylepropertymap/declared/has.tentative.html": [ - "93d29d94c3f54d1928d204f618838f2fe818d7b4", + "6ea24c7ea9f0b4c37d6d5fb1e4a234b9b73c08e8", "testharness" ], "css/css-typed-om/the-stylepropertymap/declared/iterable.tentative.html": [ @@ -615565,15 +621485,15 @@ "testharness" ], "css/css-typed-om/the-stylepropertymap/declared/set-shorthand.html": [ - "2d6ec13ffc26c1b4cb0a4f561ed9625461e04d6a", + "7a025df64793cb6e1b55c7f2ec2c34c25a3ce7a0", "testharness" ], "css/css-typed-om/the-stylepropertymap/declared/set.tentative.html": [ - "6161f94d53cb2f4fa8b9cc9bd3a8a9afc97a0031", + "d9c24fafc22b898ffc4ed442d00d5adbd81a1da7", "testharness" ], "css/css-typed-om/the-stylepropertymap/inline/append.tentative.html": [ - "36c14d76b6e2055ca2669e718a5c7d5490f7321d", + "ee9a9e4ddbcf78a7517d8d038d66844880719e63", "testharness" ], "css/css-typed-om/the-stylepropertymap/inline/clear.html": [ @@ -615581,7 +621501,7 @@ "testharness" ], "css/css-typed-om/the-stylepropertymap/inline/delete-invalid.html": [ - "cc2657ecbdc4f019f1da9677d2f78635c1b1ddd7", + "a4f1b620b03e31c7ee29b18ceba59ff59482d504", "testharness" ], "css/css-typed-om/the-stylepropertymap/inline/delete-shorthand.html": [ @@ -615593,7 +621513,7 @@ "testharness" ], "css/css-typed-om/the-stylepropertymap/inline/get-invalid.html": [ - "b847567008ccdcf7d8386b2305203d9bd92cb7c9", + "07f4a6dc7c42f7510178736b218e8a1f8848b9db", "testharness" ], "css/css-typed-om/the-stylepropertymap/inline/get-shorthand.html": [ @@ -615609,11 +621529,11 @@ "testharness" ], "css/css-typed-om/the-stylepropertymap/inline/getAll.tentative.html": [ - "c7e370086db8ffabc326598074db5ce171ab0c7f", + "935417ddcc022656371e1a88a36473112b286d86", "testharness" ], "css/css-typed-om/the-stylepropertymap/inline/has.tentative.html": [ - "d2528831d85305357912994b6760f1fa705ae16c", + "0427d5a606a73c02e1ac3f10c0941ca415880295", "testharness" ], "css/css-typed-om/the-stylepropertymap/inline/iterable.tentative.html": [ @@ -615621,11 +621541,11 @@ "testharness" ], "css/css-typed-om/the-stylepropertymap/inline/set-shorthand.html": [ - "e00d07cc5028747a9d528fc103f3c357fadeeadf", + "87ecadcb75c7c38202d5aeab5d23bdfe282b000e", "testharness" ], "css/css-typed-om/the-stylepropertymap/inline/set.tentative.html": [ - "411323a2f0c70b3820b272f97c7795d598ef6e8c", + "048ad87e8b1360995a2a7f20fd1e1ee0b9764567", "testharness" ], "css/css-typed-om/the-stylepropertymap/properties/alignment-baseline.html": [ @@ -616273,7 +622193,7 @@ "testharness" ], "css/css-typed-om/the-stylepropertymap/properties/resources/testsuite.js": [ - "3ca0b55f3f111b9c4b306f57b6a02b151528d176", + "27042c787a1bfc3d3ad1d70f91de8aa09433001f", "support" ], "css/css-typed-om/the-stylepropertymap/properties/right.html": [ @@ -619544,6 +625464,10 @@ "ffb2ecd6dc9c1a1bf4b8f5fc23c851f00e01fd6d", "reftest" ], + "css/css-values/ch-pseudo-recalc-on-font-load.html": [ + "6a60bdfa64d874a74d65d60dfc4c2f82d9aaf07a", + "testharness" + ], "css/css-values/ch-recalc-on-font-load.html": [ "625521b8102deb6cb2ca89eced91dda720c8408c", "testharness" @@ -627653,7 +633577,7 @@ "testharness" ], "css/cssom-view/elementFromPoint-parameters.html": [ - "899e411bdd302f2995a9d337ac5a3f89bd1c709b", + "35afec994ee4b4b6563f71e3a0fe4531382c3b5e", "testharness" ], "css/cssom-view/elementFromPoint-subpixel.html": [ @@ -628281,7 +634205,7 @@ "testharness" ], "css/cssom/CSSGroupingRule-insertRule.html": [ - "2364465f8374bbf824e669a2e965c6ce19312c50", + "d131e3975d27e7442a6d15a7ac8c160d9e71f9a5", "testharness" ], "css/cssom/CSSKeyframeRule.html": [ @@ -628313,11 +634237,11 @@ "testharness" ], "css/cssom/CSSStyleSheet-constructable.html": [ - "6d1f4ae6519296577c3890645fc079c275de49e9", + "215095fcc3e1813dc331084f50bfc977f95a8d08", "testharness" ], "css/cssom/CSSStyleSheet.html": [ - "d38efc280232c182db8c301714083a0e3d002413", + "c744382b55e8b9da394132406f22492807f7160e", "testharness" ], "css/cssom/HTMLLinkElement-disabled-001.tentative.html": [ @@ -628373,7 +634297,7 @@ "testharness" ], "css/cssom/at-namespace.html": [ - "04a8a2289aa67e05a359ece1d09d961539d82571", + "b1c76f3c58ae38d8ef4925d5098d523fdd218036", "testharness" ], "css/cssom/border-shorthand-serialization.html": [ @@ -628381,7 +634305,7 @@ "testharness" ], "css/cssom/computed-style-001.html": [ - "d637b066b03a71283ad89315a5c346a1715900f1", + "e487981e305df3b76f6cc45ea12bc0bf3349c2a7", "testharness" ], "css/cssom/computed-style-002.html": [ @@ -628401,7 +634325,7 @@ "testharness" ], "css/cssom/computed-style-set-property.html": [ - "0a5e4cb0589799e19fe9fc91f134d03e42d73206", + "a1f1380dcccfbd437208bd4d1a137dd2ae2179e2", "testharness" ], "css/cssom/css-style-attr-decl-block.html": [ @@ -628473,7 +634397,7 @@ "testharness" ], "css/cssom/cssstyledeclaration-mutability.html": [ - "e7bde1bda639f3202083947444e18706040ad923", + "1e0489ee97b633183b8aa34841fd732869db1d00", "testharness" ], "css/cssom/cssstyledeclaration-mutationrecord-001.html": [ @@ -628517,7 +634441,7 @@ "testharness" ], "css/cssom/escape.html": [ - "115e2c86a9a0d8e1ea7465ecf5143a42e1104c85", + "721c6ea35572d42e2782d6f40f7e73539df35b3a", "testharness" ], "css/cssom/font-shorthand-serialization.html": [ @@ -628585,7 +634509,7 @@ "testharness" ], "css/cssom/getComputedStyle-pseudo.html": [ - "340f9eed9b955467eb39c957222328baf2c41d4a", + "1795bcf2ba40806f11c0fd35a1ede40d56c937a5", "testharness" ], "css/cssom/getComputedStyle-resolved-min-max-clamping.html": [ @@ -628625,11 +634549,11 @@ "reftest" ], "css/cssom/insertRule-import-no-index.html": [ - "ad3622f86aaa4dfd58ee18015d1ef8dd1ebd6a70", + "45481e71f4f5e64ba43c63cf7cc29d300675b30d", "testharness" ], "css/cssom/insertRule-namespace-no-index.html": [ - "c1628eed85f9f6350d41f5653440af0c78578f51", + "3265159736eaf1d0d72abbe19cfbb1dc011a986c", "testharness" ], "css/cssom/insertRule-no-index.html": [ @@ -628637,7 +634561,7 @@ "testharness" ], "css/cssom/insertRule-syntax-error-01.html": [ - "170213c8badbcddda70b2313902fa7c21a757333", + "4461a9a9432df08a236414f1c781e6bbf7b89945", "testharness" ], "css/cssom/medialist-dynamic-001-ref.html": [ @@ -628653,7 +634577,7 @@ "testharness" ], "css/cssom/medialist-interfaces-002.html": [ - "210ace1393a12c34323983dddf9b11467cb38d94", + "0d2ca2e9c71d1a87e7240b77768709995e165395", "testharness" ], "css/cssom/medialist-interfaces-003.html": [ @@ -628749,7 +634673,7 @@ "support" ], "css/cssom/stylesheet-same-origin.sub.html": [ - "ef714670f5488f76d987a464a2732d60410f22ab", + "6ad55190dab366f2d9e4bdf7755750d7f5945bbe", "testharness" ], "css/cssom/stylesheet-title.html": [ @@ -629961,7 +635885,7 @@ "support" ], "css/filter-effects/svgfeblendelement-mode-001.html": [ - "8c9e3ea05805a5030b8034a7a01e53d4984a39dc", + "f27a23f51a2976ec2cdd875319c4227029cf6dea", "testharness" ], "css/filter-effects/tainting-feblend-001.html": [ @@ -630089,7 +636013,7 @@ "reftest" ], "css/geometry/DOMMatrix-001.html": [ - "a42adb4425f43babd1b55ed34a7bda819cf64e29", + "1752c2c5caedc1bbb7e5594448c7e12c5dae8665", "testharness" ], "css/geometry/DOMMatrix-002.html": [ @@ -630109,7 +636033,7 @@ "testharness" ], "css/geometry/DOMMatrix-css-string.worker.js": [ - "42f919d3f09c0701f7db1be23ba5bf8c119d1a28", + "d11638b26a664b0dea0206b657847236239e2aa2", "testharness" ], "css/geometry/DOMMatrix-newobject.html": [ @@ -630117,15 +636041,15 @@ "testharness" ], "css/geometry/DOMMatrix-stringifier.html": [ - "126c44431759c265e279e69bb9a09e55708ccf3e", + "5a39238bef5c79fb39fffcfbedc71e901b4e2753", "testharness" ], "css/geometry/DOMMatrix2DInit-validate-fixup.html": [ - "7ef4ca8b0605f794c1d2eeec019afdedba29cb1f", + "480d67a481d30965a734cdf76c60646a464823b8", "testharness" ], "css/geometry/DOMMatrixInit-validate-fixup.html": [ - "8835c1ba48a7d208f3e62e58060d237728759d87", + "b89b75205eb1f866fa0ea276b09387f8706e54ad", "testharness" ], "css/geometry/DOMPoint-001.html": [ @@ -630133,15 +636057,15 @@ "testharness" ], "css/geometry/DOMPoint-002.html": [ - "b7f5a911772b21272265bfbc6fdebdee62bce0a8", + "96276d86f5aada1873cc96416cc189a417e22ce4", "testharness" ], "css/geometry/DOMQuad-001.html": [ - "38c54285d94b516c9be6f904be2542956b81c53e", + "331bb6159563d29405a01d8830391def301e8d35", "testharness" ], "css/geometry/DOMQuad-002.html": [ - "9e3ef98895ad0f76348d57a91ae4a99f887b5d4c", + "5734be1f2938a2d4995c4b4b74ab9c7e5d807f59", "testharness" ], "css/geometry/DOMRect-001.html": [ @@ -630181,7 +636105,7 @@ "testharness" ], "css/geometry/spec-examples.html": [ - "4e97fb5f217ed28bf934974c16d07656b0addb94", + "61efa2a89bf84d20d02969a8c34a98f039eb91af", "testharness" ], "css/geometry/structured-serialization.html": [ @@ -630713,7 +636637,7 @@ "testharness" ], "css/motion/parsing/offset-path-parsing-valid.html": [ - "0ed360f6e369e5b53ae4ae0b1b535a7ff8e31ca9", + "fce99f572e9c5c1c01bcf2f27f37e344f91b7ef3", "testharness" ], "css/motion/parsing/offset-position-computed.html": [ @@ -630877,7 +636801,7 @@ "testharness" ], "css/selectors/attribute-selectors/attribute-case/syntax.html": [ - "e5acde100b06a6cf9c5eafe1e202298e87103929", + "0eda7374053fd5a5ce23c00998f5b4923a57c4bd", "testharness" ], "css/selectors/child-indexed-pseudo-class.html": [ @@ -632721,11 +638645,11 @@ "reftest" ], "css/selectors/user-invalid.html": [ - "f0c3d93cbea2430a98e1c524910ded94567a70d7", + "05cf2b679039c61732054217cf562bfeb7c3d23a", "testharness" ], "css/selectors/webkit-pseudo-element.html": [ - "5ba98eba21b60e1efa364a8c98dfd0da1983316f", + "30103fa72bf479fb80e75c03058f33a150119be8", "testharness" ], "css/selectors/x-pseudo-element.html": [ @@ -632833,7 +638757,7 @@ "support" ], "css/support/parsing-testcommon.js": [ - "647bc125df9a877f8299de43ff1c83f7d7dea167", + "bcb9d7cdd60546cb84648e2efc03826b7cb0309d", "support" ], "css/support/pattern-grg-rgr-grg.png": [ @@ -642373,7 +648297,7 @@ "reftest" ], "custom-elements/CustomElementRegistry.html": [ - "c288e8232703afbe00d355ef5b40bdc8d1fa0ac2", + "cc81e3a2cd3945ceac4ff461b14903c3901b1ba4", "testharness" ], "custom-elements/Document-createElement-svg.svg": [ @@ -642381,7 +648305,7 @@ "testharness" ], "custom-elements/Document-createElement.html": [ - "8173c7613886aaf3b289271025ddf8d7f1d12579", + "64b6f25b5e7bc489f74dcefe8c8c6bdc5f6796b3", "testharness" ], "custom-elements/Document-createElementNS.html": [ @@ -642389,11 +648313,11 @@ "testharness" ], "custom-elements/HTMLElement-attachInternals.html": [ - "22c9545215c8d97f1d8564c99cde806933c7f0f9", + "9331869f8fe388503f93d6526111c34f36fa95ad", "testharness" ], "custom-elements/HTMLElement-constructor.html": [ - "a0bfa909bae1e98febaa5ef8eb3170ca30b58c13", + "8e33137d4ff7514918a986d55a96c29b1e5988f5", "testharness" ], "custom-elements/META.yml": [ @@ -642425,7 +648349,7 @@ "testharness" ], "custom-elements/custom-element-registry/define.html": [ - "e5d71ec6eab1fb06d39d947ae8d11f8d30a9889a", + "61717b2e20035d5e1e4b722eadfc525118c39d0b", "testharness" ], "custom-elements/custom-element-registry/per-global.html": [ @@ -642445,7 +648369,7 @@ "testharness" ], "custom-elements/form-associated/ElementInternals-NotSupportedError.html": [ - "0d8a5ffc8c35016ef33dedc73fdd0b2c1c1fef59", + "51be7183c1e0a8456ade46de3ecea4166f8988d1", "testharness" ], "custom-elements/form-associated/ElementInternals-accessibility.html": [ @@ -642461,7 +648385,7 @@ "testharness" ], "custom-elements/form-associated/ElementInternals-validation.html": [ - "d71161476918a32729e7e3e4f4bca95f835ba437", + "f67e96465bd626750eb50eba1766228eecab9644", "testharness" ], "custom-elements/form-associated/form-associated-callback.html": [ @@ -642481,7 +648405,7 @@ "testharness" ], "custom-elements/htmlconstructor/newtarget.html": [ - "8d30682c10c28cd82d61333d03790d96355418d9", + "b95d7ade0bbd2cf490ecf82dba21ecefc12eab5c", "testharness" ], "custom-elements/microtasks-and-constructors.html": [ @@ -642757,7 +648681,7 @@ "support" ], "custom-elements/reactions/with-exceptions.html": [ - "82e0f59c93022fcd6321c6b8ad1f8d7014b74382", + "e7cdee789d4a50b25dfd8620aaa2a756686201d2", "testharness" ], "custom-elements/resources/custom-elements-helpers.js": [ @@ -642777,11 +648701,11 @@ "support" ], "custom-elements/throw-on-dynamic-markup-insertion-counter-construct.html": [ - "5938a0aeb9f2af389ec7da1131d8965c0216cfca", + "853595040143df0f70173279c755dd64f102f10e", "testharness" ], "custom-elements/throw-on-dynamic-markup-insertion-counter-reactions.html": [ - "b9f9f55c705e9ca4f04b783657c7f30bbd7b34ac", + "49335bf9b425f3da178cc20ae4860333f5de4468", "testharness" ], "custom-elements/upgrading.html": [ @@ -643153,11 +649077,11 @@ "testharness" ], "dom/collections/HTMLCollection-as-prototype.html": [ - "75546a77c5e5b0cc4441625086a6794d141be0cd", + "d572d35c041496904901a9eb900e84f2f5b63704", "testharness" ], "dom/collections/HTMLCollection-delete.html": [ - "6f5b9326bb94a24fa83a1370e01f366865f1a97e", + "99420d431914ad95a3c7e0257b06c9452bee597e", "testharness" ], "dom/collections/HTMLCollection-empty-name.html": [ @@ -643169,15 +649093,15 @@ "testharness" ], "dom/collections/HTMLCollection-own-props.html": [ - "1f21c0837ec92bf48b6f497da22e60a435913a06", + "99dc425dbe42c11cf5e23c7a518219e6c12b13fb", "testharness" ], "dom/collections/HTMLCollection-supported-property-indices.html": [ - "62ee6bb6abf69e1a4f1b24937c184f86815aca79", + "5339ec31ea1d5e644ced1dfd628a6cc9e34e207c", "testharness" ], "dom/collections/HTMLCollection-supported-property-names.html": [ - "0a9df1ad6606476c3f3463032957cec931af19b4", + "3d21e16692108b66c0d9cd39f60d1f7b546bc38b", "testharness" ], "dom/collections/domstringmap-supported-property-names.html": [ @@ -643205,7 +649129,7 @@ "testharness" ], "dom/events/CustomEvent.html": [ - "abc6c370fd2e87a325c81807eb202a88281a3b5f", + "87050943f9bffac8c17b85e1dba977eaebc78ec5", "testharness" ], "dom/events/Event-cancelBubble.html": [ @@ -643217,7 +649141,7 @@ "testharness" ], "dom/events/Event-constructors.html": [ - "5f1ed15792c5e255934c9e55e9535ab1ce199954", + "72347efd5324adb4e518b8e725f258646265df55", "testharness" ], "dom/events/Event-defaultPrevented-after-dispatch.html": [ @@ -643289,7 +649213,7 @@ "testharness" ], "dom/events/Event-dispatch-redispatch.html": [ - "dc180c61567b723bb2f3dd9e29bc20f3f8f3a921", + "b4584fb72008d421a4e024c27af996c9a8f9e221", "testharness" ], "dom/events/Event-dispatch-reenter.html": [ @@ -643313,7 +649237,7 @@ "testharness" ], "dom/events/Event-initEvent.html": [ - "34ed32af67bfb13b2ea40d24bdb04cf5c20be06d", + "ad1018d4daf7ba665a658119e2e6954a1a7edce2", "testharness" ], "dom/events/Event-isTrusted.any.js": [ @@ -643329,7 +649253,7 @@ "testharness" ], "dom/events/Event-subclasses-constructors.html": [ - "1fd70d4222bb57f9fb97996181858116c0e781f2", + "08a5ded011635c66151d22a09330f9341eb48c91", "testharness" ], "dom/events/Event-timestamp-high-resolution.html": [ @@ -643397,7 +649321,7 @@ "testharness" ], "dom/events/EventTarget-dispatchEvent.html": [ - "8a0d7353bc62ba8330069fef4c71a0e33321b0aa", + "783561f5fb59432a240fe552042927b84f8c6454", "testharness" ], "dom/events/EventTarget-removeEventListener.html": [ @@ -643545,11 +649469,11 @@ "support" ], "dom/nodes/CharacterData-appendChild.html": [ - "db7d51b915df8392dd68d1227f7e6092eaffbb08", + "eb4f36c68107264f9be71feb38b28501c38806a4", "testharness" ], "dom/nodes/CharacterData-appendData.html": [ - "d754218bfb1f61ed84914ea6d45223aa4bede54d", + "a5d4072244ed888c9b564579c4062d4cd788ea01", "testharness" ], "dom/nodes/CharacterData-data.html": [ @@ -643557,11 +649481,11 @@ "testharness" ], "dom/nodes/CharacterData-deleteData.html": [ - "02ecbe6abfa0298ba069eb35bb15457f38b093eb", + "84f4d5b41569c207ac13cc58d51cc845844bf57c", "testharness" ], "dom/nodes/CharacterData-insertData.html": [ - "5777327c26fabde24da955c525109d83204010fc", + "62c0ca10182a64595173d46a5aeaea05a890a131", "testharness" ], "dom/nodes/CharacterData-remove.html": [ @@ -643569,11 +649493,11 @@ "testharness" ], "dom/nodes/CharacterData-replaceData.html": [ - "624ee5f237f64e3031e012fef2abca1de7a31312", + "537751d832063a42b2c5adf2230501ee37497892", "testharness" ], "dom/nodes/CharacterData-substringData.html": [ - "f20b4b202ba0e855994f3fb55ca6a447b32807ab", + "b353526480e5dc1670722af9c49eb58f371bd0dc", "testharness" ], "dom/nodes/CharacterData-surrogates.html": [ @@ -643605,11 +649529,11 @@ "testharness" ], "dom/nodes/DOMImplementation-createDocument.html": [ - "72519dd38d994409bf138cfb86897a3b75ef1e92", + "835002b47077672583df7b364323428dd67ffee8", "testharness" ], "dom/nodes/DOMImplementation-createDocumentType.html": [ - "f7e6e18b84425688e6cc2f742825b511de848d51", + "8d23e66a2b0324ee4d4988e07ac89c9b81b8ad17", "testharness" ], "dom/nodes/DOMImplementation-createHTMLDocument.html": [ @@ -643625,7 +649549,7 @@ "testharness" ], "dom/nodes/Document-Element-getElementsByTagName.js": [ - "c18b2069f98ff98671aa553560bb2dd0deaef50d", + "dbbe667ff52549fc5f18fc3e7c11e49ca12fc542", "support" ], "dom/nodes/Document-Element-getElementsByTagNameNS.js": [ @@ -643637,7 +649561,7 @@ "testharness" ], "dom/nodes/Document-adoptNode.html": [ - "584d5d9fe0396ef9989d515c61b0fb815a918c02", + "60a4e6772ab85e5388d1bfa13f4f46249266415f", "testharness" ], "dom/nodes/Document-characterSet-normalization.html": [ @@ -643757,7 +649681,7 @@ "support" ], "dom/nodes/Document-createAttribute.html": [ - "b494257958fa55c58bd0e997cd30ae0c00c13194", + "b3dc8b60b9b0a6e1b0d459a993c21ff9df20ef57", "testharness" ], "dom/nodes/Document-createComment-createTextNode.js": [ @@ -643937,11 +649861,11 @@ "testharness" ], "dom/nodes/Document-createElement.html": [ - "a74962752e7fde79439d869cca4eb01955a45fa5", + "653108ca11acec98bb7a0990034c0d3a1338f4d1", "testharness" ], "dom/nodes/Document-createElementNS.html": [ - "6df8c785b8bd939f5631a25a0d86a6d9c60617fe", + "43cf800b4cced3ced2b09216c0d909f26412dfeb", "testharness" ], "dom/nodes/Document-createElementNS.js": [ @@ -643949,7 +649873,7 @@ "support" ], "dom/nodes/Document-createEvent.https.html": [ - "bdc1895879bfa613e72229b44d535f76f785c5a2", + "b4fb8cd0a31382d2f6d235b500ed8c667012b9e1", "testharness" ], "dom/nodes/Document-createEvent.js": [ @@ -643965,7 +649889,7 @@ "testharness" ], "dom/nodes/Document-createProcessingInstruction.js": [ - "114ac35d9f8230299c32f19ff683f464e368caf2", + "d6cc3725f030b41ad25482a978bc930b4b414960", "support" ], "dom/nodes/Document-createTextNode.html": [ @@ -643973,7 +649897,7 @@ "testharness" ], "dom/nodes/Document-createTreeWalker.html": [ - "f8f04b068fd467bf9cb9102b5b5b2c1c1d47e158", + "1e8420d8416c2ce4e5c7ad4ba6769d0a7e59f06c", "testharness" ], "dom/nodes/Document-doctype.html": [ @@ -644085,7 +650009,7 @@ "testharness" ], "dom/nodes/Element-classlist.html": [ - "5453da90da66847912797e86bc3981d723120120", + "2b5a271ba410250ba21d5b5c02b1fc238969de67", "testharness" ], "dom/nodes/Element-closest.html": [ @@ -644149,11 +650073,11 @@ "testharness" ], "dom/nodes/Element-insertAdjacentElement.html": [ - "d03e56680d40ea6730703a68fc0c98351ac79312", + "9eafee6a76ef81812e5e47616ebecd5885f684e6", "testharness" ], "dom/nodes/Element-insertAdjacentText.html": [ - "0fafabb519a2cc461580f12178e9ca7319a08f51", + "be744fd49eb4287905e66c59ab86d12efb41c377", "testharness" ], "dom/nodes/Element-lastElementChild-svg.svg": [ @@ -644177,7 +650101,7 @@ "testharness" ], "dom/nodes/Element-matches.js": [ - "6e5069fa5beebcdccb2fd0645d7c40678bb7392c", + "9494f6f0eacb1b9604d3781b6e541bf7a47e6071", "support" ], "dom/nodes/Element-nextElementSibling-svg.svg": [ @@ -644269,7 +650193,7 @@ "testharness" ], "dom/nodes/Node-appendChild.html": [ - "684607961a7eeaefb17b3a49dbf9ed36a3d7aee6", + "8264cb11a551dd07d63f5701d82a471fa39340fd", "testharness" ], "dom/nodes/Node-baseURI.html": [ @@ -644293,7 +650217,7 @@ "testharness" ], "dom/nodes/Node-contains-xml.xml": [ - "b95b7ffd1bdfa0cdc4cd80703ccbc6b3717d96f2", + "3c026b02421e3a0d26962916acadd67480a82666", "testharness" ], "dom/nodes/Node-contains.html": [ @@ -644301,7 +650225,7 @@ "testharness" ], "dom/nodes/Node-insertBefore.html": [ - "2e511b8e9a2f0dd4066de0ab28f0f32efa7f4f93", + "6977501501ddf03ed966416f5d52d0811cad2138", "testharness" ], "dom/nodes/Node-isConnected.html": [ @@ -644369,11 +650293,11 @@ "testharness" ], "dom/nodes/Node-removeChild.html": [ - "fb22583222062dbee1d71d256bd7cb0bfefe19a1", + "a4581aadc9b2526001cb5a70282d5e1939c0e819", "testharness" ], "dom/nodes/Node-replaceChild.html": [ - "3c289a4c14d0185ae1dfe1e52776bbac33cf6b23", + "e942cfa3ec44c0ca5f3692eefdd6e58f894850a7", "testharness" ], "dom/nodes/Node-textContent.html": [ @@ -644417,7 +650341,7 @@ "testharness" ], "dom/nodes/ParentNode-querySelector-All.js": [ - "dd789b72da257f508786fc517e090bcb951a9978", + "3d424f750b9700a23261bc84547c11e28f4b1fea", "support" ], "dom/nodes/ProcessingInstruction-escapes-1.xhtml": [ @@ -644437,15 +650361,15 @@ "testharness" ], "dom/nodes/Text-splitText.html": [ - "aec1cee52ed55b7c9b93d7565a3cae1a5eea7698", + "2dd23018cb4c7445cda7e84695e883fa65b557fb", "testharness" ], "dom/nodes/adoption.window.js": [ - "86893a4ae770e455be8428764cdd33236c6c8255", + "ad90aaf375a521305605174a770ea95d6309c16c", "testharness" ], "dom/nodes/append-on-Document.html": [ - "8d9ce2e3ff604ee43807ee0eb1962870439725a9", + "78f278b381563640941c70d2bb2c48f46db13aa8", "testharness" ], "dom/nodes/aria-attribute-reflection.tentative.html": [ @@ -644457,7 +650381,7 @@ "testharness" ], "dom/nodes/attributes.html": [ - "dac191b54cb2cafdaf9a71a297d130e571cd5230", + "65bea67173d2475a27c33b7cbf69bda17af2dacb", "testharness" ], "dom/nodes/attributes.js": [ @@ -644609,7 +650533,7 @@ "support" ], "dom/nodes/insert-adjacent.html": [ - "247b7d1742b398dd7d58911e5ee0533e15497042", + "68b6f4ee663c199fb7f2a13c338479b07f6a568c", "testharness" ], "dom/nodes/mutationobservers.js": [ @@ -644617,11 +650541,11 @@ "support" ], "dom/nodes/pre-insertion-checks.js": [ - "ab4d811d5b4c90e6932915d335f73936c2498527", + "705283fa235093eb4be4251b265729412679baf8", "support" ], "dom/nodes/prepend-on-Document.html": [ - "ccc56894d0aeb603a0f98575ac9542807c0e7200", + "1d6d43a46392650796cbcaae413f7ad630633a57", "testharness" ], "dom/nodes/productions.js": [ @@ -644665,7 +650589,7 @@ "testharness" ], "dom/ranges/Range-cloneContents.html": [ - "bf75c920409724216f52684c5fd7bd08012e5799", + "73bce34572583b66098e6cdb7cd487ece8cb5481", "testharness" ], "dom/ranges/Range-cloneRange.html": [ @@ -644685,15 +650609,15 @@ "testharness" ], "dom/ranges/Range-compareBoundaryPoints.html": [ - "48413ecd81ebadc3e28a14fe0862b84a3eae5e2f", + "9d150ae0ab895599b7aca34c53ee6eb99c71a3b1", "testharness" ], "dom/ranges/Range-comparePoint-2.html": [ - "356c8d351fb0a9c46ba1600613140a4d17a1d7db", + "30a6c57ad9df1404c19520afd227f9df96bd009e", "testharness" ], "dom/ranges/Range-comparePoint.html": [ - "95264796be81eff102769cf2e1137466dd7303e0", + "e18ac95c4ca42d5651c824efe5a7622cff7e4ae7", "testharness" ], "dom/ranges/Range-constructor.html": [ @@ -644709,11 +650633,11 @@ "testharness" ], "dom/ranges/Range-extractContents.html": [ - "098837f0ce5e397fa3c41b66314f1f4ef9267c04", + "b43769ebc01044c2dd46499df74b91fa955090e3", "testharness" ], "dom/ranges/Range-insertNode.html": [ - "4c4073b21566dde6452cfad852857c739a877265", + "aca3a23ff5d58b891f4e6bcf295026470a9e2960", "testharness" ], "dom/ranges/Range-intersectsNode-2.html": [ @@ -644721,7 +650645,7 @@ "testharness" ], "dom/ranges/Range-intersectsNode-binding.html": [ - "729388428ec31f38b0feece00a6f0ab0df8d346a", + "57d159b03035e5a7a98f012b9c846aa634c265d1", "testharness" ], "dom/ranges/Range-intersectsNode.html": [ @@ -644729,7 +650653,7 @@ "testharness" ], "dom/ranges/Range-isPointInRange.html": [ - "fa87442b8ab3403273cd0fc7c0bd717084aac4f7", + "80db97e844cafc49d83aeca3f12134e9db0cd15f", "testharness" ], "dom/ranges/Range-mutations-appendChild.html": [ @@ -644777,11 +650701,11 @@ "support" ], "dom/ranges/Range-selectNode.html": [ - "6311a84b9e6e899784c8e19310c7a48937ab8295", + "fe9b1f7860b1a297e1583e64242329d759d1dc41", "testharness" ], "dom/ranges/Range-set.html": [ - "5b43c04f418cce0cdd6e742a4ef127d354e0b7a6", + "694fc607497381cd042fbd9ec4cabc6811de6d32", "testharness" ], "dom/ranges/Range-stringifier.html": [ @@ -644789,7 +650713,7 @@ "testharness" ], "dom/ranges/Range-surroundContents.html": [ - "e8cc11b24e7eedb436df6d740ed963b4c6df3faa", + "c4ff0509f8f4da0d56c190bc911852a77dbc973d", "testharness" ], "dom/ranges/Range-test-iframe.html": [ @@ -644797,7 +650721,7 @@ "support" ], "dom/ranges/StaticRange-constructor.html": [ - "55a969415ce62e9c14d02e58d63b2827ae2aa6bc", + "6aae93f49b94afaf5eb87831f16367bdd5b3b41a", "testharness" ], "dom/svg-insert-crash.html": [ @@ -644813,15 +650737,15 @@ "testharness" ], "dom/traversal/NodeIterator.html": [ - "3db5dec0707c82b0bf6c03f5486fe2257ad2498e", + "fb81676cc5bb1094ee52148f949316fa7285d3fe", "testharness" ], "dom/traversal/TreeWalker-acceptNode-filter.html": [ - "5d521f016f494905d8b0893ccb37eba137ebf8c3", + "8b5ff9a9bba020d07b3cc8abfc2dd650a3892e4d", "testharness" ], "dom/traversal/TreeWalker-basic.html": [ - "100cb10de3e91245647e848d83a311a4be9dcc43", + "4e14ac421ef5e998754f5b330c8f51367522766e", "testharness" ], "dom/traversal/TreeWalker-currentNode.html": [ @@ -644853,7 +650777,7 @@ "testharness" ], "dom/traversal/TreeWalker.html": [ - "2570c9a200682ff3844d116308da13c4bdbe5fff", + "093c78144708842d842a71b9dbd1f6af98ce3901", "testharness" ], "dom/traversal/support/assert-node.js": [ @@ -644905,7 +650829,7 @@ "support" ], "domparsing/DOMParser-parseFromString-html.html": [ - "2660d1d6c87ab6cddbafe92e1b63e93ea192fcd2", + "5e1dd1291decf4d76ad17a976520c4311eb08e7f", "testharness" ], "domparsing/DOMParser-parseFromString-xml-doctype.html": [ @@ -644933,7 +650857,7 @@ "testharness" ], "domparsing/createContextualFragment.html": [ - "a885a5dcb5ab149098c9aa3ec826c27be2e2040e", + "170c0c464d90fb1918f684c867a1f9fcb3cb4fee", "testharness" ], "domparsing/idlharness.window.js": [ @@ -644941,7 +650865,7 @@ "testharness" ], "domparsing/innerhtml-01.xhtml": [ - "432cfbf41f583292e087e817b126c5b18439f17b", + "08345ac58b8ed5ccaa03758b5d2481194f649c53", "testharness" ], "domparsing/innerhtml-03.xhtml": [ @@ -644953,7 +650877,7 @@ "testharness" ], "domparsing/innerhtml-05.xhtml": [ - "da2d851595283010bcb0366dffc1b44b06b8e341", + "3afb6815231280325abac6a39026163fce6711b2", "testharness" ], "domparsing/innerhtml-06.html": [ @@ -644973,19 +650897,19 @@ "testharness" ], "domparsing/insert_adjacent_html-xhtml.xhtml": [ - "eadf10e2c1fa94d83342deb2f96a61be875d020e", + "f02f425c47d4346e984dee82ee4a74fa35afa522", "testharness" ], "domparsing/insert_adjacent_html.html": [ - "dfe624f03ad79b2f2c66d2d5d3e8c5ad64395786", + "d8b38748198f4a66b4f16b9e415d8506371b24e3", "testharness" ], "domparsing/insert_adjacent_html.js": [ - "2451228d193e29666d4f1853f6ab2e73acf45396", + "2980037433d02f8a53b0b83ffdbe94f778adb03c", "support" ], "domparsing/outerhtml-01.html": [ - "2e8072e49f9724a0a838382670f9df3544a04c3e", + "d9a38b70458605d7753ac6e8fdf68917745202e0", "testharness" ], "domparsing/outerhtml-02.html": [ @@ -645005,11 +650929,11 @@ "testharness" ], "domxpath/001.html": [ - "c26795a3115f8bb16174163a58b3a5a9dcc25183", + "4931417af301029c5bffb64093ab8ed382890753", "testharness" ], "domxpath/002.html": [ - "95b4afc4c109762a1eed1efa0b91917f68055335", + "c5c1fcc52923ab38729a3e9dc74ecb0a0d70ca9e", "testharness" ], "domxpath/META.yml": [ @@ -645029,7 +650953,7 @@ "testharness" ], "domxpath/evaluator-constructor.html": [ - "8239d9c395e3c965c5ae2f23ed79156b7b85c01f", + "8350ceb4499d570c577f9aec674435b415b6672b", "testharness" ], "domxpath/fn-concat.html": [ @@ -645073,7 +650997,7 @@ "support" ], "domxpath/lexical-structure.html": [ - "f93820b0e4176d8c96518268b6453024dd43f1df", + "05961ab226bbfd292946e0a1cb34dfd701a38c51", "testharness" ], "domxpath/node-sets.html": [ @@ -645493,7 +651417,7 @@ "testharness" ], "editing/other/non-html-document.html": [ - "5c4786e2fc1645f0b0c2f47a68736e55920cb610", + "ffd2e6f59464c56fac6694856978192ed03a199c", "testharness" ], "editing/other/restoration.html": [ @@ -645649,51 +651573,51 @@ "support" ], "element-timing/background-image-data-uri.html": [ - "3cac0f56db860cf5c6111a41a195ceb6b5d6c3a1", + "540668ae3c3b38fae1c8b09b4931ceaec9096338", "testharness" ], "element-timing/background-image-multiple-elements.html": [ - "44755d49f5c39fe8b5f96b73bcb4b7f3067dd2df", + "61a284a5df38dde63afc8216888d20f5bd308415", "testharness" ], "element-timing/background-image-stretched.html": [ - "0cd56333f50495f770145291df794877fb401a36", + "d5534c3257a477c0adffa01f707077d14a2f5b75", "testharness" ], "element-timing/buffer-before-onload.html": [ - "d675c75ba1a2e46bf964a87cbfe9547af9fb09fb", + "79dd64e29779675019a599f2e17b4e64ac8cd940", "testharness" ], "element-timing/buffered-flag.html": [ - "19c387d26b9c22ed10c352c57d5c771ea75363ba", + "1fca117879232e17dae2c889dcc245ac0be6f5f1", "testharness" ], "element-timing/cross-origin-element.sub.html": [ - "eef69a1d423a96cc8acd6b00a35e0c344ce7b7da", + "b5b06f30469b3ea82fee31beeb4657198f2e1af2", "testharness" ], "element-timing/cross-origin-iframe-element.sub.html": [ - "7296cfccfda6068313d6032c2625e2100e7f06fd", + "b183fe289aa96abb6fbd09953c00086f4fc4f3e4", "testharness" ], "element-timing/css-generated-text.html": [ - "1e3a812d1bc283e03ec232fd31b34253dbf62ddc", + "4b7dea73ca8d383ab328132d49147e7da171e5c8", "testharness" ], "element-timing/disconnect-image.html": [ - "fa42397557b9d91d5bf0c4e0cb488b32825d8fc0", + "9c2be0e45ac5457c1bbc73ba1f5ee3194d7e001e", "testharness" ], "element-timing/element-only-when-fully-active.html": [ - "5608685a34219d831dd6c57743e829967d3ed247", + "001430516dc83c5eb92517ab23b3d3490b8ce118", "testharness" ], "element-timing/first-letter-background.html": [ - "51e82d473e160ec3e6e133e0fcf67e8a371079a1", + "911f0d0f3a15a59521b1c9eb27adfec3520eb78b", "testharness" ], "element-timing/fixed-id-identifier.html": [ - "00d6d4dd94c466939dbbabb93bbe5ef9f29b86e1", + "ae8303f021d7ff1340a381a8fb3995170201c6cd", "testharness" ], "element-timing/idlharness.window.js": [ @@ -645701,55 +651625,55 @@ "testharness" ], "element-timing/image-TAO.sub.html": [ - "0906b361394ae74cef3f8f2720844a7365ea5926", + "ee2b061790094f790464fc4b627d341a14020730", "testharness" ], "element-timing/image-carousel.html": [ - "dc5d8e8dde89b6e8e4c8865b4469c5f42e2330e7", + "ce6ac951e2494de3e6a1b7c7e79cf816effb9776", "testharness" ], "element-timing/image-clipped-svg.html": [ - "15c78a4cec5e0d78d91d67ed2d501324a1f9bab6", + "c8e4a67cea687b9e54ae905d75cb1ba0b33691c8", "testharness" ], "element-timing/image-data-uri.html": [ - "e698bcf1a5d7f55b60f55d5fc68e7c626f78474d", + "afe203ae1bf96297cd96b885377317832654c243", "testharness" ], "element-timing/image-not-added.html": [ - "e65d1814b0e7591f43fd26f6f2ac47587039983e", + "83a6cc6084438042e947e2cebbfe4aec07b61d32", "testharness" ], "element-timing/image-not-fully-visible.html": [ - "ece7770467d1cdedd1ea7a0f19775676df756f42", + "c51c24a965a6dbb09b497827c1817669ca9188e2", "testharness" ], "element-timing/image-rect-iframe.html": [ - "7441405d7475b4a300962dc21dd9b50d52250c38", + "a97ed5a850787aa11fb412fa99dd7b8cb732a41e", "testharness" ], "element-timing/image-src-change.html": [ - "89b8e1d3f74750d25ca997a6f258162c5d1f113e", + "e9e13742a6505dccd7248b0175b8b9d331b533b9", "testharness" ], "element-timing/image-with-css-scale.html": [ - "2dbbc0672485cb5e36ccec07f8ce9ccfbac012f0", + "9bd71086a75ec42103266588f287512623c4e471", "testharness" ], "element-timing/image-with-rotation.html": [ - "fcffe4acfa587fc1b23b5bc123b25e6595c7e284", + "64ff942f0cdacb74315044c990041653d30b42f7", "testharness" ], "element-timing/images-repeated-resource.html": [ - "e3fe9b90db111f7238bf242601eb1e19ced075de", + "6090e75f26ec0aa920735a9382ac654ab979caa3", "testharness" ], "element-timing/invisible-images.html": [ - "06d9bfd07a0f342dbacd00c23bc36b155335f531", + "8225996e255b8137af72901a963403d5063f75a1", "testharness" ], "element-timing/multiple-background-images.html": [ - "b29e66c04a70dffbc17f05f516d3d190159ec1c5", + "c2a32c3c8e6b7de76b3b91cb9ee360a828e7e7bc", "testharness" ], "element-timing/multiple-redirects-TAO.html": [ @@ -645757,55 +651681,55 @@ "testharness" ], "element-timing/observe-background-image.html": [ - "afc6b5b38d74ca3da65a48737b1de4a534dfbb25", + "e02714b702108cbb58cfb33fffb6194bed05cd9d", "testharness" ], "element-timing/observe-child-element.html": [ - "33e92a9abddd0232ace837878fdd5c715a1bd0c4", + "4293e814eb91232c9768633c8684ca5c40a1d6cd", "testharness" ], "element-timing/observe-elementtiming.html": [ - "164cc4f580afd46ce8a2c5425db7f72841eba441", + "ee8960bd72883409055752be16ce2b3d2198535b", "testharness" ], "element-timing/observe-empty-attribute.html": [ - "c115a24cf6234b764c34a885c380e6ba5a6cca13", + "25d3492f73bee7c7c8373d14db86f36de95a9df0", "testharness" ], "element-timing/observe-multiple-images.html": [ - "6b5c5d9e3cb2099774b48c79821335f346606ec8", + "9a0657aa60fe73108ae81e0c2bddee320989822e", "testharness" ], "element-timing/observe-shadow-image.html": [ - "3e1960dde3bf1b091d42002c3c40a08a5a7fa6a2", + "1c12c5fe0310d8c21609ec17778e06063e162ba9", "testharness" ], "element-timing/observe-shadow-text.html": [ - "cc0cf0bd823991f4dacde90f09ee02ec79688baa", + "3167a1225c5216b69a99d57e8d58151a27ec3239", "testharness" ], "element-timing/observe-svg-image.html": [ - "8a0f61d6699d95cc8c450bd5d384405a53d9956b", + "83ca4f40aaeb2cdb81236ee9b973f9ea0aaf01fe", "testharness" ], "element-timing/observe-text.html": [ - "4508db3a5442caff4b2f388428d6410114c1fffc", + "a054b2617261fb33d1509a2639794cca86cf1729", "testharness" ], "element-timing/observe-video-poster.html": [ - "a6348377099f29f784ad5f993626960baac7806f", + "f64da173c6f2daa2a811075a75b997982d0af73d", "testharness" ], "element-timing/progressively-loaded-image.html": [ - "f156e1a32c4863aecf770c6f18e7bb88e8b694ee", + "0d59052cf3ac069adbe47780fefc8dc75000ac52", "testharness" ], "element-timing/rectangular-image.html": [ - "0c09911c502351d93f58e25b8957cc70f4a521ab", + "a97c549a9aad387c2beda7971fea985dcb35a4c1", "testharness" ], "element-timing/redirects-tao-star.html": [ - "a93fcd50ac373ea7ee2ea77199c5a91f4d59a4d1", + "f8e4d19bd07cf6faa872a5630855414bf229d111", "testharness" ], "element-timing/resources/TAOImage.py": [ @@ -645869,7 +651793,7 @@ "support" ], "element-timing/retrievability.html": [ - "3ac04d8278512ae9b35913c215ffd4ace97a9f8b", + "5c6113bdc933f98d7cb753de904f7b07456daf40", "testharness" ], "element-timing/same-origin-redirects.html": [ @@ -645877,7 +651801,7 @@ "testharness" ], "element-timing/scroll-to-text.html": [ - "ed332740323b076f160121dbd14390f246413c36", + "ca06e91c530a73f75220aecbfe9d7ffb2bee18b4", "testharness" ], "element-timing/supported-element-type.html": [ @@ -645885,11 +651809,11 @@ "testharness" ], "element-timing/text-with-display-style.html": [ - "03939473be33d6ae868088dcab1cd273ad5b8759", + "faf644fd8d244a9df52eb96403719b0922fcd2dc", "testharness" ], "element-timing/toJSON.html": [ - "d988934708116f29f9289511559079544aba1ba6", + "ba13a0fa90797c0bc6fb104857d5ab86a0790b3d", "testharness" ], "encoding-detection/__dir__.headers": [ @@ -646249,11 +652173,11 @@ "testharness" ], "encoding/api-invalid-label.any.js": [ - "38c0e9a55fd4800463040f9d3ed25f8a7254dddd", + "2dafb67c07d464487f4cfc1fa43d0331455a68fb", "testharness" ], "encoding/api-replacement-encodings.any.js": [ - "6d1e494ac3979bca558cf8ef7d7a7aa4dbc9649b", + "9031cf6638cad850cc26f92a0df829ba4079eb20", "testharness" ], "encoding/api-surrogates-utf8.any.js": [ @@ -646265,7 +652189,7 @@ "testharness" ], "encoding/encodeInto.any.js": [ - "7ea0b80eeb458d48d0e00e0122ded86a0d26bb81", + "7e18c812499a52b14dacb772bfaf6c429ebc2da6", "testharness" ], "encoding/eof-shift_jis-ref.html": [ @@ -647409,7 +653333,7 @@ "testharness" ], "encoding/streams/decode-attributes.any.js": [ - "21b70201271a206e7652bcc93ca1de927a318d0f", + "3fe442bf133c747d5b923d207b8f1c3a93ee5507", "testharness" ], "encoding/streams/decode-bad-chunks.any.js": [ @@ -647469,15 +653393,15 @@ "testharness" ], "encoding/textdecoder-fatal-single-byte.any.js": [ - "d3e9ae9c9a7774ee9ab11f3c6275f2c6a0275c8a", + "87e3707be4bfee91e0b4a0cb62edc9f33db418c6", "testharness" ], "encoding/textdecoder-fatal-streaming.any.js": [ - "e4fa64dbd7c43347977e25f25679149844118e5b", + "0d58b2e1d7d8a1e90353b3e42e1da58bf7345c8f", "testharness" ], "encoding/textdecoder-fatal.any.js": [ - "ba8aa5d06c3e2dfea532c70f30bb0841f6966a72", + "5ee4b65ebe3dfd3a515aae3ae904709ae084a632", "testharness" ], "encoding/textdecoder-ignorebom.any.js": [ @@ -647493,7 +653417,7 @@ "testharness" ], "encoding/textdecoder-utf16-surrogates.any.js": [ - "3b8418703da77d2052ebaa5104d8bfd22f131c81", + "b08ea56cee38a29ba62cecb19fb04561fbc80175", "testharness" ], "encoding/textencoder-constructor-non-utf.any.js": [ @@ -648317,7 +654241,7 @@ "manual" ], "entries-api/filesystemfileentry-file-manual.html": [ - "d6c62f30a3c0af7f802bae38eb5c1c7787ed2f9b", + "7ac29c0b13c41c69288c3f433725f44028d006f0", "manual" ], "entries-api/filesystemfileentry-getParent-manual.html": [ @@ -648521,7 +654445,7 @@ "testharness" ], "eventsource/eventsource-constructor-url-bogus.any.js": [ - "eb92837a71d38713c161171534f2539659995ebb", + "53c3205e8a55d7d9c9c70806b9fd2c289841ebe5", "testharness" ], "eventsource/eventsource-constructor-url-multi-window.htm": [ @@ -649193,7 +655117,7 @@ "testharness" ], "feature-policy/payment-disabled-by-feature-policy.https.sub.html": [ - "98e434a2a5c5b87a06d07cbe735279bd7e8b1c61", + "b82eb4f1ef541fb494b9061edf014f957c8117f1", "testharness" ], "feature-policy/payment-disabled-by-feature-policy.https.sub.html.headers": [ @@ -649265,7 +655189,7 @@ "support" ], "feature-policy/reporting/document-write-reporting.html": [ - "e67bff0773e03951045276072150cb12e65a3860", + "50af640e08e9f44bcc0f45590a172f11321dd9cd", "testharness" ], "feature-policy/reporting/document-write-reporting.html.headers": [ @@ -649313,7 +655237,7 @@ "support" ], "feature-policy/reporting/generic-sensor-reporting.https.html": [ - "4ccfcbf0d214d3abc253d45c3e33985c4f0daef9", + "9a5d404d34525fe5786d9b09d8fbc4eca287df2d", "testharness" ], "feature-policy/reporting/generic-sensor-reporting.https.html.headers": [ @@ -649397,7 +655321,7 @@ "support" ], "feature-policy/reporting/payment-reporting.https.html": [ - "80d0b0f09069e1027777afbf2ee17ff877f4dd55", + "417dfed7dce289a636b6308378d1d7eac0c843e1", "testharness" ], "feature-policy/reporting/payment-reporting.https.html.headers": [ @@ -649445,7 +655369,7 @@ "support" ], "feature-policy/reporting/sync-xhr-reporting.html": [ - "9e526b904d4b825771b6b318677df0aded67637b", + "dbdcc126ec44fecc712b18f874f35aef9d9d8369", "testharness" ], "feature-policy/reporting/sync-xhr-reporting.html.headers": [ @@ -649865,15 +655789,15 @@ "testharness" ], "fetch/api/headers/header-values-normalize.html": [ - "64be98af934eb0d1656cfb53376d7cbf4c0eff6a", + "079b641721a2c6a478fec478c70b509ce6a2517a", "testharness" ], "fetch/api/headers/header-values.html": [ - "6dfe0d3a78988eef77690f04b3e36e3076e33a7d", + "491288eff7c7d4ec5bf8cd37819f75106a457aa1", "testharness" ], "fetch/api/headers/headers-basic.html": [ - "1d3f4d462b89f63b325594973db90074c33af3de", + "254ef051c1227cc676dafbc9f1a3d91c98a89b01", "testharness" ], "fetch/api/headers/headers-casing.html": [ @@ -649885,7 +655809,7 @@ "testharness" ], "fetch/api/headers/headers-errors.html": [ - "194ff32f1559f2dd9b5903eb3738c17c061c7172", + "7f9916d87fe2ac125953eb25f0e278aa31073b3e", "testharness" ], "fetch/api/headers/headers-no-cors.window.js": [ @@ -649897,7 +655821,7 @@ "testharness" ], "fetch/api/headers/headers-record.html": [ - "34acc3b1c557ce7bc1841ad3d785fb1f732f299f", + "0a217c3ddb287fde30f27f75607f52c1fb2cb3ed", "testharness" ], "fetch/api/headers/headers-structure.html": [ @@ -650209,7 +656133,7 @@ "testharness" ], "fetch/api/request/request-cache.js": [ - "009d4408a56f6073474ecd807f8ce4eb70798671", + "f2fbecf496929194a7a30ef9d59ad5ec9189c5db", "support" ], "fetch/api/request/request-clone.sub.html": [ @@ -650225,11 +656149,11 @@ "testharness" ], "fetch/api/request/request-disturbed.html": [ - "d247a7ff2db3b82ffe2fd7c98a357c50658a53dc", + "27614e7e7428d4375de5000b3662668d35d7e2a6", "testharness" ], "fetch/api/request/request-error.html": [ - "70be9fb0e7c014a7e8538b7c8958081bdb902168", + "622ba3f4c28c6d552f205b3492026a9e731bd4af", "testharness" ], "fetch/api/request/request-error.js": [ @@ -650245,7 +656169,7 @@ "testharness" ], "fetch/api/request/request-init-002.html": [ - "221b415a3c182fba064a13b631c1af887461ea33", + "14be27742208beffe7f7123771812de073cff1d1", "testharness" ], "fetch/api/request/request-init-003.sub.html": [ @@ -650253,7 +656177,7 @@ "testharness" ], "fetch/api/request/request-init-stream.any.js": [ - "df5fb26a0d8fc0d77ea967102be33035b780cea2", + "e7ffa729d15b841e307d49cbdc7994ce78b2f059", "testharness" ], "fetch/api/request/request-keepalive-quota.html": [ @@ -650261,7 +656185,7 @@ "testharness" ], "fetch/api/request/request-keepalive.html": [ - "602fabc4db347139980d21f955cb20e59826739f", + "e165422166e9531b689208271f4c2691e1415cf7", "testharness" ], "fetch/api/request/request-reset-attributes.https.html": [ @@ -650413,7 +656337,7 @@ "testharness" ], "fetch/api/response/response-clone.html": [ - "f586c81bac7ca67a606cfe1c25b9ef7aa077d271", + "f5ebd7940e1eab290acac9e118c827e9b210ad71", "testharness" ], "fetch/api/response/response-consume-empty.html": [ @@ -650433,11 +656357,11 @@ "testharness" ], "fetch/api/response/response-error.html": [ - "1e68f6d01c6c763fa46427e31c6f1229ed000ccc", + "7cbb138345964f548add67a9b290657de3aecebd", "testharness" ], "fetch/api/response/response-from-stream.any.js": [ - "93b29b42867f47f4472c6820ff9d4a1a343e84cf", + "ea5192bfb10dcf316ef953c809b89a7682de92a3", "testharness" ], "fetch/api/response/response-init-001.html": [ @@ -650453,7 +656377,7 @@ "testharness" ], "fetch/api/response/response-static-redirect.html": [ - "a7492229fd06b6952347e4b61639b402106cb97b", + "f647b6debeb8930f98868b10652cd8e2ca527385", "testharness" ], "fetch/api/response/response-stream-disturbed-1.html": [ @@ -650473,7 +656397,7 @@ "testharness" ], "fetch/api/response/response-stream-disturbed-5.html": [ - "546b7b88801e8e0ff5d4ef3015d938a3803be215", + "830a41bc8096205e7dae3c8b56cad29378a5340f", "testharness" ], "fetch/api/response/response-stream-disturbed-6.html": [ @@ -650845,7 +656769,7 @@ "testharness" ], "fetch/http-cache/http-cache.js": [ - "ce49ad853631c3d2f88c5d4dc0fe807cbfa9e605", + "2ab51165f359b7fd2af64499ac435bd4774d4791", "support" ], "fetch/http-cache/invalidate.html": [ @@ -650885,7 +656809,7 @@ "testharness" ], "fetch/images/canvas-remote-read-remote-image-redirect.html": [ - "32a387288af1db934458bcc77512c388ec2ab168", + "4a887f3d331cf27ab020c2f5d4a1fa9516a91a8a", "testharness" ], "fetch/metadata/META.yml": [ @@ -652417,7 +658341,7 @@ "manual" ], "fullscreen/rendering/fullscreen-pseudo-class-support.html": [ - "ccd3f0e22be91def3e2117a567c4245a7fea5720", + "fb2ff318b9ed79b5b260b4975caffa4a0fe574e4", "testharness" ], "fullscreen/rendering/fullscreen-root-block-scroll-manual.html": [ @@ -652473,7 +658397,7 @@ "testharness" ], "generic-sensor/generic-sensor-feature-policy-test.sub.js": [ - "fabd4a7ded3c5590516e55354c1443635aa02ba6", + "2a1fba9f83c39f60beeba12d5e6c086d550dc4da", "support" ], "generic-sensor/generic-sensor-iframe-tests.sub.js": [ @@ -652481,7 +658405,7 @@ "support" ], "generic-sensor/generic-sensor-tests.js": [ - "f0d37fb9f24b68c7e155a7613cca6195208dedf4", + "0cb3cb224a187daee110c0ef044da786f480bc3c", "support" ], "generic-sensor/idlharness.https.window.js": [ @@ -652513,7 +658437,7 @@ "testharness" ], "geolocation-API/getCurrentPosition_TypeError.html": [ - "a2e578469793d7e86d1cc1817f2ab548bc6e91ad", + "6726e8ab6c7d892c4e93cf212c94f6622f89c116", "testharness" ], "geolocation-API/getCurrentPosition_permission-manual.html": [ @@ -652549,7 +658473,7 @@ "support" ], "geolocation-API/watchPosition_TypeError.html": [ - "9d7efd5e7b92c0e456f8f0a313d59ccdbc1dcd54", + "dd8287f5713ea7ce0a13a5096c45d38f640553a0", "testharness" ], "geolocation-API/watchPosition_permission-manual.html": [ @@ -653853,11 +659777,11 @@ "testharness" ], "html/browsers/history/the-history-interface/001.html": [ - "ac8c8000777474df1712357f4a7a5d78e2dd6638", + "da93e0dafc7a749a14408977cb38a3a334ea2feb", "testharness" ], "html/browsers/history/the-history-interface/002.html": [ - "431f6a58634f9d07dabe83976da1a1bc033a87a5", + "dba28b0471cbfa832051078583c15df92d3fe331", "testharness" ], "html/browsers/history/the-history-interface/004.html": [ @@ -654049,7 +659973,7 @@ "testharness" ], "html/browsers/history/the-history-interface/history_properties_only_fully_active.html": [ - "0404a6b2e028bc8497b80c3ec7b510ed59740080", + "bc09507f0ad33000c0ee0c09067495bacf1d1582", "testharness" ], "html/browsers/history/the-history-interface/history_pushstate.html": [ @@ -654057,7 +659981,7 @@ "testharness" ], "html/browsers/history/the-history-interface/history_pushstate_err.html": [ - "82afc04f2dd0d46d450f4eaec42af51dcb1e8341", + "6fa0a8589d88c07e22bb0cbf5844d57f6f78b020", "testharness" ], "html/browsers/history/the-history-interface/history_pushstate_nooptionalparam.html": [ @@ -654073,7 +659997,7 @@ "testharness" ], "html/browsers/history/the-history-interface/history_replacestate_err.html": [ - "3060cf1f128b321b00b51e6fb133cd68e745ea12", + "15d2181820cbc28703e196844763771ccb895498", "testharness" ], "html/browsers/history/the-history-interface/history_replacestate_nooptionalparam.html": [ @@ -654277,7 +660201,7 @@ "testharness" ], "html/browsers/history/the-location-interface/location-protocol-setter.html": [ - "ef92f7ab0f889b88b48ea9ddba54e4fbeb254943", + "1afef4628d43829fa617ddefed5ebfcb9355ef4d", "testharness" ], "html/browsers/history/the-location-interface/location-prototype-setting-cross-origin-domain.sub.html": [ @@ -654293,7 +660217,7 @@ "testharness" ], "html/browsers/history/the-location-interface/location-prototype-setting-same-origin-domain.sub.html": [ - "570dfccd40ff306466ee0207586c8d5416e92c08", + "8ec7585daa1475400b18d2b96e7aae3861556cab", "testharness" ], "html/browsers/history/the-location-interface/location-prototype-setting-same-origin.html": [ @@ -654317,7 +660241,7 @@ "testharness" ], "html/browsers/history/the-location-interface/location_assign.html": [ - "7e18804c283adf0055124602d2c78130d803a351", + "55f26d5660a8ced14ab995f017ba88e0fa43b3fb", "testharness" ], "html/browsers/history/the-location-interface/location_assign_about_blank-1.html": [ @@ -654613,7 +660537,7 @@ "manual" ], "html/browsers/offline/application-cache-api/api_swapcache_error.https.html": [ - "02e7b3cd8c00b70dfc14cde57a2e045e58153f77", + "4e069d73f7f54fcc7a1abb37127d797b600c7921", "testharness" ], "html/browsers/offline/application-cache-api/api_update.https.html": [ @@ -654621,7 +660545,7 @@ "testharness" ], "html/browsers/offline/application-cache-api/api_update_error.https.html": [ - "469baea8bad797807f8733185918d09b2f4cf7f5", + "46386939c5c84804b2d2eae307ebbb495ae1b7e1", "testharness" ], "html/browsers/offline/application-cache-api/secure_context.html": [ @@ -654753,7 +660677,7 @@ "manual" ], "html/browsers/origin/cross-origin-objects/cross-origin-due-to-document-domain-only.html": [ - "919a05ed2a2a5c40f56ce46e1597e8bd763b0921", + "425374faec02a6ec5f8b64f7e3d109e0bc2e0da3", "testharness" ], "html/browsers/origin/cross-origin-objects/cross-origin-objects-on-new-window.html": [ @@ -654761,7 +660685,7 @@ "testharness" ], "html/browsers/origin/cross-origin-objects/cross-origin-objects.html": [ - "2c92d5e51ad8078cec4f6e5e76035a52df93a245", + "46fc568a0eeffc5373a5ad33b5f3be0bc753d028", "testharness" ], "html/browsers/origin/cross-origin-objects/frame-with-then.html": [ @@ -654781,7 +660705,7 @@ "support" ], "html/browsers/origin/origin-of-data-document.html": [ - "d6b6d533a2219927bda6c08969b9b11d01cbf345", + "448f47fa244c1134549150367a0991f79c13da86", "testharness" ], "html/browsers/origin/relaxing-the-same-origin-restriction/document_domain.html": [ @@ -654797,7 +660721,7 @@ "testharness" ], "html/browsers/origin/relaxing-the-same-origin-restriction/document_domain_setter.html": [ - "a55d85dfdf293adc0b7160ed1bce213967d9822e", + "77f438c0166bcb570050800d3227bd7dcc691545", "testharness" ], "html/browsers/origin/relaxing-the-same-origin-restriction/document_domain_setter_srcdoc.html": [ @@ -654805,7 +660729,7 @@ "testharness" ], "html/browsers/origin/relaxing-the-same-origin-restriction/sandboxed-document_domain.html": [ - "824795f80b13c9a2860b8a1830f67393d47a30c2", + "ae1a0ccd5601c07ed32a844f4fa93aafccdc1a11", "testharness" ], "html/browsers/origin/relaxing-the-same-origin-restriction/sandboxed-document_domain.html.headers": [ @@ -654845,11 +660769,11 @@ "testharness" ], "html/browsers/sandboxing/sandbox-disallow-same-origin.html": [ - "d1bd00747f90a5b3c68c3503e6ffb03ed3c172a3", + "0dae0137ac97de7fa2125a7081effd09e730ddc7", "testharness" ], "html/browsers/sandboxing/sandbox-disallow-scripts-via-unsandboxed-popup.tentative.html": [ - "0bb98c55382f2b6481eb5d1b8b2585a55bb128b3", + "3c8c0b346a675ef2469a9ee95589a2da1ecf88dc", "testharness" ], "html/browsers/sandboxing/sandbox-disallow-scripts.html": [ @@ -655217,7 +661141,7 @@ "testharness" ], "html/browsers/the-window-object/security-window/window-security.https.html": [ - "1fb0ed7c1e62da55b890c6434bee6e46637e0209", + "ad8f177f37d2ad97d4923dd73855e03f08b587b6", "testharness" ], "html/browsers/the-window-object/self-et-al.window.js": [ @@ -655249,11 +661173,11 @@ "testharness" ], "html/browsers/the-window-object/window-indexed-properties-strict.html": [ - "e059b12261653b18dedc5591f22fa0b275d32892", + "faf214d12d527ce14716ec7ca0cf73dd4762bb85", "testharness" ], "html/browsers/the-window-object/window-indexed-properties.html": [ - "49247179738f68be143e0dc6e6c332f117945029", + "0f896cb636e973af0b044bffa880f400107ea008", "testharness" ], "html/browsers/the-window-object/window-open-defaults.window.js": [ @@ -655289,7 +661213,7 @@ "testharness" ], "html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-same-origin-domain.sub.html": [ - "83d11a20e0932852edee187b89e5f608e3ee1355", + "fb18822ac5b0067bbb870a1a5d5fd8ed7875ba49", "testharness" ], "html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-same-origin.html": [ @@ -655505,7 +661429,7 @@ "support" ], "html/browsers/windows/document-domain-nested-navigate.window.js": [ - "b639c819267477ec6546c834c452856b850af70e", + "f51eed5ca941f591536c70187e4201c464f02ab3", "testharness" ], "html/browsers/windows/document-domain-nested-set.window.js": [ @@ -655529,7 +661453,7 @@ "testharness" ], "html/browsers/windows/nested-browsing-contexts/frameElement.sub.html": [ - "2f5b1c466f8bdaf2555e548f4140abdcc18d79bc", + "7ea118208110470b47b6175329ceec473f4c1208", "testharness" ], "html/browsers/windows/nested-browsing-contexts/name-attribute.window.js": [ @@ -655713,7 +661637,7 @@ "support" ], "html/cross-origin-embedder-policy/require-corp-about-blank.html": [ - "b94cb57b95f8c290a8d3ed32b4f6b55d4f629159", + "5c51df71ae5b6a84f5c68c90a4012729a9e9c380", "testharness" ], "html/cross-origin-embedder-policy/require-corp-about-blank.html.headers": [ @@ -655721,7 +661645,7 @@ "support" ], "html/cross-origin-embedder-policy/require-corp-about-srcdoc.html": [ - "a832db1cebbf106b215a8f7c8900bf5f1d3287e3", + "4d1c1f864644dad1382092f3bdab3097d412d4cc", "testharness" ], "html/cross-origin-embedder-policy/require-corp-about-srcdoc.html.headers": [ @@ -656149,7 +662073,7 @@ "support" ], "html/dom/documents/dom-tree-accessors/Document.body.html": [ - "f42125029568476b4076603a1b982a4989b65d35", + "77de1d93b5e72343e8b56a2f7ff3503e7f4b846b", "testharness" ], "html/dom/documents/dom-tree-accessors/Document.currentScript.html": [ @@ -656457,7 +662381,7 @@ "testharness" ], "html/dom/elements/global-attributes/dataset-set.html": [ - "dbce5de309a1d0b4c70305b13540851a67c0ce91", + "a5bc177f504f9aa5acbad5e67a31a9145c486dd7", "testharness" ], "html/dom/elements/global-attributes/dataset.html": [ @@ -657637,7 +663561,7 @@ "testharness" ], "html/editing/dnd/datastore/datatransfer-types.html": [ - "d0842ae75c4f2c608b0cc25c06484027c801b75e", + "3da94d78c64827b737b3784dd6509c9f9a49c717", "testharness" ], "html/editing/dnd/datastore/helper-drop-box-here.xhtml": [ @@ -660789,7 +666713,7 @@ "support" ], "html/editing/dnd/synthetic/001.html": [ - "ddad72095b24536a031028c13e7f5a629009e49f", + "f90c345740df3f9c4366d01a3d47e323b30069fc", "testharness" ], "html/editing/dnd/synthetic/005-manual.html": [ @@ -660801,11 +666725,11 @@ "manual" ], "html/editing/dnd/target-origin/001-manual.html": [ - "4622c76a92f1dd4721a8846b4b9564d570f41fc1", + "ff8572e937bff4fd2761d801ef3bd648d395ba12", "manual" ], "html/editing/dnd/target-origin/002-manual.html": [ - "d1615090660e328544d782f82d438c50564c6a9b", + "d7e6c83a2ad17a3f6068ba76fe8f3dadd8f0c7df", "manual" ], "html/editing/dnd/target-origin/003-manual.html": [ @@ -661125,7 +667049,7 @@ "testharness" ], "html/editing/editing-0/contenteditable/contentEditable-invalidvalue.html": [ - "85b71043e16579b6dc7d2c430790138195a1e89e", + "b8c17c3a41677fb137919dda1488137a24470016", "testharness" ], "html/editing/editing-0/contenteditable/contentEditable-slotted-inherit.html": [ @@ -661141,11 +667065,11 @@ "support" ], "html/editing/editing-0/making-entire-documents-editable-the-designmode-idl-attribute/user-interaction-editing-designMode-svg.svg": [ - "6fb8a054481386dbaa160f0cab575b0bff0ccdb2", + "fd2fde0fbe1013c2e4d45a166dc57e2eabbdfb82", "testharness" ], "html/editing/editing-0/making-entire-documents-editable-the-designmode-idl-attribute/user-interaction-editing-designMode-xml.xml": [ - "ea02ecdfd39e974877ddc4bd85ac0704ef560304", + "f26cd56453b732954382a975bf2ff22b713cb193", "testharness" ], "html/editing/editing-0/making-entire-documents-editable-the-designmode-idl-attribute/user-interaction-editing-designMode.html": [ @@ -661269,23 +667193,23 @@ "support" ], "html/infrastructure/common-dom-interfaces/collections/domstringlist.html": [ - "ab5a5c025a35d8e706f3ea7cfb553c72cd1a0206", + "33f2ed6feff68d2a6ca938bf8a235f68f885cc20", "testharness" ], "html/infrastructure/common-dom-interfaces/collections/historical.html": [ - "ef8345aa72420c43a4e23ad6306d59b41fa0ffa9", + "91142c864e94f20c3ca0d5162135a773d409f60f", "testharness" ], "html/infrastructure/common-dom-interfaces/collections/htmlallcollection.html": [ - "095931ad785553a9b64d79d96eacebcb021e3171", + "14faa2128ed0bd638585955994f6b1fb48cb6a4f", "testharness" ], "html/infrastructure/common-dom-interfaces/collections/htmlformcontrolscollection.html": [ - "aa9f0a5d5e0c210156a50253cf66a8777674867e", + "5591e190b397d57b31798db6ba56f700dfe6a0ff", "testharness" ], "html/infrastructure/common-dom-interfaces/collections/htmloptionscollection.html": [ - "d39cc460e5b1e30919265921d44bda8b3d9b21ec", + "130716a9cc70226e89962a2dcc6006b297507464", "testharness" ], "html/infrastructure/common-dom-interfaces/collections/radionodelist.html": [ @@ -661357,11 +667281,11 @@ "support" ], "html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/no-coop-coep.https.any.js": [ - "a755865911d7bd5eea2c7eeca85705602234e571", + "35098892020bf58bda9f1821d2ba5b2570eb5d54", "testharness" ], "html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/no-transferring.https.html": [ - "b39e37fd4966440dc01c2efab42ea99f30574f68", + "dfa57fa2009071fc00b92d6eb89363833c50cf3c", "testharness" ], "html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/no-transferring.https.html.headers": [ @@ -661533,7 +667457,7 @@ "support" ], "html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-history.https.html": [ - "49d341f47f9bfebe37a78876ae1367766793c5c2", + "28859f17cb99bde2e50b1e85b48ae9ee35218881", "testharness" ], "html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-history.https.html.headers": [ @@ -661541,11 +667465,11 @@ "support" ], "html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-idb.any.js": [ - "4eb25eb85467fd3e9b9a41b251a8df825608838b", + "0202ec39ac6fe70fa13e83c3562979cb005c603c", "testharness" ], "html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-notifications-api.any.js": [ - "2c3fb7be034b0c315c4add66790bcfed30bcecc7", + "ce643e8a7cba5be412b367f5bc5f1bc5592df48f", "testharness" ], "html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/window-domain-success.https.sub.html": [ @@ -661633,11 +667557,11 @@ "testharness" ], "html/infrastructure/safe-passing-of-structured-data/structuredclone_0.html": [ - "fbb48db03838addca28181629070d57b1ea81f24", + "c8a6d38393c0217447992d47c994942e873e70ad", "testharness" ], "html/infrastructure/safe-passing-of-structured-data/transfer-errors.window.js": [ - "bb1c083c41df5eb896e233cbab64175c6c9b1bdb", + "b3ecd86b40a7d92d7a69f629f7e238209cde9bec", "testharness" ], "html/infrastructure/terminology/plugins/sample.txt": [ @@ -663805,11 +669729,11 @@ "testharness" ], "html/semantics/embedded-content/media-elements/historical.html": [ - "efdd90f7b152ac114b1173c4c7d8aac1cfcecc6a", + "d98a74df4e158d65672520a4eedb6929c76442ea", "testharness" ], "html/semantics/embedded-content/media-elements/interfaces/HTMLElement/HTMLMediaElement/addTextTrack.html": [ - "2a76b0a66bab3c268d3dd9d5b7b6cabab353e8a0", + "0e1a48f78a96884bd64ed7a976566081b1dcfd99", "testharness" ], "html/semantics/embedded-content/media-elements/interfaces/HTMLElement/HTMLMediaElement/crossOrigin.html": [ @@ -663885,15 +669809,15 @@ "testharness" ], "html/semantics/embedded-content/media-elements/interfaces/TextTrack/removeCue.html": [ - "a05c0b17442b691b18262b76eb0f6f10238f69c2", + "09043458cc52d91a882147cb089ec86320b0628c", "testharness" ], "html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/constructor.html": [ - "c066f60399b7ac1b10c6a5790ef2b62064be0134", + "8ee9adb1c0d30a89cc3d4830ad9d7a73ca85bcd0", "testharness" ], "html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/endTime.html": [ - "b99a12e05aae6bce84b89e498fe93651f1d40198", + "a7c10a3d4dfd7c601d0e056d2ee89f88cf59cb7e", "testharness" ], "html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/id.html": [ @@ -663913,7 +669837,7 @@ "testharness" ], "html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/startTime.html": [ - "232a7f23b3e667b6ae389fe8f9e8a0ea5ad6aeb6", + "7fba1df415aa38b5a72829530cc282b3fd8f84c7", "testharness" ], "html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/track.html": [ @@ -663925,7 +669849,7 @@ "testharness" ], "html/semantics/embedded-content/media-elements/interfaces/TextTrackCueList/getter.html": [ - "d9cd871720eb4a02eb973cdd5200c05d3966acd5", + "8056d245433fe4f55eef1babec5d3e97410dc92b", "testharness" ], "html/semantics/embedded-content/media-elements/interfaces/TextTrackCueList/length.html": [ @@ -663937,7 +669861,7 @@ "testharness" ], "html/semantics/embedded-content/media-elements/interfaces/TextTrackList/getter.html": [ - "8c5fb3759400b6415d4ea5a2f99c9eb26589927e", + "9baa4594194fedb2d38ae2c4017cd7244d4bf9fa", "testharness" ], "html/semantics/embedded-content/media-elements/interfaces/TextTrackList/length.html": [ @@ -663957,7 +669881,7 @@ "testharness" ], "html/semantics/embedded-content/media-elements/interfaces/TrackEvent/createEvent.html": [ - "9bf763f1fabd55da0bb63322900247cb6daad11f", + "1d7eb540c3c8ce00179ff0cf4eb5c4655dded27b", "testharness" ], "html/semantics/embedded-content/media-elements/loading-the-media-resource/autoplay-overrides-preload.html": [ @@ -664781,7 +670705,7 @@ "testharness" ], "html/semantics/embedded-content/media-elements/track/track-element/track-add-remove-cue.html": [ - "773fa4e8fd5f16496ecbac0af399196208534cbf", + "e73896400128ec5724c45efde9e270c1a7b70c8b", "testharness" ], "html/semantics/embedded-content/media-elements/track/track-element/track-add-track.html": [ @@ -664789,7 +670713,7 @@ "testharness" ], "html/semantics/embedded-content/media-elements/track/track-element/track-addtrack-kind.html": [ - "4503a06bb2cd25c0fc86e1930c410207488ee969", + "d058bf2987886ef609a54e5d973a1883a8c60769", "testharness" ], "html/semantics/embedded-content/media-elements/track/track-element/track-api-texttracks.html": [ @@ -664817,7 +670741,7 @@ "testharness" ], "html/semantics/embedded-content/media-elements/track/track-element/track-cue-mutable.html": [ - "cb28f6591ce9614d6a1aa3e0ea7b753d6cb713df", + "26a6b84f8a251676e4bcd9a927f849bd16bb8a07", "testharness" ], "html/semantics/embedded-content/media-elements/track/track-element/track-cue-negative-duration.html": [ @@ -665197,7 +671121,7 @@ "manual" ], "html/semantics/embedded-content/media-elements/volume_nonfinite.html": [ - "6e90a2ebcdb54abfd3655d565b6ea296ae493530", + "fce50c2e20eaf5968dd4b36193130d7d3e04a854", "testharness" ], "html/semantics/embedded-content/resources/should-load.html": [ @@ -665245,7 +671169,7 @@ "reftest" ], "html/semantics/embedded-content/the-audio-element/audio_constructor.html": [ - "57f91572bc5a3029919a534863e70c206bb0083d", + "c5b5b80ac1323794e5419264888f7d0af945ba71", "testharness" ], "html/semantics/embedded-content/the-audio-element/audio_content-ref.htm": [ @@ -665301,7 +671225,7 @@ "testharness" ], "html/semantics/embedded-content/the-canvas-element/context.arguments.missing.html": [ - "f1ef93b93acac6ab975d5363ee216308f90e9476", + "fcda9043fc78ffe3a9485d84ce466b6aa5e5566b", "testharness" ], "html/semantics/embedded-content/the-canvas-element/context.casesensitive.html": [ @@ -665341,11 +671265,11 @@ "testharness" ], "html/semantics/embedded-content/the-canvas-element/historical.html": [ - "e485e10d991ca123236598fc690cbf4243908d18", + "33044ffb1bd074960a29902971c834cb30a1cb11", "testharness" ], "html/semantics/embedded-content/the-canvas-element/imagedata.html": [ - "61331956e49659b884884201e870f87086d5cf6a", + "e124f8ff6ea869d23a7c28418f8435a3d21e2677", "testharness" ], "html/semantics/embedded-content/the-canvas-element/initial.colour.html": [ @@ -665405,35 +671329,35 @@ "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.drawImage.canvas.cross.html": [ - "2b237544c1913d86e33faec3e18201dd8bce36b1", + "66873a551f57df4c0a6da92e2de1262b44a99581", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.drawImage.canvas.redirect.html": [ - "9daa23bcc205abbc179dcff2332dad1dc3681518", + "7e640becc1fc9aca5a6b87f7e91b6c8486955684", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.drawImage.image.cross.html": [ - "4cccb91e8eaa6d0310d61ed67e934e79b4992d2c", + "f598bbe19d6c946ea51c23c78b4a81f1535fc83e", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.drawImage.image.redirect.html": [ - "349a52810e50eb0821f304f5759448949af8f281", + "0b7ca3265c1b7c9afd81b84d67c22f2e6b44f0ba", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.fillStyle.cross.html": [ - "70a154fe9c839ef25d20e32ed30b429ad2be3c0c", + "8261a29c5415abd08b021a54e7be99d7bc37e218", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.fillStyle.redirect.html": [ - "4d0be3f84ec2ac18f6ab07dff9916a6572e0d5a9", + "59cd0e0c03d21dd1d41d5ed14eeecd76100f5911", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.strokeStyle.cross.html": [ - "8ec69ae14342947246fd31586e9685a97f4f08f3", + "b987590fc9382e003393f18d5678e2acf73dbd49", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.strokeStyle.redirect.html": [ - "bb814e12c8f06088e56882c87ae32a234953457f", + "36237a2945caba39c7a1a22a938275c87c38e329", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.timing.cross.html": [ @@ -665453,39 +671377,39 @@ "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.pattern.cross.cross.html": [ - "49d4d70beedd63dc86e140aeecd3fefd7ac383b2", + "9461ad24a6ac18a851a80ebc6dff377a0d49fd5c", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.pattern.cross.redirect.html": [ - "7d526ec3949910a9bab7ed3b44bd2d2327c59e18", + "82838602b9eea4ff4979d358121421e4d45f4f42", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.pattern.fillStyle.sub.html": [ - "70c5f194ff63bedea313fe924f8c2f80849d9bb5", + "3d50bac379c081688187f1685c76a19fdca4dd69", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.pattern.image.fillStyle.cross.html": [ - "28910edc431d8558d24882caf521bc9d19cbaaf2", + "f379d3ad76f9aca9ed3efd26aabf3c88a1c766ee", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.pattern.image.fillStyle.redirect.html": [ - "9ed99a7436af492f755de53c78d688a7bc2f1463", + "a139f2a8cff359edd28c39ff1958f70afc80a6ff", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.pattern.image.strokeStyle.cross.html": [ - "77749df2bda0e18c4ccf44b8a2197484b6812789", + "25c3ee180c1dabbb2bfbb5718354182d52a9aa6f", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.pattern.image.strokeStyle.redirect.html": [ - "c57a93038b6fb2c3408adc8a46b3461b90a229fc", + "fd359d1f9a4bb3ef38e15fa1902a453b8d9f202c", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.reset.cross.html": [ - "babde24c16905cfb59baf31e53f76c495343abf7", + "64d25a3c3c1cd6059a7597c41f666907af7c8558", "testharness" ], "html/semantics/embedded-content/the-canvas-element/security.reset.redirect.html": [ - "b895f34621162acdd4f1b002b2178d68b7891e82", + "9feeee4943f4a0862f4cdbe9c75fb39e5c37d6e1", "testharness" ], "html/semantics/embedded-content/the-canvas-element/size.attributes.default.html": [ @@ -665965,7 +671889,7 @@ "support" ], "html/semantics/embedded-content/the-embed-element/historical.html": [ - "168a8468e06edf8334619949822d29ee7cb779f5", + "9df7280bb6065eaa188c637400fdd8ef609345b7", "testharness" ], "html/semantics/embedded-content/the-frame-element/document-getters-return-null-for-cross-origin.html": [ @@ -666833,7 +672757,7 @@ "testharness" ], "html/semantics/embedded-content/the-object-element/historical.html": [ - "2f293d372ec19082add2797e9bb43fef57fbb12d", + "c7a577a9d417fdc063ce0aeab21a06ca5568fc6e", "testharness" ], "html/semantics/embedded-content/the-object-element/object-attributes.html": [ @@ -667101,11 +673025,11 @@ "testharness" ], "html/semantics/forms/form-submission-0/FormDataEvent.window.js": [ - "145b5dd3727f995fba56407f07e158d1fb80ba5a", + "830d536a66311a32085ccdb4b9b60c4b3b824d1a", "testharness" ], "html/semantics/forms/form-submission-0/SubmitEvent.window.js": [ - "ca722315d815a0e40566f8dee63f5b1c389670b2", + "5f98fe05155fa4bb1bf14413b14f1146fcc2cad1", "testharness" ], "html/semantics/forms/form-submission-0/constructing-form-data-set.html": [ @@ -667261,7 +673185,7 @@ "testharness" ], "html/semantics/forms/textfieldselection/selection-not-application.html": [ - "d205ee838a819fc87fa09f616064e77e1ec36571", + "a7d7f1c5518551436b6b4845d0ce205cf3721cfc", "testharness" ], "html/semantics/forms/textfieldselection/selection-start-end-extra.html": [ @@ -667289,7 +673213,7 @@ "testharness" ], "html/semantics/forms/textfieldselection/textfieldselection-setRangeText.html": [ - "66b5e30a04e7734c211ee2df391d44b678e8ecf1", + "a5918201b314dc9198dc6ae0d46b1f065778fda5", "testharness" ], "html/semantics/forms/textfieldselection/textfieldselection-setSelectionRange.html": [ @@ -667553,7 +673477,7 @@ "testharness" ], "html/semantics/forms/the-form-element/form-indexed-element.html": [ - "66f00e7615d59d1649b9793f3d475bc7ce39b810", + "5ea96d3d1b21ac6d143b01ec325261a5255c1e8a", "testharness" ], "html/semantics/forms/the-form-element/form-length.html": [ @@ -667561,11 +673485,11 @@ "testharness" ], "html/semantics/forms/the-form-element/form-nameditem.html": [ - "e794f07c03b0921a8478cad049f2a1aba0eda8d2", + "7b7d573615e4f41c1da306db334f06d47d977961", "testharness" ], "html/semantics/forms/the-form-element/form-requestsubmit.html": [ - "1c7b7870bdf214f8672c4ede697acd28d290974c", + "62ab12c8dfdd9bbd91df15f76cbdc2a5c8832198", "testharness" ], "html/semantics/forms/the-form-element/resources/form-no-action-with-base.html": [ @@ -667645,11 +673569,11 @@ "manual" ], "html/semantics/forms/the-input-element/files.html": [ - "93088330d378cbaa816bf1a10b16535d0aa2c3b0", + "a4157a3d6baaa021bc7a403baa5842e5711db43a", "testharness" ], "html/semantics/forms/the-input-element/hidden.html": [ - "4aca00d8c6b87924c473e96561489e287f93ca07", + "9274b5cddb33227ce1ddb895470524b3a8e747c1", "testharness" ], "html/semantics/forms/the-input-element/image-click-form-data.html": [ @@ -667749,11 +673673,11 @@ "manual" ], "html/semantics/forms/the-input-element/maxlength.html": [ - "8f0a2567d40e7409fc794cc95bd975bf1ac9408b", + "da5d18d00a95ce4ca4b7ea9861d3d4930e0d157d", "testharness" ], "html/semantics/forms/the-input-element/minlength.html": [ - "7bfdf189a770de6aa32da6a38d5a01ba515740b0", + "6748e30eaf18f2729ad2d11498dcba1daae65a18", "testharness" ], "html/semantics/forms/the-input-element/month.html": [ @@ -667849,7 +673773,7 @@ "testharness" ], "html/semantics/forms/the-input-element/selection.html": [ - "7d9c1a4fd7e249e6e57e06f308d4f16fa51050aa", + "42c40108d92716ca263323389d05c5480703b393", "testharness" ], "html/semantics/forms/the-input-element/telephone.html": [ @@ -667857,7 +673781,7 @@ "testharness" ], "html/semantics/forms/the-input-element/text.html": [ - "b6d4ceabf4fa0af4d47b8a7ce2f42098c8323585", + "f30f9d39fc3dd75df3cca6b96b926078aa732ee1", "testharness" ], "html/semantics/forms/the-input-element/time-2.html": [ @@ -667881,7 +673805,7 @@ "crashtest" ], "html/semantics/forms/the-input-element/type-change-state.html": [ - "dc5dcbfdece11d08cfadabf14bc34e64bb5c012d", + "a10ea1d285830c79feba57c8e0753a05016fafb7", "testharness" ], "html/semantics/forms/the-input-element/url.html": [ @@ -667889,7 +673813,7 @@ "testharness" ], "html/semantics/forms/the-input-element/valueMode.html": [ - "5502011794fcfdcfae5161ca861448ceb503dc54", + "ff01bde269c6384a0acd743919e2173d4a37595c", "testharness" ], "html/semantics/forms/the-input-element/week.html": [ @@ -667921,7 +673845,7 @@ "testharness" ], "html/semantics/forms/the-meter-element/meter.html": [ - "1c1ce4f18c2f523a5f02eccfef4ff36ab4eb63cd", + "c7c260c957ded10d295c92c1b8273a3226cc73cb", "testharness" ], "html/semantics/forms/the-optgroup-element/optgroup-disabled-manual.html": [ @@ -668017,7 +673941,7 @@ "testharness" ], "html/semantics/forms/the-select-element/select-add.html": [ - "84a5442e424caf3bff11548e55163a8f6dd09361", + "910be348ae765df079970f4fc7f38cbbf955454d", "testharness" ], "html/semantics/forms/the-select-element/select-ask-for-reset.html": [ @@ -668081,11 +674005,11 @@ "support" ], "html/semantics/forms/the-textarea-element/textarea-maxlength.html": [ - "ff4e8f1b65c922c5983cd0dcdedb4b9a55d3747b", + "3ea673951858b3b3d63556d76454ff81179cf035", "testharness" ], "html/semantics/forms/the-textarea-element/textarea-minlength.html": [ - "9a15a1293929807b9264e4612e732949c9147ef8", + "2d40901b40d3e63fede91d9d416450580caf33b0", "testharness" ], "html/semantics/forms/the-textarea-element/textarea-newline-bidi-ref.html": [ @@ -668509,7 +674433,7 @@ "testharness" ], "html/semantics/interactive-elements/the-dialog-element/dialog-showModal.html": [ - "267c22145ee35ad9956642a0684591a53be7d1c2", + "16b55b16270b23744529eb70c125e997e6c62c89", "testharness" ], "html/semantics/interactive-elements/the-dialog-element/inert-does-not-match-disabled-selector.html": [ @@ -670737,7 +676661,7 @@ "testharness" ], "html/semantics/scripting-1/the-template-element/template-element/template-content-hierarcy.html": [ - "046395ac7c728a3f233ca7a533fdafbb42b694e9", + "823c0c830fc08c466e5043e63e1a9fdf3a942095", "testharness" ], "html/semantics/scripting-1/the-template-element/template-element/template-content-node-document.html": [ @@ -670893,7 +676817,7 @@ "testharness" ], "html/semantics/tabular-data/the-table-element/caption-methods.html": [ - "ec95eab39fb26acc0831c287d55317075abead1a", + "a349ed2b7751f22c7feac9fb8b000e753ce527d6", "testharness" ], "html/semantics/tabular-data/the-table-element/createTBody.html": [ @@ -670905,7 +676829,7 @@ "testharness" ], "html/semantics/tabular-data/the-table-element/insertRow-method-01.html": [ - "4e379a1ccc3b726b718441cc631e1a0d2a71279c", + "8ed7b5fad687784c6b1bc176e85d004a280df24f", "testharness" ], "html/semantics/tabular-data/the-table-element/insertRow-method-02.html": [ @@ -670917,7 +676841,7 @@ "testharness" ], "html/semantics/tabular-data/the-table-element/remove-row.html": [ - "dc152292e2748f60edd953c82e83f61bc106339b", + "43a128c57e92ef6a580fb2b6c522348edebaae85", "testharness" ], "html/semantics/tabular-data/the-table-element/tBodies.html": [ @@ -670925,11 +676849,11 @@ "testharness" ], "html/semantics/tabular-data/the-table-element/tFoot.html": [ - "e83d193f35f7a6596252e87306a47dbd9c9b79fd", + "40220bc1e26207b4d2870616a52145862955627d", "testharness" ], "html/semantics/tabular-data/the-table-element/tHead.html": [ - "78a874824df202fd09008336eaab1f0e2dd0da60", + "fadebecd6f2f90a63736c8aa1321cd2d0b361135", "testharness" ], "html/semantics/tabular-data/the-table-element/table-insertRow.html": [ @@ -670941,11 +676865,11 @@ "testharness" ], "html/semantics/tabular-data/the-tbody-element/deleteRow.html": [ - "5e50a31873999b9cf399f21cb59a18db1fcebb78", + "695c1ea50bf1a84f530f809e77da978b93290906", "testharness" ], "html/semantics/tabular-data/the-tbody-element/insertRow.html": [ - "4c13db7aa5f6b78cd85dc367acc701af19edb820", + "f5c2227ca607cd395467b80f5f20e249cb61767e", "testharness" ], "html/semantics/tabular-data/the-tbody-element/rows.html": [ @@ -670965,11 +676889,11 @@ "testharness" ], "html/semantics/tabular-data/the-tr-element/deleteCell.html": [ - "aa15ef77ec293c64c6f11e5ff64af7634c3c6028", + "9962617a71e0df93f40cf0883df80fc221ec3a16", "testharness" ], "html/semantics/tabular-data/the-tr-element/insertCell.html": [ - "7c2edc4acbf37e7b96beaa2f9e2cb74536dfe109", + "11cd213fe7ba1bac8d8e2e89d78aaa856a2657d4", "testharness" ], "html/semantics/tabular-data/the-tr-element/rowIndex.html": [ @@ -671981,7 +677905,7 @@ "testharness" ], "html/webappapis/atob/base64.html": [ - "c522afdd56c7ca0ef16094b9bd98c6bda5becefe", + "61c3667dceeb136e03abcec1d4835ea852e0018b", "testharness" ], "html/webappapis/dynamic-markup-insertion/closing-the-input-stream/document-close-with-pending-script.html": [ @@ -671989,7 +677913,7 @@ "testharness" ], "html/webappapis/dynamic-markup-insertion/closing-the-input-stream/document.close-01.xhtml": [ - "cccc26bf17e3afe04cdad59cf2cf325ead1fb581", + "164d71d1910f212635cfbb3f09515aafb4bbedc0", "testharness" ], "html/webappapis/dynamic-markup-insertion/closing-the-input-stream/load-event-after-location-set-during-write.window.js": [ @@ -672249,7 +678173,7 @@ "testharness" ], "html/webappapis/dynamic-markup-insertion/document-write/document.write-01.xhtml": [ - "ec8702a744eaff10fe4ebd22495a47ff4279a752", + "fc21d4e2bf2e6aff6318c2d81d2affa9833e5e06", "testharness" ], "html/webappapis/dynamic-markup-insertion/document-write/document.write-02.html": [ @@ -672385,7 +678309,7 @@ "testharness" ], "html/webappapis/dynamic-markup-insertion/document-writeln/document.writeln-01.xhtml": [ - "3d59bcd20b491b9acd84e7e65aab1faa066bc8df", + "cb5ec3a33affc613fcc3c46a2009d15066c4b8b8", "testharness" ], "html/webappapis/dynamic-markup-insertion/document-writeln/document.writeln-02.html": [ @@ -672489,11 +678413,11 @@ "testharness" ], "html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-exception-vs-return-origin.sub.window.js": [ - "0e1c54b683257aea8fd58c893957acd794cc1ab1", + "d60be3b8d6096aaee5770780b024c0e28114f2af", "testharness" ], "html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-exception-vs-return-xml.window.js": [ - "3558397410edea6eaa9e73fa6d0293cc7e4d48ba", + "8b1a04fe83adfe911d04b10a45f24569421c57ec", "testharness" ], "html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-side-effects-ignore-opens-during-unload.window.js": [ @@ -672501,7 +678425,7 @@ "testharness" ], "html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-side-effects-same-origin-domain.sub.window.js": [ - "ef35452e330e80ab8b4acebf4f1f9ef7a523dc90", + "9adacb2a99f9b4d5167a863b2d2ab9a1480266af", "testharness" ], "html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-side-effects-synchronous-script.window.js": [ @@ -672509,7 +678433,7 @@ "testharness" ], "html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-side-effects-xml.window.js": [ - "b3ea1fdf75455616c0e47772b0403bf434f76d36", + "bcc4266319a428e77dc5ba6ea7d75b6445c76113", "testharness" ], "html/webappapis/dynamic-markup-insertion/opening-the-input-stream/beforeunload.window.js": [ @@ -672517,7 +678441,7 @@ "testharness" ], "html/webappapis/dynamic-markup-insertion/opening-the-input-stream/custom-element.window.js": [ - "be646d15b803d3fbe583a38d4524ad36e1a9b5d1", + "1ad06b3d372c7fda351893da9e8a009d3134dfa6", "testharness" ], "html/webappapis/dynamic-markup-insertion/opening-the-input-stream/document-open-cancels-javascript-url-navigation.html": [ @@ -672525,11 +678449,11 @@ "testharness" ], "html/webappapis/dynamic-markup-insertion/opening-the-input-stream/document.open-01.xhtml": [ - "974702ae8cbdbd45704d325d5d7e1e649535bd09", + "c02b3e4db5091b1d4c2e73702c4240028025f702", "testharness" ], "html/webappapis/dynamic-markup-insertion/opening-the-input-stream/document.open-02.html": [ - "b56e3a836f46ebe3d902bcbcbca91ac50a6d697d", + "c7e67a0cf7486de0b70320f4d8e1b46a5556238e", "testharness" ], "html/webappapis/dynamic-markup-insertion/opening-the-input-stream/document.open-03-frame.html": [ @@ -672581,7 +678505,7 @@ "testharness" ], "html/webappapis/dynamic-markup-insertion/opening-the-input-stream/origin-check-in-document-open-same-origin-domain.sub.html": [ - "5e5ca80781809cc509a8eade7ea91e74de92f9a8", + "83ce50d6c4d6d424b9231b2a0aa505a59f19d3fc", "testharness" ], "html/webappapis/dynamic-markup-insertion/opening-the-input-stream/quirks.window.js": [ @@ -672709,7 +678633,7 @@ "testharness" ], "html/webappapis/microtask-queuing/queue-microtask.any.js": [ - "b39931719a88ad525511d8f8745a9b752a6a6465", + "e67765fade3bc64883782ffde985c915444832be", "testharness" ], "html/webappapis/microtask-queuing/queue-microtask.window.js": [ @@ -672885,7 +678809,7 @@ "testharness" ], "html/webappapis/scripting/events/messageevent-constructor.https.html": [ - "70b5ff6e568bc3885085f58d07a0b183bf9434ef", + "c0dc4d231ceac9787e37952fc516593cc113ee1a", "testharness" ], "html/webappapis/scripting/events/onerroreventhandler-frame.html": [ @@ -672973,7 +678897,7 @@ "testharness" ], "html/webappapis/scripting/processing-model-2/integration-with-the-javascript-agent-formalism/requires-failure.https.any.js": [ - "a890b350198253dc876e719d3e36d2426d3361a8", + "f195a70fdf9a41bc3abcbb1e17c38540054c5b50", "testharness" ], "html/webappapis/scripting/processing-model-2/integration-with-the-javascript-agent-formalism/requires-success.any.js": [ @@ -673061,7 +678985,7 @@ "testharness" ], "html/webappapis/scripting/processing-model-2/unhandled-promise-rejections/promise-rejection-event-constructor.html": [ - "17cc35c21b0af6cb2488345a54fb3d7117e0304a", + "888750721281df568bdc419088190b193ff37868", "testharness" ], "html/webappapis/scripting/processing-model-2/unhandled-promise-rejections/promise-rejection-events-attached-in-event.html": [ @@ -673181,7 +679105,7 @@ "testharness" ], "html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html": [ - "2b70f7ae6020dfc99d3a948c6c99970ea2dfd67e", + "c6fbeb65c55bc16f3d7c0757bc52373b34d8b975", "testharness" ], "html/webappapis/system-state-and-capabilities/the-navigator-object/secure_context.html": [ @@ -673349,7 +679273,7 @@ "testharness" ], "imagebitmap-renderingcontext/transferFromImageBitmap-detached.html": [ - "c0ae84148af586764b24e828c0ba72793230e76f", + "40bf6eeb56871be2a9373770ed1f3b82f7398a9c", "testharness" ], "images/META.yml": [ @@ -673901,7 +679825,7 @@ "support" ], "import-maps/resources/jest-test-helper.js": [ - "8fa7b65adb5f77d0e5a6282305641c8268948cb4", + "ee62af853cd285238ad92f00757c7b893164bf44", "support" ], "import-maps/resources/log.js": [ @@ -674864,10 +680788,6 @@ "2b557e653163863feffa05d3f4a4e961142aa944", "support" ], - "interfaces/css-regions.idl": [ - "f7cf3d31a114a653734990ef081ac109478dfcd8", - "support" - ], "interfaces/css-shadow-parts.idl": [ "66aaeba73a7a62280171ea1765915991b9da1ba3", "support" @@ -675389,7 +681309,7 @@ "testharness" ], "intersection-observer/observer-exceptions.html": [ - "f8d089b75b425f80cf45a8f504448af8357f7804", + "126790f290d9480dcda7eed6e1b2989ffcc6a70f", "testharness" ], "intersection-observer/observer-in-iframe.html": [ @@ -675577,7 +681497,7 @@ "testharness" ], "js/builtins/Array.prototype.join-order.html": [ - "e5589803a68bd0feda0689b85be6bd72f3da1ed2", + "13d49a8d192ac562fa5d56104195d67a62ad7444", "testharness" ], "js/builtins/Math.max.html": [ @@ -675605,7 +681525,7 @@ "testharness" ], "js/builtins/Object.prototype.hasOwnProperty-prototype-chain.html": [ - "402f1ae6fd5bfea2a18fc70b5ea73c30f6ccd418", + "e64d0b7163283d6e26a24c7812f10f39af9f7a5b", "testharness" ], "js/builtins/Object.prototype.preventExtensions.html": [ @@ -675633,7 +681553,7 @@ "testharness" ], "js/builtins/WeakMap.prototype-properties.html": [ - "ecf4a8e311ecfcf72642657468e22f234153cecd", + "2c2bddfeb7159bffa215a5f6ef858d361aa4fc8b", "testharness" ], "keyboard-lock/META.yml": [ @@ -675737,7 +681657,7 @@ "support" ], "kv-storage/interface.https.html": [ - "a5eba425b6d22469c37ee50e2845dcaa87ff8967", + "d98b1c876d39583546968bacfc2e6766bbedbf27", "testharness" ], "kv-storage/key-types.https.html": [ @@ -675797,11 +681717,11 @@ "testharness" ], "largest-contentful-paint/contracted-image.html": [ - "2d4a84bf35cf895f6bc667f2e5c4352d86fd74d0", + "ed6adfb2c7c66c65bd13f514be173d1cb48ff19e", "testharness" ], "largest-contentful-paint/cross-origin-image.sub.html": [ - "58e636e51b9f2b544b2c8f40324e61c97ee5c795", + "be0c8a1e11e334aeb62d3cd952072e481c9ee7ea", "testharness" ], "largest-contentful-paint/element-only-when-fully-active.html": [ @@ -675809,15 +681729,15 @@ "testharness" ], "largest-contentful-paint/expanded-image.html": [ - "6f7043dd8e426d6b4b5d4f89d8e64383cf7696e9", + "e0b3545c21c2c14bd26feb9720648537a780d20f", "testharness" ], "largest-contentful-paint/first-letter-background.html": [ - "44d2a1a968083e8c91f61b33909ec115ea1b3a63", + "5269e468558b5ee0ee4c9fc39a46d2523143716a", "testharness" ], "largest-contentful-paint/first-paint-equals-lcp-text.html": [ - "a49a83f346d59f8c5e1a218891ecddc5a85ac5ea", + "7a01cb15943ac3b0b863daa3272d962f78ec5e3f", "testharness" ], "largest-contentful-paint/idlharness.html": [ @@ -675825,7 +681745,7 @@ "testharness" ], "largest-contentful-paint/iframe-content-not-observed.html": [ - "7cb23ddbd2058b0079af7980a01781bb1561a3e7", + "ea8e0d79f380b723d47f9683000be7ee4985c92b", "testharness" ], "largest-contentful-paint/image-TAO.sub.html": [ @@ -675841,23 +681761,23 @@ "testharness" ], "largest-contentful-paint/image-src-change.html": [ - "5ec860fa06f3281fd421912298e7b2c93dae19bb", + "cbe46f402b4e344571932fc501d4d3410eadc125", "testharness" ], "largest-contentful-paint/invisible-images.html": [ - "d536f86dcf69da791efb442893d094c6a71d8db5", + "49324663f22688c36dbf0ae1f131bda5339151f1", "testharness" ], "largest-contentful-paint/larger-image.html": [ - "094c2096752fa52ee0a249cd26cb97b5376edae1", + "a571b8afe7915609b49197ac8eafbcde76b42d01", "testharness" ], "largest-contentful-paint/larger-text.html": [ - "973832ca6c864aff084b7db7880efb981c2bfecf", + "af8bbc06b32c95bc66b0c450b7eb20f7154edcd6", "testharness" ], "largest-contentful-paint/loadTime-after-appendChild.html": [ - "0e40127b57683fa76392827003b15c2bb9c8d558", + "f320b03df4da612b37c04900a0e702981220987a", "testharness" ], "largest-contentful-paint/multiple-redirects-TAO.html": [ @@ -675865,15 +681785,15 @@ "testharness" ], "largest-contentful-paint/observe-after-untrusted-scroll.html": [ - "1b2cd1d25b5bb9da740e5127526fed41dcebfae7", + "4a1a214c8330a79999e1841fc87c5c27d8e57906", "testharness" ], "largest-contentful-paint/observe-image.html": [ - "5856795cac49beea469b05ff06b57a163bc2756a", + "58eb5364a92536597a78f16f76907de182f60d37", "testharness" ], "largest-contentful-paint/observe-text.html": [ - "a2a376fde335cb2b9e05c8923998bfc15c2695f1", + "402fcd8019586c6b63077ff68fc8ae3a425c1574", "testharness" ], "largest-contentful-paint/redirects-tao-star.html": [ @@ -675881,7 +681801,7 @@ "testharness" ], "largest-contentful-paint/repeated-image.html": [ - "82d662d330ab74ce88773257dadfb75af87451d1", + "8c3c8909099296b85cdcda6f25c893f12a4ad3ac", "testharness" ], "largest-contentful-paint/resources/iframe-stores-entry.html": [ @@ -675901,15 +681821,15 @@ "testharness" ], "largest-contentful-paint/text-with-display-style.html": [ - "2f1f254d7775e84c7bbfdc77125eb7265b627dcf", + "24541541a8becb116ada2c682e48630932ba1fbf", "testharness" ], "largest-contentful-paint/toJSON.html": [ - "7defcce1b6f9f2b681405988f74d3977fa3f29e8", + "25be5eb2dc909fcc2c224538607e3af47377ffc2", "testharness" ], "largest-contentful-paint/video-poster.html": [ - "9ad9c4cdfd09bfb3c3de4b77c29fff31a2d7089f", + "535f30e256574d9b734028f0ba7fb13b02ac0dba", "testharness" ], "layout-instability/body-display-change.html": [ @@ -676069,7 +681989,7 @@ "testharness" ], "lint.whitelist": [ - "1b102e4e03cc42f9b3d9774ed3ebbc42ede82c7f", + "e428d2f4f1911d93cfdfde2f1a924b08d32e8ea8", "support" ], "loading/lazyload/META.yml": [ @@ -676149,7 +682069,7 @@ "testharness" ], "loading/lazyload/original-crossorigin-applied-tentative.sub.html": [ - "dc3cff783e10189a90024f2fc03ae1f5ef54128b", + "34470b03525ab202078883915b6a51f06a3c0937", "testharness" ], "loading/lazyload/original-referrer-policy-applied-tentative.sub.html": [ @@ -676217,43 +682137,43 @@ "testharness" ], "longtask-timing/long-microtask.window.js": [ - "7b7d1848f8c9a85a147abab47769960e905f33c7", + "9219fdb5c49b99b646343584fae37380d6f2a2b1", "testharness" ], "longtask-timing/longtask-attributes.html": [ - "8e0da824a873c6cf914cc85684d8bceb76a85153", + "24540d7c22f04dec0919412a481adf279f685290", "testharness" ], "longtask-timing/longtask-in-childiframe-crossorigin.html": [ - "149cf93e8695ef1e65d1db7a3700edfca3710d7c", + "20a94a1eef4de998aa1ea9fa8ed4b781e7da9d3e", "testharness" ], "longtask-timing/longtask-in-childiframe.html": [ - "432ead57597fd4d995f8ace6f232823908ece881", + "4feae7e55c16367025e13dfe1b1364500bcc34bc", "testharness" ], "longtask-timing/longtask-in-externalscript.html": [ - "57c2d5650c05e33ca4eaefa95a367dcb44075a13", + "db5c9db4a1626417aedd6c0e62c39376d8ee1a02", "testharness" ], "longtask-timing/longtask-in-parentiframe.html": [ - "2da635467a211cae6e15352c8e9ddf450ce36663", + "c6b7e3e583894ce57b292c3b746009f11a8a43c5", "testharness" ], "longtask-timing/longtask-in-raf.html": [ - "88ad2ef98927aa64a610a8573e8564c5dce20cbf", + "110ae751ee335d6d08b527d0cc7b32174f3371ec", "testharness" ], "longtask-timing/longtask-in-sibling-iframe-crossorigin.html": [ - "653556333a14c244bb079d4235fea2cb9a821d54", + "ba9c7170626e34b0f36d7680841cb13c048152e2", "testharness" ], "longtask-timing/longtask-in-sibling-iframe.html": [ - "280d387654b8a49b7c726db9175983d88b2ce73a", + "8f530fab06970125589e0594cb5725617c829349", "testharness" ], "longtask-timing/longtask-tojson.html": [ - "20a97a16b041883691db832a7197162d5699cdc9", + "6574b62d348b08e2f43aa5a81a2f3fd8bd2c50c6", "testharness" ], "longtask-timing/resources/makelongtask.js": [ @@ -676273,7 +682193,7 @@ "support" ], "longtask-timing/shared-renderer/longtask-in-new-window.html": [ - "3a68d1451a5b47ce703fd971a68ea09eb4f2ae4d", + "18d36b1e734bc0ef21af575892690211c420bd5b", "testharness" ], "longtask-timing/shared-renderer/resources/frame-with-longtask.html": [ @@ -676281,7 +682201,7 @@ "support" ], "longtask-timing/supported-longtask-types.window.js": [ - "3c68c01d32d614dab435d91a0dce39244f8d7e09", + "aaa6415a8d3e5f73e940ae83551e05caee67311c", "testharness" ], "magnetometer/META.yml": [ @@ -676872,6 +682792,14 @@ "2ad6b0b772c39cad147604523409d85bee999564", "testharness" ], + "mathml/presentation-markup/spaces/space-vertical-align.tentative-ref.html": [ + "ed30edde96258d56f300b89889e019df392bb7a1", + "support" + ], + "mathml/presentation-markup/spaces/space-vertical-align.tentative.html": [ + "31fae695da78d08f9bc7e585f40487b611b24881", + "reftest" + ], "mathml/presentation-markup/tables/table-001.html": [ "f967f62a22b2c731b0ad83ded970165539391abe", "testharness" @@ -677661,11 +683589,11 @@ "support" ], "media-source/SourceBuffer-abort-readyState.html": [ - "159ee60a2d0c4f6c4ca6be14da5bdaf9f7901226", + "5942379d08e69619208bc22f6f8fcc513d7f16e7", "testharness" ], "media-source/SourceBuffer-abort-removed.html": [ - "00d65c133b009fe7a64f6a2c294c19ec06a5a8bf", + "c96412d06309f0976231539fe4c7b77332275535", "testharness" ], "media-source/SourceBuffer-abort-updating.html": [ @@ -677677,7 +683605,7 @@ "testharness" ], "media-source/URL-createObjectURL-null.html": [ - "a4177dd846be89c4f9118b1ba3ef9a72eb2a0ecf", + "f2f973a776e5fc17fd59765d5551a79eb492a959", "testharness" ], "media-source/URL-createObjectURL-revoke.html": [ @@ -677713,11 +683641,11 @@ "testharness" ], "media-source/mediasource-addsourcebuffer.html": [ - "6ada12284908d13a9658380cbdde3179e702047d", + "a95155aefc281aa1d5e83ccdcc5663122af9fc40", "testharness" ], "media-source/mediasource-append-buffer.html": [ - "a742ea3916be0eb129a2db666cfaec43dd3f1db3", + "750ccaf456f7f1348d2d0844798513b05e4b1136", "testharness" ], "media-source/mediasource-appendbuffer-quota-exceeded.html": [ @@ -677725,7 +683653,7 @@ "testharness" ], "media-source/mediasource-appendwindow.html": [ - "aebbee418dfefb7a67c72fb569c9b84560faee44", + "9add634080467620cee954fbd7d3fb33d8c4f3a5", "testharness" ], "media-source/mediasource-attach-stops-delaying-load-event.html": [ @@ -677737,7 +683665,7 @@ "testharness" ], "media-source/mediasource-buffered.html": [ - "38cd1717eb23be2d6ef9dde3959aa79b48621193", + "7015fc6b61ac68eb058dc9acaa73ecc5a60dd605", "testharness" ], "media-source/mediasource-changetype-play-implicit.html": [ @@ -677761,11 +683689,11 @@ "support" ], "media-source/mediasource-changetype.html": [ - "8ce821d08f1c247675e5f9d86ee9554c191e47e4", + "25618cdc1ec25a20e1569d6429f9c83da3b5303a", "testharness" ], "media-source/mediasource-closed.html": [ - "4b22cae85445d73da19de7cd145a8789cd9f562f", + "79d522f2f9a9ecdfe7d35d0c955719ffcf0e3f24", "testharness" ], "media-source/mediasource-config-change-mp4-a-bitrate.html": [ @@ -677845,11 +683773,11 @@ "testharness" ], "media-source/mediasource-duration.html": [ - "4bc0fb2d74c103e69656dfd8c9a46272bcb2eacf", + "b4619da38b9f960fe1af1f9e890cde746fc2301e", "testharness" ], "media-source/mediasource-endofstream-invaliderror.html": [ - "0327e44cc0d8a000a0945a523ba7499c733bc165", + "20a118d717100cbcff7d65b7d480e12c6eba43f0", "testharness" ], "media-source/mediasource-endofstream.html": [ @@ -677873,7 +683801,7 @@ "testharness" ], "media-source/mediasource-liveseekable.html": [ - "3e79a1140264ffa467198bc8c2996c42657231fb", + "123a41e9e54a0c4c572ed2cd6874e8c571864e7a", "testharness" ], "media-source/mediasource-multiple-attach.html": [ @@ -677897,11 +683825,11 @@ "testharness" ], "media-source/mediasource-remove.html": [ - "454178709f9b7b2f83fd9a60625765512874b502", + "6fea5a3e2e5366da0953d1348ab13a7d06e25877", "testharness" ], "media-source/mediasource-removesourcebuffer.html": [ - "0388565329ff0d734785715a7b7d720c53b3feaa", + "30ec930cbeddac0cd5385985ea760fd8879f9bdc", "testharness" ], "media-source/mediasource-replay.html": [ @@ -677925,15 +683853,15 @@ "testharness" ], "media-source/mediasource-sourcebuffer-mode-timestamps.html": [ - "c5816968b0713b3094f44d385fd77341043728b6", + "c62e542162209fe18c19a2e3bcad140bdfbc21fb", "testharness" ], "media-source/mediasource-sourcebuffer-mode.html": [ - "521fa7f92afc8b56207f8dc27e15eb860b4c38af", + "2d84fa9753c04a3162a7204fe2b19999cebd8c76", "testharness" ], "media-source/mediasource-sourcebuffer-trackdefaults.html": [ - "0eb9d2643af2888546f1eba15286700ad38d5f44", + "905d1d0d0ee197aeab7a4823bdad72136674c1ce", "testharness" ], "media-source/mediasource-sourcebufferlist.html": [ @@ -677941,15 +683869,15 @@ "testharness" ], "media-source/mediasource-timestamp-offset.html": [ - "22e429286835a3329eebd8b9d53fbc3766df6e38", + "05495b71920d9f4e32db2cf0c2943f8908030084", "testharness" ], "media-source/mediasource-trackdefault.html": [ - "5fc2e5e97d6a04783409e05fb539eb29f1c761a7", + "e6c9e76ef91a382b1fe014b70269850d8677e5fd", "testharness" ], "media-source/mediasource-trackdefaultlist.html": [ - "cceda8be460a610b03afd35e83facf544901a731", + "940260cfd298897050725c83e26090c94b63930e", "testharness" ], "media-source/mediasource-util.js": [ @@ -678329,7 +684257,7 @@ "testharness" ], "mediacapture-image/ImageCapture-creation.https.html": [ - "387dceee37a8ee8149f63e5af8c1bd8e5cb8763a", + "e53915608f00df16cdbe65f6bcae304a8dd4d92a", "testharness" ], "mediacapture-image/ImageCapture-grabFrame.html": [ @@ -678441,15 +684369,15 @@ "testharness" ], "mediacapture-record/MediaRecorder-error.html": [ - "7852ee3a7c141112dd6e0faa0b36e2cc324c461d", + "4daf2d9cd1a6de82165152facf88c4742eb00536", "testharness" ], "mediacapture-record/MediaRecorder-events-and-exceptions.html": [ - "cddc07e5079481e0ac7b44d1c223d88bea9e64fe", + "5dca350dd2754211ace05c5df7d9a5fd62aee428", "testharness" ], "mediacapture-record/MediaRecorder-mimetype.html": [ - "06841aea9e66d26ef77be3b95018a97cfbf70bd9", + "8b98977dda2f4d1d0d6d3e121bb03304122c5eac", "testharness" ], "mediacapture-record/MediaRecorder-no-sink.https.html": [ @@ -678465,7 +684393,7 @@ "testharness" ], "mediacapture-record/MediaRecorder-stop.html": [ - "bda5d871d04cd3fc52cd4a30efd0392f3708c9bb", + "bb39b027f0fcac0a4aa63918d56d62296607b5e9", "testharness" ], "mediacapture-record/idlharness.window.js": [ @@ -678653,7 +684581,7 @@ "testharness" ], "mediacapture-streams/historical.https.html": [ - "9437c51552abf1d3e72e9697c4d30ec47e508e29", + "84326cec0a61adafc27a2f07846b820a983d8d61", "testharness" ], "mediacapture-streams/idlharness.https.window.js": [ @@ -678677,7 +684605,7 @@ "testharness" ], "mediasession/mediametadata.html": [ - "11f6a5f9767248b9dbec50a36d39dabb392e48aa", + "ff00e54ee7c6c31cb899a9045de2311be55fb67e", "testharness" ], "mediasession/playbackstate.html": [ @@ -678709,7 +684637,7 @@ "testharness" ], "mimesniff/mime-types/parsing.any.js": [ - "640a46b9e98ee145cdfaf44cc458023e1f1ac4bd", + "ae396c4f095b6a6d190a25fe2a0231c53f19b29a", "testharness" ], "mimesniff/mime-types/resources/generated-mime-types.json": [ @@ -681377,7 +687305,7 @@ "manual" ], "native-file-system/native_FileSystemBaseHandle-postMessage-MessagePort-manual.https.tentative.html": [ - "4b57576688171377b2296c4595917a5b7563b1fb", + "c78b766dab91f158f5fe89c6929153108230545c", "manual" ], "native-file-system/native_FileSystemBaseHandle-postMessage-manual.https.tentative.html": [ @@ -681481,7 +687409,7 @@ "testharness" ], "native-file-system/sandboxed_FileSystemBaseHandle-postMessage-MessagePort.tentative.https.window.js": [ - "043c6b392622df65a7ad92f422bc74a5c8329ee2", + "e64e6446399af15e5a7e469fd9285570de6ed749", "testharness" ], "native-file-system/sandboxed_FileSystemBaseHandle-postMessage.tentative.https.window.js": [ @@ -681953,7 +687881,7 @@ "testharness" ], "notifications/constructor-invalid.html": [ - "88df165e169c03762d9b364437eb13f56d8d0720", + "1995ccc4f5f979d4e01e97dc95ecce698eae4885", "testharness" ], "notifications/event-onclick-manual.html": [ @@ -682785,11 +688713,11 @@ "testharness" ], "offscreen-canvas/conformance-requirements/2d.missingargs.html": [ - "4c810495c8f224d58e8855c0dc6384abd4e02406", + "77d35fdbf4e0ca2c6e028e4dac4f8566fce345b8", "testharness" ], "offscreen-canvas/conformance-requirements/2d.missingargs.worker.js": [ - "b8bc127b877c088699c498ac276bdbc423d380ac", + "0fc7c4d2bb5301ce1fbdb78c4faae822bc292806", "testharness" ], "offscreen-canvas/conformance-requirements/2d.voidreturn.html": [ @@ -682961,11 +688889,11 @@ "testharness" ], "offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.null.html": [ - "0cf9ca26d73147f38c3d4538b82a33d0f6eb11e2", + "ffc7c9b08b50117a84af95c9532aa31cf668e650", "testharness" ], "offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.null.worker.js": [ - "8ed0887ecd879783bd18e3eb82215a48f8db2285", + "4591facb2ce1ab4a4d45c1bf7d810a1c0d356b3a", "testharness" ], "offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.path.html": [ @@ -683009,35 +688937,35 @@ "testharness" ], "offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.wrongtype.html": [ - "5cb283466bd5879d7084c3b52e23a2517fe3f6a2", + "c003ae2571d57d731fc8c73cc96358e88bb7ca28", "testharness" ], "offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.wrongtype.worker.js": [ - "ffdc25021635a8264bc7c371a7f3e5e3c1236536", + "5ab86698b9599ab5314c1c982da02737fba8fa40", "testharness" ], "offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerocanvas.html": [ - "f945cedab15fb77dc2a714d75d407587636c8058", + "04d4ccdb1222edc553839926946d4bdea3927bc1", "testharness" ], "offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerocanvas.worker.js": [ - "1e9d63cf92b0353c88426cf4cd68e5a507333435", + "7caae3668443b0e695211f15e4c95350ac55c027", "testharness" ], "offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.html": [ - "b941f3aa3aaa89322b40017d029274dcec264c85", + "8bf00de42382e65691599cfd0d7c0544c293c363", "testharness" ], "offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.image.html": [ - "1abcb6abf495ae8f6959393dd3496d6041b6cc75", + "94d9bb61a6b605cae1f06a86dd12e392391c0882", "testharness" ], "offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.image.worker.js": [ - "cf472ac4179c9903261f8c72f11d49bc610778b9", + "60768bc7a04dc029fb75b67b2581f43866371a52", "testharness" ], "offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.worker.js": [ - "b3b6a59cb7af150863f483de43837eb914dfafc6", + "be18c26b1ab0d0105de68bf8a53eb8947f896868", "testharness" ], "offscreen-canvas/drawing-rectangles-to-the-canvas/2d.clearRect.basic.html": [ @@ -684433,11 +690361,11 @@ "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.gradient.linear.nonfinite.html": [ - "51d48ac0fe13bdb0478fb2d3b04a8fbdd0285026", + "b20299bdc6c043ab4fa781428be4ed83004507f8", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.gradient.linear.nonfinite.worker.js": [ - "c8268b009937b065ba9df93502d8d8526a909ef6", + "5d9ad6883042f6af8e937fdecb00c3a9bb3716a7", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.gradient.linear.transform.1.html": [ @@ -684481,19 +690409,19 @@ "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidcolour.html": [ - "0b72a83527fcea6f87cc2c03f6782a1816bb0f32", + "e2ad325ebe74d4a45584172815a30c082a8f5a57", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidcolour.worker.js": [ - "526edbffb6061819b70b83d57942b065a2f8769c", + "4fde56802008160695261c81a1728ee97daab70b", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidoffset.html": [ - "d841895c97e8c36bbf56e1f2998d5c1ceb02147b", + "95c9f30478604930336667c779c115e89db69755", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidoffset.worker.js": [ - "23b5d7a3d856cd067e21a5933cf5b3dcf5aee213", + "79cefb3ed200a3d3f644ae393e449f9a8b6719fe", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.update.html": [ @@ -684601,19 +690529,19 @@ "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.negative.html": [ - "39cacb901e6b9dd57c583a898a6fd6e4cb691be9", + "470455eab0bda3789c6e5e4a19f642b371f6f5b8", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.negative.worker.js": [ - "979e020796b248b86c59632aefc134e6f72c1de1", + "8c206b7a8569f2092de8da69f12d1d464fca3a9d", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.nonfinite.html": [ - "ce657dec4c2573cba52f1ab2ef5c886ff625c603", + "207ebbc10d87876112b9348589cfcf5d36592ae8", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.nonfinite.worker.js": [ - "6a2d6e0eb04973cd4e80c288b5ce39228bd32653", + "e07060cf2c0b5e9445e8df06af7d0722fc0dbe45", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.outside1.html": [ @@ -684713,11 +690641,11 @@ "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.basic.zerocanvas.html": [ - "2293d21bf7b700ca95aebe1b158fa676c86a6c16", + "e1a0ec00bf35cd9555c11e3c476c7306facb0e8f", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.basic.zerocanvas.worker.js": [ - "c015002c6ada142efd66e6c0d9f75876cb46b13a", + "3034dee9f792f5e93721b4869d53152b52e4ab41", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.crosscanvas.html": [ @@ -684729,27 +690657,27 @@ "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.null.html": [ - "193bb9dd4c01b3c3de71a023435591237f6bcf63", + "0bf03d53d7f55912efd37dab3652ed739d7e6ba0", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.null.worker.js": [ - "6b5ad64c7c4652f0d39b6543240c05f9806a1746", + "73af4f44af1ad774468498980cf6df3d04b737b2", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.string.html": [ - "0722f8f28173f5e953c684a14fcb1644e5f63248", + "f38cddbcc5d59463830960d2544840c4934b2305", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.string.worker.js": [ - "c64f978c3fa9d76f7b2a9b9fe8b17d1778da6911", + "bade91af85dea6de8fcfb4862461ea9792a6b9a5", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.undefined.html": [ - "8dff948281390082f2f718b92ec715be90613462", + "1d106cc075aba40959ffbed912813a1e1eb79656", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.undefined.worker.js": [ - "52163c091c50c508708c894cb9cd47a481f980e5", + "d53b19aed0c7e8a474f30232e41c1c14192ab990", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.modify.canvas1.html": [ @@ -684913,11 +690841,11 @@ "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.case.html": [ - "392dfb66e91fc29784472a70d69ced1902236bd8", + "3fa8c333bfbb670af9e35b332cd0197c9a556cce", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.case.worker.js": [ - "1f7557e483f0168a272e36073d160a58b21f40ba", + "9d92417722cfce159f420d74677ca1582fdf3508", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.empty.html": [ @@ -684937,35 +690865,35 @@ "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.nullsuffix.html": [ - "4b0f25afbf9369efa5560e48c00e706ffd679e02", + "65dc223ec94657ca7b55f85e260c1e194aaedd10", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.nullsuffix.worker.js": [ - "3288e128257b9d3e963a0a41687634061c54548a", + "de773414fa38bca9fe4665a69022377bcc982e97", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.undefined.html": [ - "0722ae5ddc949fa7484d18ff4752a41f959dc197", + "b064877a4bee4c091216d3f5c40ee708903e129f", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.undefined.worker.js": [ - "020adf7c0026e3ff8fb051863a8a716a9557c0cb", + "7306f85ad79dc515492717382bede01adafca6a1", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognised.html": [ - "03f4659fd7768ffc7e1cc2f0b0d31bcb6e5e17db", + "d0f8e63e7f1bdee3a6b7af618ad996b5ca917918", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognised.worker.js": [ - "2d7796d0ae38ec6a0e77ccc8b8d02696d87a6558", + "db19ecae4493811abde355641b066cc6e58d708b", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognisednull.html": [ - "5d5b70536c4db560e832edf6469f38ce3b3d5300", + "8065796e3c1b3028a78093d8645878fa7d4d191f", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognisednull.worker.js": [ - "d16979b6e98ead15119e554c796557cad6fd2a87", + "5bb8e81b76cafb1124d94657762dc4984409d5f0", "testharness" ], "offscreen-canvas/fill-and-stroke-styles/2d.strokeStyle.default.html": [ @@ -685321,11 +691249,11 @@ "testharness" ], "offscreen-canvas/path-objects/2d.path.arc.negative.html": [ - "38b7b8679eae84e7b4472817d1a570b6f5156ea2", + "96b5bc3ec2a3e2bba7aa2ffcb83fa7196c4d2209", "testharness" ], "offscreen-canvas/path-objects/2d.path.arc.negative.worker.js": [ - "e8488a0abba23e181bf2ba6a104f981884363d04", + "e4bdee938562edf7de29f14242ca909a7ad24a2e", "testharness" ], "offscreen-canvas/path-objects/2d.path.arc.nonempty.html": [ @@ -685529,11 +691457,11 @@ "testharness" ], "offscreen-canvas/path-objects/2d.path.arcTo.negative.html": [ - "0bd6eb2dbb57a438fedf7984980800a5e63e6a0d", + "509dc1df0ba36c22cfa69609f061e20fca5db7ca", "testharness" ], "offscreen-canvas/path-objects/2d.path.arcTo.negative.worker.js": [ - "55ecf54c381bf56654f10a8accc0291b647f41db", + "67f3c0118212a2592defa0fd109836edf0abb1a5", "testharness" ], "offscreen-canvas/path-objects/2d.path.arcTo.nonfinite.html": [ @@ -686329,11 +692257,11 @@ "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.create1.zero.html": [ - "1000e44c8632043192a35030d27d5ebab40952df", + "9c72eb1c6ce5615a541b4075c319cc1574f4b14b", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.create1.zero.worker.js": [ - "693fc5927bfd58440d7027af3c77353481bf7ea8", + "dc35289fd39a36401dafeda364adcad9af188869", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.create2.basic.html": [ @@ -686369,11 +692297,11 @@ "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.create2.nonfinite.html": [ - "6f8afc0303fa1d3362fd0dab7fe0b3668319c6b6", + "ba25bd689e742c2d53366722285ca77fbc58fbe3", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.create2.nonfinite.worker.js": [ - "3f588b0ad6bdee1d780ad3aca0aa67f91bbb33a4", + "2c2e9dc2a0d275a3d25bf3b38a17efa3e895d100", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.create2.round.html": [ @@ -686385,11 +692313,11 @@ "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.create2.zero.html": [ - "43a216cdc60c2ff960badf638af01b24a2f1f238", + "5a4553c90a37877849bc52b6dfe236a6ae3553ce", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.create2.zero.worker.js": [ - "e64977ca161778edd4f55c375b7f0ad4cd8173ea", + "ad892d90b98ac0c468ea941db5b7095801e4187f", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.get.basic.html": [ @@ -686417,11 +692345,11 @@ "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.get.nonfinite.html": [ - "8d30b552a4a10af3cb98a1dbefba0dce0204ef1c", + "f40580e2345af5ce4995c5cb4aa6f7400ec49a5c", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.get.nonfinite.worker.js": [ - "b709ca6e99fce725092e10d5a2829b22d159bacb", + "754fcf87d73b922b9aad785ac70f8483e0efa2bb", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.get.nonpremul.html": [ @@ -686513,11 +692441,11 @@ "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.get.zero.html": [ - "3c461358222a908458e32def24e0debcb3dfc25f", + "6eab68366896274a52e8a46cf7aab1a5243a4d1c", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.get.zero.worker.js": [ - "a5a963db6c1d414f2fa856691c54e3bda67d4d1a", + "89d68cc527932955bd42f4db5e80087a8a533554", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.object.clamp.html": [ @@ -686673,19 +692601,19 @@ "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.put.nonfinite.html": [ - "9519691b991f7a78cc0d007fd81239f28f15e909", + "357473121f2947ed3b7bc7dcd8174a6d3a9e8d4d", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.put.nonfinite.worker.js": [ - "97b81d71eaccaa5fea80607953193399b25c9c62", + "c771a3ccbb5491f0c4bdb97725d04c4eabaa0dd1", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.put.null.html": [ - "f36f93eeddd19b391f756e943f27bbab74d981c7", + "aaf8e11a38e3fa019acf97531836ca336b020b52", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.put.null.worker.js": [ - "e7c4b3bc0118bb4c8991010ae9cd6c62675810ec", + "5f3417156be4ddf0222141430136959c6f6c2494", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.put.path.html": [ @@ -686713,11 +692641,11 @@ "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.put.wrongtype.html": [ - "90700552371d3435b4bed200d5afc508d118f590", + "95775e208aab92ece06e361375628185a76fdc68", "testharness" ], "offscreen-canvas/pixel-manipulation/2d.imageData.put.wrongtype.worker.js": [ - "93dc33c07955cfb8e5eeb87c2aedfd8418bba77f", + "36437c291456a0e9ba7476c1d4cd69d358e3abc8", "testharness" ], "offscreen-canvas/shadows/2d.shadow.alpha.1.html": [ @@ -687833,59 +693761,59 @@ "testharness" ], "offscreen-canvas/the-offscreen-canvas/context.arguments.missing.html": [ - "ae8dd692148b3c762a581b0b76e603513a4b4717", + "a8c7f5ce5c18289c6d1997d61f400a2f61bf48c3", "testharness" ], "offscreen-canvas/the-offscreen-canvas/context.arguments.missing.worker.js": [ - "9dbd97c861a2857a3032680636d7d927411587a7", + "564790a23915b4e94ffddd5be72030d0a5af55bc", "testharness" ], "offscreen-canvas/the-offscreen-canvas/context.casesensitive.html": [ - "56431e2e4fc6c24430f54a736dca258b57f10185", + "3a51e5468784c38a032d49068aabc253b584a0d1", "testharness" ], "offscreen-canvas/the-offscreen-canvas/context.casesensitive.worker.js": [ - "b41c1f767f538888104ecdc5b3b4a98bb9dff8b0", + "e8d8b710a272fe460ad55d263cf0beb9d6d304d9", "testharness" ], "offscreen-canvas/the-offscreen-canvas/context.emptystring.html": [ - "92f37506eaa44c23b9aae9bb752eff12af69adbc", + "bb3c20211b8b84db36af666dd78cd4e8e0732832", "testharness" ], "offscreen-canvas/the-offscreen-canvas/context.emptystring.worker.js": [ - "54406bb5bfe06aa01c748f2d044edc91741bf256", + "fb172b21c2fd2eba74277149e9324f3715c17aff", "testharness" ], "offscreen-canvas/the-offscreen-canvas/context.unrecognised.badname.html": [ - "8e846714fad82a2824ee2c61d4cea1a71efd0470", + "52f6bdade538d4db01ed15d3e307d05efeaba9af", "testharness" ], "offscreen-canvas/the-offscreen-canvas/context.unrecognised.badname.worker.js": [ - "855f997118b8b36d571fb5760f687b0957742a3c", + "d9a08a50e3e38e5f2ca61e23134b486ec665b2a7", "testharness" ], "offscreen-canvas/the-offscreen-canvas/context.unrecognised.badsuffix.html": [ - "5511c4f21ec1ea096937d6c709c0dd7c9f29fea3", + "1c6c3f0679c16c9d931346f12fd6380437f68b3d", "testharness" ], "offscreen-canvas/the-offscreen-canvas/context.unrecognised.badsuffix.worker.js": [ - "c56ea7eb61538fef00e0c75ddeecf642e23b59e1", + "14905a8b67542c866a64e886c073b840d7194f20", "testharness" ], "offscreen-canvas/the-offscreen-canvas/context.unrecognised.nullsuffix.html": [ - "b8660ae7fc6da28bedbfc14fae1808f286d89807", + "0ce674a837c502bbda53988afe3d454caae0af73", "testharness" ], "offscreen-canvas/the-offscreen-canvas/context.unrecognised.nullsuffix.worker.js": [ - "efe45b9196bab91bedc4e238b5478837c6a474a7", + "def49a23655b669844c2c535754447254cb76420", "testharness" ], "offscreen-canvas/the-offscreen-canvas/context.unrecognised.unicode.html": [ - "89f2655d5636748bc0e13c360352aa44d9ded1b2", + "6e041ad532906b342273d8ad5ce7a0574840f89c", "testharness" ], "offscreen-canvas/the-offscreen-canvas/context.unrecognised.unicode.worker.js": [ - "a533117562d6403e52d5d9ad3fecd2b499344025", + "918fe58cad732fdfe55f66e63114c4bd621a735b", "testharness" ], "offscreen-canvas/the-offscreen-canvas/initial.colour.html": [ @@ -687969,27 +693897,27 @@ "testharness" ], "offscreen-canvas/the-offscreen-canvas/offscreencanvas.constructor.html": [ - "a1760764dec276555c9125b04778d6a069716aff", + "cefe39d0fc80fec2b2a47c96d5fb179a25ea386f", "testharness" ], "offscreen-canvas/the-offscreen-canvas/offscreencanvas.constructor.worker.js": [ - "285e4e1d948764d54fd511b81f2d9dac0ee5b494", + "a9331101350dbeab41710820440f173fa1f60cff", "testharness" ], "offscreen-canvas/the-offscreen-canvas/offscreencanvas.getcontext.html": [ - "7aaa0e6c36a7a147de60e54124dc15c26fd49273", + "0cb0abcc3b18a66d83a2ae301d7724c11a7b004a", "testharness" ], "offscreen-canvas/the-offscreen-canvas/offscreencanvas.getcontext.worker.js": [ - "ced412fb8945d1b17732da0b179897948dc44565", + "d82b5a1c8d7cdef2f3a210ee82c243cd013240a1", "testharness" ], "offscreen-canvas/the-offscreen-canvas/offscreencanvas.resize.html": [ - "0922727c61ea2e152d3b52d381a6adb0bf4a31d1", + "a0d4263c93552781d1f72016710fb3f5fd9ffd79", "testharness" ], "offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfer.to.imagebitmap.html": [ - "31187c64e3dd656a000075bfdcf5e2030e796a05", + "e127a1eef85636e3c90af47f3f4ad734ae8fedda", "testharness" ], "offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfer.to.imagebitmap.w.html": [ @@ -687997,15 +693925,15 @@ "testharness" ], "offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfercontrol.to.offscreen.html": [ - "a13e989cfcee7490a9ac2ba91796b5f926e83d41", + "12dc47db171c0893bd45c1679edadd4020181020", "testharness" ], "offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfercontrol.to.offscreen.w.html": [ - "8637c3f71948797858dead08933f6e426801aad8", + "5030608c41bc0905d86d38ca49631e5bff9f99c7", "testharness" ], "offscreen-canvas/the-offscreen-canvas/offscreencanvas.transferrable.html": [ - "bc2ac3aae05d040a9369a4493e0ba58076968612", + "2ad464114625b4d89ac3f99298fcbc466f86ca11", "testharness" ], "offscreen-canvas/the-offscreen-canvas/offscreencanvas.transferrable.w.html": [ @@ -688409,7 +694337,7 @@ "testharness" ], "old-tests/submission/Microsoft/history/history_000.htm": [ - "855612b82a92b13b38745241228d8c0e5789fb20", + "d592f10dc2fed5bd92372f08e024ede93fcc56c4", "testharness" ], "old-tests/submission/Microsoft/selection/RemoveElementContainingSelection.htm": [ @@ -688645,7 +694573,7 @@ "testharness" ], "orientation-sensor/orientation-sensor-tests.js": [ - "fb6d83faa8bec709724777aa3fe5caaada5daf11", + "5d35f3b9afcc52083bd0d124387cae3d5220412a", "support" ], "origin-policy/content-security/comma-in-policy.https.html": [ @@ -688901,47 +694829,47 @@ "support" ], "paint-timing/basetest.html": [ - "7f84566d9a863e8bd25c2ece82c6141f7b029428", + "d4dfe7ed822beff3090a58e84d736f5ae79b4620", "testharness" ], "paint-timing/buffered-flag.window.js": [ - "7069eb6ccdeda9c51e207f0593d8f64ddc614e4f", + "4654c925ca0cf069d3b0a96f0daef25ef67ba187", "testharness" ], "paint-timing/child-painting-first-image.html": [ - "4671604cf09b9c5eaf0c11daa71692fe5790a270", + "d78af081ef8af9e47dac8a042564c0dc4fd38479", "testharness" ], "paint-timing/first-contentful-bg-image.html": [ - "ddcc78fbe55ec55c34faa59d25f1a2acb4e1724f", + "9c3b2200fb667f66925be4333a78b23914749617", "testharness" ], "paint-timing/first-contentful-canvas.html": [ - "3610a57ec716c4c087caedc6aba0c132e98ded03", + "ab47aa0c21c2cc3312f3f370a2566b80ecf8d13b", "testharness" ], "paint-timing/first-contentful-image.html": [ - "a4e89b37657361358f1b854e94c8d6b2a30d8c6c", + "034391c796cf23e9a99f2ddcfb5d18fcf5607da2", "testharness" ], "paint-timing/first-contentful-paint.html": [ - "d8eabefe12f698bc1d9ae0db477aa70946a951fb", + "67d7b95eaa5525b184b9d4abbc2e6595570caa09", "testharness" ], "paint-timing/first-contentful-svg.html": [ - "cf3e95427582fc612712ac383086dba424f65565", + "8cda11c95671f98a5ed6e2b1a83cfd77243f6744", "testharness" ], "paint-timing/first-image-child.html": [ - "0622ddef96b5762b08e647515f89c9525e11ac26", + "9851800a7bd75d7a6791557784407445ad3a35ea", "testharness" ], "paint-timing/first-paint-bg-color.html": [ - "46efb9e2674b141ce854749be565650341ebb966", + "5e863794d41850bc5422b0f759949b25bad63751", "testharness" ], "paint-timing/first-paint-only.html": [ - "fb0e75287531ea019c1f986d46481d1616efa993", + "ea735a246b3c3c2bf47e0772b0b134c7f3663051", "testharness" ], "paint-timing/idlharness.window.js": [ @@ -688949,7 +694877,7 @@ "testharness" ], "paint-timing/paint-visited.html": [ - "a0734f97acc2cca500f280a58fab69fd8b26c778", + "9a5561d5f7f317738d406d45bf371013f5cf3f25", "testharness" ], "paint-timing/resources/circle.svg": [ @@ -688969,11 +694897,11 @@ "support" ], "paint-timing/sibling-painting-first-image.html": [ - "d4197e8a35c444401b0a7dc84f0fc5a279193ca0", + "16a6f145db0265b60a10b5f7da9fab9dc97a946a", "testharness" ], "paint-timing/supported-paint-type.window.js": [ - "36acf82ca3b646b32977c3d0212a397c6fa8ea09", + "c2c3cf5d6dd8786d69e34012eb9453073affffef", "testharness" ], "payment-handler/META.yml": [ @@ -689137,7 +695065,7 @@ "support" ], "payment-method-id/payment-request-ctor-pmi-handling.https.html": [ - "5f888f0389f6c756ede8c3e481ece7bcf8b71ccf", + "4ef083ebb4f224363559387bb2f8ee8312fea6a4", "testharness" ], "payment-request/META.yml": [ @@ -689145,7 +695073,7 @@ "support" ], "payment-request/MerchantValidationEvent/complete-method.https.html": [ - "4edfd54f40e4aefd048808967689640d287c7ac7", + "36bfdb2160a7c7f71a64ecec07024b700bb1de60", "testharness" ], "payment-request/MerchantValidationEvent/constructor.http.html": [ @@ -689153,11 +695081,11 @@ "testharness" ], "payment-request/MerchantValidationEvent/constructor.https.html": [ - "da30fef00198800f369b0f8bf9dbddb5df425321", + "9fdf78ddb3dea4de72e48d1ae5288c0a9f161d68", "testharness" ], "payment-request/PaymentAddress/attributes-and-toJSON-method-manual.https.html": [ - "226fd88ff84ab58baa39da7f0691b18c50b3ff72", + "898e1916ca55d600f2b1d106dc23f1804b952bda", "manual" ], "payment-request/PaymentMethodChangeEvent/methodDetails-attribute.https.html": [ @@ -689177,7 +695105,7 @@ "testharness" ], "payment-request/PaymentRequestUpdateEvent/updateWith-call-immediate-manual.https.html": [ - "243250080bd86cab7706e34af1703877830855c5", + "0284de7858003dd00482871fbe31fe3db8ade7a1", "manual" ], "payment-request/PaymentRequestUpdateEvent/updateWith-duplicate-shipping-options-manual.https.html": [ @@ -689193,11 +695121,11 @@ "manual" ], "payment-request/PaymentRequestUpdateEvent/updateWith-state-checks-manual.https.html": [ - "c5737aa8c31e31f5312135d9de84f82277806c50", + "fb16de5699aa74e9fb71788e2378df6e21847f12", "manual" ], "payment-request/PaymentRequestUpdateEvent/updatewith-method.https.html": [ - "17a4741cdf97bd6dca6716c80a890af283f4a68a", + "acc62f5e2ce980ead15e25a70b90ca4e45d56b3f", "testharness" ], "payment-request/PaymentValidationErrors/retry-shows-error-member-manual.https.html": [ @@ -689217,11 +695145,11 @@ "manual" ], "payment-request/allowpaymentrequest/active-document-cross-origin.https.sub.html": [ - "48f6d9066328d6de4a26ab42c69a34d822ece2e8", + "29d7c6010eceb8361213f62abc5fbe0e102d32a3", "testharness" ], "payment-request/allowpaymentrequest/active-document-same-origin.https.html": [ - "bbcc026d5274a139e6e1d325343220b5b7e959df", + "9d5d30cdcab61f8de3b36d62b8accb0e0f73b41b", "testharness" ], "payment-request/allowpaymentrequest/allowpaymentrequest-attribute-cross-origin-bc-containers.https.html": [ @@ -689281,11 +695209,11 @@ "manual" ], "payment-request/constructor_convert_method_data.https.html": [ - "56866b43a481e738c844537cb9c355e9638a29fa", + "f4a9a721d07c91d31d7b5d36471a239e4e7abe0a", "testharness" ], "payment-request/historical.https.html": [ - "e681f6486b9bdd46d7420cac15855dc9acaa2ca7", + "639bd4004493da4632ce29ce77049982db4faebc", "testharness" ], "payment-request/idlharness.https.window.js": [ @@ -689321,15 +695249,15 @@ "testharness" ], "payment-request/payment-request-constructor.https.html": [ - "99c25d1723459bef569ca9e62ec29e0c889534f6", + "43b9588397e5ded391b18cd119e21eba50aa2710", "testharness" ], "payment-request/payment-request-ctor-currency-code-checks.https.html": [ - "1641683beb515d5a9d607b1feaaf5344d7556e1e", + "8004ff43f838b88675bfa47766107c205f38ad21", "testharness" ], "payment-request/payment-request-ctor-pmi-handling.https.html": [ - "5f888f0389f6c756ede8c3e481ece7bcf8b71ccf", + "4ef083ebb4f224363559387bb2f8ee8312fea6a4", "testharness" ], "payment-request/payment-request-hasenrolledinstrument-method-manual.tentative.https.html": [ @@ -689557,11 +695485,11 @@ "testharness" ], "performance-timeline/po-observe-type.any.js": [ - "5cdac973becb727d849c2e2c984de483dec73748", + "2c0719a8d146882ad317ff2418e89d4e77a2da18", "testharness" ], "performance-timeline/po-observe.any.js": [ - "6a673dbe784ed53302c28861871bb7fb2adb06ff", + "7d7de376b25ceb1b0c3cd26a4dd27e802b10b155", "testharness" ], "performance-timeline/po-observe.html": [ @@ -689877,7 +695805,7 @@ "testharness" ], "pointerevents/pointerevent_releasepointercapture_invalid_pointerid.html": [ - "824494551671a8a15a6aa2a73a110a65beff0086", + "c54e3a7ada636358e8633c6825bd388e638d1791", "testharness" ], "pointerevents/pointerevent_releasepointercapture_onpointercancel_touch.html": [ @@ -689917,7 +695845,7 @@ "testharness" ], "pointerevents/pointerevent_setpointercapture_invalid_pointerid.html": [ - "3180ca53f5582b78514d94ccadfdbc1a7c6d84bc", + "ada67fa5b7b959015dc0756bb8c11207b4effb9d", "testharness" ], "pointerevents/pointerevent_setpointercapture_override_pending_capture_element-manual.html": [ @@ -690237,7 +696165,7 @@ "testharness" ], "portals/portal-activate-event-constructor.html": [ - "7263b121151f5b1331622c0c7007df49f90b6376", + "1931e8fc8652d6f45c9a8909f2b9a2f004ae0fc4", "testharness" ], "portals/portal-activate-event.html": [ @@ -690745,19 +696673,19 @@ "manual" ], "presentation-api/controlling-ua/PresentationConnection_send-manual.https.html": [ - "9bdd0859b1cf6c58e9a50987957641f451adc5dc", + "fcc91212e0541257a92cab42585f3bae0e46cec7", "manual" ], "presentation-api/controlling-ua/PresentationRequest_error.https.html": [ - "cb22b4368ab05ef2ce2f4a52a2115a16e394980d", + "68e0fbcd222fe00ea5a1264716e711a98ee48074", "testharness" ], "presentation-api/controlling-ua/PresentationRequest_mixedcontent.https.html": [ - "52a520b748fa647856785afdac32160b7f60c08e", + "3b19b9c9bd2e261030f09b8bc85588ff7ee9c8d3", "testharness" ], "presentation-api/controlling-ua/PresentationRequest_mixedcontent_multiple.https.html": [ - "862cb45c06f6f1d343e3c41720959e9fdc7c8eec", + "e9571224d62492c9b021d7a731e2246d56d74d40", "testharness" ], "presentation-api/controlling-ua/PresentationRequest_onconnectionavailable-manual.https.html": [ @@ -690781,7 +696709,7 @@ "support" ], "presentation-api/controlling-ua/defaultRequest.https.html": [ - "bc07e02748c73cd03eb0f74dbccc244222323fa0", + "713cea7f9aebbdc51ba6334afd4c3ce8d2763ad3", "testharness" ], "presentation-api/controlling-ua/defaultRequest_success-manual.https.html": [ @@ -690873,7 +696801,7 @@ "manual" ], "presentation-api/receiving-ua/PresentationConnection_send-manual.https.html": [ - "f600a7fba236a4aa03af21a86f99932eefb0d0bd", + "188f7e3fc1b3a40740acd17934bea203c084cef9", "manual" ], "presentation-api/receiving-ua/PresentationConnection_terminate-manual.https.html": [ @@ -690965,7 +696893,7 @@ "support" ], "priority-hints/fetch-api-request.tentative.any.js": [ - "e492d87d4f2fc40555a7b350d9c20fd1de74ffc5", + "0c10a3e2f96ecc16f5e96298e7855457c4bd51c2", "testharness" ], "priority-hints/img-attr-named-constructor.tentative.html": [ @@ -691196,6 +697124,2858 @@ "f2f7eab4e33858b571344940c67de9b50e18e119", "support" ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + "4c3802dae79f69e6c16e6b996d6f7ba62a296a23", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + "d394bd1e4e2d6391d03eb9d627429288ea9dc29e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + "85ca63d1470a18b558e6fff236ac6a064d0b4940", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + "a05223441ae201fe70e51c9438d573698be291d6", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + "080260e7d461cd90aefbe53ce33bc06b014f7aec", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + "142fe0c1344d2d161332cc09f3d6ff4b6b4bdd3e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + "68b6b4796d37b9deb85aeb560b56b760a432f3a3", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + "95991260cc3f9330debb07b009c61c9d4fc0dc27", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + "143b92c3e942693e0f35358b13e3f29419a9c75a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + "caccf277e487916ea2be504c554e77461b404604", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + "ff2b557f1a58455ecfcd56d8526b437c2dafea28", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + "361752465e15bd9726c050b556d1ac196e6a2c61", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + "b313e1b8cf015a8e1b44a728a505887be5f08cd0", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + "2bfdf1f966fecfa8b2cf3d2d47281b47e726bab2", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + "15949d8d11f14b3ddb937996542c612ae30b18e1", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + "05b2a3d68eba34cca41a37efd6bf71d2b95bee7a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + "c3b6f6c7c7f9707c76f7825032565859f5d90794", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + "e83bf31950db7794494acac2fd71a8ea401b38fc", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + "35a96050dc61e4955cf58679b13d3605c143e336", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + "3d04cad1f380598e22ca618c656a4df58f0162e3", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + "30577195c98cc139adde5bdfb8800214b329bf93", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + "cf51c1e72a106070611a7e716edbe453669e864d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + "d817ec4dd12976b79a3a002fa7dac18a6fdd9858", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + "72df66720b102ffc56848101c9075679cdee6b16", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + "43761121a3c076d8358e6a55ccc5c31bbb0bc8b6", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + "edf6ad13a05c5c7e7cdc7d49c68b604e963bce58", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + "0a3c40a408eefb57844247bda94cf574c6c4673f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + "9d4b569cdf4eac1e259614e6683a4b8079f98bc8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + "42d3078838139cccfed2e507feeaaa52f6e1877b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + "c172ab34c71496fc747ce57541b480fd2f3e97f7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + "211188643b0802b328071146bccbdacdf2cb78f6", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + "774fc69efe72c59ad2d0439b1ffb2dfbc9ec76bf", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + "a8590f135b3eaeda0152f875eede2107ec561c1d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + "acb73e754ce83fa83b0fd3ace2054326b466be8d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + "460e2460525d70cacb63d55f68c923b70adb176a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + "2dbf501e7883d238bfb50ed56062aff2ad643135", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + "1eb93554227c4ca789b570664e37bd9c110f48f8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + "f28f6a8c9ecbab04e6286268df52f0c3512b2bed", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + "d052d0452390ce7f04a5b67d4649af7bb85eae2f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + "a21305652928b2e3c5b118ceae3f23ddbe7df0a6", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + "9dd49623438c031c4d82dfa8fc2963b9fbedf235", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + "58fb3efe76a188b88cb6f075858c29ca34efa8d9", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + "a351c338b6a186731f2ba833a84808edb29a52ee", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + "0741ca04100eea706072384acc71cbff5ce679d6", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + "841e31754225483aa2e0e5f0b1cbed7c022b3f42", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + "69fdbcb10584dda4a4d3221419115b0279631c65", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + "e47f4ff801bf11e11e081f909e4363f7c946dcbc", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + "1222252b6a423161b261ac86cd4dbf455122d4ed", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + "4ecc3367b639b7cce310769c99a3f7ffd746444c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + "4f6a3571834a7ffd2b97aec3ca3122f8ad2335eb", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + "395db421847b03364298a7ce04fca1d7e0079053", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + "ec9da8a2a02132f79eb7499ae98a559ffa87f170", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + "79e00866ba6bc75a6f412668b8bbd4e417ddf147", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + "2637d13d36c792017f31815fcd3a6b153a51b0e3", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + "3e5b298f86fb960cb4136cacd23b49bfccbbd189", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + "c71ca117226d6afa8aacb1428bad863f3c73cd6d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + "af90b554010a050bbc61bea0d93b414237599118", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + "9cf74fd7e0d4de649fa731cba27f47be01df1992", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + "3f8822828b579ec7254b2583ffbaef9831bd5d3d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + "de626c259d0aa645da56ab7871ad30f582394ca5", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + "608802389c84355063eaf32f786b67407cf7b2a0", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + "481f3a25060bd9686c2a53b1326465083cb0eac8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + "4914ed183aec2b8fa2f19b1c7b17734889ed2e9c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + "5248a244a400c02ab3a57b2abae7d7e5577413ed", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + "4371218111e9db332c1ee5b6bdafe658d2fcc95a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + "68a6e853aba51c60b6e3f810ca220eb54b93a408", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + "b0ef51f4d74f21e88c5a472dd4030c9956a675b5", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + "5bdb3f44dada0be97e7abf0e1d2e4814e9bb34fd", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + "64f40b9ac99ec485e0d416512a222dd8f0b0102d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + "49b21a9aaf9273deffcc06265fe4f80b41272092", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "0e68ad23e60e60577849aae66c6e7c445a002aa5", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "d45ec515a50f02e261aa4481bfa654b12a172f0f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "efa73828287306d2e13a1bf186bee5aaa429c205", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "1e17c7be9c6e4b2b350d26c57d26ea464f308703", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "44f55bc82b81971fdb7dd0fde481dfe7bc6a4449", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "11d28f2b7b2b8dbdf3bfedceb6ef5db20e34d34e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "8eb728b6883ee20466817f6c31fb298c2b31c70b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "fb4e67dbce83d94971e3b44620eb2f9c09ef1d0a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "a2f1b18267e0b14832c86f87998f8c81ca9033de", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "d0ebc66aa5f560bba3434e365ab82970ff82558a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "a6a7f916ec3b2072f9d78617837ac2ad5232a937", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "97172fc6af43a3c2dba155f7bc1b8042d9792a56", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "fb5e75f474691b7acf0a2b4109fbfc67d98606dc", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "fcc3079d1c0a541180b9c94a9527a292b170dc06", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "d24f65ca2e93c9de1c1ce8dc2d64334ee7afd180", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "b20fac55fada6eee40d46c5a0d78de87ca5b741b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "00624e1b0c3490eeae7ed8e6877351f93917961d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html": [ + "89c786406871910f1f961bbcfef139766a6da79a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html": [ + "e23fa374b4668ea14850285bcdc8eb6d8d7635bf", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html": [ + "4325995f1cb0b8c62369ce209597e2b022fe7f9f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + "218bc1ae9c8667cee0d94e7f4331be63225473e5", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + "f5b8b464b8a45f520a2272420dbb4f31154e9381", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html": [ + "10227f715433ca3d523ddd9115d2a6b9cf0a8ba5", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html": [ + "70b830df152ec028b5ccf9990bcb84b4d4ff484b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html": [ + "cc96f816cab693c7df0037b8c9635d474cd1c82e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html": [ + "c96b1a3bd2b55d0e86ccb7634ed5e36d096edd73", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "32fa5eb0be05d36e3d8c756933058d2c74713e31", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "8a3a657822bc09fc9b92e001d25560526724f116", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html": [ + "96195c261f184d488ee49b497495369c3193b843", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html": [ + "ea6022df1abba0adc40491249dcfb0e0636e0abe", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html": [ + "af7c40febec936a90df52d7d4b34b9009a701fcb", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html": [ + "781a8d446c67cb06b9051a58f8e848bb29308ea6", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html": [ + "f0dc7c38ce1451edb0913e46c6739d4792b830ef", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html": [ + "683b8b5ca96d11a504e0f4537fe1534b6c8498e1", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "edffa0f3aceb67a52d0e47acfa8da406e314932e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "5083fe37990a48f765031b5629fdf9627f8d7f94", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "064e09bd7ec1a3083a4176fc49b9eafee9d644c6", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "d31d03a8071858829bdc6db1efe52c7f722d895f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "8f1c4717df9ecc654e192c2a01ed0d3a536cd4b6", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "2d8fe73002f959f4ec31a2bc8bb44c3be90f30c9", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "0693a8f3fcb3f79931bb88e52d854a8241f28a46", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "311bd13bf45cc9a1f6406371fabe67c53815da88", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "2249c1a161d18a75ddea77d946b93678a3cce9e4", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "f0544a560113ac6da71523889bdff44b78cae340", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "eb5ed99ebef3430c45a17a9137df458f70f09534", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "2dc5249838490c7fd579da37b3d02f0801a37587", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "d8f11e5abb492c07dae2c7d9987f9a0ed3d980fe", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "77e969c673fac7cd602ef64581d937eb9141baf0", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "7ce3088cbdac3a86a68b9980a57ece1b9863b3f3", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "d6702e6fe448339bb6cc88da033608aefa058a9a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "ea3e7b68f4484ee28f78eadbb43e35745868771b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + "3d23c2969343611bf390f8446800c80d0d96b115", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + "92dc5c757648e083592c6167badbce85391f225e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + "dcab0bfa8626204c6e82f7bc7c3dc5a2d747159a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + "064250efda3a6058bd33790317da4be4184a8aa2", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + "a804d60f9379662ff24d0ae84963dc62823d29b2", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + "99e306b5f5f3872accbe55162d45fcda979dd426", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + "db0e25e6c3b513a2dd6a94683bcb20ac78612d65", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + "03f565a69be01f8c4fec80b88a42f7667dade811", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + "726c8d7f140f1cb3e56482d781267a8d4f226b97", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + "a88cb365519b150cec9967ed1772dc9b08f9319c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html": [ + "43c875becbc65c1ac4b8fbf64e1daa923cd00a6b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html": [ + "a5aacc5bde49189f46075f27067e695482f50009", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html": [ + "e8e550e70b5de0335a62e94309967c75540871ae", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html": [ + "a975e0afe22c8c91883f88f827524b1c0c5c0162", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html": [ + "7b4b354e222e4af3d06a6f3b9c96da8d8a22497d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html": [ + "019586e19b8b17dbedffe3564f8edeeb2999d55b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + "83a5347eec7a8f6dfa9b9d62abc09c05bcc1f78f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + "83175ed9536931877326c80fee4fe25fcea59f0b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + "ad0d2ea3aa8f1c9e29ad2b8c00302749ae24e6a3", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + "9682e79855da592b709d48e88bad59a47fc332a6", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + "4e6c295b183b639d29cd933bf9751d9eea0fcd0c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + "e21471beb3bc4360e56165737c993fcc0e6b729f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + "31a5606e98ddd552b6bb8ac6958bd411d54cdc74", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + "7d8bcd93218d1cc6f28121711b5c5f82298158d0", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + "62bdb36df8a3e4c9310b7ac66e76b7995b2e45e5", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + "33058b7004cd68d955df588da5b7e53e438bf20d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + "60ade0b6a2a1cccce4c3adda2bf65f02f5dfdeac", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + "c3c99c95461ef5368450fa6cf7f0bfb0416fa03b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + "b94df6fa4386e0e783e67ed634542742fc70e956", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + "8986821f7f2e7a6d0d3a0a5c9e838a790f4f0272", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + "464b20c87ab1be4b381a2df15a28944924739e43", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + "64d312c68e5456b61fceee49a98a42ebf3c022f2", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + "a7a0d8b14ae228b2e1712908bc68f71947f0b2b1", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + "e34b0f44137b4409b5982fb39440302fc92c1c2c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + "e79090f32fdd418ea9326d889fdc1bddf768089d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + "6a44f60bd6c25f34b6bdbd22a63605731901f367", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + "f5650aee09022aed06ed4b0c59e9e6740c506532", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + "f73d530e1899f87deb8f792f36dfc87f53de22fe", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + "0bb37b4900d40889cdb1ada15668e0bbd9906829", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + "e075d359cf327aba0cd8e5f5c06f2e6f7a3ff655", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + "61350037cc230f8dd02ab0995b9bc8d552049ad0", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + "8f596f55e15d0619b6c8a870dfcd442c217df52c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + "658891c390e779ad5dc2c6226fd78e2f1f3da26a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + "a2374195345169fd3f101e031fce50a28764c86c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + "bf2c352f98e86b80200b196ac4ca3d9af628d227", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + "2d0b84962ba285bfc32c2d2c8dc51acd2bf87e98", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + "30177b584db77b73dfb7751d9538c34898cfae8c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + "dacd57f68ecb22bd64f57296ef3c7a080d686156", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + "5f8812e2f432b1009b5f833eeeb1a8f3bea6bba6", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + "73dbd33dc70b6e44ef3fe9b50d125ce3a6ee8f16", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + "8ec9770020196a0925e29e96c453724d3c3fcef3", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + "047485e38b8cfb28892db7b29ee1f4bc8865bc07", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + "64f10038370fd281e3aff141d74ba93ffd7234e2", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + "a23d7d20df618fd2fdd544484c7ae27e893b16f1", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + "cef8fdb5e813ee179dcf1cdd82fbf0b3a4b2a518", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + "a3aa1db13f5d18a418175c070ceaed993ee534e2", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + "941850e8b6b7399fa782f61e9902a25af1c5a3ed", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + "120efba8c365adbbc4978c99d869c87c93d7b7e1", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + "d460510fdc5658c49176b08365b2732da2c0c7de", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + "50cf5378fff2f6acf6db3510352918b8edcc794b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + "956d32a212a9bf18947b45de0062821fd6470c9c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + "036392abd664e40b7b1d6a177f117e48d16df1c7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + "b33893e9336292f2db43865afcaa4086195479a7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + "bdd7631581ffbc84bd5c304f38e664f8d3ae8c69", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html": [ + "b4ef622748bfa15fcc260ffe8a09c2c76b617629", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html": [ + "b2c8a07785fa7d7b621158045c946ee1e8499a56", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html": [ + "8dd5eb8630dd2b0b87deb452969c45f153d29758", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html": [ + "96705247c6ecbc6940b84e11cd0c891e73d55def", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html": [ + "08b38475ab7c68a9e2c274771ea525831aa20ec0", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html": [ + "e9f0d4950486c31bab1484c6531966ffb96e20f5", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html": [ + "f88769fd9c0f6978e0444dd35d84280d501843a4", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html": [ + "a747db8bf19b2f6a74df320479f008d8a862e832", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html": [ + "6fbdb686a1a4cba4fa0e1d8f42627bae94c00c87", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html": [ + "a7e3dc518551444aa406bd508c0214974e395aa3", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html": [ + "2a50287c1bb32ff9591aa31ca06976b48d088e8b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html": [ + "acb2d52a9e09ad3b1c8d71aadb9742c387bbd110", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html": [ + "8c16c05f1a0af2e03ec60bd06cc464984e3c9cca", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html": [ + "496d12d647ba6f548f612320180a58582c233089", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html": [ + "1b0378a367943e73d77d26f92265f585ba300fd3", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html": [ + "00bea0d3a51480a94825505e175dc9cffd35a690", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html": [ + "ac2686bf311a0554302b904df99fbb0889092bbd", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html": [ + "0c72b8e9d36a0923f45c9fd582588cae5cad243d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html": [ + "d6c068b61b8d168a7353f08993e75b8dafd0a707", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html": [ + "444b3ef22f93b24e2cc1a113b79b3f4f1ff8584e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html": [ + "4e33ed9551bf6bf312854b8945a8c2fc15adda3a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html": [ + "d458756330b1e31466742ce816662252c9960392", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html": [ + "26b3bfd4d0c38b996211dedf4ca724e3cbe388b7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html": [ + "a0ccb1b05a4b90b741aa8a42bbb5e93182e207c8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html": [ + "c6445444c0dc1f5113429237098ef3c2bca14849", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html": [ + "d1f5a4d16aea2dd9406fd1fc63ca6b22a4720a8f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html": [ + "631165464cda870cb5561c893c51afd214094c47", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html": [ + "c38aec92be25efb95ae83acdf6e5fdf8f8161f2d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html": [ + "8dbe6086637901a88591a6691aefcfe9bf8ec275", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html": [ + "793297d1697d0650734800821c959dec680a4cd9", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html": [ + "e46888e7dd1ae3d03bb262df6cee378b2c56da67", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html": [ + "62ce6a414807744e4c20f0f2d3f3350b7cbcdb65", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html": [ + "6afa660bf9da441fe5a75970abcbb37e77a1a322", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html": [ + "c32fe9b95d5ade86f1e2a78b71ae353b36af0123", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html": [ + "e7cbc17b7c169e4ab2ea7143680d4e4c864f9ec0", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html": [ + "7446d6cb7f18d4f587b8d17faa27981ea5383dd7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html": [ + "1f14c13bc58abd99be093a857e303bef259d304b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html": [ + "f27f5a9ea8cb556136719475f6034e03088b51eb", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html": [ + "3fc281e8deb3412f0bf566e67cb1042da83cb605", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html": [ + "1343e9370ecb4e45795395127e38d5d2a7d77b9b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html": [ + "aa5a4dda5b0de8bb3db1b424a57060539a4862ae", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html": [ + "16d6b375c4f3744195181f5b6502e75be9069011", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html": [ + "d9c21291c9e930663e0790f7d0ef286ed6d61f46", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html": [ + "f383932ad528165289c0a80c24900e61375ebf56", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html": [ + "7f0a7900e03b348626c71a5757d8b296eecc6321", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html": [ + "afef1ce00fbde5556623c788b36435656cb3bc79", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html": [ + "e0fbedab98315db00c5fac82d9ea545c6fe4043f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html": [ + "f737d136298086a08d0c152d378270f440f244ed", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html": [ + "9d94546fe02d7a0bb9c827e88fe8a471234d8960", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html": [ + "f73a67d4030a7f2f9ffa037a4cbd4fb7527f3911", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html": [ + "e5329556d40555efff9c6bc1fbd36e3f1caea5cc", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html": [ + "424154f44e60f8b8b38eec377e01307de0083a99", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html": [ + "1e0fe60c46c900db52df08b0bd39928fcfc242fc", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html": [ + "b1c1b2c78921dbeafcb368deeb1ba0e57f8c0a67", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html": [ + "c6d6679ef334fe5834d6a0944077ccaa6f500559", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html": [ + "0ec1d0588595d0878bd6f12f66c9f6a63e8e1d27", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html": [ + "1b5110c28cff65a751da9819b5c51ac84d1d245c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html": [ + "43e2070ea66e17fee67d781b374bbe8183fc4d52", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + "c82ebd1769bbdefdc8b1ffb1da8d319b0c557983", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + "79c204fee0a06af19c1ceb046807e6c9f4050704", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html": [ + "d7f31ea497a922c6bcef93194f4b46a86a7cec97", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html": [ + "522877903c5f15c29e859c0eeb4ecc71a97d7ea3", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html": [ + "5dc0587fc0a379f1e1c4e0b663883c81267c79d2", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html": [ + "34fa9f77036447725377d78af862089d540eb377", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html": [ + "0de1d990786b64403bd7d79f6d7d3699f1811f16", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html": [ + "ed256fe53d2fbbe0d2d567c70d33fb0c0a2bf2c1", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html": [ + "1a93d1fce387b5d2e6cf6c0b23556b86b2249cf8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html": [ + "25f197009e65363588c9d8fa9c1aaca79f380adc", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html": [ + "54c3a070d6180028dfc6731de40f8a7c35fe48b1", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html": [ + "346d4c1ea2aea8054dfc4d55f3ff696dfb39204a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html": [ + "15e1b94c00d6c9c87d24c055711bbba97a963a36", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html": [ + "4f7ed37e7b293158e318520ec954b7c14bbb981e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html": [ + "7fa22ec13e428f8980eb3862ad7a551634d49d06", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html": [ + "c16b91a511ae074324dde71eed029f4dc56fb31e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html": [ + "66b00c803854acd9993b0516d57284dee3b41bb8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html": [ + "536a94590b32476becc9b56d42c397d41e770815", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + "7ef3918a8ef5cde799b985a632c5424468e55bfe", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + "5b1bf55d659b9fafb896d02c51a60f6ffe01487e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + "7c8843bea8ead762bd5982c542870b483e68d8d0", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + "caa7bc3b5c1fd08e19eb871c869bda1db3d4dd65", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + "6e6134809d11f68e5c8c9d8cadd39adb005ad0ec", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + "71c7443ee516dd955cee3aeb3d4e19c135f1512f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + "b50c96be0e7977e87be2f79a60a082325cefa3a5", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + "986de2112fd3a8e7542d05984e18930ead3b2339", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + "c6fe553114aeca920f4da3ba24811720581fdbda", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + "4cbd4308984179212ec9ae0598e1b93ceb829a74", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + "4bbc0305cc93dcf1b79fe8a3e8a04245de95cbcc", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + "d3c1792b804e0334e019d2a7f5b6a04ea20eca26", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + "a91366efb77238fb125aae5e6b4fc0f03bc952ae", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + "00f9d4ff0543054125f1ce04a3ed42a776987b1e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + "44c7e6efbc05ea6be5d20a0e3126b057885537ae", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + "ff30b9ecf79fd6feb5d04af23c43fae0958cc00b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + "775025d2bf3453ef665ddd0c0b28189d2a852f74", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + "6eb042c6581377aee95a4ddfe10ac9deb8d625b8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + "5fe6c8be51ce32b97e7133bca70e534e0f7cc13d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + "00020010b83da90a314f35894c5e594b706b81f8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + "47540313d0b99b06de8085ea0deb3cf7b0456b97", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + "56552a05ade31ef56831a5b07cab26a6273c4a04", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + "59fd3b6e252be54caa6776d2ee0e124aad37a67d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + "0ed6e096dc806e5dddbe0acec51989afeb9e311a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + "6d9de995d8d463fe3da5611cd3edbc8edf3c5ec1", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + "b0e2201884d6738f0a34299a5c669fb3de779d78", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + "c782e4c7e0b0441c3015c02b3daae272a8c178a4", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + "fdd5ecf8f806f997690f8a8934f6690c95fac7ec", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + "73566bf3649db00931b133799443871a46d11860", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + "1417dc92468ea847ddaee21b57e5dcf605b45006", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + "76ba3f840561c843c993a96e6fb7e61a1992fd8c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + "7b9302e4f8944085133018129b5b7de5a04d0544", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + "2de8c8cb1df20c10a3e1dc57b1b75ae1f6e3fbcc", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + "5ab7aacd9bfea10aeb58c941142bb59064954bc7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + "94899b0eef8a795b39729acfe5b3185b573c1589", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + "2ca30553142302726aae7c0fd9b3b5f212512063", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + "79b0e7039dbc2f6b63b32c81f9b045234a1ca99c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + "ad3eb19f8c1abc8e12d2bdc71ac91527872f00f2", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + "4e8730f41802f628b578a3494ab4e5b6413d6c04", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + "647a7726178ea76f58e51205cf6ae1f070003a90", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + "12625ee696fd9b53cace33c09a4646856228791d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + "b8c9c4a0683071227d47cc115c05080098934721", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + "99e234cb77a883f4f8f08430804236dd1b744ca0", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + "1de1d44ae49b8f28bfbf68336dbe37486827b1ea", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + "19da7b57a4e6abca3c86b23a5c80712100d958e8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + "d8ff85a0dc69ced9542287708c3379d9a3e8e9ab", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + "1ee7b80a5e604c534137f63f0e4614ae6b59d65d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + "3022b6479d19aeaca7601811a5b6ceea738456c5", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + "b9cf476c07fbdfe9a142a98c7c4732cb95066e3c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + "36c43b36d7ae9b349b4351d52f58277ed4c2979d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + "a6bb6f1e47748870add2db1cc9d9fc6f90231115", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + "e91453265847bc2cbd1c0a656555cf61a46586bb", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + "c51267686eb2f399b1721f6f6e383249cefb4c51", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + "793c4a90bcfe4ecac026fe7068912e2c746c3e04", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + "5e7abe84be189874f1f80bf4bc5f9b53c7500693", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + "5eea8def59332f51ca613c38c56a30622d5c968f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + "6bd1a59d7154a0b4b4b9367481d5f4e22e7fb18a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + "dee29c95da160621f44df36d8c11cf7e5e41a280", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + "b4129f05115ebb977312d239f783d7d70edefa7e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + "af904eec692cdd80dd0ed63d6cb582b1c8c79147", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + "9d2464d73eaf59c1e0ea80bdb68207dd20faf9c1", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + "52c65b0df419c27c151506598376f55de68b33f7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + "8f326c129774c2e02aa635c51ebd2ec4f8ddf5bd", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + "eeacfc724034a5fffaaf56c487976bbd8dad8201", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + "629f0b1e4325ee8f62cadc6bf2762ba183be6c44", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + "0f195ad8458770ceb0ebc4eba9dfaa5876028f54", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + "3aef44d2db0da7c6518c0f6baa2301821fdc3faf", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + "02b9018cf8767651054b96f7f9ac8105d93b50d8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + "de558ff53a1d4d771792d9b7307fa2551e844c9e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + "5b86e03f24ae745530083a31ede4931dfe53822e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "a04ef6cafd73c752735f5251ead8461892a57c74", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "837cc3dbc06b20872c94057d44a10eb6fe26e5cd", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "b39a5057e8096b0420d5add0f51708a86771401c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "ee7241a12c924cd783142b68addf52a057a77fee", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "77028a538b542d0d157f785c625479a350317ea8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "8ae44989ba5551afd16f2c7673107d03d54bc5a6", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "7f2c372b0e1969b99e1edcfb5ff3b68f818357ea", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "d430552bc44ca03a8dd64334e1b24f2f33e5ed9f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "20b7dd54bff4e75888182e0d6ab3c54a96c2ae67", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "475a0bc5a3486ee749535a577e1a01be062ec4b7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "17ab76a033bdcb86f5ddbada68b3105ae668532b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "b8d754a7c522dd1b8c635e2bb50feb831f87e997", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "fd82790469e69c441354408cafe0b377d71894a6", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "f51a49eaea343a4cdf429af6b56bc71a13878fa7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "903caf9ab99c4f9d3079d445c65c7e428efe386f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "408d57c2050b20688314a4df800ea6e6d9bfc9e0", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "fcc2d6ae89473723b948fb885346c2b23f262216", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html": [ + "437779cb3ae14aabf72e691a7ff2a9f33734401f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html": [ + "08b5b0661eced3ca86cb6f83a6e4261bd7d2100d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html": [ + "ccf400275a25c71617ed53a83d7d6e427aa57bc7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + "c687779eceb18e5dad8ae322e05534c39201de44", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + "3bee5c4875f759270d1db1405ed3a527c9a6eaf0", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html": [ + "380a4a716a917e5c607d9304ccdf17ec147f401b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html": [ + "e0f8eff6a540275f1eb722e0904faddbb8a05e4e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html": [ + "1b7606dcb224670391a9bfc62af134748e598c47", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html": [ + "fc229db65259ab6a905e9bc178a0f97a861b7698", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "515f07ea0e97210899c136824a04119e9f2e367e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "efa5245864cb5d6bbfd12e9afa11bbc351f97b9c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [ + "03a0fcb679e2cbfad5d5c4984110de1831b71b0d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html": [ + "9e19c534df9ff12884383b3f921c8092d7aac41f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html": [ + "24ce029049ac1e9cc27b5e3aa4f21707d6c553be", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html": [ + "66ac7130d25884787e3bde75c44aa6e8cfe68d98", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html": [ + "3f68452cf7375cccf4268f6904070e8a34ec75e6", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html": [ + "1ac53f3c3b906e2d811ff5e52f92f6b2c71cc3dc", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "9dfdd01c4f8d2db01f108ec666126ec342b0570f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "e86f4558a226a04b57ba63ada68b8af43fa7dbff", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "74fe3da8fdcc22b211c27f0731961e162b271596", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "814ee1f816b59e140babb3731eb6a5ef843eeeff", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "86288171f405c499a5f2f9dc59956ddd96745657", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "0b3c05150091876d63aac9f8a528fdbab6e0b5e1", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "060341416a2630762537cd300062e410a82459f0", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "ff5c12b1d886cf83d01309cd747e6453b2d8dc29", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "c3e0c85db0e772ef14261eeaabe50f19e08ff00b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "475118b602c63b836b0b063b5e4b1b2451f653ee", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "8ffdffb5074e159fa008a5de2f14053c2c1158c8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "e62460cf05c807f50a4edce0a1ad1c00d14890e7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "0f602308263f29b1b25465e46c4103982eea9111", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "28d8587959846069a569440e16cafbcf8d6292df", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "c865d14f103d250a190bc4b475afad7206ffe177", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "3e5a447151958a7acc0cbeb539940b966b2fba95", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "cd3fa41ec7cf55aed65cb12ffca6d044b9c4254f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + "e5151b0cef169b48b03acb343d05aabde3e143a9", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + "26e1ad11e8c543ef7dded57066a51b977bf81e16", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + "3beb9397b53fc54b7c8c9f2efc20104901830eda", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + "704a84ccae29686a6e90c7b658b4cd4b7d968d41", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + "5ed3aee5ecc41b39e8ec292af956eeb5f4ad8ac1", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + "1101eb09b351632217b79946e11e722e4e36885e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + "6a5fb25d4276e3c544ede7e490ca999cead1de3e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + "e7c2e37a22ca7779b9339c3d768df7461d56d510", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + "09f961930aa404e286112e276f2fd839c1fe9039", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + "57b2a1b801a38873d3c5ad949ea7c00544518905", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html": [ + "620a3ee07afe496b67b58f31c2bd17848fb031a7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html": [ + "ef8f517d3f7e1d4cb42d966418fb396753de2852", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html": [ + "b56e6763a9e978b7798743a85276992a75c74e49", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html": [ + "112dc5a5c8f0778fbf811bf25a8f9f808e6f5561", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html": [ + "1ec5d4200f015abc274b035efcdd2053b48fc30f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html": [ + "57fa649afa344dc9acec5aa4085857154abe0218", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + "734d2254f88dcb20675145ec2b6c51550093502d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + "9082bf4ccf4ffbc1ffe22f86fbd82e74e743ab8a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + "9b76a680e899ba03722855e8f913a359076e910f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + "75a991a04fa5a6e1453fdec10da03a7455346b20", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + "c25c3defc4335714e6b857f871bea01a01f37d2f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + "701f2d73bcdc6da179c6d7950bf0a2b96cde3d1d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + "d290db53f7965b8b6d425fe3bdcb5878ce49bb51", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + "3a7120351b6f18da66a26723650cb0f631b6c709", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + "3e85f68d7135e73197c57f63cb3236b21f5a36cf", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + "34484fdf417ccd65e420a95d568e64eac7ce0cdb", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + "f59b0b40090b03a2e0c6a3be5eb387e9bddafcde", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + "01eec1bee2ae95ce5d2c47662f72762e5f2e7a55", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + "c221f6f7ac4b0fefb42d250b219d66de3730310c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + "a9aa1d823999d2000b3c55ccf70858e491ed112e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + "581e7ce0b9c4c9254c2bb870f97ccf080d428405", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + "4d5613013c0e42c69f0d9c57a683e33161d504a4", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + "b45eb6e9cee14dbb831f3b1b5dc907b8193a2a5a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + "eee2437ca18797fd65326a2d4e832b9268da7b03", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + "f29bb36f18e4fe0e318a130aff67f32e6ce079fb", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + "c8969f1d778ce917341babfd09786096633ce8b7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + "5d9bc6944d9ec62b86f122b7758c7bdb2dfe847c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + "dc3a34ce57c3445f35ca96afeca3256104c0c32b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + "7406e3f96c17c60e3aea1e3bd25a83d910fe7690", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + "d8256f74b3e747272ae16b0dd2cadc851d98f293", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + "be2c3ca9b289dbb2aad547d71914d684b3bc3093", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + "0bc9282b76a8aa8a2b1e45133d951de46ee4ae70", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + "490821d67af275ab8a25e9e359757af1850d2ed1", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + "bddaefc4a98294fd75fa1368defba956d4b8aa85", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + "b4d36fa58741924b3cd67477b204860237162570", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + "b4f501fbbebba7eb0e235d36b810f6fa9447f09d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + "cb62336353768983da2544bc697d1b2ac938f3c6", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + "c382dadaa45a706339b885c66b9785a8c112fa24", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + "597dd7ef2e17f4c60b8f842a91c9da03deacc2a7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + "c879e8229928a36421b9719f33f6c9228ef78ab0", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + "56225dbc3af0931876b9e7b927ff125b1d8f2ff5", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + "c1fb0addb6e9ceeb949c55c015b99ab5fd57ee79", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + "a18c4e6371e159a42486a119b114838d0249ff37", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + "207b7fd9638c7cce759db5eb86d8cab4658e733c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + "d3e4aeeaad2f8c9962d045f5e87c280aadeeb846", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + "b018ba12e8f1a2ee1709db7ed404e9f1dec6e797", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + "1b8bd3581ad4f3ca6c0cb9d1cdf151aaf1b3248b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + "8d6a0159bfee773c443a96e637cb554f8b0b9d2f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + "93799cad263637f55d8e2dda6bd0969365d6d33e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + "4eeff108866e92674b87037a2e05c53ccef39b26", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + "833ccfeda0458acdcc958445919cf8ed84341943", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + "85d74f6f12a6df793a9482d06b0003b5c0f48cc9", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + "84662c7139e86910c58034cc6b07015df10576f9", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + "783a4281312483753dc9636c2999c520bd1157d5", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html": [ + "bcb3912c4eeca0e9a46cf30dd61ff9e7736d88f3", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html": [ + "915430e2bf01b65e947589c84de7b348acfabd3a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html": [ + "06e2040989fdb40086b49db4585a61aa1f462e85", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html": [ + "4c448982ae0702e42863b107121ec9f56ec1f162", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html": [ + "470a1fed5dd769946eebe7f5e9c9a67c2a3761a3", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html": [ + "c69cc65b24fc9717a8a4c5413bc76020268a3fbf", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html": [ + "f88769fd9c0f6978e0444dd35d84280d501843a4", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html": [ + "a747db8bf19b2f6a74df320479f008d8a862e832", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html": [ + "6fbdb686a1a4cba4fa0e1d8f42627bae94c00c87", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html": [ + "a7e3dc518551444aa406bd508c0214974e395aa3", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html": [ + "2a50287c1bb32ff9591aa31ca06976b48d088e8b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html": [ + "acb2d52a9e09ad3b1c8d71aadb9742c387bbd110", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html": [ + "8c16c05f1a0af2e03ec60bd06cc464984e3c9cca", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html": [ + "496d12d647ba6f548f612320180a58582c233089", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html": [ + "1b0378a367943e73d77d26f92265f585ba300fd3", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html": [ + "00bea0d3a51480a94825505e175dc9cffd35a690", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html": [ + "ac2686bf311a0554302b904df99fbb0889092bbd", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html": [ + "0c72b8e9d36a0923f45c9fd582588cae5cad243d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html": [ + "d6c068b61b8d168a7353f08993e75b8dafd0a707", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html": [ + "444b3ef22f93b24e2cc1a113b79b3f4f1ff8584e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html": [ + "4e33ed9551bf6bf312854b8945a8c2fc15adda3a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html": [ + "d458756330b1e31466742ce816662252c9960392", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html": [ + "26b3bfd4d0c38b996211dedf4ca724e3cbe388b7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html": [ + "a0ccb1b05a4b90b741aa8a42bbb5e93182e207c8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html": [ + "c6445444c0dc1f5113429237098ef3c2bca14849", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html": [ + "d1f5a4d16aea2dd9406fd1fc63ca6b22a4720a8f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html": [ + "631165464cda870cb5561c893c51afd214094c47", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html": [ + "c38aec92be25efb95ae83acdf6e5fdf8f8161f2d", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html": [ + "8dbe6086637901a88591a6691aefcfe9bf8ec275", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html": [ + "793297d1697d0650734800821c959dec680a4cd9", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html": [ + "e46888e7dd1ae3d03bb262df6cee378b2c56da67", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html": [ + "62ce6a414807744e4c20f0f2d3f3350b7cbcdb65", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html": [ + "6afa660bf9da441fe5a75970abcbb37e77a1a322", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html": [ + "c32fe9b95d5ade86f1e2a78b71ae353b36af0123", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html": [ + "e7cbc17b7c169e4ab2ea7143680d4e4c864f9ec0", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html": [ + "7446d6cb7f18d4f587b8d17faa27981ea5383dd7", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html": [ + "1f14c13bc58abd99be093a857e303bef259d304b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html": [ + "f27f5a9ea8cb556136719475f6034e03088b51eb", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html": [ + "3fc281e8deb3412f0bf566e67cb1042da83cb605", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html": [ + "1343e9370ecb4e45795395127e38d5d2a7d77b9b", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html": [ + "aa5a4dda5b0de8bb3db1b424a57060539a4862ae", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html": [ + "16d6b375c4f3744195181f5b6502e75be9069011", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html": [ + "d9c21291c9e930663e0790f7d0ef286ed6d61f46", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html": [ + "f383932ad528165289c0a80c24900e61375ebf56", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html": [ + "7f0a7900e03b348626c71a5757d8b296eecc6321", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html": [ + "afef1ce00fbde5556623c788b36435656cb3bc79", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html": [ + "e0fbedab98315db00c5fac82d9ea545c6fe4043f", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html": [ + "f737d136298086a08d0c152d378270f440f244ed", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html": [ + "9d94546fe02d7a0bb9c827e88fe8a471234d8960", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html": [ + "f73a67d4030a7f2f9ffa037a4cbd4fb7527f3911", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html": [ + "e5329556d40555efff9c6bc1fbd36e3f1caea5cc", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html": [ + "424154f44e60f8b8b38eec377e01307de0083a99", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html": [ + "1e0fe60c46c900db52df08b0bd39928fcfc242fc", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html": [ + "b1c1b2c78921dbeafcb368deeb1ba0e57f8c0a67", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html": [ + "c6d6679ef334fe5834d6a0944077ccaa6f500559", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html": [ + "0ec1d0588595d0878bd6f12f66c9f6a63e8e1d27", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html": [ + "1b5110c28cff65a751da9819b5c51ac84d1d245c", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html": [ + "43e2070ea66e17fee67d781b374bbe8183fc4d52", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + "c82ebd1769bbdefdc8b1ffb1da8d319b0c557983", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + "79c204fee0a06af19c1ceb046807e6c9f4050704", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html": [ + "d7f31ea497a922c6bcef93194f4b46a86a7cec97", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html": [ + "522877903c5f15c29e859c0eeb4ecc71a97d7ea3", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html": [ + "5dc0587fc0a379f1e1c4e0b663883c81267c79d2", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html": [ + "34fa9f77036447725377d78af862089d540eb377", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html": [ + "0de1d990786b64403bd7d79f6d7d3699f1811f16", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html": [ + "ed256fe53d2fbbe0d2d567c70d33fb0c0a2bf2c1", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html": [ + "1a93d1fce387b5d2e6cf6c0b23556b86b2249cf8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html": [ + "25f197009e65363588c9d8fa9c1aaca79f380adc", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html": [ + "54c3a070d6180028dfc6731de40f8a7c35fe48b1", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html": [ + "346d4c1ea2aea8054dfc4d55f3ff696dfb39204a", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.keep-origin.http.html": [ + "15e1b94c00d6c9c87d24c055711bbba97a963a36", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.no-redirect.http.html": [ + "4f7ed37e7b293158e318520ec954b7c14bbb981e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.swap-origin.http.html": [ + "7fa22ec13e428f8980eb3862ad7a551634d49d06", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.keep-origin.http.html": [ + "c16b91a511ae074324dde71eed029f4dc56fb31e", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.no-redirect.http.html": [ + "66b00c803854acd9993b0516d57284dee3b41bb8", + "testharness" + ], + "referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.swap-origin.http.html": [ + "536a94590b32476becc9b56d42c397d41e770815", + "testharness" + ], "referrer-policy/4K+1/generic/spec_json.js": [ "39cd997338e4c9e235d30097d970daeff5f1f19b", "support" @@ -691208,6 +699988,2858 @@ "5dc2085c62fa48787d4c16da422e3551eb844630", "support" ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + "54160250a641f6e480ea3adfc9b795ec2f59afad", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + "a14fab1396f2807021f03bbc8ca723a852d82876", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + "853e3ecd98f57a09a6eda2e11c228ee6ced43a6f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + "f296d012d82e04f1d9fcff443aa0ff385f590b1e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + "2d3b451e43eb62a8359ba79a8bac0b7fa31131bf", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + "30a0ee652cdceec890fe076299551c3e3e997dcb", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + "8576b77ec6b4a62c0cc21e8ab9fcf82274b8f040", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + "7e4f30fc2e8c64a7f0b6b0a038d06981f1a3ea2f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + "dcce9ea64ad4912cda10be218d62b5aa407d9994", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + "a2b413197ba3495d4d624affebafdf2d4809011e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + "74ed4c622f3a239ce4612f9888475cfbcdb759c7", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + "8f19bf48229bd82275ead64e49e5577abb79463d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + "c6591c90407778607bbf70369a5b1ec57bcb24c8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + "b3ae03548439d3679daf73fe1863858fb2c75a40", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + "ca967c585c9aeafe43d8fe5f824a7e7bd81dcd2c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + "7a620541464370f8f96be939bee2046a26d0172a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + "806fab6c61dcd091d6c0818f92c49718ec0cf3ec", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + "f71d39ca0698b7c94c13b0972ca59e924b177895", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + "978ac1d7fac40ee35f43ae80ad4fa739093f3dd5", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + "c9db3acde9c7fe0c0e93d558cfed49c605d85b58", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + "3decd3a67f4e1735e8a7bcd7c710b686b3c53922", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + "9277073bbab5614fa9a982d8c6618b8b1282231e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + "912e6135da6cf662229f156cbf32b7d7e9c57e3c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + "9e09c25bde8ac891d618d89f40514a333f7434ab", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + "b2c36993e9f012d93389283932d5ff7b06debad8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + "36c37a40fea798d655d18c438de89f623749fdc9", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + "b994dde1720a9734bc51bd898bf64150bf53f083", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + "5da33c6f1f3a52ae54325a75a682d7d4b6193290", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + "efa5d3118f109147e560763729c45fb6c4d83533", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + "3787093e5bd8505b1cef6890c71ce8a7000c4c15", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + "d6c6c6b6d5457fe08e413c494657dd86d392a8d1", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + "5226e583a55e550b40ee4ff9d6f04df7a66ae88d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + "e7420da5a18fcb69392aa7d7548965835ba29628", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + "95816eb2034cc0c033f37a7828ef2c88e677cabe", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + "8fa1801dbc154e998170c148584a087fd4554667", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + "f268a6ed6ebee3bb42b2b2347b19216aa968100b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + "f5d1eed210657c6fed5c0e053040ee7aa9dacfc0", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + "a9df49d87564de6cf23fea86ae4ed5fbfc4d246b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + "87c7b14bad34da3ad61d455a96a891267f6ea8bd", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + "21c9f250b51618041f564babe930df07304b1712", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + "1009f359e873fb521df4b7c79b008857355c0fd1", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + "bdebaeee48f3e65ec11c7d29249c6d0b18712bf0", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + "598bf0aaf23295cbcb7389fe530ef71c292cf543", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + "f2e819ce3688d483f5c2a0cf72e5a24541b68728", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + "b8ddb48fd2150ff3ea80dc80862444969fc679b7", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + "4c6aa0e5cab252b490e66a8c9ea7b36aa2efca98", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + "8c499d35c7b8b075e9b779b6e098b342ea312690", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + "36692fccdb84d7a711da31f469755f8864b8ed38", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + "e8578c365caf6c71c04f6b0aea49d4d7a0fe8310", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + "5d489db7aa640b8b6384250e01cd42e0110d82aa", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + "9ede931dae56cf6e93cf2094462374a35b57b80e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + "9ca994d57eabf52dca139554df5ea2975e12c55e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + "37d2238c09d2c65ce118b3f6a5578b0941e38cfa", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + "3f69bbd21915c59d7f802c707a28ebcdcf9e2c4a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + "43bfecf19dba54a86657b0de749d773a9619ad42", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + "67900f9062e9f7da29fcd3364ddc6c512080ea9d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + "dc43bf414611b8bf2923b7257b6e33c34c284206", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + "32bedff1177a0fceeacf61dc1cdcbd712b35fcac", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + "1fe69c1af2434b4a72a42a589c37987032c333d6", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + "90503c86c9abb6e6844398f826d8ce58984415a3", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + "dd9e20f0953494656d432d74a7fee458ae435d37", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + "92fd41603e1e57108739a450ca4f17f3f0b62b37", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + "f5d55ebf08c0c628e7b6f8ce99a7ed9389c7bc49", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + "9ca3d898262cc48d98d88c6cf527010c657e8d82", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + "8797d24f9125fbc6dbc493c3c84f4c58ce54a18b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + "a21632865ce85643e1766574769254c20a45c790", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + "f47d931ac09e32f9d1f4bdf415e5ee54edc21946", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + "1cc027e3fcb7310f8523aac51ed464b3d0027418", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + "9577dddc93b9c40b4f9a313055bfb855a462eb1b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + "fc5b92fce9dda98db743bcd64db78f393b4ff5d0", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "9a2b056c8c6a91ca63119454f403acd588675a4d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "6f3bb72674a80a1a15e39e810fbf21e7343e1004", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "731c6fce57221fa0995140b1f410fe05f1e77d3b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "1b17f0f9271b5370880529c7502884a8225e7fa2", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "f3d121e857ba4d390e03bc4ade1ea010c9c28182", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "5971b59fad22167b8c66b46ab1647982849e7cd6", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "055ec8c21222c3be9d09b2453deb9a32f1e4bb03", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "aad5ff4708f162ada70d7d9c97dca1ed136b3c6d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "ce0835daf591a9bc748ed8ea83c0555d614efdc7", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "63606746657435754813b8b6282262821238e0ba", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "9c3604a6b96359658cca5ee212f64f8228dd0fee", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "b8933df29fb63f00fa884987a7135efa6773b0c3", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "b341ff28b99d8ba056ced5417fc5240c76a1d20e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "d0172cec6bbfbed75995926b6add9a4c3608e50c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "2dfd23da4801f147b9ee8b34f3340e69c9004aca", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "5f01dd0a522c8721449a1a0de69ff291ed1377ba", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "a20fbdef3e1d40bb2cf7f9e23f0d617bc7833b35", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html": [ + "19f762834d423951ab566e0c936120c2bd9e8f5d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html": [ + "45b3f76674cf768eb34a3377cbaaf2cf34270e21", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html": [ + "25794b0bdac85d0ef35772cb49991f0391a70d39", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + "4808c92b9a6a4679ae5a501994f81d4961b45dc1", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + "0fccf00caad96a6f78839bb6d81da9bcd13ef721", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html": [ + "122f0971a36ba03acd82585e0cb4dc0f6cdef254", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html": [ + "ce7aa5044861437338ecdebf1df6bc77683e0477", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html": [ + "4ffafe2c0543e1595dd5247165cb6ad8db742622", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html": [ + "decf2c40322d933446695c980e91258c68521df3", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "2b17369776ba11b8686c97093884099a18632ec0", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "c4d44c7d17428fdc99cd9e82c8679584a8a51636", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html": [ + "110edf5f8a79a93b325e8800f55e895707572162", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html": [ + "39adae23ee21429b2cc049e7dda371d88fb65c02", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html": [ + "ba6dbd59d6d4987a53f9b1713ebaff40ff491973", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html": [ + "c3680a1f71c832594374b5918d30a65bee9a08b1", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html": [ + "4073a9177e26fc955e7b40ea2ff8d87a7ab708e0", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html": [ + "963e613a8e58f7dd2ed1e3c10e35d78b067762d8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "c4bcd4811fe76c379aa379886a5f05126c25646a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "202fa0c9a7e4ecba57aaeca8083afecfe92fcd17", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "520f0941e16375e525c92a0565f8659ee9fe0bee", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "00a20bd1fb4198677e88a8bdb3dc6b8792ed7f71", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "ca4dcf7381a0b833f4ee54a9fc63f61aa8c55d7b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "b189fa6326c7af3956edaf4977a8c9df0090a7ed", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "2a8bb2302394bc496d3ce95d6c8fafb575b55c4d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "600ce02bc22333cdf693ab5162ae9ae0fa60e5cf", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "824fb33302f45d3ed090a86e0c18648bb3f5ffb5", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "4c83fde2e4d336bc114b0f69191ff819443e39b6", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "0f3d7878a5dd50d64cce76f8c28c7e42a6da60fa", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "c33c745d3881bbc02f77cd9c8da0cbd42dc5d7d3", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "76eb7bd934a89542266ffb380b9cf57731ea222e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "36088e087acf642c6b4d6269c31aeb01146b1482", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "117a77b8e5a0aa89d2ae5181bb85abfdd2735f6b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "0cdb3f1cff7e2cf5123e0549c9ecc83b8ccd0e62", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "ef2c352ca53616a2a8d2e6ccb0187d91fa338dcf", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + "fef103ab36f9a388c6ebc29596bce7379f301532", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + "b30e65cef88f2288a90e57076d00638bf544637d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + "c85a4b5a464710626f6a1137754fd6322419624c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + "99db3864a6472cd3dbb7fa8b1532cb69d4fa1fff", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + "4211b11a519771a03133c0acc099e3ead6f3b56c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + "15a90bd77c7f76f46e16165c095b687292d93c79", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + "5dc1482ec09aaafd815fb6bf7b7367b535f985bf", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + "f209625f1856bf24ecb5186b40e73728a3e5fc5f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + "0ba5f0d4391e248b87aaf5716f5266257818668a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + "603523ab4669970fc551e81e0b1697948bd9d507", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html": [ + "aa2f229a061def3f369efa8a9af66a967b7b4b76", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html": [ + "8456a5f131bf3071da9474d3624f5bea06e971bb", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html": [ + "5c598da13acbd47b45499fecaf74301cb08b801d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html": [ + "2027d54604011619f5c3d96beda2c9fa48e95921", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html": [ + "764fbf15ecbac5f433c0bd48843b2c0569c43af1", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html": [ + "410ae2bcd289b6e82b3f0a6d681431057d04f407", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + "0efdd54a34f7d936299a2728b5c11c0ee3007b69", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + "cfb09c1ec0363f2c4cee735f34af2f9ec896654a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + "3b182ea59858e57f58fa4eb9983080f6f1ff9c8b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + "ebe29f74bf0acb1a5d16073f059d4e9478d3c4ca", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + "2659b7b9664bf7527b2e915f4327e48463bd74a5", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + "5093dfcb745883bef132eda01c00f595766640b7", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + "9d220aecdcf88d6aea7f92aa7800edc28da20633", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + "c80120da25ee214c635483a6ce7670d947ef59e0", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + "949beb9f2e573a1c4d9aec2b7cb12bf1f3707344", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + "1562269434fc16c3f5dbe16612a48d91166104fc", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + "9a841555d95d16b78467702b76497fade3030e46", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + "7d4eba4c0cfc6a8850f1f3e9ff82ce78c0d43e4e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + "e822bc38e9b831a6543b1603d4991b5cc66ac26c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + "89a356978977198d24c0cf8dd28715acb041258e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + "09043d6bde786fa40c31afa62df564342905da26", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + "4771692b7568d9e67a4526d7d25f2dadd74ede73", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + "f0334b267bc9d7265ee5cee306e7229efdd17e0b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + "5312351dc239cc111ebb4b2263668fa52e175c99", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + "c3c6b2446319d51c36144a41cc92e8acd3a02612", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + "a0d4eadc671ca7eff275ff1dc2f017f095cb9ee7", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + "587548d0b69e7d96701ffc528b0efde1ee15198f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + "38d7bf856bcfd06e89fe161bf2bce95599fcb7ab", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + "62b6e24a057dea75d7d427b579440784dd5d3e1c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + "47834e9d522f58fc39d8de921b83327b51ed0513", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + "2afe993bbea0cd8331f5b445f8a47e4998bdd728", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + "11040bba5427417baf97aaf9aee4734e80019dbf", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + "c33eb02091aacc5a197349db5445133f5a3da205", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + "9bb1e5bfbdd52118639039393c323f5bf1465de2", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + "eae638c67468e6c295397ea7ad2f0fad529fc9d5", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + "527328fc980c46debe0527aeed20e58c86ce2dd5", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + "6b706c4de123653c3965ee0844a9cfea415d73cb", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + "c96c701e38a6a2101997360beb62a34a422a6d50", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + "eb57c2c11cfc2f251eb3f51cdbbbb255e50e5aac", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + "d5aefdb2ad19721955ff7ccbbb3f876d65c05c2f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + "47775c11d5d7211c568f305960ac92c9a1388784", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + "39ae72fa535032985c0e87a71365ed1f841c9671", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + "d2f928e3b9fe86de89f91336b47531e02f5172a2", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + "2dfdeb45d836d87b4c6f1d6b709f7eb4875c7885", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + "efa5185ed5f2e67bfd6376a44c245cd482104ffc", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + "7bbea8116b604ccd28c9a23f1386b4e78ec10ebf", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + "ed68f19bf05e2a2b9a7592739d4bc77938087002", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + "ab6d388f2247a5bcb97aa22f3c0d29662cebee72", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + "40bc6f19d1eac6ffcdf7cbd87bca1a58898e408b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + "75ea4bb8202e976b893750a9335c1275577cbefe", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + "ddc655cd69fdd30872f28bcf87fe0f656211c7dc", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + "d140b8bf144e868939549693bd7dbda18c173145", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + "5f9dafe9f7befa4e18261753e08bdb9989c983a1", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + "a2be99f9fedb23b14ce4f37d7e964c567dcc273d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html": [ + "030d5f10d329e88e8dde99f699609f15f39fb5ff", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html": [ + "18500c2f2fa829c653da435bbc88f6f73d4db03b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html": [ + "bdbad5ca2b7cd2ecdcd7828dbd8f3386c3fd4d19", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html": [ + "b079438febf6ef8bb231aabb03dc46e747c0eaf4", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html": [ + "b21409a073a57482f81bbc906e7ffac2f645a84b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html": [ + "f52736ec73bcf8cca2761159f7fcd15e010593a8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html": [ + "5643bee8c84dcacbfec590db270fa8974f2f50a8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html": [ + "929f9a937ae371b7bfcf2b95031e043a165aba9b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html": [ + "221ad2be6e537956e528c67b49f361fb2fd3c520", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html": [ + "db0b3e6b74e6b7321a7f0d567a4e9730ad01426b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html": [ + "44639bdd28af90075d0d984862db2610fb0346c2", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html": [ + "fd93d32cf35cf6a5211e515a1c10fa3bbd1961d0", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html": [ + "89bc43cc723a12c5b1818668a496c52623d9291d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html": [ + "4ec3d90cda93bcc6ecd5a269f0238034e51cc1df", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html": [ + "420d76e655403cc127a1481412117bd0e6d3b82e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html": [ + "8d243e77f6d1183f8c1ea6cc99c18da4ff87a4c8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html": [ + "1dc719efe5593da47e7dbe49603ece6c6a038871", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html": [ + "2136d9fcabbbc11ccead669b65fa34ee05c5081d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html": [ + "0689e03855087f069817f21f84609834cc50ce62", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html": [ + "4aeaf47723430bad32cc0453c2c613e782d6444a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html": [ + "5ee203b76fae6769bade02c2ff7191372a3c0a0a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html": [ + "8c1c8e6b2b4d12b69fca2e982149df7f3800080e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html": [ + "0feeb305f722d93ae7e4fbfe9d04bc610dbed5ce", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html": [ + "51fb18edfe72121230949ff3f358a024cee061af", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html": [ + "364a03ae5529bb784a8714871ebcb227f4757876", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html": [ + "dcf6bfbf1c0da5d444e90d03c975fa9492de090f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html": [ + "61fe4deebf76e6e222328ce1a6c436cdc65f6894", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html": [ + "6c70039b1f466182a17b595c7408e289888a88a7", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html": [ + "a54f711b8f5f1c448b3bd4d1752267d2efe80346", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html": [ + "25e9320df5c402deba57e43f36eea0a3077f7b2a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html": [ + "198552217460a79b1604407ee96873896eacdc0f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html": [ + "c01c5e96eebe7a27057bd8d70f2c67baed213908", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html": [ + "e8839b93a3123c7c6f72ba8070269eaecc67f4f5", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html": [ + "c3e3a5209dc01b42025fedd22e716e9f679497ea", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html": [ + "b8c03e924e19c702f4175e548db9702f13acae7b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html": [ + "7cffff93b689794e0f493401150dc29c73d22199", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html": [ + "581789cd22ebe312a4ded5a0094f4949017da0ea", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html": [ + "a7fa4e3d2a0b8e8184936b66b16f6fb6214721d7", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html": [ + "9822fe843426655fd245555e3b035f277d4a29e8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html": [ + "6b465939df7400c940dad441571981b03ca28383", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html": [ + "46e82825fb336b8cafae0e45f71b091a72e71b79", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html": [ + "0756276d9e0a8fcc300a2569952251d23eefee59", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html": [ + "9f814fa852bb431663ded0df930be9586d8f8cdc", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html": [ + "129e3c560a4d0a7ac2c5fde2261161d4d76ba91a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html": [ + "af8a97d1184f1cd61a26be60875211d50de1b2e6", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html": [ + "40fa08862803b41955d5355b58f17eb88fef47ca", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html": [ + "9dfd8683770a17fa70b4d4c7938e751bdd5f520b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html": [ + "64df30a885892f3adca158dd9fa665c9db66b9f6", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html": [ + "34be694e3faaecd6442f7bf0e7fce32fa07195c9", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html": [ + "a08f1b2191cab619add9a575a3343ba8f39b081a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html": [ + "6b57a550032cc399c1418ab446f00a99f7508d43", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html": [ + "f900690ec7f7a77551aed8303632b4edfd046d57", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html": [ + "7fa850eea50f55cdc5d894e8523b305956bc8a08", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html": [ + "68f01c719ae05df163455717cfa264d5f039f51c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html": [ + "dc95dc909b7eb480737b6c38b7a766ffe80fad5b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html": [ + "1cc91cb6ead2aeaa3e59445bb5e2901f8a0eb256", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html": [ + "d6809deb530f094afd665e8b6135b2f78ec56f58", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html": [ + "b78fc7135e4873bd284d610bdaa9f7f8961b4361", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + "c8a46e5d191ba9d332292d02d762c21c050977f2", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + "82789e2cde2ded1f459a17ec952802d996cf9095", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html": [ + "8c84a954c66ccd71ba9859924ad4c9e5bcc7d8e3", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html": [ + "97545736fd9ac7d3cff7028eae72a7c999870c7f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html": [ + "a6865e346d079fe0dd05a53512cf97b768b88375", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html": [ + "7ff5670a5c266ef63fa9b6a9b62751e753ecadae", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html": [ + "2eb093834d68d9592c9f1a352a7aa4e40d073cb4", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html": [ + "3462597c2f1355742879b6650f8a5fc1e5800f8c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html": [ + "92503762400a3dc776e8aadac650844c62b9f1dd", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html": [ + "1ae3ec326cf0b67abd23dc9fea52bc8e00fff6b9", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html": [ + "d763c5f63007b53134786a5c777c76c541aa3756", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html": [ + "3e4776ae7ffa6eb39e7b70b2d203723b58f00cb7", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html": [ + "984888d1dcdbc9f9eaa22483475caea825e1505d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html": [ + "1012f88acc17ede9aab6e0a0600578a2b55a68bb", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html": [ + "293f3b81485adcaa5a67d0f10b23cbfea0db0aa4", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html": [ + "564e62a6e5d626179cd596788a254b7dc59f4e27", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html": [ + "7a83e94487d88989925eb7dba6519219ed543a26", + "testharness" + ], + "referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html": [ + "446cf9824f16f96757272bd1709b4ee217362bb8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + "6635dfc50312156f85fe63759a058b7c2f620c38", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + "e83ae4c76934085dc7af62b14e3c7e031788a97e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + "15d4e795dd77c00f939b42c0512682a44a2ce926", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + "7658b82ec1a193ab7edf4a7b3d70299fe71fdb77", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + "6248d0555e517b47413b2cc3609b9dc95882361f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + "48d5d351b695794a400f2dfdfba7916ecb32c6f4", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + "b46c6e3be6724ca80bf88815ff92b60f52ce57ab", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + "12cae73fbac9bb0565e0796322b6c6e29988d2a3", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + "ded040b8f10622d21299318c9d07f811d3a794f6", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + "587d33bba90e7b4707ad5960a155837f66b85045", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + "d9f2b31903a2c82c6bf82572853fb6e42b6c6498", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + "6deeb1030a2b2f3619745dbadcebe948a9658286", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + "d398f8f0a49c1fe73d85806ae2041901180bc4a8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + "ea6088e2334597bf9afc48dee779ff218ffaf669", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + "dfcf3cf24f13d4e2feb5e1510776e1cc2e940a86", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + "ab490575d22c4ebb49d0943c6988724ee5cedd17", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + "364b47cd599788275135fbb1da0ba2dc4dd7f21a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + "abeafee9eeac4a9b96309b3c572cc9ad24647b6b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + "06cd341aa20f684e9a4721eb447b38e87e640f5a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + "b65273930ff5d61a0d93d177a0660cce396749b7", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + "29da61ad2cdb76a11c6ae2597b4220e45484bfbf", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + "b5883fc31dd6bc183ce3cace27e8156a1b7970da", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + "8bf24a8b543dde60ea18c97d49486693c84af7ca", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + "5bfca7b23cf05f70b7980270fe5a215328ea114b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + "5e976f19844897fcf1867a9a82c01fb10c789884", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + "238d6a7a703c724492141c0f154f11c3f6bd2e85", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + "42ec3e3321b5e2316be1f65bd8312e9e1cd66cfa", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + "d5ad6f60819ecc4586da5a5aff08a885c51dd684", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + "a8cb418ff69dfb9f758dd99f0fa9d343a7899f8f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + "edc3c13d38b0456188c47b7e5cf65b4fd18117e2", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + "2f7f2e4a45af587a89bc3d9ecf2cc88253e2e1b9", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + "d5382241de77a065146cc22d9a671ca4ac6b4647", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + "462853088ede9f96adf608022e2186e3c64b404f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + "10ce4ce09d2513254bec9197efcfff3685695ba1", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + "eda423471fa4eb2c6bef87ee0423685708e8f9b9", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + "a96037073193a5441f72ddadaa362e44ba79e128", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + "07795d238fb3887eb69473696e893b95f61ce8a8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + "85e10c6d5d4d4c8f4ccab1b0dad9d28c9a3ad2a1", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + "b212c97aedfe0cd014c93fc4b8d10a12d1826c24", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + "ed9b01814dc2e1728cf30f65d9f76da4c0708829", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + "0fca364bf458606140e0bb2555f50a67293067eb", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + "dcde268232674e0f2db09bd26757b90b1a016413", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + "65e4b5309887d33916ff6f291668bdffc8da535f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + "4ccd1f8719b8b30c719b80e098b9b147c832cea8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + "5ea416427ae79e085edc539a1524573ff4518a8f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + "2d750ef7f1f0bcdf074dd6a4a9c6ae947fc00be5", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + "f32e1403c92176353ecb47e71c7fa38b087a59a1", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + "4245f1c5fbb009b9b92e23afec0cbb66f7367f63", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + "a8b1d9102d52274d95ee9f6227cda7bf258cc1ce", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + "6802465799d8eba057aa2a8a6be892523a17ece3", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + "b91241e3350875c813092914ed28f8998df17cee", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + "b3b48ac716734f32227ed1d9c471c3a2825fb487", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + "b962171e6df3b486791829ee665502115aba9015", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + "88c548adf0875e0f6164d55f9b0b9afcb4aefc59", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + "9a29ad47937b7ce998bb0823f7696e3431155508", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + "4f7253c25a8a5f32b2dc22c03b4ec87d54125b6a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + "b3dee8cc5fe89c1fec27c07856141bad6d47bf59", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + "75a14d71a0bb826df7cfeaf4a035f922a1759a05", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + "7c63fcb42ce9317e99c4beeba3f16cb9dfd6d199", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + "c05a4c9c6903d82b0daff2d7240aa8c6f60ea3be", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + "086d5904c0c29a7ce25dda989913f87d0b7dfc82", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + "972017b054c3df4e1ba44df1adc2a84a22426b4a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + "5ef3f2fc609562e395fa8c3bf03ac285df13393a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + "b64c282e4356d9d84aa17926303afb3f242c9a1c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + "1f2512faf748feaa6515cc52b085cac2f56f954f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + "7244d148ee7a69a4cfb36af96f7af01509dd1004", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + "2e692b8f51533561d1d2c8aa30a1bab7176e0976", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + "747e4a39370631c2af34702b5b2ff5d857e46f07", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + "3d83d2305bbe1fbe79e0761c65a5aa41041f4506", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + "2afe68e9280415fdc8bd07040425fb4efb291382", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "a6f537f175e4a1f0b7694960c0bc995572521cb8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "86b2620d90511c9e7f3695d9377e4cec92e7fb75", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "1b6f97649943d1e305cd84a18f88962ddf3b8d97", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "74320c80a8352234a8538ba3c99ec127de475a5c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "27c78b1acd0b7d11ad92989821dc2ec11ca8cdfc", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "9e475ea1d5b02972fac1d56ea3b529f61b9bb5ce", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "ea75a2987adaf59a6ca29fc25b0eb431ee0cdb92", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "331c30ea67f6b62895b2bd0688f12c1b63f24e7a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "65920c7a3913b0e6020353955d91003c86f9aa0f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "a4f455943229ff5a9843c21040d683b43748c7de", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "50861fe7082e29a06d06395caa36d522783fafec", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "95a0c8c03c4f2482ffd6a5e209d68f71f0e93f62", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "1adcb1004b73cc53b00afd730e0f0417eec12e4a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "ad9673edb75938230973175d3ddbcd3171e29730", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "d49bf50b465084ed82673b4f7ff6fdf021b106ff", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "269ac8f825a9403fc4e6aa3c9cd23f0a754206bd", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "5f550fdb2fc918b5c54ed84a2ae217036af7b57d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html": [ + "973e6a05502ef9748f135ba31f9365b884388855", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html": [ + "07240599c8b9d7f3ff04b3c4de31365215d579c6", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html": [ + "98dd2b22abfee4f8d76f83ff2eb95a33a171df72", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + "034c0d499195effc6f18f0850866a53dc2b91cf2", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + "8506cff81ca58e656b41772dc69597c138c1bedc", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html": [ + "b2d0ccb2ef2934b18a336ff4328281d7f9f7c425", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html": [ + "f79fb6061335e48bede780d1b01db00666eebba0", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html": [ + "b2c65b916e27ee39daf573178639422695c6e98f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html": [ + "5db950ef6173e2b73523f039d9b0172c532036d5", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "cb0c92eb930387776f1d9982c12e3125e928e122", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "7b4500d2efdffa5be2ab856659677575f93cafe3", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [ + "ad8ce8ada33961e22e20e41f8b76f652080602fc", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html": [ + "09e04628762e4b9158b04dbbd902ac151b251f8e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html": [ + "97aa7c0989d2a269eeb6ade1dd654cfef2c8d9f9", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html": [ + "18e2cac2c5b5f3bdd9cef9e4da461e9d84623220", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html": [ + "c1b01545027a0f8d14790f180f8510b3c28dbd2a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html": [ + "caa7e1d9e52687f7a0a3d687f1df1cbfbb412b9e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "a3fd164bafe4d567b3a4c33018b5f6363d37055c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "d3b334d3b6b1ab41e086d60a81130e0eff48ba7b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "e1d95b11f72b7f965fbb79f6eebcd3197f75df7f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "49a78b0ccf9932439a9fb78cca1a02b12c52e11a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "ebb61bf712ad4b411941384f85bdc74209f51816", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "d39439883e45f38ad9099f0060766fc6afc1a817", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "bb2467f6754adfa6baa22b68268729f02f3a7b39", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "02b88daec66853937f0a35ef6120ad8f5e9a2e3b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "95424dd40fc657ccec7686653d10f99af3b42912", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "01005e24f33d6c995e51c86a39c7a1e4ed95fff5", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "76dda5d824189a1b9e1896a01091e421530a28f6", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "5a794cfa43f66b16f4e588d5dda9d67222e5b5c0", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "0d8ed7ddf9d27079bbc09e61435e3c07607553b2", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "93bcc8f6bb6e5880f5c0242f22f0b383a052b046", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "27a35a92bb56a52bf6fd1a43ceedc6a5173c7cc4", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "169b60207557ffcf9484377845341e6c0caf9c3f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "6fe020ccdf3fbf1544b8570cdccdcc43f2a4f687", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + "5e25fbcce64a30a669f3df4d9e277186d3c950ce", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + "db57ebbae4087db5ff44a16b32d6ef31867033d9", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + "426f6d11a08ebb0424a2ac519a2bd17de957d72e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + "746c5e0a2f3f7f3f695b2a426d4a2f1eae7d6ca3", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + "22c37bfe5e900562ca910cfbbda50f0c176929c0", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + "1caf3ee26e8d45cdd552914bc590b524a5658ca4", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + "789b1db61941110a7b397a8ee0250f5afde97d4e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + "68f05c5c0b4ed8504c6c11f46d0c853790655860", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + "b16af6a11614c52163058696ca322b2523cefb30", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + "1df1732f9f20aa3cf6ab9959e9d5201ab3572516", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html": [ + "5e8f0321d46a4f38db9d6639f1c4241a376bc064", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html": [ + "a2a5ee24668d11307ab0219133ee6ba112f14903", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html": [ + "a36ce68ecd4e999ea798b3fdb9f6e813bf002313", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html": [ + "50cef3fdf4789633f483573f7625a4c3d395a985", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html": [ + "64013770f535e9a223ca4bb811d82fcc4415c428", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html": [ + "0a7522a60522d2ee0f63e3eb576a30c57e07ab44", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + "f4ecf9e72e31c1901bc5f78130c558a17243768b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + "d27594fb9b603be181f72e796be00ee3165a2020", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + "f78e7b8a688e75e3b6f751075bc9a153437cfbe7", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + "7566c575d6d3bd71fc9949deda74c8105a07a8cd", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + "7041e4cd61353439e6a2ef673dc667791567baea", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + "67daf36b9e1c0075b51078475cb497d1bcb56237", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + "ee0a21cdf6546cacefc314a3d3dc72bdb7cc7771", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + "98e6801514c65ba4d5a4311c7e85f576a581b412", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + "e254449c117a2452c98642ef45fbd6ee67513eab", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + "1d98050db431054eea154a7d8768ae87bee596bb", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + "cc68d00e624c4af8aa127543bdb3c5c493242231", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + "93ef3c680fe3b729adec328ddaac98c9e5856d35", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + "44a151fa461f121efdf163540c80e41adf0b6bd6", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + "7000b2c39f9db141b6aaff60759382958ade6656", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + "a2eead773677b16f99658ea666601b83d8f47dfe", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + "3a891942bb29bf0c1cea109e729c74ca587fb6eb", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + "283bd24f9be7ab0d627f99b675a9252ecb46f0c6", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + "1f03d22999c08aedc8160c0639f9976a5c71589b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + "3ea9eb9017d540cd6c08cb04d23869c0f5fa612d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + "c22b6f66ccddd2c39280dab68ea148b591fd0406", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + "87c589511998302eaa98a858df9020386c7663e2", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + "d557c463572d34bf75abd795779b066a0a3675ad", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + "2d529653f386bb5590d233710937fce5d134023c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + "f75e8e7f20eec9fcc9091fe9aa315afb6dc953a0", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + "5105b355bfa431a230edd4145cbbb22386c1c669", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + "1e5417ddda024efca0951468748b855e35961924", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + "82e77718d775d8592fbdb816a3b47c88698cb990", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + "f158ca6ab726e905d7e587b9b1b833826b45581d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + "ffcca16ea74d7de58fc8abf1b3a485ed6ae45dbf", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + "4ef7da52c299551b9277784472a59499e8b3864d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + "c90600de1180bb5307f65c6ccdacac6efa44d37b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + "2229564c4ff2493edf7274c663365d29c3e01c92", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + "d631404582ec4698f54ab82748e5287f45eb6c4e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + "9b9c193387d172a3e051d720142f73d52d30a786", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + "c3184980f1394f5701c11d03ee2acdf9f1d9ffda", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + "22858a5e17938d2187f51ef6fbed97308bb905a7", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + "02d815b285de851b2382b403202003ec2061b839", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + "59d0107987ebf2c6cb3c0b3c64428391e38308ec", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + "7611f0c0ccb02382fbbfcd26605f567c5bbfe4ca", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + "62360e290cd28db4cae1195ca05aeeb34ef27efc", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + "1f5f6489d3af4ddc044ecd2f1a550465e03d0c39", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + "4f3add3f008e17107d51fdbfda354d4309832524", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + "4dc0e6d514eca55bddcfad5db41620dab9c7b8f1", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + "4dda84412e2009a78f96d6fc01ab82d0c636901d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + "8eac0309834486fbe960f0f9501c4be4c8a0ad9e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + "fd6a3dfc2515bdd1ac7646391964de1f87d9ac16", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + "09c1dfcecdbd65eb34604904b5c4b8e86e52238c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + "5d479a21df68383ce7d9e40018fcf9d10922a366", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html": [ + "bfd916d74b0491d1c3596a5d35e299e8f73181f6", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html": [ + "b86ee7e3856c72475ac9b758c9a00c58ca9fcc73", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html": [ + "6ce7c97c7e27f917dbc7353c0e4705940d2caf90", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html": [ + "569ba812f8456c43d819f8cf978c812028b2f859", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html": [ + "d6c2712a1d2b14e83795f4db1b8edb1d7b7d8168", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html": [ + "e6415f4b5eac7a2e67dc5e3c5eb0e04a97cc0f1e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html": [ + "5643bee8c84dcacbfec590db270fa8974f2f50a8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html": [ + "929f9a937ae371b7bfcf2b95031e043a165aba9b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html": [ + "221ad2be6e537956e528c67b49f361fb2fd3c520", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html": [ + "db0b3e6b74e6b7321a7f0d567a4e9730ad01426b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html": [ + "44639bdd28af90075d0d984862db2610fb0346c2", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html": [ + "fd93d32cf35cf6a5211e515a1c10fa3bbd1961d0", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html": [ + "89bc43cc723a12c5b1818668a496c52623d9291d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html": [ + "4ec3d90cda93bcc6ecd5a269f0238034e51cc1df", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html": [ + "420d76e655403cc127a1481412117bd0e6d3b82e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html": [ + "8d243e77f6d1183f8c1ea6cc99c18da4ff87a4c8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html": [ + "1dc719efe5593da47e7dbe49603ece6c6a038871", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html": [ + "2136d9fcabbbc11ccead669b65fa34ee05c5081d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html": [ + "0689e03855087f069817f21f84609834cc50ce62", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html": [ + "4aeaf47723430bad32cc0453c2c613e782d6444a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html": [ + "5ee203b76fae6769bade02c2ff7191372a3c0a0a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html": [ + "8c1c8e6b2b4d12b69fca2e982149df7f3800080e", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html": [ + "0feeb305f722d93ae7e4fbfe9d04bc610dbed5ce", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html": [ + "51fb18edfe72121230949ff3f358a024cee061af", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html": [ + "364a03ae5529bb784a8714871ebcb227f4757876", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html": [ + "dcf6bfbf1c0da5d444e90d03c975fa9492de090f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html": [ + "61fe4deebf76e6e222328ce1a6c436cdc65f6894", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html": [ + "6c70039b1f466182a17b595c7408e289888a88a7", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html": [ + "a54f711b8f5f1c448b3bd4d1752267d2efe80346", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html": [ + "25e9320df5c402deba57e43f36eea0a3077f7b2a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html": [ + "198552217460a79b1604407ee96873896eacdc0f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html": [ + "c01c5e96eebe7a27057bd8d70f2c67baed213908", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html": [ + "e8839b93a3123c7c6f72ba8070269eaecc67f4f5", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html": [ + "c3e3a5209dc01b42025fedd22e716e9f679497ea", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html": [ + "b8c03e924e19c702f4175e548db9702f13acae7b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html": [ + "7cffff93b689794e0f493401150dc29c73d22199", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html": [ + "581789cd22ebe312a4ded5a0094f4949017da0ea", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html": [ + "a7fa4e3d2a0b8e8184936b66b16f6fb6214721d7", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html": [ + "9822fe843426655fd245555e3b035f277d4a29e8", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html": [ + "6b465939df7400c940dad441571981b03ca28383", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html": [ + "46e82825fb336b8cafae0e45f71b091a72e71b79", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html": [ + "0756276d9e0a8fcc300a2569952251d23eefee59", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html": [ + "9f814fa852bb431663ded0df930be9586d8f8cdc", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html": [ + "129e3c560a4d0a7ac2c5fde2261161d4d76ba91a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html": [ + "af8a97d1184f1cd61a26be60875211d50de1b2e6", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html": [ + "40fa08862803b41955d5355b58f17eb88fef47ca", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html": [ + "9dfd8683770a17fa70b4d4c7938e751bdd5f520b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html": [ + "64df30a885892f3adca158dd9fa665c9db66b9f6", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html": [ + "34be694e3faaecd6442f7bf0e7fce32fa07195c9", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html": [ + "a08f1b2191cab619add9a575a3343ba8f39b081a", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html": [ + "6b57a550032cc399c1418ab446f00a99f7508d43", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html": [ + "f900690ec7f7a77551aed8303632b4edfd046d57", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html": [ + "7fa850eea50f55cdc5d894e8523b305956bc8a08", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html": [ + "68f01c719ae05df163455717cfa264d5f039f51c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html": [ + "dc95dc909b7eb480737b6c38b7a766ffe80fad5b", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html": [ + "1cc91cb6ead2aeaa3e59445bb5e2901f8a0eb256", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html": [ + "d6809deb530f094afd665e8b6135b2f78ec56f58", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html": [ + "b78fc7135e4873bd284d610bdaa9f7f8961b4361", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + "c8a46e5d191ba9d332292d02d762c21c050977f2", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + "82789e2cde2ded1f459a17ec952802d996cf9095", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html": [ + "8c84a954c66ccd71ba9859924ad4c9e5bcc7d8e3", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html": [ + "97545736fd9ac7d3cff7028eae72a7c999870c7f", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html": [ + "a6865e346d079fe0dd05a53512cf97b768b88375", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html": [ + "7ff5670a5c266ef63fa9b6a9b62751e753ecadae", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html": [ + "2eb093834d68d9592c9f1a352a7aa4e40d073cb4", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html": [ + "3462597c2f1355742879b6650f8a5fc1e5800f8c", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html": [ + "92503762400a3dc776e8aadac650844c62b9f1dd", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html": [ + "1ae3ec326cf0b67abd23dc9fea52bc8e00fff6b9", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html": [ + "d763c5f63007b53134786a5c777c76c541aa3756", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html": [ + "3e4776ae7ffa6eb39e7b70b2d203723b58f00cb7", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.keep-origin.http.html": [ + "984888d1dcdbc9f9eaa22483475caea825e1505d", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.no-redirect.http.html": [ + "1012f88acc17ede9aab6e0a0600578a2b55a68bb", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.swap-origin.http.html": [ + "293f3b81485adcaa5a67d0f10b23cbfea0db0aa4", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.keep-origin.http.html": [ + "564e62a6e5d626179cd596788a254b7dc59f4e27", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.no-redirect.http.html": [ + "7a83e94487d88989925eb7dba6519219ed543a26", + "testharness" + ], + "referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.swap-origin.http.html": [ + "446cf9824f16f96757272bd1709b4ee217362bb8", + "testharness" + ], "referrer-policy/4K-1/generic/spec_json.js": [ "39cd997338e4c9e235d30097d970daeff5f1f19b", "support" @@ -691220,6 +702852,2858 @@ "5dc2085c62fa48787d4c16da422e3551eb844630", "support" ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + "a9fefc5335af633cc749052583b5ba1bf7bc5b2b", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + "fe269b591dfd7f61376428d3170b372d2fe0e974", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + "bdab90c3c9350a4c199d5c9e1cb87423cfdbcad5", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + "2166f0dde1302eb7b11fa70c90ce368a99fc48e0", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + "f2729cbcb52a9dff929c41705025f48788d7a687", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + "a73e9d11a2f5684b18d938295e6559e5da181880", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + "50ece9cadcb21883d074ca28df29a160d64600bd", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + "c955a1fea18f1d583bc317d84005b6aebd6dcfe6", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + "f71c3b2c16cdb8ca22327e2bc4ef8bb293f3d7b9", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + "882d65711a8da86eea89192e43cd7062c32f4a40", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + "d4f39f9242a7ec2a79a379e31bacc5589274c566", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + "a7b0e7f266d128e064b38e985d7b377a46fd9c17", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + "32c268942da0657b689d96e1d655cab8eddbb4db", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + "8ea4786c41949c85a2ac78ddb181a442acb93abe", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + "735489130603e128714673baab6bf6b3a13df0a6", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + "823c727cf7ae0f2899de63a336b62919d827f769", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + "79b9f206b13812a700ecf1b30e14ad7b331f0338", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + "28b0287a6696c577095b801c4f211c33351570c6", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + "1d0b258f03a6aed6dad5610677ce51489bbf412b", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + "8eccc5675503fcc94f9884eacce44cdc15d2c3dc", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + "dc5b1c64ca895806de628e173ab27ed68d4fe3a3", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + "98ff9597c559acc581330613683e7060ad8179b6", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + "de37be5b870d300cf1730de2541c31dc04577ba5", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + "4d034ab49d405bd4108189d11a3bf99ed6740f98", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + "a65b56492b870cfcb7c163dd43b8a55626982a20", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + "2503c58f6e8ef3624b82f1e1db9cc5488ac53922", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + "d8c793f10a1e2fcc73bb8d4356211f013b1f8df6", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + "7ee8f923b26562200d5a00069edf827c0397eeca", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + "e59b8f7e55f2ab9f4ff5a50f0fe941526c87da9d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + "e8c78a21f28589ab0d14b7df3053dab014d1c253", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + "9324cf727db196f2de803e9a11fbe40d8a02ea5f", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + "99ce0e996b6fb6f20f5540dbf800911072a520c9", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + "8b1306840e5326a5526b0c7e54a1eba3fb6dc7f0", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + "18bb216bcc6cf1f739ca0bcf46eb2e832e32e050", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + "e3c20928d7180533b36340f526a7c2ce9f5347a8", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + "a78f1b9c0f7d18c0f949c450c0d62f3e0d3ec128", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + "7f9a2bf57b3d2155ad1146047003c45235996067", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + "0027a51ef746f2e4d4dc7b8804c3c5f697b56498", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + "dfdf17ca220cc4bc21051d43a230253c628de41f", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + "d84ed7e107ada8431f2ec2773aa9d41a3b27f7c2", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + "b2f70707cb3eb162dddccbd92359ba2b61cb4e86", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + "b8c847aec05a26a9a7893c1bc419feca62fb0781", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + "ca13a3b60fffd995a58f2067f783a3c6b69fa54e", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + "b48d1202cf7e6a4bb87f87659e131ccc55634e0f", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + "132ab1033ffd4a14c4015f5dd0f7a6fa0a50873c", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + "dfa840a3516becef62be8f2ae2bf9f94632d84ec", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + "3fe9772e601a83dc68b15c5e0106e13a0a48f337", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + "a260b4b2ebeb5781415a19d87d9cdb2c933f6bf5", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + "e8c45deba7f61d1a95d9b2bc46feab70799f4406", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + "1992b36e8589a2024ab7ca425db5b086f1632c66", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + "a0f774640e657f7b0cc667f7491fc75a158347c4", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + "2deb7c6b4816c2adfc7e8a9c14a0438b0714f589", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + "2ff9d5f36b1809fef703e0e6f7486588e326d22d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + "4c6a9514b42b14cbe10ef6f9f750a8ad2ff42b2c", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + "2a0fc0f623ae23f8363a693836a93b8375cdee40", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + "5e88f7341ed42d82ad96be1a11092086e86ee5c7", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + "7d8a4afc069e7cee747e49ecbf700bbb6027f501", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + "c7f60904e180ee2a562cc3cf531878b9b337dcb4", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + "fdfb72931fc5eab62c25b9b23176126483a598d1", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + "47666106781b4defd16c2e2c8381afad19cd1d09", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + "4f08a622acc911f821ae2c59d04be90224234cdf", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + "436de59cab0fcb6fac0eff285d2d758f9de167db", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + "a8f54c1702b9def80a180ff76d5bc576817c87f1", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + "6757257a17bd8b0bb74a2542ffc8249ca806acb6", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + "2faa3f2f9bec613309b9f096684fafd9c95aa093", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + "69d15044350b0e77ffe65ecb57111777075c6fd0", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + "12959fbf9a02c7c0d454f60176c32e059a786b9b", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + "b5183cb38819e1d5d0c5db15383b05080c8767c7", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + "ad4a1bcfea27a73b927f7c46f90ee5a65632dd90", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + "1bab6fe776233abe35c16a50bbf450fe360f8720", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "7f35dbbacadfab47de6c1f71446db58d4c11bb11", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "98941a44ab35a95cc09531958cba9d534457d5b3", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "ad62a678ebdd57eba801b6b6fa5826d9e9ded293", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "866d3b13d38d92c37e7056e5f5ccc598a360d5a2", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "bf9f28ec80128417f9a8c9961d1b72846bb01ad4", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "773e5c81b5289815f54ba0d99aaa650e85290c06", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "15fe7d07220abff2a9674c156d19623e9b355003", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "9f24d9bde8ac47e0cf0bc91f3e0d2e18cc4cdd2a", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "bffff9be0fb81e58fe6add5f0f9bac2ecdd16094", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "b92a16dde62fdb9ac9eaf7770e275f7f7312660d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "cb11dfbefed640a266f1c82b70d6250b867fe8de", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "49182a2c2c2a1575650c05d84b0f53433d132779", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "1e1559eb973418a716da07f82718fd167673f7da", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "05963c2d9f2c743c86dcee6989c1de4af4b84af9", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "0e7d536ab26e216cf2e83136b7136f4586016d60", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "ab8585fc56cc740539738b9ab4a8a8b7da7b5089", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "c9511876c9777221affbcec30b07aceb4de3721f", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html": [ + "4d10d3e4396e93dbf74a947ff987c538d79881a2", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html": [ + "c396d388206c92fc6aadf0d0ec492c11fe1991a7", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html": [ + "7f902f70e03461aa42bd8b895e2cfaea530d306a", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + "34582b4d6dc924e296a50400d837464ed080f29e", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + "9fce73c9d5845861e9f7926386dad6c9b4df1e25", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html": [ + "43b06e91563df5253103f5d4930088ef478b0544", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html": [ + "0b4d5a1baafe13d4a1504f97ca833258f5cf062e", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html": [ + "9a30544bcdf04c1de519cac068c17eba63b72c4f", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html": [ + "da220eb58257437a5539bf175b4876587b39f72f", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "3cef1b4b3229dd260c71047746da3a2203c60b27", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "305c63c7a9a04fdb2f5b46ab1247bb2b640b25be", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html": [ + "cfafc7166f17c644adb9dc1ba9654bee501978a6", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html": [ + "2eb778279dcc1afedc6c6054d51974aa33ebb92d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html": [ + "88d31a55ff47f4203d4588cfcbc2039418fdff57", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html": [ + "8e987ecf3dcbdfdb55a02ece03af3ac8509edcf7", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html": [ + "6b99399a7bc6e9ca0f4172333f1e08301bffc75f", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html": [ + "e5de56b797bb681dc8506c7c772a902f2c30fb22", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "3635ee6c7aacd71bd49181075b0db8af75d9cb96", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "0645477144fc027e043ba3f7cfef136165fc83e5", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "4fdb3e02e2a4ec127220c1533ef9776a48074ade", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "35749e37f9a956b2a1465e793701e7b2d6009e6d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "a5e4575a2949e932c11db6c245bf52ad1785c822", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "179e958d3f15f99ee22ade074fae4609c046720b", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "f53ad35d86b1b8a5d13f5c2f9fa082d83f48730f", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "4ad7dcfca2ffcda71cda7acb6719bf27fa7c71c6", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "a5571e07a5d4a6105b8f3cf37ce491b37bc8d58b", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "22eacd003b5dce0bbe2e1702a1b44c5537a7537d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "a29ba3dbd8bbeddb59d8e9b10518f60f798c61e9", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "4ab18ec26d336ae75db76c2a1918e633afbf7475", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "a5e08751cec988387ec8038529e7c50bc8eadc70", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "a8babc7eb40aec10d5c8d833089dd07ed1aa5753", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "346654a54ee3cb5a9e59667518344c980c87db6f", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "7df84deb40e3a34d0c940aac9dce7ac6738edb95", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "d6490256a0ca31ac390a9386fa00369f38d3f56a", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + "b49b87c3fa4a4a5ebc5f92be3d6beafdd85a0826", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + "29a1698f1a8e089ef301d70817f1b5cb99acb645", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + "16252eb3e89653ee744fd85ba2053544b95f7042", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + "75e4b8de7065a4ca4884f2c7926d27b30cecab51", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + "9922c8bf40044cf339cabfefdbeec12dd57a147f", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + "3e77a7bda28b35fe1d5691947aece2209ae84320", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + "9789b3a8dff9ac099aaf2d39eeb1935eaa18f459", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + "7d00a136314cab6de1b4e9d7d9001df7714f6c98", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + "e5182860dbaf24026fbca9dbf87f005d927292b6", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + "2fda3a8680dd2604ee6608ba1ead1de8888215fa", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html": [ + "8de62ae9dfae8b5eed58038a765b80f45fe1c8d3", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html": [ + "bbd7003d9b0c9a9b23c87c373cdf0e678d54a29c", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html": [ + "6b49c22ffcf18ddec09e5879f338d81218c2b519", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html": [ + "8467efcb78bec6ec670d60600cb06541e872e10f", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html": [ + "b86b55cacde8cf1620f30306466ba2927bfd4de4", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html": [ + "09fc8694fd2e9daa886a3a705316a80e88592bf8", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + "6d2446f7cefad381211310d6b8afc13468ac74b7", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + "fa7c97b5773f3eb747ea2bf601abf250eacab6b9", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + "864ed4d6f0f36b0dc4e69ae4df427fa567a99981", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + "31857f5b0204562f1428aa52e489422b221379c4", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + "807c2ea5c8fad5877f543cf626df56e8443acde9", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + "fbd5a0e4e87ea3606d0799c93997956130c3ba19", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + "b55aa725186266866055d1c2103d7485199899dc", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + "7fb7b273d7ad36efc12186dcd61942501f8c94ef", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + "7ef73d70001573f4ec2fce43efface6607fb508a", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + "a3282d26e16f964196b0e12d016f14da7fc02c6d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + "d2fd9f3884920046ebee66f3cc2c5fdaaad3bdf5", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + "05d5e333652789047d3af01678f2b9e966a6df06", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + "54aec1435f005e5393b940dfd40add6a39334475", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + "734b5e24b4f0136889499c09ce770d891035c070", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + "e66736a1f2ae91d6746ecb9e83380f04b674b449", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + "03351c7007e88a100dfbbd4e1d983ff7c444c436", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + "a870fa6a4c29ed5eef1d057d46691850728df673", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + "3d61543525a871c4ab8c881b70047724e45671ee", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + "6498c9b73b2ef192c7832840e0d908234e87989e", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + "98126940adcad13690c126daf17a4a22d2d8bc26", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + "04b442f199f01d7d42041a0e2e92c2daa086a528", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + "04bb78f23850983d2c992d0f61c654b5a71b3f6d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + "05e88291cddb8d26935820016ca0d1b5ca8df870", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + "6cb89d4113e768b2267dbd4a4aa4987fc4b0333d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + "09ba06fe97a4231bf2fc7968917a7824cf7dc07d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + "5ddbbbd0097d35d4b5c1f2333c0134cc8f1a9d8d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + "daa75cd9dd25a2a27d5ef8fdfcf91d38a6e52bb9", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + "d0159817d0c12c71084f9a88bd734d155f2a4d08", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + "92fc05e5a5889ca9a3ce6ad5f1bf658cf5bf3675", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + "cd607f7a74dc100c476c9256cb0819ed7a8bd605", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + "508066029a14293579f7f1a684843a8f9bc0e331", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + "fa1d48ed60db34018454e5adf4ff60328e99ed98", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + "b0aef7fcc7c56f43b37548c58763d63706ead90e", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + "fb5aab72bda75511d8bdb30b40098fa6fa981469", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + "5975e7432e3779ad3e7809bebcc8d8ce018cab0c", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + "45506e97df70be8458a6d68859af2473ace271af", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + "066f65c071563010975c738330e3f3c9264e86f3", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + "5fbdf424f7a810491a95f84be7dfbe71bf414638", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + "8dbf224a261f9bb667c743ac065df108a4129be3", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + "eabdcb1011c41704d672e6c34937b4ccb3268f7a", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + "ea0ff9655d5574a5d2a092e8a9c924186c224cfe", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + "5a99955c352669dee0802e20a27ceef9262641eb", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + "6b136600885d20fea309c073019a25ea25d351fe", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + "a802ecb55f090371ec6f5f34a3d8247bd7e88378", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + "fb18a558fcb2a3e26ad7c6ee3072ded31b437140", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + "44b1ad4136ee11728386bd3ef6e52c892064c241", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + "fb68b2480433f92f820db4f891a24e0279d8261d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + "3f208548366a8b981f682872883c9b63ded6b131", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html": [ + "067b74f6883057ccf46da93a3a950bc0a46f699b", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html": [ + "63e27261cb4c09bde920a805b06673d8cbcb6746", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html": [ + "9f2b14305fb8e602576770e387cf4a61600e4460", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html": [ + "b92e14939a658e596d7387dacf0c6945695c04ad", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html": [ + "16eee27fee34f78abdce2ac57e2e3a2acbbbab96", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html": [ + "9e18ad80906edb3a8208b74b8f628ad68646195b", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html": [ + "e1b9c071a8f0d47be4190d7aeaadadc7f84068f7", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html": [ + "9df9f18a5402cca2377e23a10b36cfb93233a238", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html": [ + "b2111079c201ff3d7511d8aa3f51096893b72432", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html": [ + "c7aa9dc13c30e6354300a8aae2a02e634eefc0e0", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html": [ + "929c4c594d67838a0d477946194f6eb2802a4a55", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html": [ + "b2fea46787d457d1f0f24a4b430b241fc2d09b36", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html": [ + "e08868bbb70f823b2cdcc9673632cd916f2df34f", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html": [ + "827a4543138f99155643abc15537c0802133d559", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html": [ + "ced41a3b59b3a191f57cb6b508562fdc01ba6613", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html": [ + "ab873760f224a8d3ca0f77abab26e462da62f711", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html": [ + "47153305f55c119775ca8a8d6db2146cf7e97373", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html": [ + "76d4705ae5daf194c62a8363888b8e0a34ce5eb5", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html": [ + "c026b45fd061e295b4435f1285c4b6d383e0af00", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html": [ + "6870f2cfd072d9eceb74c333dd3bdf2bc01598c3", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html": [ + "1a3acf28dffbe052d51ce8d43f8bd62cfd19a575", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html": [ + "87981d1c661d9790e5f4226527b218dbfaf788e2", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html": [ + "186d94ba8afc97c85e6c0528d7d7a1257f19e0b4", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html": [ + "bfe3c149eaeb98bf8fc32bb2d8e4034c8f8f3f74", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html": [ + "265b108c984ca2a7291664db6a746653d98a9ec5", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html": [ + "51fb8801cf2caeaa653ea9dd9e95be094955f677", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html": [ + "078b803684089ff2d9529a0bdf25514824a883c7", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html": [ + "078aef4c736fc4a85a370c387331aa18dd369e3d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html": [ + "65b6e912cf336bbd55a8e51b4459c1f2c278219e", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html": [ + "7ab79f00ab26e87c076ad5a311cc5ca77bd1a093", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html": [ + "951b9a76ddfdf607db9afec9a98537ae0dc89c17", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html": [ + "c2e72a3c54572be7056e9185f256866c97879aee", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html": [ + "da910c915a7014fa06d0a8c54ce172a04fe2a569", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html": [ + "be9b5c3979bd3336c3e3d1b2871506955aa3258a", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html": [ + "69bae396965709166af06f1467320afbed05b7d0", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html": [ + "2c800d68d3ca032c0afd1f1aa813267535e65bf5", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html": [ + "ff6aee7cf06c6f4dc9e7a5caecaa1d70e55fc90d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html": [ + "ce1ddee18daee5b2669918df19068f7e1746fecd", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html": [ + "63b43d13997a2628c7f3879e2e87fd814ad5a304", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html": [ + "ed497a1c8027e5994bbd8ecf36a47e8b4fe83415", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html": [ + "f8d97a0c86a823a24c47545e8454cc75f13ec952", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html": [ + "611164c1f48fcfa38556225d22c0afeed75e4f74", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html": [ + "c680915e28a19551cc6b5ce55e87b6232149578d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html": [ + "915a88cca84346a4c6c6fa3a4ff509478e7b0901", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html": [ + "28122a250d896c2406039d772e7ae07bae3e7f83", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html": [ + "27553107eebeba6357530b602afe0c3b81b0a9e6", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html": [ + "136ddb9cc68a83a3ec316052d03d6c9176631fea", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html": [ + "d011a885919b8b1a99d94141ff8a4412dd8a114e", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html": [ + "d87d5850f0dd2c54dbb16e347b9d7fd3b43434d4", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html": [ + "2c6bf466298bbdfc59f9d7fa02185c0eb72030c8", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html": [ + "bf0589564b4e986935b1c1521838fde537717789", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html": [ + "3f616dec68a57f9a28cb68abd0eaa3c3abb33f0c", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html": [ + "0b796055cbbd252d311b4555fa269848bc3e9963", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html": [ + "e903577c95a968bbc374df077dbc0b95f2bb4a42", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html": [ + "c812e2aa122cfead7fbd1c926427a242eca563c5", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html": [ + "88b68ef5e00b5f6d67d90a45e23d2dd82cc27a94", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html": [ + "47a8bb1895359bd4ff39d063c05e57c804fcd45c", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html": [ + "a5e98f5f38e835452a67c5de9b5f9da3f7d7d77d", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + "3b6c78dcea428d1d00c95fd06051f62998860df6", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + "ca6f2485a9937a0ee9364ccc2a3d8841e10dd40c", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html": [ + "520bea1e1fbbe510d745901c9fec217b65c21e48", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html": [ + "298248e21d6ba53cc5bf5cf591adcb9b33a29f5c", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html": [ + "3b6630ca6e7cea51492e9f68cf0c8b067a6a50c8", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html": [ + "d6f2ec45a7ce85ff2f03748bd3db47c2f7a772d1", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html": [ + "d78ce1f66f4453118a3065a8f70287e281e58759", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html": [ + "314e15d4304249d5ac9b90bfd22a5fead4e03c03", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html": [ + "b098e917c936a58e3457f405a7f87a6ef0435439", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html": [ + "43f924c77f867f085095dc0e63ee01d7e8a83010", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html": [ + "10dc03fb0142ccf6cf89d98e764df16eb56fa9e9", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html": [ + "541415c9546ce3e7b8482355bd9ebaeb94c3f4eb", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html": [ + "f9d4101186fdbfc0fbb055a7bcbee559e5fa29c7", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html": [ + "fa92ffe6bd075112936d08be00cf0c210453ff18", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html": [ + "b1d2d924035a1eadecfee1c02ab883e834d47b9a", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html": [ + "5fb91ef90d4dd93b2035a27ad8f0c311bc3a2e88", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html": [ + "135bf134a40c8687ec1b13cc7d99f85f20ce856f", + "testharness" + ], + "referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html": [ + "db8586474b04aedbb244171c00d4ebd8ea90e4fc", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + "22c4900d10a6dac7aee5d243e30be1c951512a41", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + "65a3ddca6a79f6a7bc237b8fa6c0721cfb502e09", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + "d1b3ebcbca08cba6165283c77a6f62ed3630de03", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + "38abcd502d5549bdfcb30f6717e14052534bf8d0", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + "858abba8e1eda0bce1eb7f4ea66a361b98121f20", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + "e138dbac1fc73e7dc3b1a07413f966c77e45b7f0", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + "7f0a6399f57dd1b66bbd5567b4b72cff480e061d", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + "9f271c5c46881a5f90ced1a11682249f9e1a9c3d", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + "1be7385e46d76cad97a798eedb55630b9823d7af", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + "442632c4b9bc9818c473609d90eae350e8b63c99", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + "6ef205587775d7037697e9d880c4110ae229ddd7", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + "3bed586e83c598d156e6e07d03fb1d2d32e65820", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + "4a1f4291656ab6a999f615c63c76b75ea1cfba86", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + "c55848be7c1fe64e745d6357e2ab9e90867f2808", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + "d9d9b5e7622760c4dc42feaadf0107ef79b0f284", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + "8e814e27b29a0e3804897c2ad5713112bef146f2", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + "22ece65ccd1c1c0c8b45e4a0c46cf732978bd50f", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + "40e36088e399553fcced18afbce4b8555fc3492f", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + "ecfcf418c63bedd8e1d8ba27d2af4e307b66b883", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + "ecab7543b04fd3b4da10f49e254772c1d7ffd689", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + "c76f5c3bde415689cc1cdb119073fa8a65cc5f9d", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + "9041c1e8f5d916b5f5540e68bd559aaa1e79905b", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + "db6c8a6681e5f622e9bf8275329c0104600244e1", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + "7a242da44b373384538aca46fc5f70d5d9c66879", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + "c57730703364851f646f77058d9d69eb47e9687c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + "39a65cf8e8f76f248d4cbcfa8b16decdfa266d4e", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + "03588d7d3c64af047bf9c52bfdf0bee2f7a35af3", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + "2253f93b1b36980cf563c5de71d8a714fac7e913", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + "d5ff6947fc5efc9dee25087a8095c17fe0cde85b", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + "6e0e170dfc6a61aae148a3ac53fbebcf5cded132", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + "08be9fc8fb949b8d038947d96b999f4208e2bde8", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + "49205634e5931f877107cb3c25631187eb115a2f", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + "d0cdf5ecde7cc69282d14929a20f5ec01533c128", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + "6b1f98786e1a38a56579bb5452eeaacf035f5baf", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + "49d5b4143bfdd46cdb31e8658512386aa69a5963", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + "64ea5452cc6d6cfbcd394abdcb94fcdb8658410f", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + "f193ced7bc8b44ff80a9fc4891b5f8c273062f68", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + "31ad993e6630b9a662aa1a61ad1828177a2ad72c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + "fed40493102eee955494eca04c1a5e3d30979e8d", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + "053cd8d7a3554d7deb0a9dbd8848a5f622477061", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + "35ed15e929b566394d5f8ec3bcb27058db047cca", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + "014693c3e88dc8443dc2056915301c3914f12ace", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + "886ea8c3a7259d307f170f4e774ddd2e50566a00", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + "23685b8a0dfefd245f92c0181867e424c5e1a9bf", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + "822d196eb514b46c12ef1b31f207136277eeee33", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + "5cda327fcc4e23623d35e86fe1c0ce0397098038", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + "3c63a8b1c103448a79be90df7677026a44ff2d8f", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + "5836897035e340cf0f5b58f89d2df4762de44f02", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + "975110b1e779d247e1c7f45155d5ae292b76a704", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + "4641de88c739a14e07e8a9db01982ddd9936ccba", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + "a2b9102e82f14b4bece84e9e2d383c018264151a", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + "114a40cb800978130ba15ccb47917af5a85bd33f", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + "97230961f67f98847d18d6d8c8f76104707e5fa4", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + "ec8ed051039bd0c1c95230fb8efdd7338749cdb2", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + "aa336f3914de8b61a82588d3f721f7cb4bddc88a", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + "ff4f0b776662f61538659a7900990436393c0cb4", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + "0b2b0ad8d52a822620c2e039bbe43e427164462f", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + "af09ae128f980054e858fef017ae96a86fbdfbea", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + "99d4f8be7549a9fd952e71f740d9bbe8d4958310", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + "788cf67780137c02ef8f811c6f36c2544da5eae9", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + "ac3aadbdc8ec09013ec5b1ae0d84ae8fa49964fa", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + "8329e74095034c264e960e214a1e2ff784d4b734", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + "e9647772192e0f89f224cc71fa658cc593b487b5", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + "b95f2fc84d7c99b55ad6b89825f17dcdcbbc8f2a", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + "95b0ca6fbffe6df366a9df1ac6fd003c8d1a7ad4", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + "bf1f4f4f8e410365ffa8d593df3a19e444901cab", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + "cbfa298cf597f22415630e1783827884b1cee322", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + "3be3c7c04b75aa83a3b322832a316bd20c61cc8e", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + "e5ae1b3a62c8dd4ed7ff7ba5fdbac5fa081f53e6", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + "f3bb4286afc8b0f86aa0fb6fdface2619abbe1ec", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "a00780694c1f82cfc4b243536204de78c3f7db06", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "604a1e529f5d61717e5ef2a2a14b7ec718b18df5", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "37b4b4c81d9c670a70737572b4f599787a69863c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "76c03a3a23b9ba5d7fbd591088479245bbf7412e", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "f804ae15f6c37f1da7ef993cadbe4771ec48f2c3", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "218e7974a4add6f96b2777f0028455d6e00b1723", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "509b5c212587fcf0da8b7db76de07a469e01cbee", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "06518b37c084865c9b8ca4603c11481ff235d432", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "6d3bbad2f985c658ce61c0a498741f2411ebf566", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "f3d89afa8e0a773dbec92c2c0330aa892de8fd31", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "8a0f895dd5546e9e028ce7b5d26b585dc1d0407c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "8ef99fdc7279322d46208d73140f4f2bc3251eea", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "c809622a3f8d87b2f60251093407c2d8c7c08dcc", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "b8d88a5fdced14774db37d2454cd2a0d766d66c7", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "5cd3774b8ecb6b260864049647a3dcd93a416aea", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "ef1c290075b96fcbdb02ed9721ebb7d40d197a6a", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "426d5bf8556ca53eb1fb74dd8495347d43901b80", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html": [ + "a5678f0d8af832008460786df2023481cbe9065a", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html": [ + "7fbef77906bff0dd0c08bfc2168f175a93d208a9", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html": [ + "a04e160ed66ef58a1b8422605621ef0aa15d0bf7", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + "1a5830e33985a382914de04f3aaff3157dd05a45", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + "b7cbd0f451c8ba6ebaf0615596ca763950f72993", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html": [ + "1a0775901013d3395553e3b06df299ccc79005d2", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html": [ + "2a6023dd4839dc4ef964b8cf7a1fe286574d2c90", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html": [ + "db4f2c3c07c89037b66068fe9623d8fdbe45b9ee", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html": [ + "7667e641a185bb19eb5b12337fafa2782babafe2", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "0a0b8dd289743c5b86fdeedb7a6f9aa7f55c724b", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "ad1ea96f46cabf4e17b240f1bfd10dd7b6c80ed7", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [ + "f9959d9c864ba4ddfdf49a957f6932125a08b8dd", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html": [ + "a459c7251cf714cd3761bda0a0318420097efd50", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html": [ + "20483abbee11dbcbb23abb7cb8514ff8905c63df", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html": [ + "b291030abcc347dd7373641fb011aa61b8f6afcb", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html": [ + "c99c5c6512ad544960f3fc31bd147dc56a365528", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html": [ + "ce4ad27fe84ccdbbf52559159e4f9298c1b1c236", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "b18f0df99b130c6fc3fbe3569601602eb557f889", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "84a9a807c0f2910f5dd217d76d074bbbf8220a3c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "04971fe57f08c1a90bcf9434720b93065d7b2396", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "81e99b3ac0ff71d2254bf413852fe3098274c70f", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "be9fdbff51751a5ab756f83fc29285a067dfa8e5", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "fe67437e4dc7a237eab3697a770c366bb2825de1", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "5a1ec96f33a315bced2de00709faac657b6df29a", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "b31138974ed090cf6815d1857359b950751ebca3", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "d3fb9bbb74ae6db3370b1254c3df31763f639a4b", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "4631af5260be93d5acbba8e736a0a322ace887c6", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "dd6362c04db67e8d3e8ec5c3429b59617ef7f913", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "c823c6e7ba136a541019af79084aec776405e5eb", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "6801b70f93ab131998f7082b40b5841f234342fd", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "a55b41a020dbbf050d808ae71e1b63d7db6d0fb5", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "35727cd0e22038d90c59e5faf1d19fcd2d82eb02", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "0e3338647fe1f5964dcbdeba1362487582dc5514", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "d08978606020167262d2d3b989da1ab0923e3453", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + "672bf6de2212c49c986cfc874d173722ff9ae0e5", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + "2c5d115414ac6e98af462a584b2542a454b776a3", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + "77679ab4e62e9a7081ebe00e9522dc3012c8c71a", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + "2ed530425d5e5ef0421635700f7ff2efde704fc1", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + "f1724215d00384dde2d30bb238c6d393772ed80e", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + "b86e83109a8a97310e254dd95388d871e5d1dc2a", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + "2849ca8cf72c8d30538858c8a8859b407dd80207", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + "572e04d674d5ac7a315cb25d5cd8c1587b46b07c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + "b589362fb2b50467f19e3317f45d76be3579373b", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + "695e0d32b990292ba452fdc33e498b8628f3735a", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html": [ + "41ba30a0c554d672fe3b8e7333bf99abe3b9f1ac", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html": [ + "1f4442d0fd6bce3169abafabda24244b8cadddb8", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html": [ + "53e502ff5665cf789e1c7500e6620a4d68c20901", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html": [ + "786e43ee7266865bb3d6db68286be97a989d0c43", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html": [ + "cf30ceb59430e318bc4b6ec6d662c82f059d5e8e", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html": [ + "ba7e39d8902f8d110c847c3460399ceb120b16cc", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + "b25f36c61b5528050e0c37fb91a2a7c6b61bc9b5", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + "49352a7f5876c7ba35a2653bd1cf1cc979035ce6", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + "1c84b97f73c432df0ac366ca872eaa6b4c60fd8f", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + "1fd86c6ea2637cee2fd61c6d1d499cb9004639fe", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + "625b3cba2929ff481e9085ec981b68d4f5b32016", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + "2ab41c9ebec4dbd32fe9e8df712dc90a35a6a57d", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + "b463dfd023ce7d4aafc5fb8fc99660eb6668665c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + "00a10e1945001e5d6036f22043493dd59bd71aac", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + "c1a52fe0c5b6c5fb47377618acb585f487e57b26", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + "c4ff38003150745537dfe22c6cf1b865d448433c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + "863369c876ca82cc874375c45e9c29c003667070", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + "9240998a3c41ff0e840f911e64395d5f619f74bc", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + "0f4640654fa2ae9ce466687d619482ceb9107456", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + "934d17cc32963a73f823951c8d77d16d60324d09", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + "270e81a52511be0eb274d52370d4d905c735f874", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + "abddc971c7e6f06d0be0353bbb008d3e92138c11", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + "38bde67c48c8e5b39921620e2c80e74ad0046c59", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + "0c4a9a38db99e125d9efcadee89de7bb477259c9", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + "3c6efb46f162136fb48a1b507cf8f4b0353a5515", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + "77a4e88b7788bbeb8ba92c1e7cbc8fc92dcdd356", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + "119445172a461ab69a94a5d19740f25f918eff5d", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + "18ce22b7ea93090516c296212cf42cf947bca4fd", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + "95ad996eebc42e0fbe9bd42ead8a31f9e25922b6", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + "1d558cf56738cd698e0b020df96133416e3c5183", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + "0f269d6fac19ada45c3a437100f05e82da047c7d", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + "1966a479387aab09103307a4cf2dfb5834a72c73", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + "caa83b1b3159c4d499bafb05edfff9fa235428b3", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + "281119783e1e3ac6affb6f54f9d8d70476199382", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + "86785b7f5c05413af78e6dc08c7afb95b02da6dc", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + "402f680880e876adc641b9981bf075fe4e015938", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + "db7a1530be5d566e5dfb42306c2896d696a1556f", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + "70fc272e7149149aa9cb6882890170368db4d091", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + "b6f2c8add9a4c7f93edbc86a6d45cc6de4f58bea", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + "925cb67ac511c34801eafd23ed96c37e8b4b5b48", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + "5ac8f25ecbd589afc1ff4e31927ac8e30e7816c8", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + "2063221722110ae7fe92e577918eb92f1c9f99f1", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + "f1f4f3bba439481659ca87db7032def14f2f3daf", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + "030de324d9f78b0a0e706310760b52f83efe8a5c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + "2914c71d272c0be798057eaba7ff643071aa61ab", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + "586b673102d8d98f765aebe6d4e4767faeccfd8d", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + "54bbe38a12443b5bf090d7a95d6c4a1f6c715218", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + "9f71e045a19bcb74d450dcc903ab57c1eb518c4c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + "356475b6a1022389ba91e2a1f53b10841d395cca", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + "01ef4b080fcfdd510cb5647adbfbe0bea371867b", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + "e8795602b9368da8f85ed81d60618b51ab095a89", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + "ba2162745257666451fd763e24462d4746cace2c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + "59c4d5238a481874ff3c1dddde5ec8146096cff6", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + "d067cc8ea2c9b6df8a47fd583903d12b15b0bfd8", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html": [ + "889acaca97b1c4e5b8ed9ba5538ca0cfc3d0acab", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html": [ + "25d1857ead5ce58d9c89d82ea110fef30751dfca", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html": [ + "51b71a977ce4d682a000e117a785f421299d5000", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html": [ + "f0a18a10a2e0e05e3065e5b4c953ba8a33a59191", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html": [ + "c11a9c40c34d9eaceb99fad57c3627843d8a32c5", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html": [ + "9cc85b97d69aa26617b27848a4abfa5fe12ae805", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html": [ + "e1b9c071a8f0d47be4190d7aeaadadc7f84068f7", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html": [ + "9df9f18a5402cca2377e23a10b36cfb93233a238", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html": [ + "b2111079c201ff3d7511d8aa3f51096893b72432", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html": [ + "c7aa9dc13c30e6354300a8aae2a02e634eefc0e0", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html": [ + "929c4c594d67838a0d477946194f6eb2802a4a55", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html": [ + "b2fea46787d457d1f0f24a4b430b241fc2d09b36", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html": [ + "e08868bbb70f823b2cdcc9673632cd916f2df34f", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html": [ + "827a4543138f99155643abc15537c0802133d559", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html": [ + "ced41a3b59b3a191f57cb6b508562fdc01ba6613", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html": [ + "ab873760f224a8d3ca0f77abab26e462da62f711", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/same-http.keep-origin.http.html": [ + "47153305f55c119775ca8a8d6db2146cf7e97373", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/same-http.no-redirect.http.html": [ + "76d4705ae5daf194c62a8363888b8e0a34ce5eb5", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/same-http.swap-origin.http.html": [ + "c026b45fd061e295b4435f1285c4b6d383e0af00", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/same-https.keep-origin.http.html": [ + "6870f2cfd072d9eceb74c333dd3bdf2bc01598c3", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/same-https.no-redirect.http.html": [ + "1a3acf28dffbe052d51ce8d43f8bd62cfd19a575", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/fetch/same-https.swap-origin.http.html": [ + "87981d1c661d9790e5f4226527b218dbfaf788e2", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html": [ + "186d94ba8afc97c85e6c0528d7d7a1257f19e0b4", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html": [ + "bfe3c149eaeb98bf8fc32bb2d8e4034c8f8f3f74", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html": [ + "265b108c984ca2a7291664db6a746653d98a9ec5", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html": [ + "51fb8801cf2caeaa653ea9dd9e95be094955f677", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html": [ + "078b803684089ff2d9529a0bdf25514824a883c7", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html": [ + "078aef4c736fc4a85a370c387331aa18dd369e3d", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html": [ + "65b6e912cf336bbd55a8e51b4459c1f2c278219e", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html": [ + "7ab79f00ab26e87c076ad5a311cc5ca77bd1a093", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html": [ + "951b9a76ddfdf607db9afec9a98537ae0dc89c17", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html": [ + "c2e72a3c54572be7056e9185f256866c97879aee", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html": [ + "da910c915a7014fa06d0a8c54ce172a04fe2a569", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html": [ + "be9b5c3979bd3336c3e3d1b2871506955aa3258a", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html": [ + "69bae396965709166af06f1467320afbed05b7d0", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html": [ + "2c800d68d3ca032c0afd1f1aa813267535e65bf5", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html": [ + "ff6aee7cf06c6f4dc9e7a5caecaa1d70e55fc90d", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html": [ + "ce1ddee18daee5b2669918df19068f7e1746fecd", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html": [ + "63b43d13997a2628c7f3879e2e87fd814ad5a304", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html": [ + "ed497a1c8027e5994bbd8ecf36a47e8b4fe83415", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html": [ + "f8d97a0c86a823a24c47545e8454cc75f13ec952", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html": [ + "611164c1f48fcfa38556225d22c0afeed75e4f74", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html": [ + "c680915e28a19551cc6b5ce55e87b6232149578d", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html": [ + "915a88cca84346a4c6c6fa3a4ff509478e7b0901", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html": [ + "28122a250d896c2406039d772e7ae07bae3e7f83", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html": [ + "27553107eebeba6357530b602afe0c3b81b0a9e6", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html": [ + "136ddb9cc68a83a3ec316052d03d6c9176631fea", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html": [ + "d011a885919b8b1a99d94141ff8a4412dd8a114e", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html": [ + "d87d5850f0dd2c54dbb16e347b9d7fd3b43434d4", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html": [ + "2c6bf466298bbdfc59f9d7fa02185c0eb72030c8", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html": [ + "bf0589564b4e986935b1c1521838fde537717789", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html": [ + "3f616dec68a57f9a28cb68abd0eaa3c3abb33f0c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html": [ + "0b796055cbbd252d311b4555fa269848bc3e9963", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html": [ + "e903577c95a968bbc374df077dbc0b95f2bb4a42", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html": [ + "c812e2aa122cfead7fbd1c926427a242eca563c5", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html": [ + "88b68ef5e00b5f6d67d90a45e23d2dd82cc27a94", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html": [ + "47a8bb1895359bd4ff39d063c05e57c804fcd45c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html": [ + "a5e98f5f38e835452a67c5de9b5f9da3f7d7d77d", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + "3b6c78dcea428d1d00c95fd06051f62998860df6", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + "ca6f2485a9937a0ee9364ccc2a3d8841e10dd40c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html": [ + "520bea1e1fbbe510d745901c9fec217b65c21e48", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html": [ + "298248e21d6ba53cc5bf5cf591adcb9b33a29f5c", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html": [ + "3b6630ca6e7cea51492e9f68cf0c8b067a6a50c8", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html": [ + "d6f2ec45a7ce85ff2f03748bd3db47c2f7a772d1", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html": [ + "d78ce1f66f4453118a3065a8f70287e281e58759", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html": [ + "314e15d4304249d5ac9b90bfd22a5fead4e03c03", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html": [ + "b098e917c936a58e3457f405a7f87a6ef0435439", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html": [ + "43f924c77f867f085095dc0e63ee01d7e8a83010", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html": [ + "10dc03fb0142ccf6cf89d98e764df16eb56fa9e9", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html": [ + "541415c9546ce3e7b8482355bd9ebaeb94c3f4eb", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/same-http.keep-origin.http.html": [ + "f9d4101186fdbfc0fbb055a7bcbee559e5fa29c7", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/same-http.no-redirect.http.html": [ + "fa92ffe6bd075112936d08be00cf0c210453ff18", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/same-http.swap-origin.http.html": [ + "b1d2d924035a1eadecfee1c02ab883e834d47b9a", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/same-https.keep-origin.http.html": [ + "5fb91ef90d4dd93b2035a27ad8f0c311bc3a2e88", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/same-https.no-redirect.http.html": [ + "135bf134a40c8687ec1b13cc7d99f85f20ce856f", + "testharness" + ], + "referrer-policy/4K/gen/top.meta/unset/xhr/same-https.swap-origin.http.html": [ + "db8586474b04aedbb244171c00d4ebd8ea90e4fc", + "testharness" + ], "referrer-policy/4K/generic/spec_json.js": [ "39cd997338e4c9e235d30097d970daeff5f1f19b", "support" @@ -703585,7 +718069,7 @@ "testharness" ], "resize-observer/observe.html": [ - "7360264e6baff7b468c09ebf71e39c1936c2597c", + "d41799332720a1f32c7daa559c201f11ecab1316", "testharness" ], "resize-observer/resources/iframe.html": [ @@ -704361,7 +718845,7 @@ "support" ], "resources/idlharness.js": [ - "7d1373ef34110dd51c7e3be5181ede6ba5e3cee1", + "01af85b295dd6849ad48121f493a9d3c2ae9c29b", "support" ], "resources/idlharness.js.headers": [ @@ -704609,11 +719093,11 @@ "support" ], "resources/test/tests/unit/IdlArray/is_json_type.html": [ - "463d2b45309652feb6d133d62051628a977a5dc0", + "ab068b29cac0d7083471d5d525fb4c27124d9f77", "support" ], "resources/test/tests/unit/IdlDictionary/get_inheritance_stack.html": [ - "1ac9e8da06fe590513bd1318c2a83a7e83803ab3", + "052592dd4607dbda6cc17603249a38ad53b40c9c", "support" ], "resources/test/tests/unit/IdlDictionary/test_partial_dictionary.html": [ @@ -704633,7 +719117,7 @@ "support" ], "resources/test/tests/unit/IdlInterface/get_inheritance_stack.html": [ - "66b79afc12f2fdf139163502065a1778c63b06e2", + "7e9188c7318920f44935e418a50aa35a58bf5725", "support" ], "resources/test/tests/unit/IdlInterface/get_interface_object.html": [ @@ -704665,7 +719149,7 @@ "support" ], "resources/test/tests/unit/IdlInterface/traverse_inherited_and_consequential_interfaces.html": [ - "400bc35d9fc7b0aea97f89806e68e14c79a73fef", + "94b956db6eed1e19d7dd37ca62a804c4fe36ea2a", "support" ], "resources/test/tests/unit/IdlInterfaceMember/is_to_json_regular_operation.html": [ @@ -704873,7 +719357,7 @@ "testharness" ], "scroll-animations/constructor.html": [ - "a449b32d2be4bfe9e825ff3b3637a5ddb609b93e", + "336afd504e56c30337ec18a8a014eef3a1cd45f5", "testharness" ], "scroll-animations/current-time-nan.html": [ @@ -704905,7 +719389,7 @@ "testharness" ], "scroll-animations/setting-current-time.html": [ - "7a77f17509c6fff104d268d6a753f66469bb5dec", + "dd2abb47d39844a10e06f53781106e6be05a4623", "testharness" ], "scroll-to-text-fragment/META.yml": [ @@ -705125,11 +719609,11 @@ "testharness" ], "selection/collapse.js": [ - "7d03f00c8c7be2e1e030aae9a25d9f6e99b16c44", + "4a816f49564fd877f06eb2a30df27b83ae7294d2", "support" ], "selection/collapseToStartEnd.html": [ - "07c2b843b40acad772eb477a118228be2444aff8", + "c2bba3af18958d75a04dba116d2830d35ef803a8", "testharness" ], "selection/common.js": [ @@ -705157,11 +719641,11 @@ "testharness" ], "selection/extend.js": [ - "a3be628d6c8d37ce5f646656b3fc6ba7b3808cb9", + "d5d199068c5b0465f96ed643af8d7d20a889312e", "support" ], "selection/getRangeAt.html": [ - "3c6d7976fa06e284f74c71f7e7e6ba3ff9dea422", + "466bfd5286535492311a095173a4fb98b1ac5e8d", "testharness" ], "selection/getSelection.html": [ @@ -705181,7 +719665,7 @@ "testharness" ], "selection/removeRange.html": [ - "6ddccc66f225d4b6b2a1362e5e0c06a3ddf622d0", + "7618a4ac535b5b7fed48f2f533bc4489d0008813", "testharness" ], "selection/script-and-style-elements.html": [ @@ -705189,7 +719673,7 @@ "testharness" ], "selection/selectAllChildren.html": [ - "65a4ff3c6c58768b259bb637a52ef28c91c5c313", + "9a472a4b2fe5ef4b0e5283e3d957ceefef387ff1", "testharness" ], "selection/setBaseAndExtent.html": [ @@ -706069,7 +720553,7 @@ "support" ], "service-workers/cache-storage/script-tests/cache-put.js": [ - "38d25647b34e71945a77c29bb654e1df9626ad4f", + "6979d96d161618d045101bc98682d2946bbf6547", "support" ], "service-workers/cache-storage/script-tests/cache-storage-keys.js": [ @@ -706261,7 +720745,7 @@ "support" ], "service-workers/service-worker/ServiceWorkerGlobalScope/resources/extendable-message-event-constructor-worker.js": [ - "55de70dcf8158408e4993f2736bc5062c0e3cb63", + "42da5825c56ddc828077749af4874a5b5837529c", "support" ], "service-workers/service-worker/ServiceWorkerGlobalScope/resources/extendable-message-event-loopback-worker.js": [ @@ -706393,7 +720877,7 @@ "testharness" ], "service-workers/service-worker/client-navigate.https.html": [ - "9492335bb29f753f9e309ffa8b3d309794e152fb", + "4ba64e5fd902a4380e776c65be40998b5400a8ef", "testharness" ], "service-workers/service-worker/clients-get-client-types.https.html": [ @@ -706465,7 +720949,7 @@ "testharness" ], "service-workers/service-worker/detached-context.https.html": [ - "f96370d201000d20a950166dccf2caf72bd473c1", + "c9015b809301ad706cbcd7eda9f17c88323df3e5", "testharness" ], "service-workers/service-worker/embed-and-object-are-not-intercepted.https.html": [ @@ -706485,7 +720969,7 @@ "testharness" ], "service-workers/service-worker/fetch-canvas-tainting-double-write.https.html": [ - "4e233053729c42c1f8ac49d9554f3035c8f04728", + "dab2153baa6f462bdafa68b555cc198ccce09398", "testharness" ], "service-workers/service-worker/fetch-canvas-tainting-image-cache.https.html": [ @@ -706637,7 +721121,7 @@ "testharness" ], "service-workers/service-worker/fetch-request-css-cross-origin.https.html": [ - "2cdfdea996f7c55a56c4bbcd6fe94dace192a497", + "5d9db5cb46630fd60f4466136dc3fa24f9c3471e", "testharness" ], "service-workers/service-worker/fetch-request-css-images.https.html": [ @@ -706801,7 +721285,7 @@ "testharness" ], "service-workers/service-worker/multipart-image.https.html": [ - "9bdadff21fbbac84e6150724a3a9bfdb035be38f", + "75865172c600b3bb2726c3366ab452b5f79b1ce7", "testharness" ], "service-workers/service-worker/multiple-register.https.html": [ @@ -707653,7 +722137,7 @@ "support" ], "service-workers/service-worker/resources/import-scripts-mime-types-worker.js": [ - "2c585ac1060a88c4f3eeac6b6a81bbb4e0c30280", + "d4f1f3e26d88d180264b1abea83fbfdcf8cdc89d", "support" ], "service-workers/service-worker/resources/import-scripts-redirect-import.js": [ @@ -708101,7 +722585,7 @@ "support" ], "service-workers/service-worker/resources/service-worker-csp-worker.py": [ - "9d2b1f2d834f523447b2cfd373bb176f2e0e8573", + "7b0c13feba9fbcd591cd52ad553418b06d933b93", "support" ], "service-workers/service-worker/resources/service-worker-header.py": [ @@ -708525,7 +723009,7 @@ "testharness" ], "shadow-dom/Document-prototype-adoptNode.html": [ - "e9b07d0c8095bf0bf7d40e6d5a09c6f79f6c44fd", + "6afd603618d7af99a9a71818a735b786efb36cd7", "testharness" ], "shadow-dom/Document-prototype-currentScript.html": [ @@ -708533,7 +723017,7 @@ "testharness" ], "shadow-dom/Document-prototype-importNode.html": [ - "4566e4e83582222a21a61cd1695a913222cec954", + "f71f8dc6c5e027108176d3dfab633e2d18b78129", "testharness" ], "shadow-dom/DocumentOrShadowRoot-prototype-elementFromPoint.html": [ @@ -708541,11 +723025,11 @@ "testharness" ], "shadow-dom/Element-interface-attachShadow-custom-element.html": [ - "8f2913450d43c0177684026182846d09838a5a43", + "11ae277c4123d8cdb5e701e5bc3d097ff1b14dff", "testharness" ], "shadow-dom/Element-interface-attachShadow.html": [ - "304b64cd46603d2cdbbbd0f78c3032ca8ad3d4cd", + "858dec4cb9fb707e311253a3193b1ab575b668be", "testharness" ], "shadow-dom/Element-interface-shadowRoot-attribute.html": [ @@ -708569,7 +723053,7 @@ "testharness" ], "shadow-dom/Node-prototype-cloneNode.html": [ - "6c6b24bc0ee4b6cf7ac579b61739ba3d078e676a", + "0ee47d492e5ad0ec8c00d15d4897c19772c9651d", "testharness" ], "shadow-dom/Range-prototype-insertNode.html": [ @@ -708577,7 +723061,7 @@ "testharness" ], "shadow-dom/ShadowRoot-interface.html": [ - "bda361e5987d1c6461a0e6455975f948aa1791e0", + "8efa50e4ea18cc6655dba923cdcf4f6e59029c5b", "testharness" ], "shadow-dom/Slotable-interface.html": [ @@ -709745,11 +724229,11 @@ "testharness" ], "speech-api/SpeechSynthesisErrorEvent-constructor.html": [ - "61e179cca47b70d001e5e081e87166ec1363714a", + "abefbf9a51cdaef5f7b2a43211e450331b5546a7", "testharness" ], "speech-api/SpeechSynthesisEvent-constructor.html": [ - "3ad6886b0aa9b4b868e5c57358ed742ebbeacff0", + "e6b29683f79d8317ce8505678b3d70df6916ba78", "testharness" ], "speech-api/SpeechSynthesisUtterance-basics.https.html": [ @@ -709777,7 +724261,7 @@ "support" ], "std-toast/actions.html": [ - "d07e5fd3d62694880bb3a69a6b4ca4ac1a9473e1", + "6a80def09985f27867f2c41bbb138b1a40399641", "testharness" ], "std-toast/attributes.html": [ @@ -709801,7 +724285,7 @@ "testharness" ], "std-toast/options.html": [ - "9f53bf88601ce914b1acf4054121d9420370fffa", + "0383d71f9ae9ff9c2f682abd8158b9c2e31e245b", "testharness" ], "std-toast/ref-tests/toast-slotting-expected.html": [ @@ -709945,11 +724429,11 @@ "support" ], "streams/byte-length-queuing-strategy.any.js": [ - "6a61adcdc96cf1f002e70642a87e8e1218e52c06", + "5cb3f5e87c50641fefef521ccdc2972a6156930c", "testharness" ], "streams/count-queuing-strategy.any.js": [ - "5aae61eda3394e3017d51d241159112f5ef9883f", + "f36bdc5790d430a8670778c587b812cc3947e946", "testharness" ], "streams/piping/abort.any.js": [ @@ -709985,7 +724469,7 @@ "testharness" ], "streams/piping/pipe-through.any.js": [ - "92d1394ca2f0ab75375b10bf50f2d45b195deeff", + "e6959b6c12ae9b3416b70b51ba37481f26ec76f9", "testharness" ], "streams/piping/then-interception.any.js": [ @@ -709993,7 +724477,7 @@ "testharness" ], "streams/piping/throwing-options.any.js": [ - "6fab32cc6dcf4c2f4fb5a7a22999788f22459f4e", + "68fac571114beb75153fba51469b9dcd6b981a82", "testharness" ], "streams/piping/transform-streams.any.js": [ @@ -710001,11 +724485,11 @@ "testharness" ], "streams/readable-byte-streams/brand-checks.any.js": [ - "e4d5e26e84385bf6b4d4698444d9233a74b0cb05", + "9bbe7111ea8ddf4afbea30d435400a19ff63c684", "testharness" ], "streams/readable-byte-streams/construct-byob-request.any.js": [ - "428cdeb76aeab536d083c06e17ea54863fe3072a", + "2e1c53fdea877946e2a097a81b4c949421883e9b", "testharness" ], "streams/readable-byte-streams/constructor.any.js": [ @@ -710013,31 +724497,31 @@ "testharness" ], "streams/readable-byte-streams/detached-buffers.any.js": [ - "7d87173f0a0035a38c51c5318c1dc28ff45abfb6", + "e37db6a0d87d00aacb0cf84bbfb74d1bff9439ad", "testharness" ], "streams/readable-byte-streams/general.any.js": [ - "c8f1fb7864e4ad2c9e68d7a1144c16cf67b5a5d5", + "1947ededb6652ef6c048ef34496d6b75f0afc7ac", "testharness" ], "streams/readable-byte-streams/properties.any.js": [ - "2d52fd678ab1f602b81295904afdd428a3c736db", + "b201caf78a7d7445a92f4f82245db5ebf726c7f9", "testharness" ], "streams/readable-streams/async-iterator.any.js": [ - "865b8475427b475e8b50b6bff54e58f3e23e58b6", + "ffbcdbb28bced9345124abba3bf32616100c1eec", "testharness" ], "streams/readable-streams/bad-strategies.any.js": [ - "5dab51ef771ee48e537a5f9a9f8cb7514d411797", + "2378c2bef2f262483a80772d640c5bb14451a3f6", "testharness" ], "streams/readable-streams/bad-underlying-sources.any.js": [ - "cde5603f2403452576e4d01426f277921082bcd3", + "0dc3e0a2535b1d3376d9d611a224b205ca9bea4d", "testharness" ], "streams/readable-streams/brand-checks.any.js": [ - "7bd41b4455e3303db3926ada2b662a8abc437bff", + "c82f513df01a86576442b31ca7fa93fcf0652b9a", "testharness" ], "streams/readable-streams/cancel.any.js": [ @@ -710053,7 +724537,7 @@ "testharness" ], "streams/readable-streams/default-reader.any.js": [ - "224cd834b31f86174da9cd7d28048b7ab8689b2a", + "1e67b272b544edfb718acaff71dccc05fee752f1", "testharness" ], "streams/readable-streams/floating-point-total-queue-size.any.js": [ @@ -710061,11 +724545,11 @@ "testharness" ], "streams/readable-streams/garbage-collection.any.js": [ - "b6f2a7f1d94594bfc3b90e4110eba50e052567e6", + "76a69572073c09103ef8100369e750c050dde5d2", "testharness" ], "streams/readable-streams/general.any.js": [ - "e9a107db1a36964044eb53a18ea53105140d0f42", + "4a72b3044ff013d65322b45dcc0ee7d46f5a52df", "testharness" ], "streams/readable-streams/patched-global.any.js": [ @@ -710073,7 +724557,7 @@ "testharness" ], "streams/readable-streams/reentrant-strategies.any.js": [ - "7724ea63d3747e4fdf8dcd418889d3c2160d8036", + "ca77a1b357f4b428dd68428a483cc13270f60067", "testharness" ], "streams/readable-streams/tee.any.js": [ @@ -710093,7 +724577,7 @@ "support" ], "streams/resources/rs-test-templates.js": [ - "ef68e0ade647baf5ddf002615e4e4efdb5dbae02", + "8e3814d322fd119edcd183d2647f2d0353bf019e", "support" ], "streams/resources/rs-utils.js": [ @@ -710101,7 +724585,7 @@ "support" ], "streams/resources/test-utils.js": [ - "5a9e2479faadf6bacfd95849f4eb6b013d45a8af", + "614fcca18e96dee419800f34e54c941a0843f697", "support" ], "streams/transform-streams/backpressure.any.js": [ @@ -710117,7 +724601,7 @@ "testharness" ], "streams/transform-streams/errors.any.js": [ - "53a4a49984b700040793d9c71567345e1180cab8", + "a6a35839e23b3192f4ad65d0f52687ab76b37a88", "testharness" ], "streams/transform-streams/flush.any.js": [ @@ -710125,7 +724609,7 @@ "testharness" ], "streams/transform-streams/general.any.js": [ - "537001edae99e0be56d39404e6cc366c3443274d", + "c9323155e6a00db80caf22568826ffbd9f213aba", "testharness" ], "streams/transform-streams/lipfuzz.any.js": [ @@ -710145,11 +724629,11 @@ "testharness" ], "streams/transform-streams/strategies.any.js": [ - "9ebfec7358e53e60061f33de61bdcd4bc4fb4243", + "c7645e7e651c0b57cd65870fb6f9048aa4bd5a0c", "testharness" ], "streams/transform-streams/terminate.any.js": [ - "2bf9eabed8410c9352a70163c8f40e25811dfd0f", + "0018b4b47d242b5908eaf2565d153e2052fbeabc", "testharness" ], "streams/writable-streams/aborting.any.js": [ @@ -710157,15 +724641,15 @@ "testharness" ], "streams/writable-streams/bad-strategies.any.js": [ - "d67ee6b5039dc98e5093aef0c3f2820462112a4c", + "bc51c3e9fc44b3c673e07318ba2a67d30d21d028", "testharness" ], "streams/writable-streams/bad-underlying-sinks.any.js": [ - "ed04b3c0a17fcd9902054e0d844171b9baa41c18", + "b0da6503b0ff7655709bd1f1ba2d099c3580c235", "testharness" ], "streams/writable-streams/brand-checks.any.js": [ - "17179e7936eda23a284e447bf9b877270016931d", + "a28fec3bd6baa0506cc952336ddceb3ae9cb1504", "testharness" ], "streams/writable-streams/byte-length-queuing-strategy.any.js": [ @@ -710177,7 +724661,7 @@ "testharness" ], "streams/writable-streams/constructor.any.js": [ - "97cda9cedac9aaae87cfa23e63c7667b15955734", + "c792e1f1fafe35c34e10c1b4fdf8662ad6add073", "testharness" ], "streams/writable-streams/count-queuing-strategy.any.js": [ @@ -710193,7 +724677,7 @@ "testharness" ], "streams/writable-streams/general.any.js": [ - "96670448a9da68ce54d1f3ecf8b2ba38b2673c73", + "b168ee0a5b9ea35e8a68e5c472386246df0fa41f", "testharness" ], "streams/writable-streams/properties.any.js": [ @@ -710205,11 +724689,11 @@ "testharness" ], "streams/writable-streams/start.any.js": [ - "0a1095b25062b2b46d8632d6239e60dc743d6604", + "96be6a7b18aa7eaa1f9b2f0ef40fba4f47839cf7", "testharness" ], "streams/writable-streams/write.any.js": [ - "c936ef55af99d4874d71e9c5eab57cac8d9b25a1", + "68da793985556635844b7711271a6ee0a9c7b1a5", "testharness" ], "subresource-integrity/META.yml": [ @@ -710705,11 +725189,11 @@ "testharness" ], "svg/animations/scripted/SVGAnimationElement-exceptions.html": [ - "0ad8ad3df50cf77cb12a7f7da550fac4dc4b8689", + "fe06ac1a376d8f772d5ca1ba4ccf5b0ce672ab4c", "testharness" ], "svg/animations/scripted/SVGAnimationElement-getStartTime.html": [ - "5ffe98c3b855dac879062ade9a6061f0b8bd2274", + "fec3ff4db207306c8ac895d41d0de6f4bdc4ff34", "testharness" ], "svg/animations/scripted/end-element-on-inactive-element.svg": [ @@ -714245,7 +728729,7 @@ "support" ], "svg/path/distance/pathLength-positive.svg": [ - "b40d6b82b55cce9d085652f60a5704c3971f7bfd", + "798b7ff3b8ae2bd19d415dc886c41617d87ccdc1", "reftest" ], "svg/path/distance/pathLength-zero-percentage-ref.svg": [ @@ -714264,6 +728748,54 @@ "4ae0b836f7f41a417f2f9e86d7c7847e20be17bd", "reftest" ], + "svg/path/distance/pathlength-path-mutating.svg": [ + "b3f71653f4214c0283ead06fa465a027001c433a", + "reftest" + ], + "svg/path/distance/pathlength-path-negative.svg": [ + "ce782dbef76c0c04b5602d47f3202e3ff1f1c971", + "reftest" + ], + "svg/path/distance/pathlength-path-zero.svg": [ + "f5c4168cd592bd6ea2bafed82e95e61a432c345f", + "reftest" + ], + "svg/path/distance/pathlength-path.svg": [ + "79402505ca9b6dbec040bb6fc8615efebe3d10c5", + "reftest" + ], + "svg/path/distance/pathlength-rect-mutating.svg": [ + "2dcbe4407909a43850f97a9a87e798f8cf713769", + "reftest" + ], + "svg/path/distance/pathlength-rect.svg": [ + "106fed5f2eb11d4dffd09346f5913751947473a4", + "reftest" + ], + "svg/path/distance/reference/pathlength-path-mutating-ref.svg": [ + "fe45125f6bbcd57e3d232c968527efeef32f13ab", + "support" + ], + "svg/path/distance/reference/pathlength-path-negative-ref.svg": [ + "c4dfb1b2b5916354dde10a11d40973ddf6749780", + "support" + ], + "svg/path/distance/reference/pathlength-path-ref.svg": [ + "79aca8720439c92541145f0c4968a130975c9f9a", + "support" + ], + "svg/path/distance/reference/pathlength-path-zero-ref.svg": [ + "232bf66cbcdd10c079d5cc99621ed87068c0e8aa", + "support" + ], + "svg/path/distance/reference/pathlength-rect-mutating-ref.svg": [ + "120941444a4898197d6b6001f9908a6cd48b62ba", + "support" + ], + "svg/path/distance/reference/pathlength-rect-ref.svg": [ + "232178d732c3e9ebe7c5412b845eaacf6690d502", + "support" + ], "svg/path/error-handling/bounding.svg": [ "85c089b25baa814e563e136bcba819e4bd80b2b1", "testharness" @@ -715185,7 +729717,7 @@ "testharness" ], "svg/types/scripted/SVGAnimatedNumber.html": [ - "a1697cbf926774e4b8ef5e5967f539aff8296642", + "c72cabca1a84b8cf071b91097e23a4039468999b", "testharness" ], "svg/types/scripted/SVGAnimatedNumberList.html": [ @@ -715204,6 +729736,14 @@ "e268386b64e256383b606aa02ac1497e380d8f3f", "testharness" ], + "svg/types/scripted/SVGGeometryElement.getPointAtLength-02.svg": [ + "4cf93da6a18dfb57db426ae9da8a44beb5e7efbb", + "testharness" + ], + "svg/types/scripted/SVGGeometryElement.getTotalLength-01.svg": [ + "49c8c165d70d66064643b50bd369ee4c5eaf05b6", + "testharness" + ], "svg/types/scripted/SVGGeometryElement.isPointInFill-01.svg": [ "f9ae97e402dbe0d586853fff81fd1056d8cac78d", "testharness" @@ -715225,7 +729765,7 @@ "testharness" ], "svg/types/scripted/SVGLength.html": [ - "2b043b99a629b2a840937a8f628e12e9b7affbf1", + "7436f5940c5d7432ab318759d3bb83df597c35af", "testharness" ], "svg/types/scripted/SVGLengthList-appendItem.html": [ @@ -715237,11 +729777,11 @@ "testharness" ], "svg/types/scripted/SVGLengthList-basics.html": [ - "58d0e937bedeb2615ce74039046909d8ea53e990", + "685074d519fae3f5d59bd7c10f6d5a7c51f16fbf", "testharness" ], "svg/types/scripted/SVGLengthList-getItem.html": [ - "c81a23394468f2e4d586d4e6ece5be713470d485", + "ca27810e72d2d33fd865caa31d4a600ba9a11b40", "testharness" ], "svg/types/scripted/event-handler-all-document-element-events.svg": [ @@ -715249,7 +729789,7 @@ "testharness" ], "svg/types/scripted/resources/SVGLengthList-helper.js": [ - "3cf888b7dbaeb370ef1b34409540337dee2c8e33", + "07697d6491b83414923e80a4a8c5a06f7471cce9", "support" ], "testharness_runner.html": [ @@ -715285,7 +729825,7 @@ "support" ], "tools/META.yml": [ - "7cc22a28c20c01f2c602b6b79814fc6844054306", + "6f4bb000cfa13d17fed62892efbc8e46f2c57c72", "support" ], "tools/__init__.py": [ @@ -715373,7 +729913,7 @@ "support" ], "tools/ci/azure/pip_install.yml": [ - "c8795345f6bcf4a943e07a459947e718ad6a0afc", + "eb7e790ba227081557eb1c22727a0df5a6f6e685", "support" ], "tools/ci/azure/safari-technology-preview.rb": [ @@ -715457,7 +729997,7 @@ "support" ], "tools/ci/tc/decision.py": [ - "0c935b93f8ee87f66dadefddd3a116160ed9dd3f", + "4b23630012bd2cd4757d930dc4379396472ff486", "support" ], "tools/ci/tc/download.py": [ @@ -715469,7 +730009,7 @@ "support" ], "tools/ci/tc/tasks/test.yml": [ - "e80e794203edca3c8d5f19ea9833a4f79e979f08", + "7476337e09bfd31f6fb68ecf2e17b33b4ac70d8b", "support" ], "tools/ci/tc/testdata/epochs_daily_push_event.json": [ @@ -715497,7 +730037,7 @@ "support" ], "tools/ci/tc/tests/test_valid.py": [ - "b170928b290a27f75eada66162ea404a1dbae9f9", + "a194d370181d1fc7d420d136da349af5001b10f8", "support" ], "tools/ci/tests/test_jobs.py": [ @@ -716225,7 +730765,7 @@ "support" ], "tools/requirements_mypy.txt": [ - "f3a56a6dd715ac6d6b01057a609a3e470ba8e303", + "a478015893d71a45953f9651844a35c2a46ba7d2", "support" ], "tools/runner/css/bootstrap-theme.min.css": [ @@ -720221,7 +734761,7 @@ "support" ], "tools/tox.ini": [ - "e8673db0a69ae4695e7b1fa152c533aa1b0f98d1", + "6706c4787fcb440d1493be8b5ad7584e546d0396", "support" ], "tools/webdriver/.gitignore": [ @@ -720265,7 +734805,7 @@ "support" ], "tools/wpt/browser.py": [ - "13ce823d0cecff9f84e131be80f101bd468e3cf5", + "bf1958fab9912044f4b26afc5a515b815463fb3f", "support" ], "tools/wpt/commands.json": [ @@ -720277,7 +734817,7 @@ "support" ], "tools/wpt/install.py": [ - "3da697e5333a55510d0b63b74f79c236303b4c4f", + "4a368f9a4d6e72a2f92135cd31c7b4a774882aca", "support" ], "tools/wpt/mach-emulator.manifest": [ @@ -720313,15 +734853,15 @@ "support" ], "tools/wpt/tests/test_browser.py": [ - "25b66e7d922f54edf197baaaf42c26c9fce04621", + "e7c32a3621186086102d5b44aade3c7f175f07aa", "support" ], "tools/wpt/tests/test_revlist.py": [ - "ec2a6b899d5d1a927dcad1f9a7583f987a3ad947", + "6b499dc5db43e48907cefea9f6384186dcc0822b", "support" ], "tools/wpt/tests/test_run.py": [ - "ef58ec41b2b4cfc14955b701627d047af78f29bc", + "4871301700929442c7245b80211380ccad5365cf", "support" ], "tools/wpt/tests/test_testfiles.py": [ @@ -720329,11 +734869,11 @@ "support" ], "tools/wpt/tests/test_wpt.py": [ - "6569580e9ff471784e307b7e84555935dec99586", + "c8adef557d01b126ba8b93e69733c2ff5e917053", "support" ], "tools/wpt/tox.ini": [ - "6a044473a6b74981345683abb960588de6535bfb", + "8e3e26e135b4d376a492aea5adbd242797b03fe0", "support" ], "tools/wpt/update.py": [ @@ -720349,7 +734889,7 @@ "support" ], "tools/wpt/wpt.py": [ - "93301dd86b4ffe202902a492204eba6537fb50d5", + "49ee6345381450c4087423b2f7d1c9538f813c92", "support" ], "tools/wptrunner/.gitignore": [ @@ -720389,7 +734929,7 @@ "support" ], "tools/wptrunner/requirements.txt": [ - "ccf55d2ca7f15f16d779971ec70c2070dcadf921", + "4ebdb3ea5f282525afd8fbb01e74527eab03da2e", "support" ], "tools/wptrunner/requirements_android_webview.txt": [ @@ -720505,7 +735045,7 @@ "support" ], "tools/wptrunner/test/test.py": [ - "8f323a3386c997cbcfa013e6585086471ddfa208", + "0e3b30c745a49a053e818e5f376a3f1237de77d5", "support" ], "tools/wptrunner/test/testdata/testharness/firefox/subdir/test_pref_inherit.html": [ @@ -720561,7 +735101,7 @@ "support" ], "tools/wptrunner/tox.ini": [ - "ad3502e02a9e81016940c8f39f56540f5ab1f26d", + "c544da7a95d2a982cab8b68af537440b71fa096b", "support" ], "tools/wptrunner/wptrunner.default.ini": [ @@ -720621,7 +735161,7 @@ "support" ], "tools/wptrunner/wptrunner/browsers/firefox_android.py": [ - "d6c8c4796615c1d33f15eea861defe25d78df2ee", + "0b4832f858ccaf91938ba23c52f618ce8cad8ef4", "support" ], "tools/wptrunner/wptrunner/browsers/ie.py": [ @@ -720809,7 +735349,7 @@ "support" ], "tools/wptrunner/wptrunner/metadata.py": [ - "aafc7d52250f62fdcd7025858f2273290c77d49e", + "03d13f87015a79db38d8a12500b0dd1333dc4820", "support" ], "tools/wptrunner/wptrunner/process.py": [ @@ -720849,7 +735389,7 @@ "support" ], "tools/wptrunner/wptrunner/testloader.py": [ - "8fcf66d64ed9cec5979ae2ef3b02320d5782b818", + "6c5b5a8ea00071bcdf6820103218545992496176", "support" ], "tools/wptrunner/wptrunner/testrunner.py": [ @@ -720889,7 +735429,7 @@ "support" ], "tools/wptrunner/wptrunner/tests/test_products.py": [ - "5d2bcf075d0f572e8972eba5fdb4a5bd36b5db75", + "e64f5ad8945b1297147f33fc6a3e1546024797f1", "support" ], "tools/wptrunner/wptrunner/tests/test_stability.py": [ @@ -720929,7 +735469,7 @@ "support" ], "tools/wptrunner/wptrunner/update/tree.py": [ - "9006df6719332ae592ee3861485d82c212423b48", + "f362770ff16d30e449de853f687467297b0ed077", "support" ], "tools/wptrunner/wptrunner/update/update.py": [ @@ -720973,11 +735513,11 @@ "support" ], "tools/wptrunner/wptrunner/wptmanifest/node.py": [ - "77b17a50325c77067391ab6639d0e029e3395047", + "0f82d7006b69ed0e485290387b65768b859a8700", "support" ], "tools/wptrunner/wptrunner/wptmanifest/parser.py": [ - "b8b840fcaee1514712c2b0d26cc62891c96051b3", + "abb6d4da7c8b2f44a545d9ebf0075f4ca44b570b", "support" ], "tools/wptrunner/wptrunner/wptmanifest/serializer.py": [ @@ -721281,7 +735821,7 @@ "support" ], "tools/wptserve/tests/test_stash.py": [ - "1ea99c0609f5bed859651284eb3da80a4cddf737", + "31af1558b0cc5c046843e0e96569db42c467cf22", "support" ], "tools/wptserve/wptserve/__init__.py": [ @@ -721297,7 +735837,7 @@ "support" ], "tools/wptserve/wptserve/handlers.py": [ - "c18fa2d3792597a4c2a850dda233be56590c67ea", + "fea1277b0d1cb5cac8ca445ab059947412669acc", "support" ], "tools/wptserve/wptserve/logger.py": [ @@ -721305,7 +735845,7 @@ "support" ], "tools/wptserve/wptserve/pipes.py": [ - "3500948fc8c296daa3baf6ba0965f8262ddf9fb3", + "569875bf972819d526022fc590c55fc621c02485", "support" ], "tools/wptserve/wptserve/ranges.py": [ @@ -721401,11 +735941,11 @@ "testharness" ], "touch-events/touch-touchevent-constructor.html": [ - "1b723b7bb3c5cebc0701e2393e334a1e99ce2ef3", + "e2d0950d5e27aa9905a9c2e1ca26242ed57fee53", "testharness" ], "trusted-types/DOMParser-parseFromString-regression.tentative.https.html": [ - "30986e45d2671caec84879314b43891664dd10ae", + "cc57ee7f8ea4cf42407868463e396cb2a4260d76", "testharness" ], "trusted-types/DOMParser-parseFromString.tentative.html": [ @@ -721465,7 +736005,7 @@ "testharness" ], "trusted-types/TrustedTypePolicy-CSP-no-name.tentative.html": [ - "18819b20894644094684df6ca48d7e5a5b762d8e", + "b1c7f51ddb3a14603cf6f11ea437484f09366c74", "testharness" ], "trusted-types/TrustedTypePolicy-CSP-wildcard.tentative.html": [ @@ -721473,11 +736013,11 @@ "testharness" ], "trusted-types/TrustedTypePolicy-CSP.tentative.html": [ - "8ae162558f41fe0b8015292fe8be84433469311e", + "3a56546151e4e8fcef6bfecafa42cd50dd01ebcc", "testharness" ], "trusted-types/TrustedTypePolicy-createXXX.tentative.html": [ - "34fbf5587daf725222dd191fc941fffe2630e106", + "7e39042e1cb86c042367b5fc08e4e4e72c934165", "testharness" ], "trusted-types/TrustedTypePolicy-getPolicyNames.tentative.html": [ @@ -721489,11 +736029,11 @@ "testharness" ], "trusted-types/TrustedTypePolicyFactory-createPolicy-createXYZTests.tentative.html": [ - "a78b3dbf0fd7a9532a45957970076cce16819231", + "746d89fa3f8c3f21cb64d6fb348de15ef9b1f3e2", "testharness" ], "trusted-types/TrustedTypePolicyFactory-createPolicy-cspTests-noNamesGiven.tentative.html": [ - "cec1bfb6041e525557c92f4cd7621c64f065654b", + "15728b9888f3cb0c7d9f509c86949f8942a66a22", "testharness" ], "trusted-types/TrustedTypePolicyFactory-createPolicy-cspTests-wildcard.tentative.html": [ @@ -721501,11 +736041,11 @@ "testharness" ], "trusted-types/TrustedTypePolicyFactory-createPolicy-cspTests.tentative.html": [ - "8ae162558f41fe0b8015292fe8be84433469311e", + "3a56546151e4e8fcef6bfecafa42cd50dd01ebcc", "testharness" ], "trusted-types/TrustedTypePolicyFactory-createPolicy-nameTests.tentative.html": [ - "0b1872abe5036d93618ae3849d52497511bb51b5", + "f049484f1199a088db7e60c4b899a1150c70906b", "testharness" ], "trusted-types/TrustedTypePolicyFactory-createPolicy-unenforced.tentative.html": [ @@ -721525,11 +736065,11 @@ "testharness" ], "trusted-types/TrustedTypePolicyFactory-metadata.tentative.html": [ - "67c734b5a4285576bbe51f6e4f67e674ca1c1c03", + "50f877cda07f05e6f9fc916637bc8c3ecaa9da3b", "testharness" ], "trusted-types/Window-TrustedTypes.tentative.html": [ - "c61d9207b65f430b08c6801a5ffc04d3d0efedd1", + "718c763afafd12bfa498eb8827fb1b12b509c51d", "testharness" ], "trusted-types/WorkerGlobalScope-importScripts.https.html": [ @@ -721537,35 +736077,35 @@ "testharness" ], "trusted-types/block-Node-multiple-arguments.tentative.html": [ - "879d34f96126945fb3ae78d9c5f86ccb04b1f39c", + "d66b8c8f25b64e214312bb9cd507a5901ebde53c", "testharness" ], "trusted-types/block-string-assignment-to-DOMParser-parseFromString.tentative.html": [ - "12cef6af661a5f56f59cdd7e6a5f81ae6e200b0c", + "bd038635df73560e23bf7ad4a50c93cebf827822", "testharness" ], "trusted-types/block-string-assignment-to-DOMWindowTimers-setTimeout-setInterval.tentative.html": [ - "6d723ba23b6b196d97c3e5816e7d867803b95eb0", + "d2764936675168b3d0ea052f3860bcd95c049024", "testharness" ], "trusted-types/block-string-assignment-to-Document-write.tentative.html": [ - "1049b46563d4b95d089db0d18b37b90970f1018b", + "fa87d119f79f69a020e75c9749e04b4f73d6a7dd", "testharness" ], "trusted-types/block-string-assignment-to-Element-insertAdjacentHTML.tentative.html": [ - "1e8c091d87e70b5d3d037dd1a49fd4774aa56628", + "c91e4e56acd483fe935839c3d95c712b6a1d76bc", "testharness" ], "trusted-types/block-string-assignment-to-Element-outerHTML.tentative.html": [ - "17815e6a9e9bfe4199d089f03504aa89d09203ff", + "397606bc056a8dd7729c5eb9ef66aeef59dda9db", "testharness" ], "trusted-types/block-string-assignment-to-Element-setAttribute.tentative.html": [ - "47c4c3557f8363af8fd3937401345ac56c9941eb", + "e6abf602fb08817bc3cdb9828ae4c490922389e5", "testharness" ], "trusted-types/block-string-assignment-to-Element-setAttributeNS.tentative.html": [ - "cc8b05e8c8370a50da89d8232e7276ae4b75b356", + "aa13d72ceb2f53d4fbf17ef80e6e66c4298f6ca3", "testharness" ], "trusted-types/block-string-assignment-to-HTMLElement-generic.tentative.html": [ @@ -721573,19 +736113,19 @@ "testharness" ], "trusted-types/block-string-assignment-to-Range-createContextualFragment.tentative.html": [ - "a57376206de6f1383ed716494fe328a842d37ba1", + "b38e4f3da5f8728eb3b67e63b250d63734a1b0aa", "testharness" ], "trusted-types/block-text-node-insertion-into-script-element.tentative.html": [ - "1f5e8fda7aeacc4494643b570c9526fc3a855caa", + "607a622f2b3e9eec6f1145b59be47012e7cdf723", "testharness" ], "trusted-types/csp-block-eval.tentative.html": [ - "93a97f15f8a972793e6f63108aeaa36dec431157", + "7902ca4040f582427e36941b6779e1bcdc51abf8", "testharness" ], "trusted-types/default-policy-report-only.tentative.html": [ - "ba23d7a3678e12419f077cd870e5e56fa701ad63", + "1cff751a80194bfaef6095617a89a423b76e70b2", "testharness" ], "trusted-types/default-policy-report-only.tentative.html.headers": [ @@ -721593,7 +736133,7 @@ "support" ], "trusted-types/default-policy.tentative.html": [ - "955cdfaa4042119f04ad21622fdc804872613e0f", + "debde85cdac9d7bb1bcb19b56f7063fea0a53241", "testharness" ], "trusted-types/default-policy.tentative.html.headers": [ @@ -721609,7 +736149,7 @@ "support" ], "trusted-types/empty-default-policy.tentative.html": [ - "2d3a10addbc25221babc37550e36acb8c7252a4b", + "d31b48ecd5a86670b7c6ea3c4d993cd3f11946df", "testharness" ], "trusted-types/empty-default-policy.tentative.html.headers": [ @@ -721625,7 +736165,7 @@ "testharness" ], "trusted-types/eval-csp-tt-no-default-policy.tentative.html": [ - "0da09a8a5cd1c2d353b17850ff89b607afa1873f", + "6d48ae48a01a1558e97efebc65ac9f42a893329a", "testharness" ], "trusted-types/eval-no-csp-no-tt-default-policy.tentative.html": [ @@ -721637,7 +736177,7 @@ "testharness" ], "trusted-types/eval-with-permissive-csp.tentative.html": [ - "32f12d8e129d69c225cc26e3b886f4ff91469542", + "5a35561438ab93c5066c4191bfcf3db0ddb83977", "testharness" ], "trusted-types/idlharness.tentative.window.js": [ @@ -721665,11 +736205,11 @@ "support" ], "trusted-types/require-trusted-types-for.tentative.html": [ - "95cfc4d106e5adfe6539641a3b046796b257b972", + "2a3820a89b8ad36c324139bf75fab8d72d7087a4", "testharness" ], "trusted-types/support/WorkerGlobalScope-importScripts.https.js": [ - "fa63c8bad0fcd9f93d89c8c3bea2d8a0b59d2094", + "c40e8550dd659e2656564f5b3b61a0e5cb591710", "support" ], "trusted-types/support/WorkerGlobalScope-importScripts.https.js.headers": [ @@ -721677,7 +736217,7 @@ "support" ], "trusted-types/support/helper.sub.js": [ - "20f56c3cbc7af094a7fd8db5d73b546804f8e9d0", + "2d1bd436bdf35f54474c8b53eb422d1948a7fa8c", "support" ], "trusted-types/support/navigation-report-only-support.html": [ @@ -721701,7 +736241,7 @@ "support" ], "trusted-types/trusted-types-createHTMLDocument.tentative.html": [ - "711e494a1607d575e1ee7f48693b5a442617ac42", + "ac95d9e64de97d96c18fdfad9b7b99b737228c59", "testharness" ], "trusted-types/trusted-types-duplicate-names-list-report-only.tentative.html": [ @@ -721713,11 +736253,11 @@ "support" ], "trusted-types/trusted-types-duplicate-names-list.tentative.html": [ - "839f2ef7a3ac5e6d1bc78e3b892e8b898370de1e", + "9a895ffa2ad2b1cc56b6e1727c6e184ab26e1420", "testharness" ], "trusted-types/trusted-types-duplicate-names.tentative.html": [ - "fb808246ac8aa093938a6ce85f8b5fb3675da357", + "e817cf145a260b1e355e5fc06288d8c959a42779", "testharness" ], "trusted-types/trusted-types-eval-reporting-no-unsafe-eval.tentative.https.html": [ @@ -721737,7 +736277,7 @@ "support" ], "trusted-types/trusted-types-eval-reporting.tentative.https.html": [ - "a521f94389ae0412a36b87f60d5428415b184a88", + "90007168a13d1d141dc149c42aa92c645f64bf28", "testharness" ], "trusted-types/trusted-types-eval-reporting.tentative.https.html.headers": [ @@ -721773,7 +736313,7 @@ "support" ], "trusted-types/tt-block-eval.tentative.html": [ - "8fe8aa50d6c9f8e3ac5f1a01a0d41f84a5c03549", + "f9c1a5d0b12365506fb62ec43a23d9bca4f61cf1", "testharness" ], "uievents/META.yml": [ @@ -721885,7 +736425,7 @@ "support" ], "uievents/legacy/Event-subclasses-init.html": [ - "676eec9280907b86201ca98963c36bc1e5263c33", + "a79a9f18adba6e329b6be8c45724417b4e337fde", "testharness" ], "uievents/mouse/layout_change_should_fire_mouseover-manual.html": [ @@ -725073,11 +739613,11 @@ "testharness" ], "url/failure.html": [ - "ac16edf8c743af2650b2b78f570c84f2bc75ecda", + "8f3d0299a40fdbff76e286cf45bc739cf2f3cf84", "testharness" ], "url/historical.any.js": [ - "407e118f3a05f986c29011c698b5081743c6b62c", + "c3067dfd730123585c3c5c81b082df9a07e4c556", "testharness" ], "url/idlharness.any.js": [ @@ -725109,7 +739649,7 @@ "testharness" ], "url/url-constructor.html": [ - "cb4c0db3571d2f20efb1215faa0ba867fb321c15", + "7ddcdc88170c202347b072d88f6a47477a776045", "testharness" ], "url/url-origin.html": [ @@ -725117,7 +739657,7 @@ "testharness" ], "url/url-searchparams.any.js": [ - "c55ae58d3b1e5be919296d541a01c65b56203e3a", + "34d4a4b068983167183df267d956c5422da8c9ca", "testharness" ], "url/url-setters.html": [ @@ -725221,7 +739761,7 @@ "testharness" ], "user-timing/invoke_with_timing_attributes.html": [ - "6c06f5e9d527b2a0cf3d7d2c02b334a24c9d4f25", + "1df94a3006d7fb93039875d1cdb0b4c34385d54f", "testharness" ], "user-timing/invoke_with_timing_attributes.worker.js": [ @@ -725229,7 +739769,7 @@ "testharness" ], "user-timing/invoke_without_parameter.html": [ - "e47a3ba7a981e978cdf015f8fc6bfbae6762dba9", + "114435e59befbba8f760d45e1413ffc56d2e864b", "testharness" ], "user-timing/mark-entry-constructor.any.js": [ @@ -725237,7 +739777,7 @@ "testharness" ], "user-timing/mark-errors.any.js": [ - "3207d18b048daf1118f20c375303efa376e0daf3", + "dcd36695e22f2c0c333e77cb910e1023ecd557fe", "testharness" ], "user-timing/mark-l3.any.js": [ @@ -725261,11 +739801,11 @@ "testharness" ], "user-timing/mark_exceptions.html": [ - "e1f4c4e0f49484cedd8b6025bbe854c0503c94c1", + "b445c6b8778ae7aa0cff1cfcdbe789c2b0ddfc7d", "testharness" ], "user-timing/measure-exceptions.html": [ - "0c532e79390e81393fdb71ea5dd59bbed1e65c38", + "2836eaee2a86c10997893f3e9b77c86079030019", "testharness" ], "user-timing/measure-l3.any.js": [ @@ -725273,7 +739813,7 @@ "testharness" ], "user-timing/measure-with-dict.any.js": [ - "95160fea8941d55a04381f46b730afc5a0956901", + "b452feb0de6fbb4749208baf0153bb12ab79ef04", "testharness" ], "user-timing/measure.html": [ @@ -725289,7 +739829,7 @@ "testharness" ], "user-timing/measure_exceptions_navigation_timing.html": [ - "1633221198c3164475c843ac61dd5308802f3013", + "b1868b2cb6b3cb1b27b4774a9b30156b5b8952a7", "testharness" ], "user-timing/measure_navigation_timing.html": [ @@ -725297,7 +739837,7 @@ "testharness" ], "user-timing/measure_syntax_err.any.js": [ - "84829f11eb166c4b067fcac622483148eac2c4cb", + "9b762a40906351500527b9464837f50c04f77f3b", "testharness" ], "user-timing/measures.html": [ @@ -725305,7 +739845,7 @@ "testharness" ], "user-timing/performance-measure-invalid.worker.js": [ - "dedd6da8884f1afffb18a61a800970796d678a20", + "29efb729992cc6edae17ac19c8bebbc316af1aa5", "testharness" ], "user-timing/resources/user-timing-helper.js": [ @@ -725321,7 +739861,7 @@ "support" ], "user-timing/structured-serialize-detail.any.js": [ - "0c4be9a3bcb0acbdeed2a2c4dae22ab2a1a3d587", + "78771b2f7663d4384b03f79e050144be39a4882f", "testharness" ], "user-timing/supported-usertiming-types.any.js": [ @@ -725369,7 +739909,7 @@ "testharness" ], "vibration/invalid-values.html": [ - "9381dadcc06e5d301b5531f0679ce44f943e8740", + "a8b2534feac01173cc79bda6a9cefb0f93e8fa11", "testharness" ], "vibration/pattern-array-extra-manual.html": [ @@ -726573,11 +741113,11 @@ "testharness" ], "wasm/jsapi/constructor/validate.any.js": [ - "57fa3359770f2c1be7d20186c5ecb8564f72a132", + "a0eaa3fb87d62497379d1e7b2320a3fc43e9508f", "testharness" ], "wasm/jsapi/global/constructor.any.js": [ - "237f99c8b298183a557c10778c70e1d359b9d6b6", + "cb287da4e9afa1a4006bc6c091cda22081492960", "testharness" ], "wasm/jsapi/global/toString.any.js": [ @@ -726585,11 +741125,11 @@ "testharness" ], "wasm/jsapi/global/value-get-set.any.js": [ - "7b45ddc20b273f55a7bf1a83de03373100c736e3", + "69f0e46379ffd20a3b9bfb190487376d616d916e", "testharness" ], "wasm/jsapi/global/valueOf.any.js": [ - "d4a84b254f76ea50284619967ab6dc98c99bfea2", + "0d4de93a6bd229f8d9fab7941b24a1944dc6aa78", "testharness" ], "wasm/jsapi/idlharness.any.js": [ @@ -726605,11 +741145,11 @@ "testharness" ], "wasm/jsapi/instance/constructor.any.js": [ - "1ce4de904e16da04b68137fbcdf71a49c402204b", + "745c3f8495123b4b67fd1e9402304ceff49278a6", "testharness" ], "wasm/jsapi/instance/exports.any.js": [ - "2ba57c5e2fd99c37b866771c573133be97f3a5d0", + "7c81a41295b0a1f2e20ee7972291e1099f2375fe", "testharness" ], "wasm/jsapi/instance/toString.any.js": [ @@ -726621,19 +741161,19 @@ "support" ], "wasm/jsapi/interface.any.js": [ - "98c4a1d781b7d77709a7f1df5adb3c756648fbd3", + "88940be51a7f5727c27e167d9e10abbaeb04a06b", "testharness" ], "wasm/jsapi/memory/buffer.any.js": [ - "4788ffcf84ff8d88adbafbe416dd7d5b80ec89d1", + "a835e6511a0a6c53c36a0ffd8143f4a1a7388eca", "testharness" ], "wasm/jsapi/memory/constructor.any.js": [ - "cef713fe0fe74f009e9f8aadd9168e7fa5138eb0", + "8bd606e321283a3ab91fecc1511c915c82dcd26a", "testharness" ], "wasm/jsapi/memory/grow.any.js": [ - "11c41942510b65b62b63468cc332b803445321de", + "f07a97c92758ac7138b6ac521f3f2b7286214139", "testharness" ], "wasm/jsapi/memory/toString.any.js": [ @@ -726641,19 +741181,19 @@ "testharness" ], "wasm/jsapi/module/constructor.any.js": [ - "03e508aa1e0f10e7476d74c642153470f18a73f7", + "1fffb6cd4f3b9013f5b65987dfeef8c0a46c6c8f", "testharness" ], "wasm/jsapi/module/customSections.any.js": [ - "09355979d84ade5385e7b3a5ac265eaa0da500cf", + "298d89604cf739ba6ef9929da9162bdf6beb4c80", "testharness" ], "wasm/jsapi/module/exports.any.js": [ - "eadfc84f1e4e774202c96667e9a6e162359d967e", + "83f97dd67a1e419c10c399b26fc50e1d37de3405", "testharness" ], "wasm/jsapi/module/imports.any.js": [ - "9d7ef2f0a9b90a69f40cc29a82193efb7ce5aae8", + "91e4be33aca6955d8b67cf0b51ddd7323ae62843", "testharness" ], "wasm/jsapi/module/toString.any.js": [ @@ -726661,27 +741201,27 @@ "testharness" ], "wasm/jsapi/table/assertions.js": [ - "c88972b4ebdcd760b2a441835c2c9eb31dabfea8", + "c42a446a75d01f172dd0ef28a836553e79566156", "support" ], "wasm/jsapi/table/constructor.any.js": [ - "99eee19fecd49e432c7f6774c0968218e6d931a3", + "a494a9e559b92136e3616d16f73b08a72a8b222b", "testharness" ], "wasm/jsapi/table/get-set.any.js": [ - "bd053b389c904ed9b2587ad2817650d31fde7504", + "175f30fbcadca6e9a3b698ec677779fc56175239", "testharness" ], "wasm/jsapi/table/grow-reftypes.tentative.any.js": [ - "807aea991bbc82eaa4702a12f5b1093baaef6d10", + "54141c059ed04e0654fa6be24d2d3f8f01209509", "testharness" ], "wasm/jsapi/table/grow.any.js": [ - "558b49d1c7d3bcba9798370792fa4b6f83332105", + "f543cc620bcc4ccc0e706d0dcb8e68af4210a24e", "testharness" ], "wasm/jsapi/table/length.any.js": [ - "b1bfa6cfd1f44fbdbf18769b3f3e8129310c7e0e", + "f4e1148479729061a7f40e68311add43e0c51b1c", "testharness" ], "wasm/jsapi/table/toString.any.js": [ @@ -726697,7 +741237,7 @@ "support" ], "wasm/serialization/arraybuffer/transfer.window.js": [ - "3edfdaad958b09dfc3727e2d27e89b55549cb4e2", + "b2b5697fca306a9e3fa05cc60abac172dbc4275e", "testharness" ], "wasm/serialization/module/broadcastchannel-success-and-failure.html": [ @@ -726705,7 +741245,7 @@ "testharness" ], "wasm/serialization/module/broadcastchannel-success.html": [ - "cd5f8d0b56a19148dbd01b4218869f1f0c3526fd", + "ddc242b82ef99403f48dfff0963c8576a73e0b31", "testharness" ], "wasm/serialization/module/identity-not-preserved.html": [ @@ -726721,7 +741261,7 @@ "testharness" ], "wasm/serialization/module/no-transferring.html": [ - "a0bf11f01dd459b2e3abeb249f725e1e05d1532f", + "2f0f674b1fcfd460f60714abba6dc03b377cafbb", "testharness" ], "wasm/serialization/module/resources/blank.html": [ @@ -726805,15 +741345,15 @@ "support" ], "wasm/serialization/module/serialization-via-history.html": [ - "35dc17b6701fadf920ce251ec6c63da1c26b6570", + "38d4301d70bc896680169158ec480a2f74d533b1", "testharness" ], "wasm/serialization/module/serialization-via-idb.any.js": [ - "1d861c3d3aa1072b1c90332fec7ac993d3b59552", + "10c99c4d31cb4cc57a3435a2490e0cb3a0e1d081", "testharness" ], "wasm/serialization/module/serialization-via-notifications-api.any.js": [ - "84105651d3b53192f453b9f16bb85163165495cb", + "3672192df798a13dd086fa4b86c5125ac87a6c51", "testharness" ], "wasm/serialization/module/window-domain-success.sub.html": [ @@ -726857,7 +741397,7 @@ "testharness" ], "wasm/webapi/historical.any.js": [ - "0fe1e1c891fa7ee7d79c6895f8b38f4f207e6b23", + "257112c4160f5424d12d175319322c2f5ae1576b", "testharness" ], "wasm/webapi/idlharness.any.js": [ @@ -726901,7 +741441,7 @@ "support" ], "web-animations/README.md": [ - "75493ce57b4c242195d9fb56e73154865d6f59bf", + "c41e0e048efe704917b05894ab72c3f60f5a9a97", "support" ], "web-animations/animation-model/animation-types/accumulation-per-property.html": [ @@ -726997,7 +741537,7 @@ "testharness" ], "web-animations/interfaces/Animation/commitStyles.html": [ - "d3a95e053e3ebf07f1eea5974fd7aec020d52bd1", + "40cb2634e41a41bac6b9699f4c815c3f8e3b57dd", "testharness" ], "web-animations/interfaces/Animation/constructor.html": [ @@ -727025,7 +741565,7 @@ "testharness" ], "web-animations/interfaces/Animation/pause.html": [ - "0649c2f617df45d896c38f14a706f150b02dc82c", + "74d0724ef427f6b1752012e876d338d8b8ec4d60", "testharness" ], "web-animations/interfaces/Animation/pending.html": [ @@ -727037,7 +741577,7 @@ "testharness" ], "web-animations/interfaces/Animation/play.html": [ - "3e8f923d544adb54a60193ffd42c097077334d38", + "d29b67b7992860d072c73bcbbeaa269d8aea10dc", "testharness" ], "web-animations/interfaces/Animation/ready.html": [ @@ -727057,7 +741597,7 @@ "testharness" ], "web-animations/interfaces/AnimationEffect/updateTiming.html": [ - "f4f672ab1aac76905e3258144fbf022201df0f53", + "6a340c0bf47a298d3c04340e91d8026680aa9ba1", "testharness" ], "web-animations/interfaces/AnimationPlaybackEvent/constructor.html": [ @@ -727085,7 +741625,7 @@ "testharness" ], "web-animations/interfaces/KeyframeEffect/constructor.html": [ - "46a23b0c2e87aef9d36c86960b4f9c2d254f3140", + "f9d552e63ec55aefaab282d7dc9a352cc00fb263", "testharness" ], "web-animations/interfaces/KeyframeEffect/copy-constructor.html": [ @@ -727101,11 +741641,11 @@ "testharness" ], "web-animations/interfaces/KeyframeEffect/processing-a-keyframes-argument-001.html": [ - "5bd0ae2b1edbb508d45ac64258332fcaddf5434c", + "87e60a2b1085125040a454763216ed335f249e6c", "testharness" ], "web-animations/interfaces/KeyframeEffect/processing-a-keyframes-argument-002.html": [ - "e78e13d69aa5e8004c4ec49de2bc98b6bfb6a54a", + "4b0e15c9a2f73a81eb181691c8c096fecc55edae", "testharness" ], "web-animations/interfaces/KeyframeEffect/setKeyframes.html": [ @@ -727181,7 +741721,7 @@ "testharness" ], "web-animations/timing-model/animations/finishing-an-animation.html": [ - "779bee184b8dbde227db6ae72dc7ff83a79c4176", + "b91eacfb689cac397be47a17909a7c1edf583824", "testharness" ], "web-animations/timing-model/animations/pausing-an-animation.html": [ @@ -727205,7 +741745,7 @@ "reftest" ], "web-animations/timing-model/animations/reversing-an-animation.html": [ - "75fd9876c0495a8bd0096d2f976a920d3d7e5a05", + "8d869d72aaffc44f07c6d3e30cd26ac53ac281d3", "testharness" ], "web-animations/timing-model/animations/seamlessly-updating-the-playback-rate-of-an-animation.html": [ @@ -727213,7 +741753,7 @@ "testharness" ], "web-animations/timing-model/animations/setting-the-current-time-of-an-animation.html": [ - "6687ad7612e2b37fc7d4d5604e27252cbeb7166d", + "22f88adb8b4268b4a1b11af6cfb287e7ac634809", "testharness" ], "web-animations/timing-model/animations/setting-the-playback-rate-of-an-animation.html": [ @@ -727465,7 +742005,7 @@ "testharness" ], "web-nfc/NDEFRecord_constructor.https.html": [ - "bf4697f8b17ca97de735dc0851a2f48766b1a6b6", + "66befaa30a7e32aa762b8bcb806e64632ce4e0c9", "testharness" ], "web-nfc/NDEFWriter-document-hidden-manual.https.html": [ @@ -727501,7 +742041,7 @@ "support" ], "web-share/canShare-files.tentative.https.html": [ - "98863a4e2112e870d675a657811a3f464552e299", + "2c2f2ff9699020b0ffcaf97c65aa75eaafe799e2", "testharness" ], "web-share/canShare-insecure.tentative.http.html": [ @@ -727765,7 +742305,7 @@ "testharness" ], "webaudio/the-audio-api/the-analysernode-interface/test-analysernode.html": [ - "a8b5a7154e94479460c1085c6b5cb584e9b6976c", + "e8325388d1bf01e7bebe881ad0da1583f0e2f481", "testharness" ], "webaudio/the-audio-api/the-audiobuffer-interface/.gitkeep": [ @@ -728333,7 +742873,7 @@ "testharness" ], "webaudio/the-audio-api/the-constantsourcenode-interface/test-constantsourcenode.html": [ - "1e0d7255c556bec234ec57dd229f544e00c93749", + "7cefde8f2857f207267087a36bc765c0782698f3", "testharness" ], "webaudio/the-audio-api/the-convolvernode-interface/.gitkeep": [ @@ -728429,7 +742969,7 @@ "testharness" ], "webaudio/the-audio-api/the-destinationnode-interface/destination.html": [ - "cda5668a09b6cc4d3eade92b1f70e9d3a4cdb913", + "1af0e0f010b3c83c36e705c537510ee91159fb38", "testharness" ], "webaudio/the-audio-api/the-dynamicscompressornode-interface/.gitkeep": [ @@ -728481,7 +743021,7 @@ "testharness" ], "webaudio/the-audio-api/the-iirfilternode-interface/test-iirfilternode.html": [ - "61c11ffc5083a90ba7a29183a521a7aacac38f72", + "001a2a6172438207b50c16f707bd74a1524fd3dc", "testharness" ], "webaudio/the-audio-api/the-mediaelementaudiosourcenode-interface/.gitkeep": [ @@ -728513,7 +743053,7 @@ "support" ], "webaudio/the-audio-api/the-mediastreamaudiosourcenode-interface/mediastreamaudiosourcenode-ctor.html": [ - "fea042ca530d5c92de3edf358af8b21973187e13", + "a711419656979bccaca95e08f26035ebd2a0c4c9", "testharness" ], "webaudio/the-audio-api/the-mediastreamaudiosourcenode-interface/mediastreamaudiosourcenode-routing.html": [ @@ -728669,35 +743209,35 @@ "testharness" ], "webauthn/META.yml": [ - "e8ea8e059854c2eda47b038dbd861253726d9c63", + "a52d978f0eac073ea327e13eb6b8773f89d6091b", "support" ], "webauthn/createcredential-badargs-attestation.https.html": [ - "a56f4f031434198ec4f77f05ad09aa46e09cf445", + "6bce3233a1c029fb705a245afd0913beab1f56e7", "testharness" ], "webauthn/createcredential-badargs-authnrselection.https.html": [ - "a9ea8753c6a000e6afbdecb1c66d29fb0292dcf5", + "87bdb040055b403b3fca64b3ae6e0e80e2cffd65", "testharness" ], "webauthn/createcredential-badargs-challenge.https.html": [ - "6c03295bc9c87cb925d7fe791fecfeeac095e938", + "554fc0ec43b8d7265b8f0bf003641a9f5cba150c", "testharness" ], "webauthn/createcredential-badargs-rp.https.html": [ - "67598687cd24dc28359c040a20b2061691dcf025", + "890ba21a81bb2bcc585a2c3969f2155f54361b4b", "testharness" ], "webauthn/createcredential-badargs-user.https.html": [ - "f03f233215a101212c876a65406dfa21319bd664", + "070a5c77dea294d340033424872a774786167986", "testharness" ], "webauthn/createcredential-excludecredentials.https.html": [ - "a5294c743ad9661cd25d103b5f25352707bba51a", + "de72afc1f588586ddaea2d8fd87920c0de8d85fe", "testharness" ], "webauthn/createcredential-extensions.https.html": [ - "01afb3344a5f149cc6d7a6696118d41ea8ab1230", + "f4a05c3042f8172dcdc4737a30c15af4bd6af8d4", "testharness" ], "webauthn/createcredential-passing.https.html": [ @@ -728705,11 +743245,11 @@ "testharness" ], "webauthn/createcredential-pubkeycredparams.https.html": [ - "50166bbf141f06d3a5cb1d3915792ad33f869508", + "34622fdf74e50b65a425488a94f17cbc4364b59f", "testharness" ], "webauthn/createcredential-timeout.https.html": [ - "b94ae582d3e77c3cdee849b77cd39c69db961bf2", + "d4aa459240b732dfdcebdd85c2afccd862a9d947", "testharness" ], "webauthn/getcredential-badargs-rpid.https.html": [ @@ -728717,11 +743257,11 @@ "testharness" ], "webauthn/getcredential-badargs-userverification.https.html": [ - "60f2e28b6ff181fd87d50ca68a9769454b9f7f31", + "5bc579bc3335e56aa71adcc5d3a58bab8d51f898", "testharness" ], "webauthn/getcredential-extensions.https.html": [ - "bc7a80d40ee1416d71e9bd937308fa0f60c08b45", + "763f48b70f34428e83a3a5d6419e7726d45211bb", "testharness" ], "webauthn/getcredential-passing.https.html": [ @@ -728729,11 +743269,11 @@ "testharness" ], "webauthn/getcredential-timeout.https.html": [ - "84dbad8c0bb0bdd814c02870f27918013ba99fd8", + "e6cd884ae064a59976c9191ff09da106e6de9739", "testharness" ], "webauthn/helpers.js": [ - "73474b5ecbfd5b5f2f83d8e4b3ad7f317f75a5bd", + "bbbba464948c77d57bf3fbc19f31cd4579551229", "support" ], "webauthn/idlharness-manual.https.window.js": [ @@ -729733,11 +744273,11 @@ "support" ], "webgl/compressedTexImage2D.html": [ - "b0a031add0be018f995e4463114d333a0d9eb85a", + "a974c65002448c0df1beb97f93d5cd1476f254ca", "testharness" ], "webgl/compressedTexSubImage2D.html": [ - "539f9e17f8a811c5acb4f07cf6cbd17015726632", + "20c5ff9bd3841ca190f2d171842e28076ee00e0f", "testharness" ], "webgl/idlharness.any.js": [ @@ -729745,11 +744285,11 @@ "testharness" ], "webgl/texImage2D.html": [ - "2f769160dfdeaa3b0a73380e5540b30dfc971489", + "86b84d1a999f165ef63fbb24ccf0587e4f6a01a3", "testharness" ], "webgl/texSubImage2D.html": [ - "294b30c7607edc38aed19a31e44c5237eee8b970", + "7a6c2091822a2194e851b7adcdd59cc27840df6d", "testharness" ], "webgl/uniformMatrixNfv.html": [ @@ -730053,7 +744593,7 @@ "testharness" ], "webmessaging/Channel_postMessage_DataCloneErr.htm": [ - "9f4cd6b9be711e90c435140bab5183aa10e18e31", + "d2885d2947fd1872325c5a86d2a03154ac4da38c", "testharness" ], "webmessaging/Channel_postMessage_clone_port.htm": [ @@ -730061,7 +744601,7 @@ "testharness" ], "webmessaging/Channel_postMessage_clone_port_error.htm": [ - "c33feaa5f0947a275e1cb39d920be7a2658cb97e", + "bdc77e3b99d833cd008ad7ab39e0f137e4c4d75e", "testharness" ], "webmessaging/Channel_postMessage_event_properties.htm": [ @@ -730069,7 +744609,7 @@ "testharness" ], "webmessaging/Channel_postMessage_ports_readonly_array.htm": [ - "4ccf3ac4f3535676fb45ee591ed6ee75fc32f289", + "74027130377a9d27803290d9769426a6af2f8877", "testharness" ], "webmessaging/Channel_postMessage_target_source.htm": [ @@ -730105,7 +744645,7 @@ "testharness" ], "webmessaging/MessageEvent.html": [ - "4fb68b5999ba4f829febc83ca9d305ba6327aad0", + "401d941e1d6494e3a7b6c5912e66d772ac795704", "testharness" ], "webmessaging/MessageEvent_onmessage_postMessage_infinite_loop.html": [ @@ -730141,7 +744681,7 @@ "testharness" ], "webmessaging/broadcastchannel/interface.html": [ - "a552563ed66b9168c717a3bc3f41c6a6f7f7f8b1", + "1733d2d17fafd84553c6da2ab6360a23167f7fda", "testharness" ], "webmessaging/broadcastchannel/origin.window.js": [ @@ -730213,7 +744753,7 @@ "testharness" ], "webmessaging/message-channels/close.html": [ - "d975ea728327d95def65af0e5875a16dfdfa0289", + "75b5f229d6d5e412abecf5807ad25f96d69bf4b7", "testharness" ], "webmessaging/message-channels/dictionary-transferrable.html": [ @@ -730245,11 +744785,11 @@ "testharness" ], "webmessaging/postMessage_Document.htm": [ - "97765fae818751354a38ddc6068c58aaf2605025", + "a5580ef4b2b9137fc9add8ab1eb9a8f224dc6a80", "testharness" ], "webmessaging/postMessage_Function.htm": [ - "c53e8fcc3cd24cf8f3acafae1f320ebbf443411d", + "fd31f83df4b75fe36a3a8581c81d230888b3a879", "testharness" ], "webmessaging/postMessage_MessagePorts_sorigin.htm": [ @@ -730273,11 +744813,11 @@ "testharness" ], "webmessaging/postMessage_dup_transfer_objects.htm": [ - "a28c9640067d505bf5aaff328bfa0b5c8b7dd9f8", + "511b51271f30a2655951e8556488621a7095b826", "testharness" ], "webmessaging/postMessage_invalid_targetOrigin.htm": [ - "d6e16460f192f37a84b5f173350992b168ba7a6e", + "b9cc6377ef82a511264857f5b1bf424ef08d007d", "testharness" ], "webmessaging/postMessage_objects.sub.htm": [ @@ -730309,7 +744849,7 @@ "support" ], "webmessaging/with-options/broken-origin.html": [ - "d6901a15a34a166a9db7a999dc99f4f43c60bcb8", + "795404b0ecf279a58cad1a477119c7d75d169ead", "testharness" ], "webmessaging/with-options/host-specific-origin.html": [ @@ -730345,7 +744885,7 @@ "testharness" ], "webmessaging/with-ports/001.html": [ - "e3687f16226aff75493b37b5eedb75b6006a9982", + "62dcf5e9bfb893874761c1057d5d11c167679f58", "testharness" ], "webmessaging/with-ports/002.html": [ @@ -730353,7 +744893,7 @@ "testharness" ], "webmessaging/with-ports/003.html": [ - "3c0d4296b07e85f7b5fd9bd3e9f7fe9bf8cdd9b1", + "47ddfbe81a5acefc5995dd39ef0291c42925f3f3", "testharness" ], "webmessaging/with-ports/004.html": [ @@ -730429,19 +744969,19 @@ "testharness" ], "webmessaging/with-ports/025.html": [ - "9a0e5cf6ffb729d7949e4073d75d3c4595800a16", + "7af2a852ed603c317227621d1eaf51831171956c", "testharness" ], "webmessaging/with-ports/026.html": [ - "cf5c5e18ae5cd4a7bb69f7aed59fee3e3d960c4b", + "2af90e6be3afe334ee44acb2d07221f6442b6641", "testharness" ], "webmessaging/with-ports/027.html": [ - "e5f8c9c14abeaf779c5e59f4ce2e1b9aea1a5ec0", + "78ea225eb75577aadac1a33fb547629caac16463", "testharness" ], "webmessaging/without-ports/001.html": [ - "8f77c31fc61046fdd1d8783917793dda7a388c8f", + "09c28c5a5ce53af327ba9b36abb6659605138dc5", "testharness" ], "webmessaging/without-ports/002.html": [ @@ -730449,7 +744989,7 @@ "testharness" ], "webmessaging/without-ports/003.html": [ - "5021e09f46b37b987aa99652b229bf415bebc735", + "6dc1e55777ba3d093d9de7eb4b281e5a1489fa53", "testharness" ], "webmessaging/without-ports/004.html": [ @@ -730473,7 +745013,7 @@ "testharness" ], "webmessaging/without-ports/009.html": [ - "779383da203902aa5c34e1e3085e43467dc9c4a0", + "d613b4a07344490806233e43498abf315a638082", "testharness" ], "webmessaging/without-ports/010.html": [ @@ -730537,19 +745077,19 @@ "testharness" ], "webmessaging/without-ports/024.html": [ - "8d99994599c9b638b6af9d02c25b285158d553de", + "0e4651593a79862f8fdff1c4f65b4669a7d27bec", "testharness" ], "webmessaging/without-ports/025-1.js": [ - "c088fc981947224d24859d078ef1254c1fdd7910", + "bd1d778d9b32651b05f1b7364459ed4096646528", "support" ], "webmessaging/without-ports/025.html": [ - "47bec6bd842d361c1355a57f4015e3624c766fce", + "4686febe94e0b24eb9799493d0741a4384ad75e5", "testharness" ], "webmessaging/without-ports/026.html": [ - "e8d799c5d2553e6db8b7c117d186e8163d2fb405", + "546da8a91b541cde8954eb4068b83e4169a65fea", "testharness" ], "webmessaging/without-ports/027.html": [ @@ -730589,7 +745129,7 @@ "testharness" ], "webrtc-extensions/RTCRtpReceiver-playoutDelayHint.html": [ - "d8e47bda22174c63094c0918ccabed63513ea9fa", + "29dfc19a6b68900679b06b3c3527c177c4e38b48", "testharness" ], "webrtc-identity/META.yml": [ @@ -730625,7 +745165,7 @@ "support" ], "webrtc-quic/RTCQuicStream.https.html": [ - "563d74a20808c23491d3b1228b827e6809dba1bf", + "9f5fd7ffd537aed176598b6feb35d45c3034e0f3", "testharness" ], "webrtc-quic/RTCQuicTransport-helper.js": [ @@ -730633,7 +745173,7 @@ "support" ], "webrtc-quic/RTCQuicTransport.https.html": [ - "b84d90f2388fffa49bf1f57ee178d31c953497db", + "aa80c911a67b3cbdc383ff828c83d9d072eb0630", "testharness" ], "webrtc-stats/META.yml": [ @@ -730665,15 +745205,15 @@ "support" ], "webrtc/RTCCertificate-postMessage.html": [ - "ee8347c97ac39410531cd129762ec16f8ebb44df", + "6cca240057668f90ecd896a15d76d17cfdc7d036", "testharness" ], "webrtc/RTCCertificate.html": [ - "a33ba9ae5f2b201e663c5aa70d1984f0687c613a", + "6b7626c92e75c06dba8606558abe003d8d994fd3", "testharness" ], "webrtc/RTCConfiguration-bundlePolicy.html": [ - "6b64cf8ddd53ad6b545dfd516ee457dfd50a2913", + "e825d7b4023751fe6aefd4957fdc08d81c608990", "testharness" ], "webrtc/RTCConfiguration-helper.js": [ @@ -730681,19 +745221,19 @@ "support" ], "webrtc/RTCConfiguration-iceCandidatePoolSize.html": [ - "2e6859d2596163375550b1dc929f126894e02898", + "0dccf4c11d2ca70389d9a2ec8f99ecdc02794d50", "testharness" ], "webrtc/RTCConfiguration-iceServers.html": [ - "3f5c367d3ad98186461864b6b0bdecee3a07319e", + "2ef99bf59c8cc11273e99388b1444bf25067cb22", "testharness" ], "webrtc/RTCConfiguration-iceTransportPolicy.html": [ - "74e8b4b2ae7c2bfcdf474915394a1b5f27f9234c", + "25d4511f48e32ef9568e750e74abe2df5c51e596", "testharness" ], "webrtc/RTCConfiguration-rtcpMuxPolicy.html": [ - "7d0c81f5eabfddd5fbe66a2eab60ebb6fcec33f5", + "5198c9074a0b39ccc9015150b280ffff640b9d4a", "testharness" ], "webrtc/RTCDTMFSender-helper.js": [ @@ -730701,7 +745241,7 @@ "support" ], "webrtc/RTCDTMFSender-insertDTMF.https.html": [ - "62a5f0472c1983140f1ccd29b10e5b86d302c79b", + "be6e3c6e59d039a0f2bbf065db9897fb971f5b15", "testharness" ], "webrtc/RTCDTMFSender-ontonechange-long.https.html": [ @@ -730721,7 +745261,7 @@ "testharness" ], "webrtc/RTCDataChannel-id.html": [ - "0cf01976ff0eeb66c51ded321e777123f063b02c", + "355f6a36eae551e8ea92ff91a8a6b65ed10c776c", "testharness" ], "webrtc/RTCDataChannel-send-blob-order.html": [ @@ -730729,11 +745269,11 @@ "testharness" ], "webrtc/RTCDataChannel-send.html": [ - "4565a8385febacd33aed74bd09bbaaaddef34538", + "406937f33aee8a1cb417edd401946c4b424a17be", "testharness" ], "webrtc/RTCDataChannelEvent-constructor.html": [ - "03211eccb920e136413a0e61a94d24f4d8bbd714", + "265943ae56350e01d14cd4d1cfdd7c86635e49b5", "testharness" ], "webrtc/RTCDtlsTransport-getRemoteCertificates.html": [ @@ -730745,11 +745285,11 @@ "testharness" ], "webrtc/RTCError.html": [ - "9c7227521edeb8e9db1c744ce3f6a145bc66314b", + "bcc5749bf7d5e69fd3d674ac33564403e41e9985", "testharness" ], "webrtc/RTCIceCandidate-constructor.html": [ - "344007ded2b4d4496171402896d738817cdde12e", + "6c208e887f473a031e0e9ee07658b53bfbe5935a", "testharness" ], "webrtc/RTCIceConnectionState-candidate-pair.https.html": [ @@ -730761,7 +745301,7 @@ "support" ], "webrtc/RTCIceTransport-extension.https.html": [ - "94beb9927861e83142cab9c1aa3043e4c479ed0d", + "40e9f30d1704e48a808b8d0ff029188b3b7d6519", "testharness" ], "webrtc/RTCIceTransport.html": [ @@ -730781,11 +745321,11 @@ "testharness" ], "webrtc/RTCPeerConnection-addTrack.https.html": [ - "3f4f927883de757d23caf7fda2af30715d67d8ed", + "7585961f31ce942db94a6e59be76cf8b8b3de0df", "testharness" ], "webrtc/RTCPeerConnection-addTransceiver.https.html": [ - "3640bfb31cd32b926c0493aa1d80f9d291dfae26", + "bc537c26867fe699388a7ba287606b007ab41afc", "testharness" ], "webrtc/RTCPeerConnection-canTrickleIceCandidates.html": [ @@ -730801,7 +745341,7 @@ "testharness" ], "webrtc/RTCPeerConnection-constructor.html": [ - "abea2eb6761b779ba527b75660d0c2258c805ba1", + "0336837f8131d4c5df435d859d7d36ccc726123f", "testharness" ], "webrtc/RTCPeerConnection-createAnswer.html": [ @@ -730809,7 +745349,7 @@ "testharness" ], "webrtc/RTCPeerConnection-createDataChannel.html": [ - "350f71567820f80506fdc6d86452784521f0ff40", + "67b40c9ed8ea44d9559a318619206531c01b32a7", "testharness" ], "webrtc/RTCPeerConnection-createOffer.html": [ @@ -730877,7 +745417,7 @@ "testharness" ], "webrtc/RTCPeerConnection-removeTrack.https.html": [ - "10b4cfb3a613d8abc508da9ed12c3c3605d32ebe", + "9e61ef785edf7f672b9161b14c86ee8b1cd16501", "testharness" ], "webrtc/RTCPeerConnection-restartIce-onnegotiationneeded.https.html": [ @@ -730945,7 +745485,7 @@ "testharness" ], "webrtc/RTCPeerConnection-setRemoteDescription.html": [ - "464e16d736a02085e312350597c5ebe492de3c1c", + "3f335d71b9ab640c34b879d624fa77215488d5ce", "testharness" ], "webrtc/RTCPeerConnection-track-stats.https.html": [ @@ -730957,7 +745497,7 @@ "testharness" ], "webrtc/RTCPeerConnectionIceEvent-constructor.html": [ - "7de7fcaeb10ef209ece63ad346f668e1c634c4db", + "447002dca1fa35816fdd24c74dd761c1d48cf028", "testharness" ], "webrtc/RTCRtpCapabilities-helper.js": [ @@ -731029,7 +745569,7 @@ "testharness" ], "webrtc/RTCRtpSender-setStreams.https.html": [ - "08592da4d528889565825f9147d789c89b7e18fc", + "45b47d06a6c9c2956f93ae09379f68ecfa565591", "testharness" ], "webrtc/RTCRtpSender-transport.https.html": [ @@ -731041,7 +745581,7 @@ "testharness" ], "webrtc/RTCRtpTransceiver-setCodecPreferences.html": [ - "c553c9d8bc79640c23ec803552f973012a801bb5", + "dff1eb2c5820bd60412382b1e5a908be33328087", "testharness" ], "webrtc/RTCRtpTransceiver-stop.html": [ @@ -731073,7 +745613,7 @@ "support" ], "webrtc/RTCTrackEvent-constructor.html": [ - "a0c031eaa5a25729639d2595f1a5748ae59955cb", + "c9105e693af6661c74ba868858732a29d2b84096", "testharness" ], "webrtc/RTCTrackEvent-fire.html": [ @@ -731225,7 +745765,7 @@ "testharness" ], "websockets/Close-Reason-124Bytes.any.js": [ - "357748a7c4df65f34c00fafa4a96a3a427fa2508", + "d7fcdcb10c9474bd0b2cd4a5293991711f144918", "testharness" ], "websockets/Close-reason-unpaired-surrogates.any.js": [ @@ -731241,7 +745781,7 @@ "testharness" ], "websockets/Create-Secure-url-with-space.any.js": [ - "f6ca19e04726a428fd8c635dc65919ca953c0479", + "1ff0d25927114c7c6064ad4080378e391e919520", "testharness" ], "websockets/Create-Secure-valid-url-array-protocols.any.js": [ @@ -731269,7 +745809,7 @@ "testharness" ], "websockets/Create-asciiSep-protocol-string.any.js": [ - "37657f18dfca8fee3157c48e88798bdbc41f68c3", + "e3f55fbc93020a85ee351334a5b4bcab19756b25", "testharness" ], "websockets/Create-blocked-port.any.js": [ @@ -731277,15 +745817,15 @@ "testharness" ], "websockets/Create-invalid-urls.any.js": [ - "5ae25a2cdc00c7f308b65a10d670fdf4e8f3582c", + "5fe0bf4fba82fccdb129ae144d495c592eff1223", "testharness" ], "websockets/Create-non-absolute-url.any.js": [ - "9ac9707209f9b9bc6a22ea1637783c0aed8f2222", + "543ba3731675c6866dbe9f3c4778414fb12c92f2", "testharness" ], "websockets/Create-nonAscii-protocol-string.any.js": [ - "631699413a357caf1ed950f460d484cfeda63ebd", + "85a8d368917c466dc6ca3b6d3dac0bfe801fb58d", "testharness" ], "websockets/Create-on-worker-shutdown.any.js": [ @@ -731293,15 +745833,15 @@ "testharness" ], "websockets/Create-protocol-with-space.any.js": [ - "18f6815a489a8af0b671d9111c11210f306d0567", + "e7c1bea4de345a81ce2da4f17d98ca737634ae7f", "testharness" ], "websockets/Create-protocols-repeated-case-insensitive.any.js": [ - "1d59015e05835074a9bf4642fe8a40850675bf64", + "0b9bfecdc724f10d0c251bf897999e1ffd19bef6", "testharness" ], "websockets/Create-protocols-repeated.any.js": [ - "bdaf5606a8b16a4b9a65d0326ba1e0ab3eb330e2", + "67cfa1f122ff4eea01b38e9fb2247bb005bc4689", "testharness" ], "websockets/Create-valid-url-array-protocols.any.js": [ @@ -731325,7 +745865,7 @@ "testharness" ], "websockets/Create-wrong-scheme.any.js": [ - "78ff7394622edfce754d6649d478e547a77e57c5", + "affe346d6e1caa6347abb165e3774d08ed45bf42", "testharness" ], "websockets/META.yml": [ @@ -731353,11 +745893,11 @@ "testharness" ], "websockets/Secure-Close-1005.any.js": [ - "f5f2cbf6e6616e7c596789ba6bb1339fe358b0bc", + "dc0d0550f23aa20b36893df00465b21a31e924ad", "testharness" ], "websockets/Secure-Close-2999-reason.any.js": [ - "ee1c756694ba258d9c8f05f469c0e94f0e4aaf53", + "f90a95acf7fa0ea52d26bd727a46adbd5e38e3f5", "testharness" ], "websockets/Secure-Close-3000-reason.any.js": [ @@ -731373,7 +745913,7 @@ "testharness" ], "websockets/Secure-Close-Reason-124Bytes.any.js": [ - "0786c295e760c3af2cb4994267974f62c6f004c1", + "aaaac8e113b66d8f512fb9be19a22a03a3c15fea", "testharness" ], "websockets/Secure-Close-Reason-Unpaired-surrogates.any.js": [ @@ -731381,7 +745921,7 @@ "testharness" ], "websockets/Secure-Close-onlyReason.any.js": [ - "029b8d8af8ef8517fad73cfeec84131aef8d1583", + "66e8a7f68861ddb12dc266641f580d95cb35982b", "testharness" ], "websockets/Secure-Close-readyState-Closed.any.js": [ @@ -731477,7 +746017,7 @@ "testharness" ], "websockets/Send-before-open.any.js": [ - "b2f1ea9c3aa856e5e0ace17ff4ff3a69d6cf57fd", + "fed8f519932a156fbe63eac240351e693636b2b3", "testharness" ], "websockets/Send-binary-65K-arraybuffer.any.js": [ @@ -731549,7 +746089,7 @@ "testharness" ], "websockets/close-invalid.any.js": [ - "8ac1da3f5de56974a1cea4a172a15c28d6047565", + "32d6d5d3e295baa9523cad4f3becb6ffb72125a7", "testharness" ], "websockets/closing-handshake/002.html": [ @@ -731573,15 +746113,15 @@ "testharness" ], "websockets/constructor/001.html": [ - "2a868bfa0d37a3bb92b1847e080b1437a2a5a229", + "b82d941c7787d01c82cdc90ef4fa04478201b42e", "testharness" ], "websockets/constructor/002.html": [ - "94015979b0a19d1dbb76f15a8347e408ab0061a7", + "59ac675cc58e8b54704aa37f91c13a5e95ec905a", "testharness" ], "websockets/constructor/004.html": [ - "f358021541b2fbd476d34b395153862797c9961e", + "f0cd3418c88945b05426933b30d1462abdef3b0c", "testharness" ], "websockets/constructor/005.html": [ @@ -731593,7 +746133,7 @@ "testharness" ], "websockets/constructor/007.html": [ - "6f141a541865545f89c3ec9aa3604fa8bb24f257", + "4c8a7cd7f3c9ff7702c8a2adc76d27bd4d743c32", "testharness" ], "websockets/constructor/008.html": [ @@ -731645,7 +746185,7 @@ "testharness" ], "websockets/constructor/021.html": [ - "80156540f7a0722432a64ba3fe32b3368494a76b", + "209b262f98579257b5032f443e4680f92d919074", "testharness" ], "websockets/constructor/022.html": [ @@ -731909,11 +746449,11 @@ "testharness" ], "websockets/interfaces/WebSocket/constants/005.html": [ - "b3c2e932e6d08c11b964040005564fe822e0d572", + "8f17deb3785fc0f8856db9b2dac2073bd896a352", "testharness" ], "websockets/interfaces/WebSocket/constants/006.html": [ - "702193456477816e2a799c71245e1adb17de1397", + "0396687736a25eca203d514e6aa302bca3b2d2b8", "testharness" ], "websockets/interfaces/WebSocket/events/001.html": [ @@ -732033,7 +746573,7 @@ "testharness" ], "websockets/interfaces/WebSocket/send/001.html": [ - "3a22420ad6cb273e00f1ddf53fb55146247252c0", + "829a4ed7610f8db52fa0c736d5c7984b6526c522", "testharness" ], "websockets/interfaces/WebSocket/send/002.html": [ @@ -732041,11 +746581,11 @@ "testharness" ], "websockets/interfaces/WebSocket/send/003.html": [ - "08aadbf4665b73a02d8e0aec3c228c71ef05e080", + "0077b4020055dd7ca8941cbb85540f913a6b0370", "testharness" ], "websockets/interfaces/WebSocket/send/004.html": [ - "af906b55333168a73b527b6f24e4c44746ffbe49", + "f454f0cda59b152f1fff42f51def6adf21588a0d", "testharness" ], "websockets/interfaces/WebSocket/send/005.html": [ @@ -732181,11 +746721,11 @@ "testharness" ], "websockets/stream-tentative/close.any.js": [ - "ddcdc2b2c8f62682f395551be1272b624876ce32", + "1442d821148119a07889f3087edd02d78cbe3b8e", "testharness" ], "websockets/stream-tentative/constructor.any.js": [ - "12a24f25f2cc50c9437c7e59c4997774d023a101", + "a5401b30bfc1519aacfb62ea850f34d6dc386faf", "testharness" ], "websockets/stream-tentative/resources/url-constants.js": [ @@ -732353,7 +746893,7 @@ "testharness" ], "webstorage/missing_arguments.html": [ - "38c52cf62754d5ee4092356104daca544a9f5be7", + "1c8a1a4481581820da2b22210c4394bd6b6b97ac", "testharness" ], "webstorage/resources/event_body_handler.html": [ @@ -732457,7 +746997,7 @@ "manual" ], "webstorage/storage_local_setitem_quotaexceedederr.html": [ - "b547f3046d1918f5625a85b05963785c441bae58", + "b55ace2fa21ff5689a11a7e86c3579dea5d66076", "testharness" ], "webstorage/storage_local_window_open.html": [ @@ -732473,7 +747013,7 @@ "manual" ], "webstorage/storage_session_setitem_quotaexceedederr.html": [ - "285a4bea2b55272012249bc92abc98c84ef9f4e6", + "7096c1610c7f3b9b54acf57c259bc6b083c0f55d", "testharness" ], "webstorage/storage_session_window_noopener.html": [ @@ -732489,7 +747029,7 @@ "testharness" ], "webstorage/storage_setitem.html": [ - "fa38284fd018923b114f5fe091390776cd86db4b", + "be82df1ecdb06779adf9c99f3e3bf3b46f73f1c3", "testharness" ], "webstorage/storage_string_conversion.html": [ @@ -732601,7 +747141,7 @@ "testharness" ], "webusb/usbConnectionEvent.https.any.js": [ - "9d4f60abc48733da6bf06ed7673228fb4a31d628", + "349fd9b75f3b60160d8d410fb1c81a192f3c1e36", "testharness" ], "webusb/usbDevice-iframe.https.html": [ @@ -732621,7 +747161,7 @@ "testharness" ], "webusb/usbInTransferResult.https.any.js": [ - "4cdb58e467b5770f5a08329ac59c209bde56fa60", + "c8f65f1737a5cd208273123c83322b6962a64142", "testharness" ], "webusb/usbInterface.https.any.js": [ @@ -732629,23 +747169,23 @@ "testharness" ], "webusb/usbIsochronousInTransferPacket.https.any.js": [ - "ee992f998b6078d6d65dfcfd4b5e33a31dcae10f", + "55543d11f8c6e972b7ca3ee2444c1d618f15b960", "testharness" ], "webusb/usbIsochronousInTransferResult.https.any.js": [ - "25c128a76cc1a3fe6f39869ea657368acc21529b", + "0aa57d00e6de4623bb7c06570ebe79380a653688", "testharness" ], "webusb/usbIsochronousOutTransferPacket.https.any.js": [ - "d99c85651942b0ad8857f421d7e44028dbcc8b7a", + "2747a6fa0a480f98f632c20dbd8e2d772cddd648", "testharness" ], "webusb/usbIsochronousOutTransferResult.https.any.js": [ - "13b94322ed22726521fe9b165a19cfe8dae5ca9d", + "692420d948191998a1251b164ca917a86f3264dc", "testharness" ], "webusb/usbOutTransferResult.https.any.js": [ - "f880a43ea1c590e24724408565245946ebef519e", + "200c0716eb2ebf0fead8a6bbc0c27476dbe72e5a", "testharness" ], "webvr/META.yml": [ @@ -732733,7 +747273,7 @@ "testharness" ], "webvtt/api/VTTCue/position.html": [ - "4bbf54ea7b3e1fd586ed43ce94286b171af96e4b", + "c0485e7a799190a785c4ab8bc785f9ac8ff39c89", "testharness" ], "webvtt/api/VTTCue/positionAlign.html": [ @@ -732745,7 +747285,7 @@ "testharness" ], "webvtt/api/VTTCue/size.html": [ - "26a26f0a8c0077a4fc70e4e585d24034b6411528", + "fdb8059c72f7600a9dd9be5a63457e9412780105", "testharness" ], "webvtt/api/VTTCue/snapToLines.html": [ @@ -732761,7 +747301,7 @@ "testharness" ], "webvtt/api/VTTRegion/constructor.html": [ - "cddde0a07170942307936b236cdbb8a24953aa16", + "a427f4f7d6339cb417feb501943db29c90530419", "testharness" ], "webvtt/api/VTTRegion/id.html": [ @@ -732777,11 +747317,11 @@ "testharness" ], "webvtt/api/VTTRegion/regionAnchorX.html": [ - "acdb9ef239e9610be2290ef77602bb05b8f76887", + "f7663366cbf764ddce4ecdc32662f905c0106d46", "testharness" ], "webvtt/api/VTTRegion/regionAnchorY.html": [ - "9e4728846c8104636a5e082814bee0ab1f197bfc", + "174ff678901295c0c5115ed93e9357e33bb076be", "testharness" ], "webvtt/api/VTTRegion/scroll.html": [ @@ -732789,15 +747329,15 @@ "testharness" ], "webvtt/api/VTTRegion/viewportAnchorX.html": [ - "8adf7ba02a5af891a77571d3135bab899517734e", + "0786585d468560150b92bd8c16694eef77d38c32", "testharness" ], "webvtt/api/VTTRegion/viewportAnchorY.html": [ - "cdbe793f66773e75b34d19fffff1352ce1fb248f", + "de43567b62749e625139c8d4f01c5ccdf73a4d07", "testharness" ], "webvtt/api/VTTRegion/width.html": [ - "fdc663f86a7f5ae20fb9ed707ce41426d9435ea1", + "97c1c7395600d1fa11cd282d241edc2181762e42", "testharness" ], "webvtt/api/categories.json": [ @@ -735869,7 +750409,7 @@ "testharness" ], "webxr/events_session_select.https.html": [ - "396d6b23939f96a2f29151eac21548cd97f92009", + "bc501b693497ddf58ccabd4491858263c4dfbdbc", "testharness" ], "webxr/events_session_select_subframe.https.html": [ @@ -736013,7 +750553,7 @@ "testharness" ], "webxr/xrDevice_requestSession_no_mode.https.html": [ - "5ef249c58186131f8e467da48cfafebe65df9adf", + "9c1ebb7efd7bfc0b51873df5143530322f42840a", "testharness" ], "webxr/xrDevice_requestSession_non_immersive_no_gesture.https.html": [ @@ -736037,7 +750577,7 @@ "testharness" ], "webxr/xrFrame_lifetime.https.html": [ - "2d706d24848a29ee9ad5f3d309f809b803f5c8ca", + "7c71f0af3dda960bb4c723e4cd8a1267db45a3e6", "testharness" ], "webxr/xrFrame_session_sameObject.https.html": [ @@ -736077,7 +750617,7 @@ "testharness" ], "webxr/xrRigidTransform_constructor.https.html": [ - "15a7f2b5771a78dba2036ec46933e826c9a54355", + "5e055efc41b74fc968b097610e8deba38f2642df", "testharness" ], "webxr/xrRigidTransform_inverse.https.html": [ @@ -736221,7 +750761,7 @@ "testharness" ], "workers/SharedWorker-constructor.html": [ - "2bfe7d9b87adfe927517a0a3af6d614d8837964d", + "5347891d41855aaa5d1398d0b0fe53cc9c2fda3d", "testharness" ], "workers/SharedWorker-detach-frame-in-error-event.html": [ @@ -736277,7 +750817,7 @@ "testharness" ], "workers/Worker-formdata.any.js": [ - "3ee42d9f4b76228bc25a89d0fb8a1c653139e45a", + "f14d4ff41a2419e464d6887513b89cc982cfd0f3", "testharness" ], "workers/Worker-location.sub.any.js": [ @@ -736289,7 +750829,7 @@ "testharness" ], "workers/Worker-multi-port.html": [ - "138f8f02d4e722509905f01cd64bfb93b997f9bd", + "725745b0ea4498ec3eec8811b51f692c555f21df", "testharness" ], "workers/Worker-nested-importScripts-error.html": [ @@ -736505,7 +751045,7 @@ "testharness" ], "workers/Worker_cross_origin_security_err.htm": [ - "1a5e260c18b4de298e02c234316322c3a3c71cc2", + "8417adbefdad83678b06cdb076696e19b70c32a0", "testharness" ], "workers/Worker_dispatchEvent_ErrorEvent.htm": [ @@ -736701,7 +751241,7 @@ "support" ], "workers/constructors/SharedWorker/no-arguments-ctor.html": [ - "eaee870db0e14c0c68533f98ee63b7c3a580eeeb", + "c189e556019d8d761a43fbb6259368164ca7c19c", "testharness" ], "workers/constructors/SharedWorker/null": [ @@ -736737,7 +751277,7 @@ "testharness" ], "workers/constructors/SharedWorker/same-origin.html": [ - "66747b22fbb30e64d8f6d627c1c1b6e03d53d472", + "1fc76d5f5e46faceda09afcacce7c1b834834d44", "testharness" ], "workers/constructors/SharedWorker/setting-port-members.html": [ @@ -736753,7 +751293,7 @@ "support" ], "workers/constructors/SharedWorker/undefined-arguments.html": [ - "b9a3b3692c349d6b17191d961d3744080d08ceab", + "bc0a75bcfeb95a6a62627f66688ce52441dc956e", "testharness" ], "workers/constructors/SharedWorker/undefined.headers": [ @@ -736769,7 +751309,7 @@ "support" ], "workers/constructors/SharedWorker/unresolvable-url.html": [ - "2ca3d93d3e8fa2a16a557370fe85bca3952e1713", + "c392d0e1f7dc2e846456b5ab32bd534cf9f7a012", "testharness" ], "workers/constructors/Worker/1": [ @@ -736797,7 +751337,7 @@ "testharness" ], "workers/constructors/Worker/Worker-constructor.html": [ - "e073df76f36f0117cdf61e04f05cc8cb0f5530ff", + "524a0982a9e532c1e5be01a526ed61bd6a0e58de", "testharness" ], "workers/constructors/Worker/ctor-1.html": [ @@ -736825,7 +751365,7 @@ "support" ], "workers/constructors/Worker/same-origin.html": [ - "6df5e92fda37a9e78d60426c01b60ede512d47de", + "cdc36c17183fb161e281865f160ab27e35f0ed1e", "testharness" ], "workers/constructors/Worker/sample_worker/worker.js": [ @@ -736893,7 +751433,7 @@ "testharness" ], "workers/importscripts_mime.any.js": [ - "04c63a3a5f6d9bd3b71d94142f65a1825358b8ed", + "d7e215853f4d924a75df076e36dba3ead6fd6ee2", "testharness" ], "workers/interfaces/DedicatedWorkerGlobalScope/EventTarget.worker.js": [ @@ -737181,7 +751721,7 @@ "testharness" ], "workers/interfaces/WorkerUtils/importScripts/002.worker.js": [ - "2cecbcb53525691cefa687d8e7cb3302eeeb1d6c", + "1cacee5ccb5e3322e01c6e67b879d4c55f5d053f", "testharness" ], "workers/interfaces/WorkerUtils/importScripts/003.html": [ @@ -737357,11 +751897,11 @@ "testharness" ], "workers/modules/dedicated-worker-import-failure.html": [ - "5e8b152195a354022943ae9404bb4473d3cd0c0d", + "33eeea261893bc2d920bb348efff7a07f264729f", "testharness" ], "workers/modules/dedicated-worker-import-meta.html": [ - "4ed56e279f7d558ca5d75c6cbe969ba41b2d52dd", + "cff8e91488e8239abe213619d12d5a603072fbea", "testharness" ], "workers/modules/dedicated-worker-import-referrer.html": [ @@ -737381,7 +751921,7 @@ "support" ], "workers/modules/dedicated-worker-options-type.html": [ - "74523f4478b4209d4de060e98553946896fdecb7", + "bb37a18f2cc93312fd10fd7e0ed64d7be738a45f", "testharness" ], "workers/modules/resources/credentials.py": [ @@ -737393,7 +751933,7 @@ "support" ], "workers/modules/resources/dynamic-import-given-url-worker.js": [ - "2ea88b8071875a431cb4b40225facd1adf6d5644", + "55102759352c5564e832e37bb8c7f0e7bd007f4d", "support" ], "workers/modules/resources/dynamic-import-remote-origin-credentials-checker-worker.sub.js": [ @@ -737452,8 +751992,12 @@ "cb762eff806849df46dc758ef7b98b63f27f54c9", "support" ], + "workers/modules/resources/import-meta-url-export.js": [ + "5287b2e9e8492e23d082a43ceb588a331fa3c924", + "support" + ], "workers/modules/resources/import-meta-url-worker.js": [ - "9d909778eda0e3a6082b6f93a8fabf36a82b9267", + "7887836a6cc1a5c321ebbe2efa0e5724796c281c", "support" ], "workers/modules/resources/import-scripts-worker.js": [ @@ -737521,7 +752065,11 @@ "testharness" ], "workers/modules/shared-worker-import-failure.html": [ - "0e0b9b306314fd96b48e0007918935bc56df2d53", + "718ea650ec7d5f5a2beb192a901f186b29187dc6", + "testharness" + ], + "workers/modules/shared-worker-import-meta.html": [ + "44cd9df9ee7097abfee68b01a8868249bee63f3b", "testharness" ], "workers/modules/shared-worker-import.any.js": [ @@ -737529,7 +752077,7 @@ "testharness" ], "workers/modules/shared-worker-options-type.html": [ - "25b793c631de2899d6ddc73900716328ea8837f9", + "fb46ab5be7ec74866a1e5232387b14c49cfdbdc9", "testharness" ], "workers/name-property.html": [ @@ -737621,7 +752169,7 @@ "testharness" ], "workers/postMessage_clone_port_error.htm": [ - "30012962d8606917b7c9f731c910427b71d47a47", + "3558987476bdd89dde27e5958c2de39679656f4c", "testharness" ], "workers/postMessage_event_properties.htm": [ @@ -737629,7 +752177,7 @@ "testharness" ], "workers/postMessage_ports_readonly_array.htm": [ - "0645ea7ef5f8920bbb03e8024509026d5e303bf5", + "bd833ede9361de0efe75e928ef14a20c52092b28", "testharness" ], "workers/postMessage_target_source.htm": [ @@ -737925,7 +752473,7 @@ "support" ], "workers/support/ImportScriptsNosniffErr.js": [ - "fefbfc736735ec69634ec79ca25fb4a548f799bc", + "22dc9c1ba57c9575cda4758447d04adec386ac56", "support" ], "workers/support/SharedWorker-common.js": [ @@ -738321,7 +752869,7 @@ "support" ], "wpt": [ - "a24bc83a9197a1561ddf28c8116c0cb10bcde70e", + "37ab5409ec798ac44f97eec1cc90e3207cdd78ad", "support" ], "wpt.py": [ @@ -738337,7 +752885,7 @@ "support" ], "x-frame-options/deny.sub.html": [ - "626f2043f328bb4f3fd883a87f018fad55bf5f7e", + "dd8afe8079a0096295881c15db95a97d5f25c7b6", "testharness" ], "x-frame-options/invalid.sub.html": [ @@ -738369,11 +752917,11 @@ "support" ], "x-frame-options/support/xfo.py": [ - "e8d8c4eafbc56ef6850403889e89ac0bb0cfe015", + "619cf553e46bb72d42bccaf0d87008804f46eed3", "support" ], "xhr/FormData-append.html": [ - "a10244fa23d475a6fc4cb6fe2b15f869c3081218", + "c64b93cbc7ef82c36abced4cc1d5c1cf60f1b2f9", "testharness" ], "xhr/META.yml": [ @@ -738385,7 +752933,7 @@ "support" ], "xhr/XMLHttpRequest-withCredentials.any.js": [ - "96e95c90faf0645dfad09c24a80ed4b8cd5a4880", + "27ffa70d5b9ecb4cb14f1e097347e61e3430adbd", "testharness" ], "xhr/abort-after-receive.any.js": [ @@ -738517,15 +753065,15 @@ "testharness" ], "xhr/access-control-basic-denied.htm": [ - "535762d0edafe1d58510f43f1296d1d9662c8b24", + "970e09d0f57cff971bb4462bd4ebaed69eb78adf", "testharness" ], "xhr/access-control-basic-get-fail-non-simple.htm": [ - "a4fe23460d12d7d3cd907464257df98edd29aa9f", + "97370bd650241e2efe799dde37d13099bee96cc3", "testharness" ], "xhr/access-control-basic-non-cors-safelisted-content-type.htm": [ - "062f8b0bb5b466c264b80f8f983c94d49cc1b9aa", + "0e0e971fd4b5c1f8139fe52e41ddf77ccb304654", "testharness" ], "xhr/access-control-basic-post-success-no-content-type.htm": [ @@ -738533,7 +753081,7 @@ "testharness" ], "xhr/access-control-basic-post-with-non-cors-safelisted-content-type.htm": [ - "0a6df932aa44e64b6025b4055137f212d111fe32", + "f63e6bc924e26e6aafd10f220300629320a65cfd", "testharness" ], "xhr/access-control-basic-preflight-denied.htm": [ @@ -738601,15 +753149,15 @@ "testharness" ], "xhr/access-control-preflight-sync-header-denied.htm": [ - "7948c18a2efcc6c02d76f683a3dbb5fa2558c8ae", + "8697f1ede95b0178aaeb0584004dfff6aecb5c5f", "testharness" ], "xhr/access-control-preflight-sync-method-denied.htm": [ - "a54c308d9f1190ea23a0df460f78fe76964c018e", + "0ca6c5cdf4a08b925299aec08cb1114fefcaf288", "testharness" ], "xhr/access-control-preflight-sync-not-supported.htm": [ - "bb08296304f9ef619ef4b581fdf116953f1f3166", + "f5df4a2d4b57a7b2a35fe6b936dc35721632cf93", "testharness" ], "xhr/access-control-recursive-failed-request.htm": [ @@ -738729,7 +753277,7 @@ "support" ], "xhr/formdata-blob.htm": [ - "5efef7b615bbfa7dc54891fe40405c0f62eb98e2", + "92cee55cd2f80f15de2684ebfc129a5a6b1d38f3", "testharness" ], "xhr/formdata-delete.htm": [ @@ -738749,11 +753297,11 @@ "testharness" ], "xhr/formdata-set.htm": [ - "ee43e1569f1958e5c71f14a3bd89b75756d6a85c", + "d46e44a916fd20cb9ba94b1ac5c2481659ec7cdc", "testharness" ], "xhr/formdata.htm": [ - "699c11ab7838a32a3e62460f13a2a427d8d81707", + "675203cb1af76d71242381d49efc133a5d5384c1", "testharness" ], "xhr/getallresponseheaders-cookies.htm": [ @@ -738809,7 +753357,7 @@ "testharness" ], "xhr/headers-normalize-response.htm": [ - "84f2fc8582127b9a8e271887d420b3ea7a87696a", + "3d472f688cf6d9836fad2045784f5705d9f532f3", "testharness" ], "xhr/historical.html": [ @@ -738821,7 +753369,7 @@ "testharness" ], "xhr/loadstart-and-state.html": [ - "460b2bfc99085b1d6b900860f3250f0f6ac70262", + "8b344a58f81f5d6d71de701ec414d5b12467372b", "testharness" ], "xhr/no-utf16-json.htm": [ @@ -738853,7 +753401,7 @@ "testharness" ], "xhr/open-method-bogus.htm": [ - "263e7b6db7eb1581028bad1c742627d597e90540", + "13bb18bf5c4fae5632d9f076fe93bc65811e1250", "testharness" ], "xhr/open-method-case-insensitive.htm": [ @@ -738865,11 +753413,11 @@ "testharness" ], "xhr/open-method-insecure.htm": [ - "1a77ff3ec7973005982544d1781470a2cd7d0df1", + "a6bf4422481feff2677547c7ab5c64b4b224b812", "testharness" ], "xhr/open-method-responsetype-set-sync.htm": [ - "0b4d814041c525285999186a7b3d5074235e1f7b", + "7858c91409e7e7cb51695f6d233de0d01554a604", "testharness" ], "xhr/open-open-send.htm": [ @@ -738933,11 +753481,11 @@ "testharness" ], "xhr/open-url-multi-window-2.htm": [ - "ed4ba01576b59b1cf25a580c05b3a6383d5d16c1", + "fdd91016db8c3ecc93bafee43dade4aea2a44ea2", "testharness" ], "xhr/open-url-multi-window-3.htm": [ - "344434b0e7c694ccb52bc9a63ab5e5bef3f21f24", + "cfce8310dc42b916ed958e69f0b4761c694f2619", "testharness" ], "xhr/open-url-multi-window-4.htm": [ @@ -738945,11 +753493,11 @@ "testharness" ], "xhr/open-url-multi-window-5.htm": [ - "a27d2b366c0680d2a30cbb107c3496abb0264908", + "40a3429fbb472a7396bc7d0475cd0f6b0c23e6e7", "testharness" ], "xhr/open-url-multi-window-6.htm": [ - "99279639921d9a594c15014f5c429ee6ae7a215d", + "d834a048a51d183bb82bdd43276740a4f894ceb4", "testharness" ], "xhr/open-url-multi-window.htm": [ @@ -738981,7 +753529,7 @@ "testharness" ], "xhr/overridemimetype-done-state.any.js": [ - "bdf49e1ca52e76eff6b07c12e10a0320417236a0", + "5e7049243657d45ac9da42f234328733eb5cfc12", "testharness" ], "xhr/overridemimetype-edge-cases.window.js": [ @@ -738997,7 +753545,7 @@ "testharness" ], "xhr/overridemimetype-loading-state.htm": [ - "cce3fa49ef752c6e66ba10500b35053316de6c13", + "06e4d5fec1ef1ba0cbf885fd3585889881ca5c64", "testharness" ], "xhr/overridemimetype-open-state-force-utf-8.htm": [ @@ -739025,7 +753573,7 @@ "testharness" ], "xhr/progressevent-interface.html": [ - "850d1b23dcfa2662b2ffce3c1968d1f92eaaf188", + "7552ff73d3f44997723674da0407bf59ab3f91c4", "testharness" ], "xhr/resources/accept-language.py": [ @@ -739341,11 +753889,11 @@ "support" ], "xhr/resources/send-after-setting-document-domain-window-2.htm": [ - "073268c21c7e84fbcbe539a6a45476dc757d0564", + "cd9f0c6bb7044f569db1f87c1abb9ec99b1ab32f", "support" ], "xhr/resources/send-after-setting-document-domain-window-helper.js": [ - "f5c762b042b70a27734157e0ca7d4d868f25147b", + "0c239cfdbcd5a44533e367311dd413b5e66da0b7", "support" ], "xhr/resources/shift-jis-html.py": [ @@ -739493,7 +754041,7 @@ "testharness" ], "xhr/responsetype.any.js": [ - "88bd9189ebed0317904fad4240888a23cca272ce", + "444c3e3d169a0a2680bd0501b8859b7ca97b4250", "testharness" ], "xhr/responseurl.html": [ @@ -739517,7 +754065,7 @@ "testharness" ], "xhr/responsexml-non-document-types.htm": [ - "84d90a8d35ae1d3da3494cd2681ed1ef8b7debc6", + "6d7feea7530eef7285b6625b7b1d687059fe0033", "testharness" ], "xhr/responsexml-non-well-formed.htm": [ @@ -739541,7 +754089,7 @@ "testharness" ], "xhr/send-authentication-basic-cors-not-enabled.htm": [ - "68ad5e95ed870f9b09401e8417df70116c0336af", + "2e7cbaf034048d3b73c905048b090546bee43ca1", "testharness" ], "xhr/send-authentication-basic-cors.htm": [ @@ -739625,7 +754173,7 @@ "testharness" ], "xhr/send-data-es-object.any.js": [ - "d98a4ca65aa6b2f3f4043f09742354e6b12ff833", + "c6fe5de260c212013052f66636b92fb07aa82373", "testharness" ], "xhr/send-data-formdata.any.js": [ @@ -739633,11 +754181,11 @@ "testharness" ], "xhr/send-data-readablestream.any.js": [ - "cca6e76a042cc8a5b55e1ead306ddaf9467b8c09", + "c53b1071828f95669d41a967c51bd352b389bebb", "testharness" ], "xhr/send-data-unexpected-tostring.htm": [ - "b8a3b4ae6902357cfe392c484e8413bff1729061", + "290ae2065fc0fe91395276496a3dedfd2cd7872e", "testharness" ], "xhr/send-entity-body-basic.htm": [ @@ -739673,7 +754221,7 @@ "testharness" ], "xhr/send-network-error-sync-events.sub.htm": [ - "b9f4fdf99de7cb6b9e5da86e1b513d8da1eb8a6d", + "2266eb36e1e3791a4fa1b70ea084cc6fcead926d", "testharness" ], "xhr/send-no-response-event-loadend.htm": [ @@ -739689,7 +754237,7 @@ "testharness" ], "xhr/send-non-same-origin.htm": [ - "6dbbca7477d2fa0ebd1132e23bd1a2565d550ea2", + "bb9f32c174f8883ad928858a1d2696db11d33136", "testharness" ], "xhr/send-receive-utf16.htm": [ @@ -739697,7 +754245,7 @@ "testharness" ], "xhr/send-redirect-bogus-sync.htm": [ - "a9dc73e5fd754f3e2193bd13d70ed0cca5983cd2", + "0f0598b1645451a5fb0dada58e8fab0678868ad7", "testharness" ], "xhr/send-redirect-bogus.htm": [ @@ -739705,7 +754253,7 @@ "testharness" ], "xhr/send-redirect-infinite-sync.htm": [ - "6e9e47e55fc9f84d480623ff75fe0dc3b51eaea0", + "cc6d7a24bf63146dbfe4057f5e7e925d94b5a36c", "testharness" ], "xhr/send-redirect-infinite.htm": [ @@ -739749,7 +754297,7 @@ "testharness" ], "xhr/send-send.any.js": [ - "2bfe40436f4a6ba8c3adc152c186a7b6d272b114", + "64b1554180973a42993660af792688958899716e", "testharness" ], "xhr/send-sync-blocks-async.htm": [ @@ -739785,7 +754333,7 @@ "testharness" ], "xhr/setrequestheader-after-send.htm": [ - "7ccdb3e4c3109091286c02bbea7a5892215714f0", + "174e9ec4196c7eb4b5fae050a4ce9b01a50ee840", "testharness" ], "xhr/setrequestheader-allow-empty-value.htm": [ @@ -739797,15 +754345,15 @@ "testharness" ], "xhr/setrequestheader-before-open.htm": [ - "cbe4b299c9dac18154340493073e7419b0773cb8", + "5c377fbc10076a2d98bb4bdc46ce2ec8c18ac6af", "testharness" ], "xhr/setrequestheader-bogus-name.htm": [ - "86e55f33a00649cf25c05b04914fb7756ef6bcb9", + "ce2308cc67debb52800153a084af614823f59913", "testharness" ], "xhr/setrequestheader-bogus-value.htm": [ - "15fbb39052526df052af8940cb8db7149302afc4", + "cba341c5dc689336629f525cfe6724ff002e838e", "testharness" ], "xhr/setrequestheader-case-insensitive.htm": [ @@ -739873,7 +754421,7 @@ "testharness" ], "xhr/timeout-sync.htm": [ - "9815532c70ff347199a998f02bf4b11f15c7bcee", + "d8b2cc48f3647d216a3824e1391cd2612419c1f1", "testharness" ], "xhr/xmlhttprequest-basic.htm": [ @@ -739885,7 +754433,7 @@ "testharness" ], "xhr/xmlhttprequest-network-error-sync.htm": [ - "c4a887a1ebee76390dea928f8c56a2c8f34d6ad2", + "ee367fbe0ee245b9f8dfbf6de13297e2b6239bc0", "testharness" ], "xhr/xmlhttprequest-network-error.htm": [ @@ -739973,7 +754521,7 @@ "testharness" ], "xhr/xmlhttprequest-unsent.htm": [ - "eb52d63eef971895f69f1b0151baa457250dd452", + "82282b0163e6ab493de404920c66a626d954c2fe", "testharness" ], "xslt/META.yml": [ diff --git a/tests/wpt/metadata/css/css-regions/animations/animations-001.html.ini b/tests/wpt/metadata/css/css-regions/animations/animations-001.html.ini deleted file mode 100644 index a095b42c651..00000000000 --- a/tests/wpt/metadata/css/css-regions/animations/animations-001.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[animations-001.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-002.html.ini b/tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-002.html.ini deleted file mode 100644 index 5b7ad4fdc4c..00000000000 --- a/tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-002.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[extract-ordered-lists-in-regions-explicit-counters-002.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-003.html.ini b/tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-003.html.ini deleted file mode 100644 index a081500daab..00000000000 --- a/tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-003.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[extract-ordered-lists-in-regions-explicit-counters-003.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-004.html.ini b/tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-004.html.ini deleted file mode 100644 index da163e9c49a..00000000000 --- a/tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-004.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[extract-ordered-lists-in-regions-explicit-counters-004.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-005.html.ini b/tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-005.html.ini deleted file mode 100644 index 2f736712800..00000000000 --- a/tests/wpt/metadata/css/css-regions/counters/extract-ordered-lists-in-regions-explicit-counters-005.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[extract-ordered-lists-in-regions-explicit-counters-005.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/elements/canvas3d-001.html.ini b/tests/wpt/metadata/css/css-regions/elements/canvas3d-001.html.ini deleted file mode 100644 index cc4dc5a7b8d..00000000000 --- a/tests/wpt/metadata/css/css-regions/elements/canvas3d-001.html.ini +++ /dev/null @@ -1,2 +0,0 @@ -[canvas3d-001.html] - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/elements/canvas3d-002.html.ini b/tests/wpt/metadata/css/css-regions/elements/canvas3d-002.html.ini deleted file mode 100644 index bcfb3650944..00000000000 --- a/tests/wpt/metadata/css/css-regions/elements/canvas3d-002.html.ini +++ /dev/null @@ -1,2 +0,0 @@ -[canvas3d-002.html] - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/elements/iframe-001.html.ini b/tests/wpt/metadata/css/css-regions/elements/iframe-001.html.ini deleted file mode 100644 index 93990ef882e..00000000000 --- a/tests/wpt/metadata/css/css-regions/elements/iframe-001.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[iframe-001.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-001.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-001.html.ini deleted file mode 100644 index 9c6b7aae44e..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-001.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-flexbox-001.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-002.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-002.html.ini deleted file mode 100644 index 5651ca16a0d..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-002.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-flexbox-002.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-003.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-003.html.ini deleted file mode 100644 index f02127b72d9..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-003.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-flexbox-003.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-004.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-004.html.ini deleted file mode 100644 index 8bb69746d91..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-flexbox-004.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-flexbox-004.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-001.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-001.html.ini deleted file mode 100644 index 38ca1aa731d..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-001.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-regions-in-autoheight-flexbox-001.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-002.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-002.html.ini deleted file mode 100644 index 68d8b56368b..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-002.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-regions-in-autoheight-flexbox-002.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-003.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-003.html.ini deleted file mode 100644 index 5ecff9ec986..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-003.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-regions-in-autoheight-flexbox-003.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-004.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-004.html.ini deleted file mode 100644 index 5c8d5e3a8e6..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-004.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-regions-in-autoheight-flexbox-004.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-001.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-001.html.ini deleted file mode 100644 index c58116cd25d..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-001.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-regions-in-fixed-sized-flexbox-001.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-002.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-002.html.ini deleted file mode 100644 index 6a4e5f017e5..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-002.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-regions-in-fixed-sized-flexbox-002.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-003.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-003.html.ini deleted file mode 100644 index 61dcc5229bb..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-003.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-regions-in-fixed-sized-flexbox-003.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-004.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-004.html.ini deleted file mode 100644 index 521adaa20dc..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-004.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-regions-in-fixed-sized-flexbox-004.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-005.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-005.html.ini deleted file mode 100644 index 9a5c38264cb..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-005.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-regions-in-fixed-sized-flexbox-005.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-006.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-006.html.ini deleted file mode 100644 index be3e1649be1..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-006.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-regions-in-fixed-sized-flexbox-006.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-007.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-007.html.ini deleted file mode 100644 index 8435b31bf4d..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-007.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-regions-in-fixed-sized-flexbox-007.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-008.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-008.html.ini deleted file mode 100644 index e6b5ab69724..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-008.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[autoheight-regions-in-fixed-sized-flexbox-008.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/column-flexbox-break.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/column-flexbox-break.html.ini deleted file mode 100644 index 033d45918bf..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/column-flexbox-break.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[column-flexbox-break.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-001.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-001.html.ini deleted file mode 100644 index 2a442098b0a..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-001.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-flexbox-001.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-002.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-002.html.ini deleted file mode 100644 index 22dbe68be61..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-002.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-flexbox-002.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-003.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-003.html.ini deleted file mode 100644 index cf0e845e5d5..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-003.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-flexbox-003.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-004.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-004.html.ini deleted file mode 100644 index 44332dcfaa2..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/regions-flexbox-004.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-flexbox-004.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/row-flexbox-break.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/row-flexbox-break.html.ini deleted file mode 100644 index 3570f4cf0c9..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/row-flexbox-break.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[row-flexbox-break.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/flexbox/visibility-regions-in-flexbox.html.ini b/tests/wpt/metadata/css/css-regions/flexbox/visibility-regions-in-flexbox.html.ini deleted file mode 100644 index c8a1e6f7e55..00000000000 --- a/tests/wpt/metadata/css/css-regions/flexbox/visibility-regions-in-flexbox.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[visibility-regions-in-flexbox.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/interactivity/resizing/regions-resizing-003.html.ini b/tests/wpt/metadata/css/css-regions/interactivity/resizing/regions-resizing-003.html.ini deleted file mode 100644 index 343b0afb57d..00000000000 --- a/tests/wpt/metadata/css/css-regions/interactivity/resizing/regions-resizing-003.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-resizing-003.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/interactivity/resizing/regions-resizing-007.html.ini b/tests/wpt/metadata/css/css-regions/interactivity/resizing/regions-resizing-007.html.ini deleted file mode 100644 index db2df3e3038..00000000000 --- a/tests/wpt/metadata/css/css-regions/interactivity/resizing/regions-resizing-007.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-resizing-007.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/interactivity/resizing/regions-resizing-009.html.ini b/tests/wpt/metadata/css/css-regions/interactivity/resizing/regions-resizing-009.html.ini deleted file mode 100644 index fa7511605e1..00000000000 --- a/tests/wpt/metadata/css/css-regions/interactivity/resizing/regions-resizing-009.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-resizing-009.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-003.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-003.html.ini deleted file mode 100644 index 2c3588e39c7..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-003.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-003.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-004.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-004.html.ini deleted file mode 100644 index 58ab1b8eb28..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-004.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-004.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-006.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-006.html.ini deleted file mode 100644 index 6586d5936b8..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-006.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-006.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-008.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-008.html.ini deleted file mode 100644 index 1124b07bd53..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-008.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-008.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-009.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-009.html.ini deleted file mode 100644 index 9335b1d9b9b..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-009.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-009.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-011.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-011.html.ini deleted file mode 100644 index 958215a4f96..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-011.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-011.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-012.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-012.html.ini deleted file mode 100644 index 8b58eaf6518..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-012.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-012.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-013.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-013.html.ini deleted file mode 100644 index 726516643b7..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-013.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-013.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-015.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-015.html.ini deleted file mode 100644 index 857b6f6189d..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-015.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-015.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-016.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-016.html.ini deleted file mode 100644 index 24a961db7b8..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-016.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-016.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-017.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-017.html.ini deleted file mode 100644 index aa19077aae4..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-017.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-017.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-019.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-019.html.ini deleted file mode 100644 index 1a1a4ddd3b0..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-019.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-019.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-021.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-021.html.ini deleted file mode 100644 index f0866bb9aa9..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-021.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-021.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-022.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-022.html.ini deleted file mode 100644 index 74a9f40c89d..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-022.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-022.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-023.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-023.html.ini deleted file mode 100644 index e7b0d92af98..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-023.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-023.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-024.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-024.html.ini deleted file mode 100644 index c15d22355a2..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-024.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-024.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-025.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-025.html.ini deleted file mode 100644 index f5a925ceaa7..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-025.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-025.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-026.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-026.html.ini deleted file mode 100644 index fd179d6925b..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-026.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-026.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-027.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-027.html.ini deleted file mode 100644 index c0fb7fbaafa..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-027.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-027.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-028.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-028.html.ini deleted file mode 100644 index 9787f1915c3..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-028.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-028.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-029.html.ini b/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-029.html.ini deleted file mode 100644 index 8028ae6d3f5..00000000000 --- a/tests/wpt/metadata/css/css-regions/multicolumn/regions-multicol-029.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-multicol-029.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-001.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-001.html.ini deleted file mode 100644 index 554a0b38626..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-001.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-001.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-002.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-002.html.ini deleted file mode 100644 index b8201b95185..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-002.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-002.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-003.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-003.html.ini deleted file mode 100644 index 8636e039804..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-003.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-003.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-004.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-004.html.ini deleted file mode 100644 index 62f3783e95e..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-004.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-004.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-005.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-005.html.ini deleted file mode 100644 index 6dff1e9aaba..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-005.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-005.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-006.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-006.html.ini deleted file mode 100644 index 293ba6273f4..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-006.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-006.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-007.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-007.html.ini deleted file mode 100644 index 25582a0fc40..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-007.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-007.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-008.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-008.html.ini deleted file mode 100644 index a7f1633d5a9..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-008.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-008.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-009.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-009.html.ini deleted file mode 100644 index b4b506dff98..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-009.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-009.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-010.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-010.html.ini deleted file mode 100644 index 4a860ddc878..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-010.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-010.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-011.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-011.html.ini deleted file mode 100644 index 255e14a173b..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-011.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-011.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-012.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-012.html.ini deleted file mode 100644 index ee1170bad30..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-012.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-012.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-013.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-013.html.ini deleted file mode 100644 index 66306bece65..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-013.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-013.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-014.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-014.html.ini deleted file mode 100644 index e9232b2ba4f..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-014.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-014.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-015.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-015.html.ini deleted file mode 100644 index 116bbcf9d12..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-015.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-015.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-016.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-016.html.ini deleted file mode 100644 index 260f38a37c5..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-016.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-016.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-018.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-018.html.ini deleted file mode 100644 index 3056ec7e324..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-018.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-018.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-019.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-019.html.ini deleted file mode 100644 index 2db6c7720ae..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-019.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-019.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-020.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-020.html.ini deleted file mode 100644 index 96ac2a1c5a7..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-020.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-020.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-021.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-021.html.ini deleted file mode 100644 index c72a13f5634..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-021.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-021.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-022.html.ini b/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-022.html.ini deleted file mode 100644 index 58ca9043072..00000000000 --- a/tests/wpt/metadata/css/css-regions/transforms/regions-transforms-022.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[regions-transforms-022.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-006.html.ini b/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-006.html.ini new file mode 100644 index 00000000000..1e41a1d6e6b --- /dev/null +++ b/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-006.html.ini @@ -0,0 +1,2 @@ +[white-space-pre-wrap-trailing-spaces-006.html] + expected: FAIL diff --git a/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-007.html.ini b/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-007.html.ini new file mode 100644 index 00000000000..871f3de0ebb --- /dev/null +++ b/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-007.html.ini @@ -0,0 +1,2 @@ +[white-space-pre-wrap-trailing-spaces-007.html] + expected: FAIL diff --git a/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-008.html.ini b/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-008.html.ini new file mode 100644 index 00000000000..74798f57999 --- /dev/null +++ b/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-008.html.ini @@ -0,0 +1,2 @@ +[white-space-pre-wrap-trailing-spaces-008.html] + expected: FAIL diff --git a/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-009.html.ini b/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-009.html.ini new file mode 100644 index 00000000000..d402699f659 --- /dev/null +++ b/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-009.html.ini @@ -0,0 +1,2 @@ +[white-space-pre-wrap-trailing-spaces-009.html] + expected: FAIL diff --git a/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-010.html.ini b/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-010.html.ini new file mode 100644 index 00000000000..c9fbd67ca50 --- /dev/null +++ b/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-010.html.ini @@ -0,0 +1,2 @@ +[white-space-pre-wrap-trailing-spaces-010.html] + expected: FAIL diff --git a/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-011.html.ini b/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-011.html.ini new file mode 100644 index 00000000000..9a188c58a74 --- /dev/null +++ b/tests/wpt/metadata/css/css-text/white-space/white-space-pre-wrap-trailing-spaces-011.html.ini @@ -0,0 +1,2 @@ +[white-space-pre-wrap-trailing-spaces-011.html] + expected: FAIL diff --git a/tests/wpt/metadata/css/css-transforms/transform-scale-hittest.html.ini b/tests/wpt/metadata/css/css-transforms/transform-scale-hittest.html.ini index f8e7e539aae..4a1e8110f6f 100644 --- a/tests/wpt/metadata/css/css-transforms/transform-scale-hittest.html.ini +++ b/tests/wpt/metadata/css/css-transforms/transform-scale-hittest.html.ini @@ -2,6 +2,3 @@ [Hit test intersecting scaled box] expected: FAIL - [Hit test within unscaled box] - expected: FAIL - diff --git a/tests/wpt/metadata/css/css-values/ch-pseudo-recalc-on-font-load.html.ini b/tests/wpt/metadata/css/css-values/ch-pseudo-recalc-on-font-load.html.ini new file mode 100644 index 00000000000..0b86720af14 --- /dev/null +++ b/tests/wpt/metadata/css/css-values/ch-pseudo-recalc-on-font-load.html.ini @@ -0,0 +1,17 @@ +[ch-pseudo-recalc-on-font-load.html] + expected: ERROR + [ch in pseudo-element ::first-letter should be recalculated after loading a web font] + expected: FAIL + + [ch in pseudo-element ::marker should be recalculated after loading a web font] + expected: FAIL + + [ch in pseudo-element ::after should be recalculated after loading a web font] + expected: FAIL + + [ch in pseudo-element ::first-line should be recalculated after loading a web font] + expected: FAIL + + [ch in pseudo-element ::before should be recalculated after loading a web font] + expected: FAIL + diff --git a/tests/wpt/metadata/css/css-values/lh-rlh-on-root-001.html.ini b/tests/wpt/metadata/css/css-values/lh-rlh-on-root-001.html.ini index a07c3f293a1..1a708ae9c50 100644 --- a/tests/wpt/metadata/css/css-values/lh-rlh-on-root-001.html.ini +++ b/tests/wpt/metadata/css/css-values/lh-rlh-on-root-001.html.ini @@ -17,3 +17,9 @@ [rlh in font-size on root] expected: FAIL + [lh in line-height on root] + expected: FAIL + + [rlh in line-height on root] + expected: FAIL + diff --git a/tests/wpt/metadata/css/cssom-view/CaretPosition-001.html.ini b/tests/wpt/metadata/css/cssom-view/CaretPosition-001.html.ini new file mode 100644 index 00000000000..4c79907309b --- /dev/null +++ b/tests/wpt/metadata/css/cssom-view/CaretPosition-001.html.ini @@ -0,0 +1,4 @@ +[CaretPosition-001.html] + [Element at (400, 100)] + expected: FAIL + diff --git a/tests/wpt/metadata/css/cssom-view/elementFromPoint-001.html.ini b/tests/wpt/metadata/css/cssom-view/elementFromPoint-001.html.ini new file mode 100644 index 00000000000..e38782d8c85 --- /dev/null +++ b/tests/wpt/metadata/css/cssom-view/elementFromPoint-001.html.ini @@ -0,0 +1,4 @@ +[elementFromPoint-001.html] + [CSSOM View - 5 - extensions to the Document interface] + expected: FAIL + diff --git a/tests/wpt/metadata/fetch/content-type/response.window.js.ini b/tests/wpt/metadata/fetch/content-type/response.window.js.ini index f10cc491003..9eed3a29e9a 100644 --- a/tests/wpt/metadata/fetch/content-type/response.window.js.ini +++ b/tests/wpt/metadata/fetch/content-type/response.window.js.ini @@ -312,12 +312,18 @@ [fetch(): separate response Content-Type: text/plain ] expected: NOTRUN - [ -
-

 

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/elements/reference/canvas3d-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/elements/reference/canvas3d-001-ref.html deleted file mode 100644 index d17694470f2..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/elements/reference/canvas3d-001-ref.html +++ /dev/null @@ -1,29 +0,0 @@ - - - - CSS Reftest Reference - - - - - - -

Test passes if you see a cube (with blue, teal and purple sides) inside a black-bordered rectangle and no red.

- -
-
- -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/elements/reference/canvas3d-002-ref.html b/tests/wpt/web-platform-tests/css/css-regions/elements/reference/canvas3d-002-ref.html deleted file mode 100644 index 3c743a3b2c0..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/elements/reference/canvas3d-002-ref.html +++ /dev/null @@ -1,31 +0,0 @@ - - - - CSS Reftest Reference - - - - - - -

Test passes if you see a continuous run of text over a cube (with blue, teal and purple sides) and no red.

- -
- -
-
- Lorem ipsum dolor sit amet, consectetur adipisicing elit. Culpa, veniam, dolorum earum molestias iusto corrupti quaerat unde. Nihil, ex, architecto enim doloremque amet ipsa distinctio quibusdam iste eveniet minima quisquam. -
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/elements/reference/iframe-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/elements/reference/iframe-001-ref.html deleted file mode 100644 index 17d5b5a1f32..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/elements/reference/iframe-001-ref.html +++ /dev/null @@ -1,20 +0,0 @@ - - - - CSS Reftest Reference - - - - -

Test passes if you see horizontal green rectangle and no red.

- -
- -
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/elements/support/3d-filler.html b/tests/wpt/web-platform-tests/css/css-regions/elements/support/3d-filler.html deleted file mode 100644 index 1ff6323f7eb..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/elements/support/3d-filler.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - - 3D transformed Lorem Ipsum - - - - -

- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx
-

-

- xx
- xx -

- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/elements/support/Three.js b/tests/wpt/web-platform-tests/css/css-regions/elements/support/Three.js deleted file mode 100644 index 60747148474..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/elements/support/Three.js +++ /dev/null @@ -1,682 +0,0 @@ -// Three.js r44 - http://github.com/mrdoob/three.js -var THREE=THREE||{};if(!window.Int32Array)window.Int32Array=Array,window.Float32Array=Array;THREE.Color=function(b){b!==void 0&&this.setHex(b);return this}; -THREE.Color.prototype={constructor:THREE.Color,r:1,g:1,b:1,copy:function(b){this.r=b.r;this.g=b.g;this.b=b.b;return this},setRGB:function(b,c,e){this.r=b;this.g=c;this.b=e;return this},setHSV:function(b,c,e){var f,h,m;if(e==0)this.r=this.g=this.b=0;else switch(f=Math.floor(b*6),h=b*6-f,b=e*(1-c),m=e*(1-c*h),c=e*(1-c*(1-h)),f){case 1:this.r=m;this.g=e;this.b=b;break;case 2:this.r=b;this.g=e;this.b=c;break;case 3:this.r=b;this.g=m;this.b=e;break;case 4:this.r=c;this.g=b;this.b=e;break;case 5:this.r= -e;this.g=b;this.b=m;break;case 6:case 0:this.r=e,this.g=c,this.b=b}return this},setHex:function(b){b=Math.floor(b);this.r=(b>>16&255)/255;this.g=(b>>8&255)/255;this.b=(b&255)/255;return this},getHex:function(){return~~(this.r*255)<<16^~~(this.g*255)<<8^~~(this.b*255)},getContextStyle:function(){return"rgb("+Math.floor(this.r*255)+","+Math.floor(this.g*255)+","+Math.floor(this.b*255)+")"},clone:function(){return(new THREE.Color).setRGB(this.r,this.g,this.b)}}; -THREE.Vector2=function(b,c){this.x=b||0;this.y=c||0}; -THREE.Vector2.prototype={constructor:THREE.Vector2,set:function(b,c){this.x=b;this.y=c;return this},copy:function(b){this.x=b.x;this.y=b.y;return this},clone:function(){return new THREE.Vector2(this.x,this.y)},add:function(b,c){this.x=b.x+c.x;this.y=b.y+c.y;return this},addSelf:function(b){this.x+=b.x;this.y+=b.y;return this},sub:function(b,c){this.x=b.x-c.x;this.y=b.y-c.y;return this},subSelf:function(b){this.x-=b.x;this.y-=b.y;return this},multiplyScalar:function(b){this.x*=b;this.y*=b;return this}, -divideScalar:function(b){b?(this.x/=b,this.y/=b):this.set(0,0);return this},negate:function(){return this.multiplyScalar(-1)},dot:function(b){return this.x*b.x+this.y*b.y},lengthSq:function(){return this.x*this.x+this.y*this.y},length:function(){return Math.sqrt(this.lengthSq())},normalize:function(){return this.divideScalar(this.length())},distanceTo:function(b){return Math.sqrt(this.distanceToSquared(b))},distanceToSquared:function(b){var c=this.x-b.x,b=this.y-b.y;return c*c+b*b},setLength:function(b){return this.normalize().multiplyScalar(b)}, -equals:function(b){return b.x==this.x&&b.y==this.y}};THREE.Vector3=function(b,c,e){this.x=b||0;this.y=c||0;this.z=e||0}; -THREE.Vector3.prototype={constructor:THREE.Vector3,set:function(b,c,e){this.x=b;this.y=c;this.z=e;return this},copy:function(b){this.x=b.x;this.y=b.y;this.z=b.z;return this},clone:function(){return new THREE.Vector3(this.x,this.y,this.z)},add:function(b,c){this.x=b.x+c.x;this.y=b.y+c.y;this.z=b.z+c.z;return this},addSelf:function(b){this.x+=b.x;this.y+=b.y;this.z+=b.z;return this},addScalar:function(b){this.x+=b;this.y+=b;this.z+=b;return this},sub:function(b,c){this.x=b.x-c.x;this.y=b.y-c.y;this.z= -b.z-c.z;return this},subSelf:function(b){this.x-=b.x;this.y-=b.y;this.z-=b.z;return this},multiply:function(b,c){this.x=b.x*c.x;this.y=b.y*c.y;this.z=b.z*c.z;return this},multiplySelf:function(b){this.x*=b.x;this.y*=b.y;this.z*=b.z;return this},multiplyScalar:function(b){this.x*=b;this.y*=b;this.z*=b;return this},divideSelf:function(b){this.x/=b.x;this.y/=b.y;this.z/=b.z;return this},divideScalar:function(b){b?(this.x/=b,this.y/=b,this.z/=b):this.set(0,0,0);return this},negate:function(){return this.multiplyScalar(-1)}, -dot:function(b){return this.x*b.x+this.y*b.y+this.z*b.z},lengthSq:function(){return this.x*this.x+this.y*this.y+this.z*this.z},length:function(){return Math.sqrt(this.lengthSq())},lengthManhattan:function(){return this.x+this.y+this.z},normalize:function(){return this.divideScalar(this.length())},setLength:function(b){return this.normalize().multiplyScalar(b)},cross:function(b,c){this.x=b.y*c.z-b.z*c.y;this.y=b.z*c.x-b.x*c.z;this.z=b.x*c.y-b.y*c.x;return this},crossSelf:function(b){return this.set(this.y* -b.z-this.z*b.y,this.z*b.x-this.x*b.z,this.x*b.y-this.y*b.x)},distanceTo:function(b){return Math.sqrt(this.distanceToSquared(b))},distanceToSquared:function(b){return(new THREE.Vector3).sub(this,b).lengthSq()},setPositionFromMatrix:function(b){this.x=b.n14;this.y=b.n24;this.z=b.n34},setRotationFromMatrix:function(b){var c=Math.cos(this.y);this.y=Math.asin(b.n13);Math.abs(c)>1.0E-5?(this.x=Math.atan2(-b.n23/c,b.n33/c),this.z=Math.atan2(-b.n12/c,b.n11/c)):(this.x=0,this.z=Math.atan2(b.n21,b.n22))},isZero:function(){return this.lengthSq()< -1.0E-4}};THREE.Vector4=function(b,c,e,f){this.x=b||0;this.y=c||0;this.z=e||0;this.w=f||1}; -THREE.Vector4.prototype={constructor:THREE.Vector4,set:function(b,c,e,f){this.x=b;this.y=c;this.z=e;this.w=f;return this},copy:function(b){this.x=b.x;this.y=b.y;this.z=b.z;this.w=b.w||1},clone:function(){return new THREE.Vector4(this.x,this.y,this.z,this.w)},add:function(b,c){this.x=b.x+c.x;this.y=b.y+c.y;this.z=b.z+c.z;this.w=b.w+c.w;return this},addSelf:function(b){this.x+=b.x;this.y+=b.y;this.z+=b.z;this.w+=b.w;return this},sub:function(b,c){this.x=b.x-c.x;this.y=b.y-c.y;this.z=b.z-c.z;this.w= -b.w-c.w;return this},subSelf:function(b){this.x-=b.x;this.y-=b.y;this.z-=b.z;this.w-=b.w;return this},multiplyScalar:function(b){this.x*=b;this.y*=b;this.z*=b;this.w*=b;return this},divideScalar:function(b){b?(this.x/=b,this.y/=b,this.z/=b,this.w/=b):(this.z=this.y=this.x=0,this.w=1);return this},negate:function(){return this.multiplyScalar(-1)},dot:function(b){return this.x*b.x+this.y*b.y+this.z*b.z+this.w*b.w},lengthSq:function(){return this.dot(this)},length:function(){return Math.sqrt(this.lengthSq())}, -normalize:function(){return this.divideScalar(this.length())},setLength:function(b){return this.normalize().multiplyScalar(b)},lerpSelf:function(b,c){this.x+=(b.x-this.x)*c;this.y+=(b.y-this.y)*c;this.z+=(b.z-this.z)*c;this.w+=(b.w-this.w)*c;return this}};THREE.Ray=function(b,c){this.origin=b||new THREE.Vector3;this.direction=c||new THREE.Vector3}; -THREE.Ray.prototype={constructor:THREE.Ray,intersectScene:function(b){return this.intersectObjects(b.objects)},intersectObjects:function(b){var c,e,f=[];c=0;for(e=b.length;c0&&b>0&&k+b<1}if(b instanceof THREE.Particle){var f=c(this.origin,this.direction,b.matrixWorld.getPosition());if(f==null||f>b.scale.x)return[];return[{distance:f,point:b.position,face:null,object:b}]}else if(b instanceof THREE.Mesh){f=c(this.origin,this.direction,b.matrixWorld.getPosition());if(f==null||f>b.geometry.boundingSphere.radius*Math.max(b.scale.x, -Math.max(b.scale.y,b.scale.z)))return[];var h,m,k,n,u,p,v,t,x,w,z=b.geometry,y=z.vertices,B=[],f=0;for(h=z.faces.length;f0:t<0)))if(t=v.dot((new THREE.Vector3).sub(k,x))/t,x=x.addSelf(w.multiplyScalar(t)),m instanceof THREE.Face3)e(x,k,n,u)&&(m={distance:this.origin.distanceTo(x),point:x,face:m,object:b},B.push(m));else if(m instanceof THREE.Face4&&(e(x,k,n,p)||e(x,n,u,p)))m={distance:this.origin.distanceTo(x),point:x,face:m,object:b},B.push(m);B.sort(function(b,e){return b.distance-e.distance});return B}else return[]}}; -THREE.Rectangle=function(){function b(){m=f-c;k=h-e}var c,e,f,h,m,k,n=!0;this.getX=function(){return c};this.getY=function(){return e};this.getWidth=function(){return m};this.getHeight=function(){return k};this.getLeft=function(){return c};this.getTop=function(){return e};this.getRight=function(){return f};this.getBottom=function(){return h};this.set=function(k,m,v,t){n=!1;c=k;e=m;f=v;h=t;b()};this.addPoint=function(k,m){n?(n=!1,c=k,e=m,f=k,h=m):(c=ck?f:k,h=h>m?h:m);b()};this.add3Points= -function(k,m,v,t,x,w){n?(n=!1,c=kv?k>x?k:x:v>x?v:x,h=m>t?m>w?m:w:t>w?t:w):(c=kv?k>x?k>f?k:f:x>f?x:f:v>x?v>f?v:f:x>f?x:f,h=m>t?m>w?m>h?m:h:w>h?w:h:t>w?t>h?t:h:w>h?w:h);b()};this.addRectangle=function(k){n?(n=!1,c=k.getLeft(),e=k.getTop(),f=k.getRight(),h=k.getBottom()):(c=ck.getRight()?f:k.getRight(),h=h> -k.getBottom()?h:k.getBottom());b()};this.inflate=function(k){c-=k;e-=k;f+=k;h+=k;b()};this.minSelf=function(k){c=c>k.getLeft()?c:k.getLeft();e=e>k.getTop()?e:k.getTop();f=f=0&&Math.min(h,b.getBottom())-Math.max(e,b.getTop())>=0};this.empty=function(){n=!0;h=f=e=c=0;b()};this.isEmpty=function(){return n}};THREE.Matrix3=function(){this.m=[]}; -THREE.Matrix3.prototype={constructor:THREE.Matrix3,transpose:function(){var b,c=this.m;b=c[1];c[1]=c[3];c[3]=b;b=c[2];c[2]=c[6];c[6]=b;b=c[5];c[5]=c[7];c[7]=b;return this},transposeIntoArray:function(b){var c=this.m;b[0]=c[0];b[1]=c[3];b[2]=c[6];b[3]=c[1];b[4]=c[4];b[5]=c[7];b[6]=c[2];b[7]=c[5];b[8]=c[8];return this}};THREE.Matrix4=function(b,c,e,f,h,m,k,n,u,p,v,t,x,w,z,y){this.set(b||1,c||0,e||0,f||0,h||0,m||1,k||0,n||0,u||0,p||0,v||1,t||0,x||0,w||0,z||0,y||1);this.flat=Array(16);this.m33=new THREE.Matrix3}; -THREE.Matrix4.prototype={constructor:THREE.Matrix4,set:function(b,c,e,f,h,m,k,n,u,p,v,t,x,w,z,y){this.n11=b;this.n12=c;this.n13=e;this.n14=f;this.n21=h;this.n22=m;this.n23=k;this.n24=n;this.n31=u;this.n32=p;this.n33=v;this.n34=t;this.n41=x;this.n42=w;this.n43=z;this.n44=y;return this},identity:function(){this.set(1,0,0,0,0,1,0,0,0,0,1,0,0,0,0,1);return this},copy:function(b){this.set(b.n11,b.n12,b.n13,b.n14,b.n21,b.n22,b.n23,b.n24,b.n31,b.n32,b.n33,b.n34,b.n41,b.n42,b.n43,b.n44);return this},lookAt:function(b, -c,e){var f=THREE.Matrix4.__v1,h=THREE.Matrix4.__v2,m=THREE.Matrix4.__v3;m.sub(b,c).normalize();if(m.length()===0)m.z=1;f.cross(e,m).normalize();f.length()===0&&(m.x+=1.0E-4,f.cross(e,m).normalize());h.cross(m,f).normalize();this.n11=f.x;this.n12=h.x;this.n13=m.x;this.n21=f.y;this.n22=h.y;this.n23=m.y;this.n31=f.z;this.n32=h.z;this.n33=m.z;return this},multiplyVector3:function(b){var c=b.x,e=b.y,f=b.z,h=1/(this.n41*c+this.n42*e+this.n43*f+this.n44);b.x=(this.n11*c+this.n12*e+this.n13*f+this.n14)*h; -b.y=(this.n21*c+this.n22*e+this.n23*f+this.n24)*h;b.z=(this.n31*c+this.n32*e+this.n33*f+this.n34)*h;return b},multiplyVector4:function(b){var c=b.x,e=b.y,f=b.z,h=b.w;b.x=this.n11*c+this.n12*e+this.n13*f+this.n14*h;b.y=this.n21*c+this.n22*e+this.n23*f+this.n24*h;b.z=this.n31*c+this.n32*e+this.n33*f+this.n34*h;b.w=this.n41*c+this.n42*e+this.n43*f+this.n44*h;return b},rotateAxis:function(b){var c=b.x,e=b.y,f=b.z;b.x=c*this.n11+e*this.n12+f*this.n13;b.y=c*this.n21+e*this.n22+f*this.n23;b.z=c*this.n31+ -e*this.n32+f*this.n33;b.normalize();return b},crossVector:function(b){var c=new THREE.Vector4;c.x=this.n11*b.x+this.n12*b.y+this.n13*b.z+this.n14*b.w;c.y=this.n21*b.x+this.n22*b.y+this.n23*b.z+this.n24*b.w;c.z=this.n31*b.x+this.n32*b.y+this.n33*b.z+this.n34*b.w;c.w=b.w?this.n41*b.x+this.n42*b.y+this.n43*b.z+this.n44*b.w:1;return c},multiply:function(b,c){var e=b.n11,f=b.n12,h=b.n13,m=b.n14,k=b.n21,n=b.n22,u=b.n23,p=b.n24,v=b.n31,t=b.n32,x=b.n33,w=b.n34,z=b.n41,y=b.n42,B=b.n43,D=b.n44,G=c.n11,H=c.n12, -E=c.n13,N=c.n14,F=c.n21,I=c.n22,C=c.n23,K=c.n24,U=c.n31,L=c.n32,O=c.n33,S=c.n34,P=c.n41,o=c.n42,W=c.n43,na=c.n44;this.n11=e*G+f*F+h*U+m*P;this.n12=e*H+f*I+h*L+m*o;this.n13=e*E+f*C+h*O+m*W;this.n14=e*N+f*K+h*S+m*na;this.n21=k*G+n*F+u*U+p*P;this.n22=k*H+n*I+u*L+p*o;this.n23=k*E+n*C+u*O+p*W;this.n24=k*N+n*K+u*S+p*na;this.n31=v*G+t*F+x*U+w*P;this.n32=v*H+t*I+x*L+w*o;this.n33=v*E+t*C+x*O+w*W;this.n34=v*N+t*K+x*S+w*na;this.n41=z*G+y*F+B*U+D*P;this.n42=z*H+y*I+B*L+D*o;this.n43=z*E+y*C+B*O+D*W;this.n44=z* -N+y*K+B*S+D*na;return this},multiplyToArray:function(b,c,e){this.multiply(b,c);e[0]=this.n11;e[1]=this.n21;e[2]=this.n31;e[3]=this.n41;e[4]=this.n12;e[5]=this.n22;e[6]=this.n32;e[7]=this.n42;e[8]=this.n13;e[9]=this.n23;e[10]=this.n33;e[11]=this.n43;e[12]=this.n14;e[13]=this.n24;e[14]=this.n34;e[15]=this.n44;return this},multiplySelf:function(b){this.multiply(this,b);return this},multiplyScalar:function(b){this.n11*=b;this.n12*=b;this.n13*=b;this.n14*=b;this.n21*=b;this.n22*=b;this.n23*=b;this.n24*= -b;this.n31*=b;this.n32*=b;this.n33*=b;this.n34*=b;this.n41*=b;this.n42*=b;this.n43*=b;this.n44*=b;return this},determinant:function(){var b=this.n11,c=this.n12,e=this.n13,f=this.n14,h=this.n21,m=this.n22,k=this.n23,n=this.n24,u=this.n31,p=this.n32,v=this.n33,t=this.n34,x=this.n41,w=this.n42,z=this.n43,y=this.n44;return f*k*p*x-e*n*p*x-f*m*v*x+c*n*v*x+e*m*t*x-c*k*t*x-f*k*u*w+e*n*u*w+f*h*v*w-b*n*v*w-e*h*t*w+b*k*t*w+f*m*u*z-c*n*u*z-f*h*p*z+b*n*p*z+c*h*t*z-b*m*t*z-e*m*u*y+c*k*u*y+e*h*p*y-b*k*p*y-c*h* -v*y+b*m*v*y},transpose:function(){var b;b=this.n21;this.n21=this.n12;this.n12=b;b=this.n31;this.n31=this.n13;this.n13=b;b=this.n32;this.n32=this.n23;this.n23=b;b=this.n41;this.n41=this.n14;this.n14=b;b=this.n42;this.n42=this.n24;this.n24=b;b=this.n43;this.n43=this.n34;this.n43=b;return this},clone:function(){var b=new THREE.Matrix4;b.n11=this.n11;b.n12=this.n12;b.n13=this.n13;b.n14=this.n14;b.n21=this.n21;b.n22=this.n22;b.n23=this.n23;b.n24=this.n24;b.n31=this.n31;b.n32=this.n32;b.n33=this.n33;b.n34= -this.n34;b.n41=this.n41;b.n42=this.n42;b.n43=this.n43;b.n44=this.n44;return b},flatten:function(){this.flat[0]=this.n11;this.flat[1]=this.n21;this.flat[2]=this.n31;this.flat[3]=this.n41;this.flat[4]=this.n12;this.flat[5]=this.n22;this.flat[6]=this.n32;this.flat[7]=this.n42;this.flat[8]=this.n13;this.flat[9]=this.n23;this.flat[10]=this.n33;this.flat[11]=this.n43;this.flat[12]=this.n14;this.flat[13]=this.n24;this.flat[14]=this.n34;this.flat[15]=this.n44;return this.flat},flattenToArray:function(b){b[0]= -this.n11;b[1]=this.n21;b[2]=this.n31;b[3]=this.n41;b[4]=this.n12;b[5]=this.n22;b[6]=this.n32;b[7]=this.n42;b[8]=this.n13;b[9]=this.n23;b[10]=this.n33;b[11]=this.n43;b[12]=this.n14;b[13]=this.n24;b[14]=this.n34;b[15]=this.n44;return b},flattenToArrayOffset:function(b,c){b[c]=this.n11;b[c+1]=this.n21;b[c+2]=this.n31;b[c+3]=this.n41;b[c+4]=this.n12;b[c+5]=this.n22;b[c+6]=this.n32;b[c+7]=this.n42;b[c+8]=this.n13;b[c+9]=this.n23;b[c+10]=this.n33;b[c+11]=this.n43;b[c+12]=this.n14;b[c+13]=this.n24;b[c+14]= -this.n34;b[c+15]=this.n44;return b},setTranslation:function(b,c,e){this.set(1,0,0,b,0,1,0,c,0,0,1,e,0,0,0,1);return this},setScale:function(b,c,e){this.set(b,0,0,0,0,c,0,0,0,0,e,0,0,0,0,1);return this},setRotationX:function(b){var c=Math.cos(b),b=Math.sin(b);this.set(1,0,0,0,0,c,-b,0,0,b,c,0,0,0,0,1);return this},setRotationY:function(b){var c=Math.cos(b),b=Math.sin(b);this.set(c,0,b,0,0,1,0,0,-b,0,c,0,0,0,0,1);return this},setRotationZ:function(b){var c=Math.cos(b),b=Math.sin(b);this.set(c,-b,0, -0,b,c,0,0,0,0,1,0,0,0,0,1);return this},setRotationAxis:function(b,c){var e=Math.cos(c),f=Math.sin(c),h=1-e,m=b.x,k=b.y,n=b.z,u=h*m,p=h*k;this.set(u*m+e,u*k-f*n,u*n+f*k,0,u*k+f*n,p*k+e,p*n-f*m,0,u*n-f*k,p*n+f*m,h*n*n+e,0,0,0,0,1);return this},setPosition:function(b){this.n14=b.x;this.n24=b.y;this.n34=b.z;return this},getPosition:function(){if(!this.position)this.position=new THREE.Vector3;this.position.set(this.n14,this.n24,this.n34);return this.position},getColumnX:function(){if(!this.columnX)this.columnX= -new THREE.Vector3;this.columnX.set(this.n11,this.n21,this.n31);return this.columnX},getColumnY:function(){if(!this.columnY)this.columnY=new THREE.Vector3;this.columnY.set(this.n12,this.n22,this.n32);return this.columnY},getColumnZ:function(){if(!this.columnZ)this.columnZ=new THREE.Vector3;this.columnZ.set(this.n13,this.n23,this.n33);return this.columnZ},setRotationFromEuler:function(b,c){var e=b.x,f=b.y,h=b.z,m=Math.cos(e),e=Math.sin(e),k=Math.cos(f),f=Math.sin(f),n=Math.cos(h),h=Math.sin(h);switch(c){case "YXZ":var u= -k*n,p=k*h,v=f*n,t=f*h;this.n11=u+t*e;this.n12=v*e-p;this.n13=m*f;this.n21=m*h;this.n22=m*n;this.n23=-e;this.n31=p*e-v;this.n32=t+u*e;this.n33=m*k;break;case "ZXY":u=k*n;p=k*h;v=f*n;t=f*h;this.n11=u-t*e;this.n12=-m*h;this.n13=v+p*e;this.n21=p+v*e;this.n22=m*n;this.n23=t-u*e;this.n31=-m*f;this.n32=e;this.n33=m*k;break;case "ZYX":u=m*n;p=m*h;v=e*n;t=e*h;this.n11=k*n;this.n12=v*f-p;this.n13=u*f+t;this.n21=k*h;this.n22=t*f+u;this.n23=p*f-v;this.n31=-f;this.n32=e*k;this.n33=m*k;break;case "YZX":u=m*k;p= -m*f;v=e*k;t=e*f;this.n11=k*n;this.n12=t-u*h;this.n13=v*h+p;this.n21=h;this.n22=m*n;this.n23=-e*n;this.n31=-f*n;this.n32=p*h+v;this.n33=u-t*h;break;case "XZY":u=m*k;p=m*f;v=e*k;t=e*f;this.n11=k*n;this.n12=-h;this.n13=f*n;this.n21=u*h+t;this.n22=m*n;this.n23=p*h-v;this.n31=v*h-p;this.n32=e*n;this.n33=t*h+u;break;default:u=m*n,p=m*h,v=e*n,t=e*h,this.n11=k*n,this.n12=-k*h,this.n13=f,this.n21=p+v*f,this.n22=u-t*f,this.n23=-e*k,this.n31=t-u*f,this.n32=v+p*f,this.n33=m*k}return this},setRotationFromQuaternion:function(b){var c= -b.x,e=b.y,f=b.z,h=b.w,m=c+c,k=e+e,n=f+f,b=c*m,u=c*k;c*=n;var p=e*k;e*=n;f*=n;m*=h;k*=h;h*=n;this.n11=1-(p+f);this.n12=u-h;this.n13=c+k;this.n21=u+h;this.n22=1-(b+f);this.n23=e-m;this.n31=c-k;this.n32=e+m;this.n33=1-(b+p);return this},scale:function(b){var c=b.x,e=b.y,b=b.z;this.n11*=c;this.n12*=e;this.n13*=b;this.n21*=c;this.n22*=e;this.n23*=b;this.n31*=c;this.n32*=e;this.n33*=b;this.n41*=c;this.n42*=e;this.n43*=b;return this},compose:function(b,c,e){var f=THREE.Matrix4.__m1,h=THREE.Matrix4.__m2; -f.identity();f.setRotationFromQuaternion(c);h.setScale(e.x,e.y,e.z);this.multiply(f,h);this.n14=b.x;this.n24=b.y;this.n34=b.z;return this},decompose:function(b,c,e){var f=THREE.Matrix4.__v1,h=THREE.Matrix4.__v2,m=THREE.Matrix4.__v3;f.set(this.n11,this.n21,this.n31);h.set(this.n12,this.n22,this.n32);m.set(this.n13,this.n23,this.n33);b=b instanceof THREE.Vector3?b:new THREE.Vector3;c=c instanceof THREE.Quaternion?c:new THREE.Quaternion;e=e instanceof THREE.Vector3?e:new THREE.Vector3;e.x=f.length(); -e.y=h.length();e.z=m.length();b.x=this.n14;b.y=this.n24;b.z=this.n34;f=THREE.Matrix4.__m1;f.copy(this);f.n11/=e.x;f.n21/=e.x;f.n31/=e.x;f.n12/=e.y;f.n22/=e.y;f.n32/=e.y;f.n13/=e.z;f.n23/=e.z;f.n33/=e.z;c.setFromRotationMatrix(f);return[b,c,e]},extractPosition:function(b){this.n14=b.n14;this.n24=b.n24;this.n34=b.n34},extractRotation:function(b,c){var e=1/c.x,f=1/c.y,h=1/c.z;this.n11=b.n11*e;this.n21=b.n21*e;this.n31=b.n31*e;this.n12=b.n12*f;this.n22=b.n22*f;this.n32=b.n32*f;this.n13=b.n13*h;this.n23= -b.n23*h;this.n33=b.n33*h}}; -THREE.Matrix4.makeInvert=function(b,c){var e=b.n11,f=b.n12,h=b.n13,m=b.n14,k=b.n21,n=b.n22,u=b.n23,p=b.n24,v=b.n31,t=b.n32,x=b.n33,w=b.n34,z=b.n41,y=b.n42,B=b.n43,D=b.n44;c===void 0&&(c=new THREE.Matrix4);c.n11=u*w*y-p*x*y+p*t*B-n*w*B-u*t*D+n*x*D;c.n12=m*x*y-h*w*y-m*t*B+f*w*B+h*t*D-f*x*D;c.n13=h*p*y-m*u*y+m*n*B-f*p*B-h*n*D+f*u*D;c.n14=m*u*t-h*p*t-m*n*x+f*p*x+h*n*w-f*u*w;c.n21=p*x*z-u*w*z-p*v*B+k*w*B+u*v*D-k*x*D;c.n22=h*w*z-m*x*z+m*v*B-e*w*B-h*v*D+e*x*D;c.n23=m*u*z-h*p*z-m*k*B+e*p*B+h*k*D-e*u*D;c.n24= -h*p*v-m*u*v+m*k*x-e*p*x-h*k*w+e*u*w;c.n31=n*w*z-p*t*z+p*v*y-k*w*y-n*v*D+k*t*D;c.n32=m*t*z-f*w*z-m*v*y+e*w*y+f*v*D-e*t*D;c.n33=h*p*z-m*n*z+m*k*y-e*p*y-f*k*D+e*n*D;c.n34=m*n*v-f*p*v-m*k*t+e*p*t+f*k*w-e*n*w;c.n41=u*t*z-n*x*z-u*v*y+k*x*y+n*v*B-k*t*B;c.n42=f*x*z-h*t*z+h*v*y-e*x*y-f*v*B+e*t*B;c.n43=h*n*z-f*u*z-h*k*y+e*u*y+f*k*B-e*n*B;c.n44=f*u*v-h*n*v+h*k*t-e*u*t-f*k*x+e*n*x;c.multiplyScalar(1/b.determinant());return c}; -THREE.Matrix4.makeInvert3x3=function(b){var c=b.m33,e=c.m,f=b.n33*b.n22-b.n32*b.n23,h=-b.n33*b.n21+b.n31*b.n23,m=b.n32*b.n21-b.n31*b.n22,k=-b.n33*b.n12+b.n32*b.n13,n=b.n33*b.n11-b.n31*b.n13,u=-b.n32*b.n11+b.n31*b.n12,p=b.n23*b.n12-b.n22*b.n13,v=-b.n23*b.n11+b.n21*b.n13,t=b.n22*b.n11-b.n21*b.n12,b=b.n11*f+b.n21*k+b.n31*p;b==0&&console.error("THREE.Matrix4.makeInvert3x3: Matrix not invertible.");b=1/b;e[0]=b*f;e[1]=b*h;e[2]=b*m;e[3]=b*k;e[4]=b*n;e[5]=b*u;e[6]=b*p;e[7]=b*v;e[8]=b*t;return c}; -THREE.Matrix4.makeFrustum=function(b,c,e,f,h,m){var k;k=new THREE.Matrix4;k.n11=2*h/(c-b);k.n12=0;k.n13=(c+b)/(c-b);k.n14=0;k.n21=0;k.n22=2*h/(f-e);k.n23=(f+e)/(f-e);k.n24=0;k.n31=0;k.n32=0;k.n33=-(m+h)/(m-h);k.n34=-2*m*h/(m-h);k.n41=0;k.n42=0;k.n43=-1;k.n44=0;return k};THREE.Matrix4.makePerspective=function(b,c,e,f){var h,b=e*Math.tan(b*Math.PI/360);h=-b;return THREE.Matrix4.makeFrustum(h*c,b*c,h,b,e,f)}; -THREE.Matrix4.makeOrtho=function(b,c,e,f,h,m){var k,n,u,p;k=new THREE.Matrix4;n=c-b;u=e-f;p=m-h;k.n11=2/n;k.n12=0;k.n13=0;k.n14=-((c+b)/n);k.n21=0;k.n22=2/u;k.n23=0;k.n24=-((e+f)/u);k.n31=0;k.n32=0;k.n33=-2/p;k.n34=-((m+h)/p);k.n41=0;k.n42=0;k.n43=0;k.n44=1;return k};THREE.Matrix4.__v1=new THREE.Vector3;THREE.Matrix4.__v2=new THREE.Vector3;THREE.Matrix4.__v3=new THREE.Vector3;THREE.Matrix4.__m1=new THREE.Matrix4;THREE.Matrix4.__m2=new THREE.Matrix4; -THREE.Object3D=function(){this.id=THREE.Object3DCount++;this.name="";this.parent=void 0;this.children=[];this.up=new THREE.Vector3(0,1,0);this.position=new THREE.Vector3;this.rotation=new THREE.Vector3;this.eulerOrder="XYZ";this.scale=new THREE.Vector3(1,1,1);this.flipSided=this.doubleSided=this.dynamic=!1;this.renderDepth=null;this.rotationAutoUpdate=!0;this.matrix=new THREE.Matrix4;this.matrixWorld=new THREE.Matrix4;this.matrixRotationWorld=new THREE.Matrix4;this.matrixWorldNeedsUpdate=this.matrixAutoUpdate= -!0;this.quaternion=new THREE.Quaternion;this.useQuaternion=!1;this.boundRadius=0;this.boundRadiusScale=1;this.visible=!0;this.receiveShadow=this.castShadow=!1;this.frustumCulled=!0;this._vector=new THREE.Vector3}; -THREE.Object3D.prototype={constructor:THREE.Object3D,translate:function(b,c){this.matrix.rotateAxis(c);this.position.addSelf(c.multiplyScalar(b))},translateX:function(b){this.translate(b,this._vector.set(1,0,0))},translateY:function(b){this.translate(b,this._vector.set(0,1,0))},translateZ:function(b){this.translate(b,this._vector.set(0,0,1))},lookAt:function(b){this.matrix.lookAt(b,this.position,this.up);this.rotationAutoUpdate&&this.rotation.setRotationFromMatrix(this.matrix)},addChild:function(b){if(this.children.indexOf(b)=== --1){b.parent!==void 0&&b.parent.removeChild(b);b.parent=this;this.children.push(b);for(var c=this;c.parent!==void 0;)c=c.parent;c!==void 0&&c instanceof THREE.Scene&&c.addChildRecurse(b)}},removeChild:function(b){var c=this.children.indexOf(b);if(c!==-1)b.parent=void 0,this.children.splice(c,1)},getChildByName:function(b,c){var e,f,h;e=0;for(f=this.children.length;e=0&&h>=0&&m>=0&&n>=0?!0:k<0&&h<0||m<0&&n<0?!1:(k<0?c=Math.max(c,k/(k-h)):h<0&&(f=Math.min(f,k/(k-h))),m<0?c=Math.max(c,m/(m-n)):n<0&&(f=Math.min(f,m/(m-n))),fE&&k.positionScreen.z0&&I.z<1))ja=H[G]=H[G]||new THREE.RenderableParticle,G++,D=ja,D.x=I.x/I.w,D.y=I.y/I.w,D.z= -I.z,D.rotation=X.rotation.z,D.scale.x=X.scale.x*Math.abs(D.x-(I.x+h.projectionMatrix.n11)/(I.w+h.projectionMatrix.n14)),D.scale.y=X.scale.y*Math.abs(D.y-(I.y+h.projectionMatrix.n22)/(I.w+h.projectionMatrix.n24)),D.materials=X.materials,N.push(D);m&&N.sort(c);return N}};THREE.Quaternion=function(b,c,e,f){this.set(b||0,c||0,e||0,f!==void 0?f:1)}; -THREE.Quaternion.prototype={constructor:THREE.Quaternion,set:function(b,c,e,f){this.x=b;this.y=c;this.z=e;this.w=f;return this},copy:function(b){this.x=b.x;this.y=b.y;this.z=b.z;this.w=b.w;return this},setFromEuler:function(b){var c=0.5*Math.PI/360,e=b.x*c,f=b.y*c,h=b.z*c,b=Math.cos(f),f=Math.sin(f),c=Math.cos(-h),h=Math.sin(-h),m=Math.cos(e),e=Math.sin(e),k=b*c,n=f*h;this.w=k*m-n*e;this.x=k*e+n*m;this.y=f*c*m+b*h*e;this.z=b*h*m-f*c*e;return this},setFromAxisAngle:function(b,c){var e=c/2,f=Math.sin(e); -this.x=b.x*f;this.y=b.y*f;this.z=b.z*f;this.w=Math.cos(e);return this},setFromRotationMatrix:function(b){var c=Math.pow(b.determinant(),1/3);this.w=Math.sqrt(Math.max(0,c+b.n11+b.n22+b.n33))/2;this.x=Math.sqrt(Math.max(0,c+b.n11-b.n22-b.n33))/2;this.y=Math.sqrt(Math.max(0,c-b.n11+b.n22-b.n33))/2;this.z=Math.sqrt(Math.max(0,c-b.n11-b.n22+b.n33))/2;this.x=b.n32-b.n23<0?-Math.abs(this.x):Math.abs(this.x);this.y=b.n13-b.n31<0?-Math.abs(this.y):Math.abs(this.y);this.z=b.n21-b.n12<0?-Math.abs(this.z):Math.abs(this.z); -this.normalize();return this},calculateW:function(){this.w=-Math.sqrt(Math.abs(1-this.x*this.x-this.y*this.y-this.z*this.z));return this},inverse:function(){this.x*=-1;this.y*=-1;this.z*=-1;return this},length:function(){return Math.sqrt(this.x*this.x+this.y*this.y+this.z*this.z+this.w*this.w)},normalize:function(){var b=Math.sqrt(this.x*this.x+this.y*this.y+this.z*this.z+this.w*this.w);b==0?this.w=this.z=this.y=this.x=0:(b=1/b,this.x*=b,this.y*=b,this.z*=b,this.w*=b);return this},multiplySelf:function(b){var c= -this.x,e=this.y,f=this.z,h=this.w,m=b.x,k=b.y,n=b.z,b=b.w;this.x=c*b+h*m+e*n-f*k;this.y=e*b+h*k+f*m-c*n;this.z=f*b+h*n+c*k-e*m;this.w=h*b-c*m-e*k-f*n;return this},multiply:function(b,c){this.x=b.x*c.w+b.y*c.z-b.z*c.y+b.w*c.x;this.y=-b.x*c.z+b.y*c.w+b.z*c.x+b.w*c.y;this.z=b.x*c.y-b.y*c.x+b.z*c.w+b.w*c.z;this.w=-b.x*c.x-b.y*c.y-b.z*c.z+b.w*c.w;return this},multiplyVector3:function(b,c){c||(c=b);var e=b.x,f=b.y,h=b.z,m=this.x,k=this.y,n=this.z,u=this.w,p=u*e+k*h-n*f,v=u*f+n*e-m*h,t=u*h+m*f-k*e,e=-m* -e-k*f-n*h;c.x=p*u+e*-m+v*-n-t*-k;c.y=v*u+e*-k+t*-m-p*-n;c.z=t*u+e*-n+p*-k-v*-m;return c}};THREE.Quaternion.slerp=function(b,c,e,f){var h=b.w*c.w+b.x*c.x+b.y*c.y+b.z*c.z;if(Math.abs(h)>=1)return e.w=b.w,e.x=b.x,e.y=b.y,e.z=b.z,e;var m=Math.acos(h),k=Math.sqrt(1-h*h);if(Math.abs(k)<0.001)return e.w=0.5*(b.w+c.w),e.x=0.5*(b.x+c.x),e.y=0.5*(b.y+c.y),e.z=0.5*(b.z+c.z),e;h=Math.sin((1-f)*m)/k;f=Math.sin(f*m)/k;e.w=b.w*h+c.w*f;e.x=b.x*h+c.x*f;e.y=b.y*h+c.y*f;e.z=b.z*h+c.z*f;return e}; -THREE.Vertex=function(b){this.position=b||new THREE.Vector3};THREE.Face3=function(b,c,e,f,h,m){this.a=b;this.b=c;this.c=e;this.normal=f instanceof THREE.Vector3?f:new THREE.Vector3;this.vertexNormals=f instanceof Array?f:[];this.color=h instanceof THREE.Color?h:new THREE.Color;this.vertexColors=h instanceof Array?h:[];this.vertexTangents=[];this.materials=m instanceof Array?m:[m];this.centroid=new THREE.Vector3}; -THREE.Face4=function(b,c,e,f,h,m,k){this.a=b;this.b=c;this.c=e;this.d=f;this.normal=h instanceof THREE.Vector3?h:new THREE.Vector3;this.vertexNormals=h instanceof Array?h:[];this.color=m instanceof THREE.Color?m:new THREE.Color;this.vertexColors=m instanceof Array?m:[];this.vertexTangents=[];this.materials=k instanceof Array?k:[k];this.centroid=new THREE.Vector3};THREE.UV=function(b,c){this.u=b||0;this.v=c||0}; -THREE.UV.prototype={constructor:THREE.UV,set:function(b,c){this.u=b;this.v=c;return this},copy:function(b){this.u=b.u;this.v=b.v;return this},clone:function(){return new THREE.UV(this.u,this.v)}}; -THREE.Geometry=function(){this.id=THREE.GeometryCount++;this.vertices=[];this.colors=[];this.faces=[];this.edges=[];this.faceUvs=[[]];this.faceVertexUvs=[[]];this.morphTargets=[];this.morphColors=[];this.skinWeights=[];this.skinIndices=[];this.boundingSphere=this.boundingBox=null;this.dynamic=this.hasTangents=!1}; -THREE.Geometry.prototype={constructor:THREE.Geometry,computeCentroids:function(){var b,c,e;b=0;for(c=this.faces.length;b0){this.boundingBox={x:[this.vertices[0].position.x,this.vertices[0].position.x],y:[this.vertices[0].position.y,this.vertices[0].position.y],z:[this.vertices[0].position.z,this.vertices[0].position.z]};for(var c=1,e=this.vertices.length;cthis.boundingBox.x[1])this.boundingBox.x[1]=b.position.x;if(b.position.ythis.boundingBox.y[1])this.boundingBox.y[1]=b.position.y;if(b.position.zthis.boundingBox.z[1])this.boundingBox.z[1]=b.position.z}}},computeBoundingSphere:function(){for(var b=0,c=0,e=this.vertices.length;cthis.points.length-2?m:m+1;e[3]=m>this.points.length-3?m:m+2;p=this.points[e[0]];v=this.points[e[1]]; -t=this.points[e[2]];x=this.points[e[3]];n=k*k;u=k*n;f.x=c(p.x,v.x,t.x,x.x,k,n,u);f.y=c(p.y,v.y,t.y,x.y,k,n,u);f.z=c(p.z,v.z,t.z,x.z,k,n,u);return f};this.getControlPointsArray=function(){var b,e,c=this.points.length,f=[];for(b=0;b1){b=e.matrixWorldInverse;b=-(b.n31*this.position.x+b.n32*this.position.y+b.n33*this.position.z+b.n34);this.LODs[0].object3D.visible=!0;for(var f=1;f=this.LODs[f].visibleAtDistance)this.LODs[f-1].object3D.visible=!1, -this.LODs[f].object3D.visible=!0;else break;for(;f0&&(e(THREE.NormalBlending),c(1),h("rgba("+Math.floor(z.r*255)+","+Math.floor(z.g*255)+","+Math.floor(z.b* -255)+","+y+")"),w.fillRect(Math.floor(Z.getX()),Math.floor(Z.getY()),Math.floor(Z.getWidth()),Math.floor(Z.getHeight()))),Z.empty())};this.render=function(b,u){function p(b){var e,c,f,k=b.lights;ka.setRGB(0,0,0);ya.setRGB(0,0,0);ta.setRGB(0,0,0);b=0;for(e=k.length;b>1,v=la.height>>1,m=k.scale.x*t,u=k.scale.y*x,o=m*p,n=u*v,T.set(b.x-o,b.y-n,b.x+o,b.y+n),M.instersects(T)&&(w.save(),w.translate(b.x,b.y),w.rotate(-k.rotation),w.scale(m,-u),w.translate(-p,-v),w.drawImage(la,0,0),w.restore())}else m instanceof THREE.ParticleCanvasMaterial&&(o=k.scale.x*t,n=k.scale.y*x,T.set(b.x-o,b.y-n,b.x+o,b.y+n),M.instersects(T)&&(f(m.color.getContextStyle()),h(m.color.getContextStyle()),w.save(),w.translate(b.x,b.y),w.rotate(-k.rotation),w.scale(o,n),m.program(w), -w.restore()))}function B(b,k,h,m){c(m.opacity);e(m.blending);w.beginPath();w.moveTo(b.positionScreen.x,b.positionScreen.y);w.lineTo(k.positionScreen.x,k.positionScreen.y);w.closePath();if(m instanceof THREE.LineBasicMaterial){b=m.linewidth;if(E!=b)w.lineWidth=E=b;b=m.linecap;if(N!=b)w.lineCap=N=b;b=m.linejoin;if(F!=b)w.lineJoin=F=b;f(m.color.getContextStyle());w.stroke();T.inflate(m.linewidth*2)}}function y(b,f,k,h,n,t,la,p,w){m.data.vertices+=3;m.data.faces++;c(p.opacity);e(p.blending);S=b.positionScreen.x; -P=b.positionScreen.y;o=f.positionScreen.x;W=f.positionScreen.y;na=k.positionScreen.x;R=k.positionScreen.y;G(S,P,o,W,na,R);if(p instanceof THREE.MeshBasicMaterial)if(p.map)p.map.mapping instanceof THREE.UVMapping&&(ra=la.uvs[0],Ya(S,P,o,W,na,R,ra[h].u,ra[h].v,ra[n].u,ra[n].v,ra[t].u,ra[t].v,p.map));else if(p.envMap){if(p.envMap.mapping instanceof THREE.SphericalReflectionMapping)b=u.matrixWorldInverse,oa.copy(la.vertexNormalsWorld[0]),sa=(oa.x*b.n11+oa.y*b.n12+oa.z*b.n13)*0.5+0.5,Ca=-(oa.x*b.n21+oa.y* -b.n22+oa.z*b.n23)*0.5+0.5,oa.copy(la.vertexNormalsWorld[1]),wa=(oa.x*b.n11+oa.y*b.n12+oa.z*b.n13)*0.5+0.5,Aa=-(oa.x*b.n21+oa.y*b.n22+oa.z*b.n23)*0.5+0.5,oa.copy(la.vertexNormalsWorld[2]),za=(oa.x*b.n11+oa.y*b.n12+oa.z*b.n13)*0.5+0.5,Fa=-(oa.x*b.n21+oa.y*b.n22+oa.z*b.n23)*0.5+0.5,Ya(S,P,o,W,na,R,sa,Ca,wa,Aa,za,Fa,p.envMap)}else p.wireframe?Ja(p.color,p.wireframeLinewidth,p.wireframeLinecap,p.wireframeLinejoin):Ka(p.color);else if(p instanceof THREE.MeshLambertMaterial)p.map&&!p.wireframe&&(p.map.mapping instanceof -THREE.UVMapping&&(ra=la.uvs[0],Ya(S,P,o,W,na,R,ra[h].u,ra[h].v,ra[n].u,ra[n].v,ra[t].u,ra[t].v,p.map)),e(THREE.SubtractiveBlending)),xa?!p.wireframe&&p.shading==THREE.SmoothShading&&la.vertexNormalsWorld.length==3?(ca.r=X.r=ja.r=ka.r,ca.g=X.g=ja.g=ka.g,ca.b=X.b=ja.b=ka.b,v(w,la.v1.positionWorld,la.vertexNormalsWorld[0],ca),v(w,la.v2.positionWorld,la.vertexNormalsWorld[1],X),v(w,la.v3.positionWorld,la.vertexNormalsWorld[2],ja),ea.r=(X.r+ja.r)*0.5,ea.g=(X.g+ja.g)*0.5,ea.b=(X.b+ja.b)*0.5,va=Wa(ca,X, -ja,ea),Sa(S,P,o,W,na,R,0,0,1,0,0,1,va)):(ha.r=ka.r,ha.g=ka.g,ha.b=ka.b,v(w,la.centroidWorld,la.normalWorld,ha),$.r=Math.max(0,Math.min(p.color.r*ha.r,1)),$.g=Math.max(0,Math.min(p.color.g*ha.g,1)),$.b=Math.max(0,Math.min(p.color.b*ha.b,1)),p.wireframe?Ja($,p.wireframeLinewidth,p.wireframeLinecap,p.wireframeLinejoin):Ka($)):p.wireframe?Ja(p.color,p.wireframeLinewidth,p.wireframeLinecap,p.wireframeLinejoin):Ka(p.color);else if(p instanceof THREE.MeshDepthMaterial)V=u.near,pa=u.far,ca.r=ca.g=ca.b=1- -Na(b.positionScreen.z,V,pa),X.r=X.g=X.b=1-Na(f.positionScreen.z,V,pa),ja.r=ja.g=ja.b=1-Na(k.positionScreen.z,V,pa),ea.r=(X.r+ja.r)*0.5,ea.g=(X.g+ja.g)*0.5,ea.b=(X.b+ja.b)*0.5,va=Wa(ca,X,ja,ea),Sa(S,P,o,W,na,R,0,0,1,0,0,1,va);else if(p instanceof THREE.MeshNormalMaterial)$.r=Ta(la.normalWorld.x),$.g=Ta(la.normalWorld.y),$.b=Ta(la.normalWorld.z),p.wireframe?Ja($,p.wireframeLinewidth,p.wireframeLinecap,p.wireframeLinejoin):Ka($)}function D(b,f,k,h,n,p,la,t,w){m.data.vertices+=4;m.data.faces++;c(t.opacity); -e(t.blending);if(t.map||t.envMap)y(b,f,h,0,1,3,la,t,w),y(n,k,p,1,2,3,la,t,w);else if(S=b.positionScreen.x,P=b.positionScreen.y,o=f.positionScreen.x,W=f.positionScreen.y,na=k.positionScreen.x,R=k.positionScreen.y,ia=h.positionScreen.x,aa=h.positionScreen.y,ma=n.positionScreen.x,fa=n.positionScreen.y,ga=p.positionScreen.x,da=p.positionScreen.y,t instanceof THREE.MeshBasicMaterial)H(S,P,o,W,na,R,ia,aa),t.wireframe?Ja(t.color,t.wireframeLinewidth,t.wireframeLinecap,t.wireframeLinejoin):Ka(t.color);else if(t instanceof -THREE.MeshLambertMaterial)xa?!t.wireframe&&t.shading==THREE.SmoothShading&&la.vertexNormalsWorld.length==4?(ca.r=X.r=ja.r=ea.r=ka.r,ca.g=X.g=ja.g=ea.g=ka.g,ca.b=X.b=ja.b=ea.b=ka.b,v(w,la.v1.positionWorld,la.vertexNormalsWorld[0],ca),v(w,la.v2.positionWorld,la.vertexNormalsWorld[1],X),v(w,la.v4.positionWorld,la.vertexNormalsWorld[3],ja),v(w,la.v3.positionWorld,la.vertexNormalsWorld[2],ea),va=Wa(ca,X,ja,ea),G(S,P,o,W,ia,aa),Sa(S,P,o,W,ia,aa,0,0,1,0,0,1,va),G(ma,fa,na,R,ga,da),Sa(ma,fa,na,R,ga,da,1, -0,1,1,0,1,va)):(ha.r=ka.r,ha.g=ka.g,ha.b=ka.b,v(w,la.centroidWorld,la.normalWorld,ha),$.r=Math.max(0,Math.min(t.color.r*ha.r,1)),$.g=Math.max(0,Math.min(t.color.g*ha.g,1)),$.b=Math.max(0,Math.min(t.color.b*ha.b,1)),H(S,P,o,W,na,R,ia,aa),t.wireframe?Ja($,t.wireframeLinewidth,t.wireframeLinecap,t.wireframeLinejoin):Ka($)):(H(S,P,o,W,na,R,ia,aa),t.wireframe?Ja(t.color,t.wireframeLinewidth,t.wireframeLinecap,t.wireframeLinejoin):Ka(t.color));else if(t instanceof THREE.MeshNormalMaterial)$.r=Ta(la.normalWorld.x), -$.g=Ta(la.normalWorld.y),$.b=Ta(la.normalWorld.z),H(S,P,o,W,na,R,ia,aa),t.wireframe?Ja($,t.wireframeLinewidth,t.wireframeLinecap,t.wireframeLinejoin):Ka($);else if(t instanceof THREE.MeshDepthMaterial)V=u.near,pa=u.far,ca.r=ca.g=ca.b=1-Na(b.positionScreen.z,V,pa),X.r=X.g=X.b=1-Na(f.positionScreen.z,V,pa),ja.r=ja.g=ja.b=1-Na(h.positionScreen.z,V,pa),ea.r=ea.g=ea.b=1-Na(k.positionScreen.z,V,pa),va=Wa(ca,X,ja,ea),G(S,P,o,W,ia,aa),Sa(S,P,o,W,ia,aa,0,0,1,0,0,1,va),G(ma,fa,na,R,ga,da),Sa(ma,fa,na,R,ga, -da,1,0,1,1,0,1,va)}function G(b,e,c,f,k,h){w.beginPath();w.moveTo(b,e);w.lineTo(c,f);w.lineTo(k,h);w.lineTo(b,e);w.closePath()}function H(b,e,c,f,k,h,m,o){w.beginPath();w.moveTo(b,e);w.lineTo(c,f);w.lineTo(k,h);w.lineTo(m,o);w.lineTo(b,e);w.closePath()}function Ja(b,e,c,k){if(E!=e)w.lineWidth=E=e;if(N!=c)w.lineCap=N=c;if(F!=k)w.lineJoin=F=k;f(b.getContextStyle());w.stroke();T.inflate(e*2)}function Ka(b){h(b.getContextStyle());w.fill()}function Ya(b,e,c,f,k,m,o,n,t,p,la,u,v){if(v.image.width!=0){if(v.needsUpdate== -!0||qa[v.id]==void 0){var x=v.wrapS==THREE.RepeatWrapping,Da=v.wrapT==THREE.RepeatWrapping;qa[v.id]=w.createPattern(v.image,x&&Da?"repeat":x&&!Da?"repeat-x":!x&&Da?"repeat-y":"no-repeat");v.needsUpdate=!1}h(qa[v.id]);var x=v.offset.x/v.repeat.x,Da=v.offset.y/v.repeat.y,M=(v.image.width-1)*v.repeat.x,v=(v.image.height-1)*v.repeat.y,o=(o+x)*M,n=(n+Da)*v,t=(t+x)*M,p=(p+Da)*v,la=(la+x)*M,u=(u+Da)*v;c-=b;f-=e;k-=b;m-=e;t-=o;p-=n;la-=o;u-=n;x=1/(t*u-la*p);v=(u*c-p*k)*x;p=(u*f-p*m)*x;c=(t*k-la*c)*x;f=(t* -m-la*f)*x;b=b-v*o-c*n;e=e-p*o-f*n;w.save();w.transform(v,p,c,f,b,e);w.fill();w.restore()}}function Sa(b,e,c,f,k,h,m,o,n,t,p,la,u){var v,x;v=u.width-1;x=u.height-1;m*=v;o*=x;n*=v;t*=x;p*=v;la*=x;c-=b;f-=e;k-=b;h-=e;n-=m;t-=o;p-=m;la-=o;x=1/(n*la-p*t);v=(la*c-t*k)*x;t=(la*f-t*h)*x;c=(n*k-p*c)*x;f=(n*h-p*f)*x;b=b-v*m-c*o;e=e-t*m-f*o;w.save();w.transform(v,t,c,f,b,e);w.clip();w.drawImage(u,0,0);w.restore()}function Wa(b,e,c,f){var k=~~(b.r*255),h=~~(b.g*255),b=~~(b.b*255),m=~~(e.r*255),o=~~(e.g*255), -e=~~(e.b*255),n=~~(c.r*255),t=~~(c.g*255),c=~~(c.b*255),p=~~(f.r*255),u=~~(f.g*255),f=~~(f.b*255);Ba[0]=k<0?0:k>255?255:k;Ba[1]=h<0?0:h>255?255:h;Ba[2]=b<0?0:b>255?255:b;Ba[4]=m<0?0:m>255?255:m;Ba[5]=o<0?0:o>255?255:o;Ba[6]=e<0?0:e>255?255:e;Ba[8]=n<0?0:n>255?255:n;Ba[9]=t<0?0:t>255?255:t;Ba[10]=c<0?0:c>255?255:c;Ba[12]=p<0?0:p>255?255:p;Ba[13]=u<0?0:u>255?255:u;Ba[14]=f<0?0:f>255?255:f;Ga.putImageData(la,0,0);Da.drawImage(Y,0,0);return Va}function Na(b,e,c){b=(b-e)/(c-e);return b*b*(3-2*b)}function Ta(b){b= -(b+1)*0.5;return b<0?0:b>1?1:b}function La(b,e){var c=e.x-b.x,f=e.y-b.y,k=c*c+f*f;k!=0&&(k=1/Math.sqrt(k),c*=k,f*=k,e.x+=c,e.y+=f,b.x-=c,b.y-=f)}var Xa,bb,ua,Ea,Ma,Ua,J,A;this.autoClear?this.clear():w.setTransform(1,0,0,-1,t,x);m.data.vertices=0;m.data.faces=0;k=n.projectScene(b,u,this.sortElements);(xa=b.lights.length>0)&&p(b);Xa=0;for(bb=k.length;Xa0&&(c.r+=h.color.r*m,c.g+=h.color.g*m,c.b+=h.color.b*m)):h instanceof THREE.PointLight&&(U.sub(h.position,e.centroidWorld),U.normalize(),m=e.normalWorld.dot(U)*h.intensity,m>0&&(c.r+=h.color.r*m,c.g+=h.color.g*m,c.b+=h.color.b*m))}function c(e,c,k,o,n,t){m.data.vertices+=3;m.data.faces++;S=f(P++);S.setAttribute("d", -"M "+e.positionScreen.x+" "+e.positionScreen.y+" L "+c.positionScreen.x+" "+c.positionScreen.y+" L "+k.positionScreen.x+","+k.positionScreen.y+"z");n instanceof THREE.MeshBasicMaterial?E.copy(n.color):n instanceof THREE.MeshLambertMaterial?H?(N.r=F.r,N.g=F.g,N.b=F.b,b(t,o,N),E.r=Math.max(0,Math.min(n.color.r*N.r,1)),E.g=Math.max(0,Math.min(n.color.g*N.g,1)),E.b=Math.max(0,Math.min(n.color.b*N.b,1))):E.copy(n.color):n instanceof THREE.MeshDepthMaterial?(K=1-n.__2near/(n.__farPlusNear-o.z*n.__farMinusNear), -E.setRGB(K,K,K)):n instanceof THREE.MeshNormalMaterial&&E.setRGB(h(o.normalWorld.x),h(o.normalWorld.y),h(o.normalWorld.z));n.wireframe?S.setAttribute("style","fill: none; stroke: "+E.getContextStyle()+"; stroke-width: "+n.wireframeLinewidth+"; stroke-opacity: "+n.opacity+"; stroke-linecap: "+n.wireframeLinecap+"; stroke-linejoin: "+n.wireframeLinejoin):S.setAttribute("style","fill: "+E.getContextStyle()+"; fill-opacity: "+n.opacity);u.appendChild(S)}function e(e,c,k,o,n,t,p){m.data.vertices+=4;m.data.faces++; -S=f(P++);S.setAttribute("d","M "+e.positionScreen.x+" "+e.positionScreen.y+" L "+c.positionScreen.x+" "+c.positionScreen.y+" L "+k.positionScreen.x+","+k.positionScreen.y+" L "+o.positionScreen.x+","+o.positionScreen.y+"z");t instanceof THREE.MeshBasicMaterial?E.copy(t.color):t instanceof THREE.MeshLambertMaterial?H?(N.r=F.r,N.g=F.g,N.b=F.b,b(p,n,N),E.r=Math.max(0,Math.min(t.color.r*N.r,1)),E.g=Math.max(0,Math.min(t.color.g*N.g,1)),E.b=Math.max(0,Math.min(t.color.b*N.b,1))):E.copy(t.color):t instanceof -THREE.MeshDepthMaterial?(K=1-t.__2near/(t.__farPlusNear-n.z*t.__farMinusNear),E.setRGB(K,K,K)):t instanceof THREE.MeshNormalMaterial&&E.setRGB(h(n.normalWorld.x),h(n.normalWorld.y),h(n.normalWorld.z));t.wireframe?S.setAttribute("style","fill: none; stroke: "+E.getContextStyle()+"; stroke-width: "+t.wireframeLinewidth+"; stroke-opacity: "+t.opacity+"; stroke-linecap: "+t.wireframeLinecap+"; stroke-linejoin: "+t.wireframeLinejoin):S.setAttribute("style","fill: "+E.getContextStyle()+"; fill-opacity: "+ -t.opacity);u.appendChild(S)}function f(b){L[b]==null&&(L[b]=document.createElementNS("http://www.w3.org/2000/svg","path"),W==0&&L[b].setAttribute("shape-rendering","crispEdges"));return L[b]}function h(b){b=(b+1)*0.5;return b<0?0:b>1?1:b}var m=this,k=null,n=new THREE.Projector,u=document.createElementNS("http://www.w3.org/2000/svg","svg"),p,v,t,x,w,z,y,B,D=new THREE.Rectangle,G=new THREE.Rectangle,H=!1,E=new THREE.Color(16777215),N=new THREE.Color(16777215),F=new THREE.Color(0),I=new THREE.Color(0), -C=new THREE.Color(0),K,U=new THREE.Vector3,L=[],O=[],S,P,o,W=1;this.domElement=u;this.sortElements=this.sortObjects=this.autoClear=!0;this.data={vertices:0,faces:0};this.setQuality=function(b){switch(b){case "high":W=1;break;case "low":W=0}};this.setSize=function(b,e){p=b;v=e;t=p/2;x=v/2;u.setAttribute("viewBox",-t+" "+-x+" "+p+" "+v);u.setAttribute("width",p);u.setAttribute("height",v);D.set(-t,-x,t,x)};this.clear=function(){for(;u.childNodes.length>0;)u.removeChild(u.childNodes[0])};this.render= -function(b,f){var h,p,v,E,N,L,K,ca;this.autoClear&&this.clear();m.data.vertices=0;m.data.faces=0;k=n.projectScene(b,f,this.sortElements);o=P=0;if(H=b.lights.length>0){K=b.lights;F.setRGB(0,0,0);I.setRGB(0,0,0);C.setRGB(0,0,0);h=0;for(p=K.length;h 0\nuniform vec3 directionalLightColor[ MAX_DIR_LIGHTS ];\nuniform vec3 directionalLightDirection[ MAX_DIR_LIGHTS ];\n#endif\n#if MAX_POINT_LIGHTS > 0\nuniform vec3 pointLightColor[ MAX_POINT_LIGHTS ];\nuniform vec3 pointLightPosition[ MAX_POINT_LIGHTS ];\nuniform float pointLightDistance[ MAX_POINT_LIGHTS ];\n#ifdef PHONG\nvarying vec4 vPointLight[ MAX_POINT_LIGHTS ];\n#endif\n#endif", -lights_vertex:"if ( !enableLighting ) {\nvLightWeighting = vec3( 1.0 );\n} else {\nvLightWeighting = ambientLightColor;\n#if MAX_DIR_LIGHTS > 0\nfor( int i = 0; i < MAX_DIR_LIGHTS; i ++ ) {\nvec4 lDirection = viewMatrix * vec4( directionalLightDirection[ i ], 0.0 );\nfloat directionalLightWeighting = max( dot( transformedNormal, normalize( lDirection.xyz ) ), 0.0 );\nvLightWeighting += directionalLightColor[ i ] * directionalLightWeighting;\n}\n#endif\n#if MAX_POINT_LIGHTS > 0\nfor( int i = 0; i < MAX_POINT_LIGHTS; i ++ ) {\nvec4 lPosition = viewMatrix * vec4( pointLightPosition[ i ], 1.0 );\nvec3 lVector = lPosition.xyz - mvPosition.xyz;\nfloat lDistance = 1.0;\nif ( pointLightDistance[ i ] > 0.0 )\nlDistance = 1.0 - min( ( length( lVector ) / pointLightDistance[ i ] ), 1.0 );\nlVector = normalize( lVector );\nfloat pointLightWeighting = max( dot( transformedNormal, lVector ), 0.0 );\nvLightWeighting += pointLightColor[ i ] * pointLightWeighting * lDistance;\n#ifdef PHONG\nvPointLight[ i ] = vec4( lVector, lDistance );\n#endif\n}\n#endif\n}", -lights_pars_fragment:"#if MAX_DIR_LIGHTS > 0\nuniform vec3 directionalLightDirection[ MAX_DIR_LIGHTS ];\n#endif\n#if MAX_POINT_LIGHTS > 0\nvarying vec4 vPointLight[ MAX_POINT_LIGHTS ];\n#endif\nvarying vec3 vViewPosition;\nvarying vec3 vNormal;",lights_fragment:"vec3 normal = normalize( vNormal );\nvec3 viewPosition = normalize( vViewPosition );\nvec4 mColor = vec4( diffuse, opacity );\nvec4 mSpecular = vec4( specular, opacity );\n#if MAX_POINT_LIGHTS > 0\nvec4 pointDiffuse = vec4( vec3( 0.0 ), 1.0 );\nvec4 pointSpecular = vec4( vec3( 0.0 ), 1.0 );\nfor ( int i = 0; i < MAX_POINT_LIGHTS; i ++ ) {\nvec3 pointVector = normalize( vPointLight[ i ].xyz );\nvec3 pointHalfVector = normalize( vPointLight[ i ].xyz + viewPosition );\nfloat pointDistance = vPointLight[ i ].w;\nfloat pointDotNormalHalf = dot( normal, pointHalfVector );\nfloat pointDiffuseWeight = max( dot( normal, pointVector ), 0.0 );\nfloat pointSpecularWeight = 0.0;\nif ( pointDotNormalHalf >= 0.0 )\npointSpecularWeight = pow( pointDotNormalHalf, shininess );\npointDiffuse += mColor * pointDiffuseWeight * pointDistance;\npointSpecular += mSpecular * pointSpecularWeight * pointDistance;\n}\n#endif\n#if MAX_DIR_LIGHTS > 0\nvec4 dirDiffuse = vec4( vec3( 0.0 ), 1.0 );\nvec4 dirSpecular = vec4( vec3( 0.0 ), 1.0 );\nfor( int i = 0; i < MAX_DIR_LIGHTS; i ++ ) {\nvec4 lDirection = viewMatrix * vec4( directionalLightDirection[ i ], 0.0 );\nvec3 dirVector = normalize( lDirection.xyz );\nvec3 dirHalfVector = normalize( lDirection.xyz + viewPosition );\nfloat dirDotNormalHalf = dot( normal, dirHalfVector );\nfloat dirDiffuseWeight = max( dot( normal, dirVector ), 0.0 );\nfloat dirSpecularWeight = 0.0;\nif ( dirDotNormalHalf >= 0.0 )\ndirSpecularWeight = pow( dirDotNormalHalf, shininess );\ndirDiffuse += mColor * dirDiffuseWeight;\ndirSpecular += mSpecular * dirSpecularWeight;\n}\n#endif\nvec4 totalLight = vec4( ambient, opacity );\n#if MAX_DIR_LIGHTS > 0\ntotalLight += dirDiffuse + dirSpecular;\n#endif\n#if MAX_POINT_LIGHTS > 0\ntotalLight += pointDiffuse + pointSpecular;\n#endif\ngl_FragColor = gl_FragColor * totalLight;", -color_pars_fragment:"#ifdef USE_COLOR\nvarying vec3 vColor;\n#endif",color_fragment:"#ifdef USE_COLOR\ngl_FragColor = gl_FragColor * vec4( vColor, opacity );\n#endif",color_pars_vertex:"#ifdef USE_COLOR\nvarying vec3 vColor;\n#endif",color_vertex:"#ifdef USE_COLOR\nvColor = color;\n#endif",skinning_pars_vertex:"#ifdef USE_SKINNING\nuniform mat4 boneGlobalMatrices[ MAX_BONES ];\n#endif",skinning_vertex:"#ifdef USE_SKINNING\ngl_Position = ( boneGlobalMatrices[ int( skinIndex.x ) ] * skinVertexA ) * skinWeight.x;\ngl_Position += ( boneGlobalMatrices[ int( skinIndex.y ) ] * skinVertexB ) * skinWeight.y;\ngl_Position = projectionMatrix * viewMatrix * objectMatrix * gl_Position;\n#endif", -morphtarget_pars_vertex:"#ifdef USE_MORPHTARGETS\nuniform float morphTargetInfluences[ 8 ];\n#endif",morphtarget_vertex:"#ifdef USE_MORPHTARGETS\nvec3 morphed = vec3( 0.0, 0.0, 0.0 );\nmorphed += ( morphTarget0 - position ) * morphTargetInfluences[ 0 ];\nmorphed += ( morphTarget1 - position ) * morphTargetInfluences[ 1 ];\nmorphed += ( morphTarget2 - position ) * morphTargetInfluences[ 2 ];\nmorphed += ( morphTarget3 - position ) * morphTargetInfluences[ 3 ];\nmorphed += ( morphTarget4 - position ) * morphTargetInfluences[ 4 ];\nmorphed += ( morphTarget5 - position ) * morphTargetInfluences[ 5 ];\nmorphed += ( morphTarget6 - position ) * morphTargetInfluences[ 6 ];\nmorphed += ( morphTarget7 - position ) * morphTargetInfluences[ 7 ];\nmorphed += position;\ngl_Position = projectionMatrix * modelViewMatrix * vec4( morphed, 1.0 );\n#endif", -default_vertex:"#ifndef USE_MORPHTARGETS\n#ifndef USE_SKINNING\ngl_Position = projectionMatrix * mvPosition;\n#endif\n#endif",shadowmap_pars_fragment:"#ifdef USE_SHADOWMAP\nuniform sampler2D shadowMap[ MAX_SHADOWS ];\nuniform float shadowDarkness;\nuniform float shadowBias;\nvarying vec4 vShadowCoord[ MAX_SHADOWS ];\nfloat unpackDepth( const in vec4 rgba_depth ) {\nconst vec4 bit_shift = vec4( 1.0 / ( 256.0 * 256.0 * 256.0 ), 1.0 / ( 256.0 * 256.0 ), 1.0 / 256.0, 1.0 );\nfloat depth = dot( rgba_depth, bit_shift );\nreturn depth;\n}\n#endif", -shadowmap_fragment:"#ifdef USE_SHADOWMAP\n#ifdef SHADOWMAP_SOFT\nconst float xPixelOffset = 1.0 / SHADOWMAP_WIDTH;\nconst float yPixelOffset = 1.0 / SHADOWMAP_HEIGHT;\n#endif\nvec4 shadowColor = vec4( 1.0 );\nfor( int i = 0; i < MAX_SHADOWS; i ++ ) {\nvec3 shadowCoord = vShadowCoord[ i ].xyz / vShadowCoord[ i ].w;\nif ( shadowCoord.x >= 0.0 && shadowCoord.x <= 1.0 && shadowCoord.y >= 0.0 && shadowCoord.y <= 1.0 ) {\n#ifdef SHADOWMAP_SOFT\nfloat shadow = 0.0;\nfor ( float y = -1.25; y <= 1.25; y += 1.25 )\nfor ( float x = -1.25; x <= 1.25; x += 1.25 ) {\nvec4 rgbaDepth = texture2D( shadowMap[ i ], vec2( x * xPixelOffset, y * yPixelOffset ) + shadowCoord.xy );\nfloat fDepth = unpackDepth( rgbaDepth );\nif ( fDepth < ( shadowCoord.z + shadowBias ) )\nshadow += 1.0;\n}\nshadow /= 9.0;\nshadowColor = shadowColor * vec4( vec3( ( 1.0 - shadowDarkness * shadow ) ), 1.0 );\n#else\nvec4 rgbaDepth = texture2D( shadowMap[ i ], shadowCoord.xy );\nfloat fDepth = unpackDepth( rgbaDepth );\nif ( fDepth < ( shadowCoord.z + shadowBias ) )\nshadowColor = shadowColor * vec4( vec3( shadowDarkness ), 1.0 );\n#endif\n}\n}\ngl_FragColor = gl_FragColor * shadowColor;\n#endif", -shadowmap_pars_vertex:"#ifdef USE_SHADOWMAP\nvarying vec4 vShadowCoord[ MAX_SHADOWS ];\nuniform mat4 shadowMatrix[ MAX_SHADOWS ];\n#endif",shadowmap_vertex:"#ifdef USE_SHADOWMAP\nfor( int i = 0; i < MAX_SHADOWS; i ++ ) {\nvShadowCoord[ i ] = shadowMatrix[ i ] * objectMatrix * vec4( position, 1.0 );\n}\n#endif",alphatest_fragment:"#ifdef ALPHATEST\nif ( gl_FragColor.a < ALPHATEST ) discard;\n#endif"}; -THREE.UniformsUtils={merge:function(b){var c,e,f,h={};for(c=0;c=0)o.bindBuffer(o.ARRAY_BUFFER,k.__webglVertexBuffer),o.vertexAttribPointer(b.position, -3,o.FLOAT,!1,0,0);else if(m.morphTargetBase){c=h.program.attributes;m.morphTargetBase!==-1?(o.bindBuffer(o.ARRAY_BUFFER,k.__webglMorphTargetsBuffers[m.morphTargetBase]),o.vertexAttribPointer(c.position,3,o.FLOAT,!1,0,0)):c.position>=0&&(o.bindBuffer(o.ARRAY_BUFFER,k.__webglVertexBuffer),o.vertexAttribPointer(c.position,3,o.FLOAT,!1,0,0));if(m.morphTargetForcedOrder.length)for(var f=0,p=m.morphTargetForcedOrder,t=m.morphTargetInfluences;fu&&(v=w,u=t[v]);o.bindBuffer(o.ARRAY_BUFFER,k.__webglMorphTargetsBuffers[v]);o.vertexAttribPointer(c["morphTarget"+f],3,o.FLOAT,!1,0,0);m.__webglMorphTargetInfluences[f]=u;p[v]=1;u= --1;f++}}h.program.uniforms.morphTargetInfluences!==null&&o.uniform1fv(h.program.uniforms.morphTargetInfluences,m.__webglMorphTargetInfluences)}if(k.__webglCustomAttributes)for(n in k.__webglCustomAttributes)b[n]>=0&&(c=k.__webglCustomAttributes[n],o.bindBuffer(o.ARRAY_BUFFER,c.buffer),o.vertexAttribPointer(b[n],c.size,o.FLOAT,!1,0,0));b.color>=0&&(o.bindBuffer(o.ARRAY_BUFFER,k.__webglColorBuffer),o.vertexAttribPointer(b.color,3,o.FLOAT,!1,0,0));b.normal>=0&&(o.bindBuffer(o.ARRAY_BUFFER,k.__webglNormalBuffer), -o.vertexAttribPointer(b.normal,3,o.FLOAT,!1,0,0));b.tangent>=0&&(o.bindBuffer(o.ARRAY_BUFFER,k.__webglTangentBuffer),o.vertexAttribPointer(b.tangent,4,o.FLOAT,!1,0,0));b.uv>=0&&(k.__webglUVBuffer?(o.bindBuffer(o.ARRAY_BUFFER,k.__webglUVBuffer),o.vertexAttribPointer(b.uv,2,o.FLOAT,!1,0,0),o.enableVertexAttribArray(b.uv)):o.disableVertexAttribArray(b.uv));b.uv2>=0&&(k.__webglUV2Buffer?(o.bindBuffer(o.ARRAY_BUFFER,k.__webglUV2Buffer),o.vertexAttribPointer(b.uv2,2,o.FLOAT,!1,0,0),o.enableVertexAttribArray(b.uv2)): -o.disableVertexAttribArray(b.uv2));h.skinning&&b.skinVertexA>=0&&b.skinVertexB>=0&&b.skinIndex>=0&&b.skinWeight>=0&&(o.bindBuffer(o.ARRAY_BUFFER,k.__webglSkinVertexABuffer),o.vertexAttribPointer(b.skinVertexA,4,o.FLOAT,!1,0,0),o.bindBuffer(o.ARRAY_BUFFER,k.__webglSkinVertexBBuffer),o.vertexAttribPointer(b.skinVertexB,4,o.FLOAT,!1,0,0),o.bindBuffer(o.ARRAY_BUFFER,k.__webglSkinIndicesBuffer),o.vertexAttribPointer(b.skinIndex,4,o.FLOAT,!1,0,0),o.bindBuffer(o.ARRAY_BUFFER,k.__webglSkinWeightsBuffer), -o.vertexAttribPointer(b.skinWeight,4,o.FLOAT,!1,0,0));m instanceof THREE.Mesh?(h.wireframe?(o.lineWidth(h.wireframeLinewidth),o.bindBuffer(o.ELEMENT_ARRAY_BUFFER,k.__webglLineBuffer),o.drawElements(o.LINES,k.__webglLineCount,o.UNSIGNED_SHORT,0)):(o.bindBuffer(o.ELEMENT_ARRAY_BUFFER,k.__webglFaceBuffer),o.drawElements(o.TRIANGLES,k.__webglFaceCount,o.UNSIGNED_SHORT,0)),P.data.vertices+=k.__webglFaceCount,P.data.faces+=k.__webglFaceCount/3,P.data.drawCalls++):m instanceof THREE.Line?(m=m.type==THREE.LineStrip? -o.LINE_STRIP:o.LINES,o.lineWidth(h.linewidth),o.drawArrays(m,0,k.__webglLineCount),P.data.drawCalls++):m instanceof THREE.ParticleSystem?(o.drawArrays(o.POINTS,0,k.__webglParticleCount),P.data.drawCalls++):m instanceof THREE.Ribbon&&(o.drawArrays(o.TRIANGLE_STRIP,0,k.__webglVertexCount),P.data.drawCalls++)}}function h(b,e,c){if(!b.__webglVertexBuffer)b.__webglVertexBuffer=o.createBuffer();if(!b.__webglNormalBuffer)b.__webglNormalBuffer=o.createBuffer();b.hasPos&&(o.bindBuffer(o.ARRAY_BUFFER,b.__webglVertexBuffer), -o.bufferData(o.ARRAY_BUFFER,b.positionArray,o.DYNAMIC_DRAW),o.enableVertexAttribArray(e.attributes.position),o.vertexAttribPointer(e.attributes.position,3,o.FLOAT,!1,0,0));if(b.hasNormal){o.bindBuffer(o.ARRAY_BUFFER,b.__webglNormalBuffer);if(c==THREE.FlatShading){var f,k,h,m,n,p,t,u,v,w,x=b.count*3;for(w=0;w=0;c--)b[c].object==e&&b.splice(c,1)}function E(b){function e(b){var k=[];c=0;for(f=b.length;c65535&&(t[o].counter+=1,p=t[o].hash+"_"+t[o].counter,b.geometryGroups[p]==void 0&&(b.geometryGroups[p]={faces:[], -materials:n,vertices:0,numMorphTargets:u})),b.geometryGroups[p].faces.push(k),b.geometryGroups[p].vertices+=m;b.geometryGroupsList=[];for(var v in b.geometryGroups)b.geometryGroupsList.push(b.geometryGroups[v])}function N(b,e,c){b.push({buffer:e,object:c,opaque:{list:[],count:0},transparent:{list:[],count:0}})}function F(b){if(b!=fa){switch(b){case THREE.AdditiveBlending:o.blendEquation(o.FUNC_ADD);o.blendFunc(o.SRC_ALPHA,o.ONE);break;case THREE.SubtractiveBlending:o.blendEquation(o.FUNC_ADD);o.blendFunc(o.ZERO, -o.ONE_MINUS_SRC_COLOR);break;case THREE.MultiplyBlending:o.blendEquation(o.FUNC_ADD);o.blendFunc(o.ZERO,o.SRC_COLOR);break;default:o.blendEquationSeparate(o.FUNC_ADD,o.FUNC_ADD),o.blendFuncSeparate(o.SRC_ALPHA,o.ONE_MINUS_SRC_ALPHA,o.ONE,o.ONE_MINUS_SRC_ALPHA)}fa=b}}function I(b,e,c){(c.width&c.width-1)==0&&(c.height&c.height-1)==0?(o.texParameteri(b,o.TEXTURE_WRAP_S,S(e.wrapS)),o.texParameteri(b,o.TEXTURE_WRAP_T,S(e.wrapT)),o.texParameteri(b,o.TEXTURE_MAG_FILTER,S(e.magFilter)),o.texParameteri(b, -o.TEXTURE_MIN_FILTER,S(e.minFilter)),o.generateMipmap(b)):(o.texParameteri(b,o.TEXTURE_WRAP_S,o.CLAMP_TO_EDGE),o.texParameteri(b,o.TEXTURE_WRAP_T,o.CLAMP_TO_EDGE),o.texParameteri(b,o.TEXTURE_MAG_FILTER,O(e.magFilter)),o.texParameteri(b,o.TEXTURE_MIN_FILTER,O(e.minFilter)))}function C(b,e){if(b.needsUpdate){if(!b.__webglInit)b.__webglInit=!0,b.__webglTexture=o.createTexture();o.activeTexture(o.TEXTURE0+e);o.bindTexture(o.TEXTURE_2D,b.__webglTexture);b instanceof THREE.DataTexture?o.texImage2D(o.TEXTURE_2D, -0,S(b.format),b.image.width,b.image.height,0,S(b.format),o.UNSIGNED_BYTE,b.image.data):o.texImage2D(o.TEXTURE_2D,0,o.RGBA,o.RGBA,o.UNSIGNED_BYTE,b.image);I(o.TEXTURE_2D,b,b.image);b.needsUpdate=!1}else o.activeTexture(o.TEXTURE0+e),o.bindTexture(o.TEXTURE_2D,b.__webglTexture)}function K(b){var e=b instanceof THREE.WebGLRenderTargetCube;if(b&&!b.__webglFramebuffer){if(b.depthBuffer===void 0)b.depthBuffer=!0;if(b.stencilBuffer===void 0)b.stencilBuffer=!0;b.__webglRenderbuffer=o.createRenderbuffer(); -b.__webglTexture=o.createTexture();if(e){o.bindTexture(o.TEXTURE_CUBE_MAP,b.__webglTexture);I(o.TEXTURE_CUBE_MAP,b,b);b.__webglFramebuffer=[];for(var c=0;c<6;c++)b.__webglFramebuffer[c]=o.createFramebuffer(),o.texImage2D(o.TEXTURE_CUBE_MAP_POSITIVE_X+c,0,S(b.format),b.width,b.height,0,S(b.format),S(b.type),null)}else b.__webglFramebuffer=o.createFramebuffer(),o.bindTexture(o.TEXTURE_2D,b.__webglTexture),I(o.TEXTURE_2D,b,b),o.texImage2D(o.TEXTURE_2D,0,S(b.format),b.width,b.height,0,S(b.format),S(b.type), -null);o.bindRenderbuffer(o.RENDERBUFFER,b.__webglRenderbuffer);if(e)for(c=0;c<6;++c)o.bindFramebuffer(o.FRAMEBUFFER,b.__webglFramebuffer[c]),o.framebufferTexture2D(o.FRAMEBUFFER,o.COLOR_ATTACHMENT0,o.TEXTURE_CUBE_MAP_POSITIVE_X+c,b.__webglTexture,0);else o.bindFramebuffer(o.FRAMEBUFFER,b.__webglFramebuffer),o.framebufferTexture2D(o.FRAMEBUFFER,o.COLOR_ATTACHMENT0,o.TEXTURE_2D,b.__webglTexture,0);b.depthBuffer&&!b.stencilBuffer?(o.renderbufferStorage(o.RENDERBUFFER,o.DEPTH_COMPONENT16,b.width,b.height), -o.framebufferRenderbuffer(o.FRAMEBUFFER,o.DEPTH_ATTACHMENT,o.RENDERBUFFER,b.__webglRenderbuffer)):b.depthBuffer&&b.stencilBuffer?(o.renderbufferStorage(o.RENDERBUFFER,o.DEPTH_STENCIL,b.width,b.height),o.framebufferRenderbuffer(o.FRAMEBUFFER,o.DEPTH_STENCIL_ATTACHMENT,o.RENDERBUFFER,b.__webglRenderbuffer)):o.renderbufferStorage(o.RENDERBUFFER,o.RGBA4,b.width,b.height);e?o.bindTexture(o.TEXTURE_CUBE_MAP,null):o.bindTexture(o.TEXTURE_2D,null);o.bindRenderbuffer(o.RENDERBUFFER,null);o.bindFramebuffer(o.FRAMEBUFFER, -null)}var f,k;b?(e=e?b.__webglFramebuffer[b.activeCubeFace]:b.__webglFramebuffer,c=b.width,b=b.height,k=f=0):(e=null,c=ea,b=qa,f=X,k=ja);e!=R&&(o.bindFramebuffer(o.FRAMEBUFFER,e),o.viewport(f,k,c,b),R=e)}function U(b){b instanceof THREE.WebGLRenderTargetCube?(o.bindTexture(o.TEXTURE_CUBE_MAP,b.__webglTexture),o.generateMipmap(o.TEXTURE_CUBE_MAP),o.bindTexture(o.TEXTURE_CUBE_MAP,null)):(o.bindTexture(o.TEXTURE_2D,b.__webglTexture),o.generateMipmap(o.TEXTURE_2D),o.bindTexture(o.TEXTURE_2D,null))}function L(b, -e){var c;b=="fragment"?c=o.createShader(o.FRAGMENT_SHADER):b=="vertex"&&(c=o.createShader(o.VERTEX_SHADER));o.shaderSource(c,e);o.compileShader(c);if(!o.getShaderParameter(c,o.COMPILE_STATUS))return console.error(o.getShaderInfoLog(c)),console.error(e),null;return c}function O(b){switch(b){case THREE.NearestFilter:case THREE.NearestMipMapNearestFilter:case THREE.NearestMipMapLinearFilter:return o.NEAREST;default:return o.LINEAR}}function S(b){switch(b){case THREE.RepeatWrapping:return o.REPEAT;case THREE.ClampToEdgeWrapping:return o.CLAMP_TO_EDGE; -case THREE.MirroredRepeatWrapping:return o.MIRRORED_REPEAT;case THREE.NearestFilter:return o.NEAREST;case THREE.NearestMipMapNearestFilter:return o.NEAREST_MIPMAP_NEAREST;case THREE.NearestMipMapLinearFilter:return o.NEAREST_MIPMAP_LINEAR;case THREE.LinearFilter:return o.LINEAR;case THREE.LinearMipMapNearestFilter:return o.LINEAR_MIPMAP_NEAREST;case THREE.LinearMipMapLinearFilter:return o.LINEAR_MIPMAP_LINEAR;case THREE.ByteType:return o.BYTE;case THREE.UnsignedByteType:return o.UNSIGNED_BYTE;case THREE.ShortType:return o.SHORT; -case THREE.UnsignedShortType:return o.UNSIGNED_SHORT;case THREE.IntType:return o.INT;case THREE.UnsignedShortType:return o.UNSIGNED_INT;case THREE.FloatType:return o.FLOAT;case THREE.AlphaFormat:return o.ALPHA;case THREE.RGBFormat:return o.RGB;case THREE.RGBAFormat:return o.RGBA;case THREE.LuminanceFormat:return o.LUMINANCE;case THREE.LuminanceAlphaFormat:return o.LUMINANCE_ALPHA}return 0}var P=this,o,W=[],na=null,R=null,ia=!0,aa=null,ma=null,fa=null,ga=null,da=null,$=null,ca=null,X=0,ja=0,ea=0,qa= -0,V=[new THREE.Vector4,new THREE.Vector4,new THREE.Vector4,new THREE.Vector4,new THREE.Vector4,new THREE.Vector4],pa=new THREE.Matrix4,va=new Float32Array(16),ra=new Float32Array(16),sa=new THREE.Vector4,Ca={ambient:[0,0,0],directional:{length:0,colors:[],positions:[]},point:{length:0,colors:[],positions:[],distances:[]}},b=b||{},wa=b.canvas!==void 0?b.canvas:document.createElement("canvas"),Aa=b.stencil!==void 0?b.stencil:!0,za=b.preserveDrawingBuffer!==void 0?b.preserveDrawingBuffer:!1,Fa=b.antialias!== -void 0?b.antialias:!1,M=b.clearColor!==void 0?new THREE.Color(b.clearColor):new THREE.Color(0),Z=b.clearAlpha!==void 0?b.clearAlpha:0;_maxLights=b.maxLights!==void 0?b.maxLights:4;this.data={vertices:0,faces:0,drawCalls:0};this.maxMorphTargets=8;this.domElement=wa;this.sortObjects=this.autoClear=!0;this.shadowMapBias=0.0039;this.shadowMapDarkness=0.5;this.shadowMapHeight=this.shadowMapWidth=512;this.shadowCameraNear=1;this.shadowCameraFar=5E3;this.shadowCameraFov=50;this.shadowMap=[];this.shadowMapEnabled= -!1;this.shadowMapSoft=!0;var T,xa=[],b=THREE.ShaderLib.depthRGBA,ha=THREE.UniformsUtils.clone(b.uniforms),ka=new THREE.MeshShaderMaterial({fragmentShader:b.fragmentShader,vertexShader:b.vertexShader,uniforms:ha}),ya=new THREE.MeshShaderMaterial({fragmentShader:b.fragmentShader,vertexShader:b.vertexShader,uniforms:ha,morphTargets:!0});ka._shadowPass=!0;ya._shadowPass=!0;try{if(!(o=wa.getContext("experimental-webgl",{antialias:Fa,stencil:Aa,preserveDrawingBuffer:za})))throw"Error creating WebGL context."; -console.log(navigator.userAgent+" | "+o.getParameter(o.VERSION)+" | "+o.getParameter(o.VENDOR)+" | "+o.getParameter(o.RENDERER)+" | "+o.getParameter(o.SHADING_LANGUAGE_VERSION))}catch(ta){console.error(ta)}o.clearColor(0,0,0,1);o.clearDepth(1);o.clearStencil(0);o.enable(o.DEPTH_TEST);o.depthFunc(o.LEQUAL);o.frontFace(o.CCW);o.cullFace(o.BACK);o.enable(o.CULL_FACE);o.enable(o.BLEND);o.blendEquation(o.FUNC_ADD);o.blendFunc(o.SRC_ALPHA,o.ONE_MINUS_SRC_ALPHA);o.clearColor(M.r,M.g,M.b,Z);this.context= -o;var oa=o.getParameter(o.MAX_VERTEX_TEXTURE_IMAGE_UNITS)>0,Y={};Y.vertices=new Float32Array(16);Y.faces=new Uint16Array(6);i=0;Y.vertices[i++]=-1;Y.vertices[i++]=-1;Y.vertices[i++]=0;Y.vertices[i++]=1;Y.vertices[i++]=1;Y.vertices[i++]=-1;Y.vertices[i++]=1;Y.vertices[i++]=1;Y.vertices[i++]=1;Y.vertices[i++]=1;Y.vertices[i++]=1;Y.vertices[i++]=0;Y.vertices[i++]=-1;Y.vertices[i++]=1;Y.vertices[i++]=0;i=Y.vertices[i++]=0;Y.faces[i++]=0;Y.faces[i++]=1;Y.faces[i++]=2;Y.faces[i++]=0;Y.faces[i++]=2;Y.faces[i++]= -3;Y.vertexBuffer=o.createBuffer();Y.elementBuffer=o.createBuffer();o.bindBuffer(o.ARRAY_BUFFER,Y.vertexBuffer);o.bufferData(o.ARRAY_BUFFER,Y.vertices,o.STATIC_DRAW);o.bindBuffer(o.ELEMENT_ARRAY_BUFFER,Y.elementBuffer);o.bufferData(o.ELEMENT_ARRAY_BUFFER,Y.faces,o.STATIC_DRAW);Y.program=o.createProgram();o.attachShader(Y.program,L("fragment",THREE.ShaderLib.sprite.fragmentShader));o.attachShader(Y.program,L("vertex",THREE.ShaderLib.sprite.vertexShader));o.linkProgram(Y.program);Y.attributes={};Y.uniforms= -{};Y.attributes.position=o.getAttribLocation(Y.program,"position");Y.attributes.uv=o.getAttribLocation(Y.program,"uv");Y.uniforms.uvOffset=o.getUniformLocation(Y.program,"uvOffset");Y.uniforms.uvScale=o.getUniformLocation(Y.program,"uvScale");Y.uniforms.rotation=o.getUniformLocation(Y.program,"rotation");Y.uniforms.scale=o.getUniformLocation(Y.program,"scale");Y.uniforms.alignment=o.getUniformLocation(Y.program,"alignment");Y.uniforms.map=o.getUniformLocation(Y.program,"map");Y.uniforms.opacity=o.getUniformLocation(Y.program, -"opacity");Y.uniforms.useScreenCoordinates=o.getUniformLocation(Y.program,"useScreenCoordinates");Y.uniforms.affectedByDistance=o.getUniformLocation(Y.program,"affectedByDistance");Y.uniforms.screenPosition=o.getUniformLocation(Y.program,"screenPosition");Y.uniforms.modelViewMatrix=o.getUniformLocation(Y.program,"modelViewMatrix");Y.uniforms.projectionMatrix=o.getUniformLocation(Y.program,"projectionMatrix");var Ga=!1;this.setSize=function(b,e){wa.width=b;wa.height=e;this.setViewport(0,0,wa.width, -wa.height)};this.setViewport=function(b,e,c,f){X=b;ja=e;ea=c;qa=f;o.viewport(X,ja,ea,qa)};this.setScissor=function(b,e,c,f){o.scissor(b,e,c,f)};this.enableScissorTest=function(b){b?o.enable(o.SCISSOR_TEST):o.disable(o.SCISSOR_TEST)};this.enableDepthBufferWrite=function(b){ia=b;o.depthMask(b)};this.setClearColorHex=function(b,e){M.setHex(b);Z=e;o.clearColor(M.r,M.g,M.b,Z)};this.setClearColor=function(b,e){M.copy(b);Z=e;o.clearColor(M.r,M.g,M.b,Z)};this.clear=function(){o.clear(o.COLOR_BUFFER_BIT|o.DEPTH_BUFFER_BIT| -o.STENCIL_BUFFER_BIT)};this.getContext=function(){return o};this.deallocateObject=function(b){if(b.__webglInit)if(b.__webglInit=!1,delete b._modelViewMatrix,delete b._normalMatrixArray,delete b._modelViewMatrixArray,delete b._objectMatrixArray,b instanceof THREE.Mesh)for(g in b.geometry.geometryGroups){var e=b.geometry.geometryGroups[g];o.deleteBuffer(e.__webglVertexBuffer);o.deleteBuffer(e.__webglNormalBuffer);o.deleteBuffer(e.__webglTangentBuffer);o.deleteBuffer(e.__webglColorBuffer);o.deleteBuffer(e.__webglUVBuffer); -o.deleteBuffer(e.__webglUV2Buffer);o.deleteBuffer(e.__webglSkinVertexABuffer);o.deleteBuffer(e.__webglSkinVertexBBuffer);o.deleteBuffer(e.__webglSkinIndicesBuffer);o.deleteBuffer(e.__webglSkinWeightsBuffer);o.deleteBuffer(e.__webglFaceBuffer);o.deleteBuffer(e.__webglLineBuffer);if(e.numMorphTargets)for(var c=0,f=e.numMorphTargets;c=0&&o.enableVertexAttribArray(w.position);w.color>=0&&o.enableVertexAttribArray(w.color);w.normal>=0&&o.enableVertexAttribArray(w.normal);w.tangent>=0&&o.enableVertexAttribArray(w.tangent);b.skinning&&w.skinVertexA>=0&&w.skinVertexB>=0&&w.skinIndex>=0&&w.skinWeight>=0&&(o.enableVertexAttribArray(w.skinVertexA),o.enableVertexAttribArray(w.skinVertexB),o.enableVertexAttribArray(w.skinIndex), -o.enableVertexAttribArray(w.skinWeight));if(b.attributes)for(k in b.attributes)w[k]!==void 0&&w[k]>=0&&o.enableVertexAttribArray(w[k]);if(b.morphTargets)for(k=b.numSupportedMorphTargets=0;k=0&&(o.enableVertexAttribArray(w[M]),b.numSupportedMorphTargets++)};this.clearTarget=function(b,c,e,f){K(b);b=0;c&&(b|=o.COLOR_BUFFER_BIT);e&&(b|=o.DEPTH_BUFFER_BIT);f&&(b|=o.STENCIL_BUFFER_BIT);o.clear(b)};this.render=function(b,c,o,v){var M,T,D,Z,G,H,E,V,ka=b.lights, -C=b.fog;this.shadowMapEnabled&&z(b,c);P.data.vertices=0;P.data.faces=0;P.data.drawCalls=0;c.matrixAutoUpdate&&c.update(void 0,!0);b.update(void 0,!1,c);c.matrixWorldInverse.flattenToArray(ra);c.projectionMatrix.flattenToArray(va);pa.multiply(c.projectionMatrix,c.matrixWorldInverse);u(pa);this.initWebGLObjects(b);K(o);(this.autoClear||v)&&this.clear();G=b.__webglObjects.length;for(v=0;v=0;v--)if(M=b.__webglObjects[v],M.render){E=M.object;V=M.buffer;D=M.opaque;m(E);for(M=0;M0||x.faceVertexUvs.length>0)n.__uvArray=new Float32Array(t*2);if(x.faceUvs.length>1||x.faceVertexUvs.length>1)n.__uv2Array=new Float32Array(t*2)}if(p.geometry.skinWeights.length&&p.geometry.skinIndices.length)n.__skinVertexAArray= -new Float32Array(t*4),n.__skinVertexBArray=new Float32Array(t*4),n.__skinIndexArray=new Float32Array(t*4),n.__skinWeightArray=new Float32Array(t*4);n.__faceArray=new Uint16Array(T*3+(p.geometry.edgeFaces?p.geometry.edgeFaces.length*6:0));n.__lineArray=new Uint16Array(z*2);if(n.numMorphTargets){n.__morphTargetsArrays=[];x=0;for(M=n.numMorphTargets;x=0;h--)e[h]==f&&e.splice(h,1)}else f instanceof THREE.MarchingCubes&&H(e.__webglObjectsImmediate,f);b.__objectsRemoved.splice(0,1)}e=0;for(f=b.__webglObjects.length;e0&&(o.bindBuffer(o.ARRAY_BUFFER,t.__webglColorBuffer),o.bufferData(o.ARRAY_BUFFER,sa,Z));Fa&&(o.bindBuffer(o.ARRAY_BUFFER,t.__webglNormalBuffer),o.bufferData(o.ARRAY_BUFFER,ma,Z));Za&&wa.hasTangents&&(o.bindBuffer(o.ARRAY_BUFFER,t.__webglTangentBuffer),o.bufferData(o.ARRAY_BUFFER,$,Z));za&&S>0&&(o.bindBuffer(o.ARRAY_BUFFER,t.__webglUVBuffer),o.bufferData(o.ARRAY_BUFFER,ja,Z));za&&ra>0&&(o.bindBuffer(o.ARRAY_BUFFER,t.__webglUV2Buffer), -o.bufferData(o.ARRAY_BUFFER,fa,Z));Aa&&(o.bindBuffer(o.ELEMENT_ARRAY_BUFFER,t.__webglFaceBuffer),o.bufferData(o.ELEMENT_ARRAY_BUFFER,qa,Z),o.bindBuffer(o.ELEMENT_ARRAY_BUFFER,t.__webglLineBuffer),o.bufferData(o.ELEMENT_ARRAY_BUFFER,ia,Z));Q>0&&(o.bindBuffer(o.ARRAY_BUFFER,t.__webglSkinVertexABuffer),o.bufferData(o.ARRAY_BUFFER,aa,Z),o.bindBuffer(o.ARRAY_BUFFER,t.__webglSkinVertexBBuffer),o.bufferData(o.ARRAY_BUFFER,ea,Z),o.bindBuffer(o.ARRAY_BUFFER,t.__webglSkinIndicesBuffer),o.bufferData(o.ARRAY_BUFFER, -ta,Z),o.bindBuffer(o.ARRAY_BUFFER,t.__webglSkinWeightsBuffer),o.bufferData(o.ARRAY_BUFFER,da,Z));T&&(delete t.__inittedArrays,delete t.__colorArray,delete t.__normalArray,delete t.__tangentArray,delete t.__uvArray,delete t.__uv2Array,delete t.__faceArray,delete t.__vertexArray,delete t.__lineArray,delete t.__skinVertexAArray,delete t.__skinVertexBArray,delete t.__skinIndexArray,delete t.__skinWeightArray)}h.__dirtyVertices=!1;h.__dirtyMorphTargets=!1;h.__dirtyElements=!1;h.__dirtyUvs=!1;h.__dirtyNormals= -!1;h.__dirtyTangents=!1;h.__dirtyColors=!1;G(m)}else if(k instanceof THREE.Ribbon){h=k.geometry;if(h.__dirtyVertices||h.__dirtyColors){k=h;m=o.DYNAMIC_DRAW;n=z=T=T=void 0;x=k.vertices;p=k.colors;v=x.length;t=p.length;u=k.__vertexArray;Z=k.__colorArray;M=k.__dirtyColors;if(k.__dirtyVertices){for(T=0;T1&&(e-=1)}c===void 0&&(c={h:0,s:0,v:0});c.h=e;c.s=k;c.v=m;return c}, -clamp:function(b,c,e){return be?e:b}};THREE.ColorUtils.__hsv={h:0,s:0,v:0}; -THREE.GeometryUtils={merge:function(b,c){var e=c instanceof THREE.Mesh,f=b.vertices.length,h=e?c.geometry:c,m=b.vertices,k=h.vertices,n=b.faces,u=h.faces,p=b.faceVertexUvs[0],h=h.faceVertexUvs[0];e&&c.matrixAutoUpdate&&c.updateMatrix();for(var v=0,t=k.length;v1&&(f=1-f,h=1-h);m=1-f-h;k.copy(b);k.multiplyScalar(f);n.copy(c);n.multiplyScalar(h);k.addSelf(n);n.copy(e);n.multiplyScalar(m);k.addSelf(n);return k},randomPointInFace:function(b, -c,e){var f,h,m;if(b instanceof THREE.Face3)return f=c.vertices[b.a].position,h=c.vertices[b.b].position,m=c.vertices[b.c].position,THREE.GeometryUtils.randomPointInTriangle(f,h,m);else if(b instanceof THREE.Face4){f=c.vertices[b.a].position;h=c.vertices[b.b].position;m=c.vertices[b.c].position;var c=c.vertices[b.d].position,k;e?b._area1&&b._area2?(e=b._area1,k=b._area2):(e=THREE.GeometryUtils.triangleArea(f,h,c),k=THREE.GeometryUtils.triangleArea(h,m,c),b._area1=e,b._area2=k):(e=THREE.GeometryUtils.triangleArea(f, -h,c),k=THREE.GeometryUtils.triangleArea(h,m,c));return THREE.GeometryUtils.random()*(e+k)b?e(c,k-1):p[k] 0\nuniform vec3 directionalLightColor[ MAX_DIR_LIGHTS ];\nuniform vec3 directionalLightDirection[ MAX_DIR_LIGHTS ];\n#endif\n#if MAX_POINT_LIGHTS > 0\nuniform vec3 pointLightColor[ MAX_POINT_LIGHTS ];\nvarying vec4 vPointLight[ MAX_POINT_LIGHTS ];\n#endif\nvarying vec3 vViewPosition;", -THREE.ShaderChunk.fog_pars_fragment,"void main() {\ngl_FragColor = vec4( 1.0 );\nvec4 mColor = vec4( uDiffuseColor, uOpacity );\nvec4 mSpecular = vec4( uSpecularColor, uOpacity );\nvec3 specularTex = vec3( 1.0 );\nvec3 normalTex = texture2D( tNormal, vUv ).xyz * 2.0 - 1.0;\nnormalTex.xy *= uNormalScale;\nnormalTex = normalize( normalTex );\nif( enableDiffuse )\ngl_FragColor = gl_FragColor * texture2D( tDiffuse, vUv );\nif( enableAO )\ngl_FragColor = gl_FragColor * texture2D( tAO, vUv );\nif( enableSpecular )\nspecularTex = texture2D( tSpecular, vUv ).xyz;\nmat3 tsb = mat3( vTangent, vBinormal, vNormal );\nvec3 finalNormal = tsb * normalTex;\nvec3 normal = normalize( finalNormal );\nvec3 viewPosition = normalize( vViewPosition );\n#if MAX_POINT_LIGHTS > 0\nvec4 pointTotal = vec4( vec3( 0.0 ), 1.0 );\nfor ( int i = 0; i < MAX_POINT_LIGHTS; i ++ ) {\nvec3 pointVector = normalize( vPointLight[ i ].xyz );\nvec3 pointHalfVector = normalize( vPointLight[ i ].xyz + viewPosition );\nfloat pointDistance = vPointLight[ i ].w;\nfloat pointDotNormalHalf = dot( normal, pointHalfVector );\nfloat pointDiffuseWeight = max( dot( normal, pointVector ), 0.0 );\nfloat pointSpecularWeight = 0.0;\nif ( pointDotNormalHalf >= 0.0 )\npointSpecularWeight = specularTex.r * pow( pointDotNormalHalf, uShininess );\npointTotal += pointDistance * vec4( pointLightColor[ i ], 1.0 ) * ( mColor * pointDiffuseWeight + mSpecular * pointSpecularWeight * pointDiffuseWeight );\n}\n#endif\n#if MAX_DIR_LIGHTS > 0\nvec4 dirTotal = vec4( vec3( 0.0 ), 1.0 );\nfor( int i = 0; i < MAX_DIR_LIGHTS; i++ ) {\nvec4 lDirection = viewMatrix * vec4( directionalLightDirection[ i ], 0.0 );\nvec3 dirVector = normalize( lDirection.xyz );\nvec3 dirHalfVector = normalize( lDirection.xyz + viewPosition );\nfloat dirDotNormalHalf = dot( normal, dirHalfVector );\nfloat dirDiffuseWeight = max( dot( normal, dirVector ), 0.0 );\nfloat dirSpecularWeight = 0.0;\nif ( dirDotNormalHalf >= 0.0 )\ndirSpecularWeight = specularTex.r * pow( dirDotNormalHalf, uShininess );\ndirTotal += vec4( directionalLightColor[ i ], 1.0 ) * ( mColor * dirDiffuseWeight + mSpecular * dirSpecularWeight * dirDiffuseWeight );\n}\n#endif\nvec4 totalLight = vec4( ambientLightColor * uAmbientColor, uOpacity );\n#if MAX_DIR_LIGHTS > 0\ntotalLight += dirTotal;\n#endif\n#if MAX_POINT_LIGHTS > 0\ntotalLight += pointTotal;\n#endif\ngl_FragColor = gl_FragColor * totalLight;", -THREE.ShaderChunk.fog_fragment,"}"].join("\n"),vertexShader:"attribute vec4 tangent;\n#ifdef VERTEX_TEXTURES\nuniform sampler2D tDisplacement;\nuniform float uDisplacementScale;\nuniform float uDisplacementBias;\n#endif\nvarying vec3 vTangent;\nvarying vec3 vBinormal;\nvarying vec3 vNormal;\nvarying vec2 vUv;\n#if MAX_POINT_LIGHTS > 0\nuniform vec3 pointLightPosition[ MAX_POINT_LIGHTS ];\nuniform float pointLightDistance[ MAX_POINT_LIGHTS ];\nvarying vec4 vPointLight[ MAX_POINT_LIGHTS ];\n#endif\nvarying vec3 vViewPosition;\nvoid main() {\nvec4 mPosition = objectMatrix * vec4( position, 1.0 );\nvec4 mvPosition = modelViewMatrix * vec4( position, 1.0 );\nvViewPosition = -mvPosition.xyz;\nvNormal = normalize( normalMatrix * normal );\nvTangent = normalize( normalMatrix * tangent.xyz );\nvBinormal = cross( vNormal, vTangent ) * tangent.w;\nvBinormal = normalize( vBinormal );\nvUv = uv;\n#if MAX_POINT_LIGHTS > 0\nfor( int i = 0; i < MAX_POINT_LIGHTS; i++ ) {\nvec4 lPosition = viewMatrix * vec4( pointLightPosition[ i ], 1.0 );\nvec3 lVector = lPosition.xyz - mvPosition.xyz;\nfloat lDistance = 1.0;\nif ( pointLightDistance[ i ] > 0.0 )\nlDistance = 1.0 - min( ( length( lVector ) / pointLightDistance[ i ] ), 1.0 );\nlVector = normalize( lVector );\nvPointLight[ i ] = vec4( lVector, lDistance );\n}\n#endif\n#ifdef VERTEX_TEXTURES\nvec3 dv = texture2D( tDisplacement, uv ).xyz;\nfloat df = uDisplacementScale * dv.x + uDisplacementBias;\nvec4 displacedPosition = vec4( vNormal.xyz * df, 0.0 ) + mvPosition;\ngl_Position = projectionMatrix * displacedPosition;\n#else\ngl_Position = projectionMatrix * mvPosition;\n#endif\n}"}, -cube:{uniforms:{tCube:{type:"t",value:1,texture:null}},vertexShader:"varying vec3 vViewPosition;\nvoid main() {\nvec4 mPosition = objectMatrix * vec4( position, 1.0 );\nvViewPosition = cameraPosition - mPosition.xyz;\ngl_Position = projectionMatrix * modelViewMatrix * vec4( position, 1.0 );\n}",fragmentShader:"uniform samplerCube tCube;\nvarying vec3 vViewPosition;\nvoid main() {\nvec3 wPos = cameraPosition - vViewPosition;\ngl_FragColor = textureCube( tCube, vec3( - wPos.x, wPos.yz ) );\n}"}}}; -THREE.Curve=function(){};THREE.Curve.prototype.getPoint=function(){console.log("Warning, getPoint() not implemented!");return null};THREE.Curve.prototype.getPointAt=function(b){return this.getPoint(this.getUtoTmapping(b))};THREE.Curve.prototype.getPoints=function(b){b||(b=5);var c,e=[];for(c=0;c<=b;c++)e.push(this.getPoint(c/b));return e};THREE.Curve.prototype.getSpacedPoints=function(b){b||(b=5);var c,e=[];for(c=0;c<=b;c++)e.push(this.getPointAt(c/b));return e}; -THREE.Curve.prototype.getLength=function(){var b=this.getLengths();return b[b.length-1]};THREE.Curve.prototype.getLengths=function(b){b||(b=200);if(this.cacheArcLengths&&this.cacheArcLengths.length==b+1)return this.cacheArcLengths;var c=[],e,f=this.getPoint(0),h,m=0;c.push(0);for(h=1;h<=b;h++)e=this.getPoint(h/b),m+=e.distanceTo(f),c.push(m),f=e;return this.cacheArcLengths=c}; -THREE.Curve.prototype.getUtoTmapping=function(b,c){var e=this.getLengths(),f=0,h=e.length,m;m=c?c:b*e[h-1];time=Date.now();for(var k=0,n=h-1,u;k<=n;)if(f=Math.floor(k+(n-k)/2),u=e[f]-m,u<0)k=f+1;else if(u>0)n=f-1;else{n=f;break}f=n;if(e[f]==m)return f/(h-1);k=e[f];return e=(f+(m-k)/(e[f+1]-k))/(h-1)};THREE.Curve.prototype.getNormalVector=function(b){b=this.getTangent(b);return new THREE.Vector2(-b.y,b.x)}; -THREE.Curve.prototype.getTangent=function(b){var c=b-1.0E-4;b+=1.0E-4;c<0&&(c=0);b>1&&(b=1);var c=this.getPoint(c),b=this.getPoint(b),e=new THREE.Vector2;e.sub(b,c);return e.unit()};THREE.LineCurve=function(b,c){b instanceof THREE.Vector2?(this.v1=b,this.v2=c):THREE.LineCurve.oldConstructor.apply(this,arguments)};THREE.LineCurve.oldConstructor=function(b,c,e,f){this.constructor(new THREE.Vector2(b,c),new THREE.Vector2(e,f))};THREE.LineCurve.prototype=new THREE.Curve; -THREE.LineCurve.prototype.constructor=THREE.LineCurve;THREE.LineCurve.prototype.getPoint=function(b){var c=new THREE.Vector2;c.sub(this.v2,this.v1);c.multiplyScalar(b).addSelf(this.v1);return c};THREE.LineCurve.prototype.getPointAt=function(b){return this.getPoint(b)};THREE.LineCurve.prototype.getTangent=function(){var b=new THREE.Vector2;b.sub(this.v2,this.v1);b.normalize();return b}; -THREE.QuadraticBezierCurve=function(b,c,e){if(!(c instanceof THREE.Vector2))var f=Array.prototype.slice.call(arguments),b=new THREE.Vector2(f[0],f[1]),c=new THREE.Vector2(f[2],f[3]),e=new THREE.Vector2(f[4],f[5]);this.v0=b;this.v1=c;this.v2=e};THREE.QuadraticBezierCurve.prototype=new THREE.Curve;THREE.QuadraticBezierCurve.prototype.constructor=THREE.QuadraticBezierCurve; -THREE.QuadraticBezierCurve.prototype.getPoint=function(b){var c;c=THREE.Shape.Utils.b2(b,this.v0.x,this.v1.x,this.v2.x);b=THREE.Shape.Utils.b2(b,this.v0.y,this.v1.y,this.v2.y);return new THREE.Vector2(c,b)};THREE.QuadraticBezierCurve.prototype.getTangent=function(b){var c;c=THREE.Curve.Utils.tangentQuadraticBezier(b,this.v0.x,this.v1.x,this.v2.x);b=THREE.Curve.Utils.tangentQuadraticBezier(b,this.v0.y,this.v1.y,this.v2.y);c=new THREE.Vector2(c,b);c.normalize();return c}; -THREE.CubicBezierCurve=function(b,c,e,f){if(!(c instanceof THREE.Vector2))var h=Array.prototype.slice.call(arguments),b=new THREE.Vector2(h[0],h[1]),c=new THREE.Vector2(h[2],h[3]),e=new THREE.Vector2(h[4],h[5]),f=new THREE.Vector2(h[6],h[7]);this.v0=b;this.v1=c;this.v2=e;this.v3=f};THREE.CubicBezierCurve.prototype=new THREE.Curve;THREE.CubicBezierCurve.prototype.constructor=THREE.CubicBezierCurve; -THREE.CubicBezierCurve.prototype.getPoint=function(b){var c;c=THREE.Shape.Utils.b3(b,this.v0.x,this.v1.x,this.v2.x,this.v3.x);b=THREE.Shape.Utils.b3(b,this.v0.y,this.v1.y,this.v2.y,this.v3.y);return new THREE.Vector2(c,b)};THREE.CubicBezierCurve.prototype.getTangent=function(b){var c;c=THREE.Curve.Utils.tangentCubicBezier(b,this.v0.x,this.v1.x,this.v2.x,this.v3.x);b=THREE.Curve.Utils.tangentCubicBezier(b,this.v0.y,this.v1.y,this.v2.y,this.v3.y);c=new THREE.Vector2(c,b);c.normalize();return c}; -THREE.SplineCurve=function(b){this.points=b};THREE.SplineCurve.prototype=new THREE.Curve;THREE.SplineCurve.prototype.constructor=THREE.SplineCurve; -THREE.SplineCurve.prototype.getPoint=function(b){var c=new THREE.Vector2,e=[],f=this.points,h;h=(f.length-1)*b;b=Math.floor(h);h-=b;e[0]=b==0?b:b-1;e[1]=b;e[2]=b>f.length-2?b:b+1;e[3]=b>f.length-3?b:b+2;c.x=THREE.Curve.Utils.interpolate(f[e[0]].x,f[e[1]].x,f[e[2]].x,f[e[3]].x,h);c.y=THREE.Curve.Utils.interpolate(f[e[0]].y,f[e[1]].y,f[e[2]].y,f[e[3]].y,h);return c};THREE.ArcCurve=function(b,c,e,f,h,m){this.aX=b;this.aY=c;this.aRadius=e;this.aStartAngle=f;this.aEndAngle=h;this.aClockwise=m}; -THREE.ArcCurve.prototype=new THREE.Curve;THREE.ArcCurve.prototype.constructor=THREE.ArcCurve;THREE.ArcCurve.prototype.getPoint=function(b){var c=this.aEndAngle-this.aStartAngle;this.aClockwise||(b=1-b);b=this.aStartAngle+b*c;return new THREE.Vector2(this.aX+this.aRadius*Math.cos(b),this.aY+this.aRadius*Math.sin(b))}; -THREE.Curve.Utils={tangentQuadraticBezier:function(b,c,e,f){return 2*(1-b)*(e-c)+2*b*(f-e)},tangentCubicBezier:function(b,c,e,f,h){return-3*c*(1-b)*(1-b)+3*e*(1-b)*(1-b)-6*b*e*(1-b)+6*b*f*(1-b)-3*b*b*f+3*b*b*h},tangentSpline:function(b){return 6*b*b-6*b+(3*b*b-4*b+1)+(-6*b*b+6*b)+(3*b*b-2*b)},interpolate:function(b,c,e,f,h){var b=(e-b)*0.5,f=(f-c)*0.5,m=h*h;return(2*c-2*e+b+f)*h*m+(-3*c+3*e-2*b-f)*m+b*h+c}}; -THREE.Curve.create=function(b,c){b.prototype=new THREE.Curve;b.prototype.constructor=b;b.prototype.getPoint=c;return b};THREE.LineCurve3=THREE.Curve.create(function(b,c){this.v1=b;this.v2=c},function(b){var c=new THREE.Vector3;c.sub(v2,v1);c.multiplyScalar(b);c.addSelf(this.v1);return c}); -THREE.QuadraticBezierCurve3=THREE.Curve.create(function(b,c,e){this.v0=b;this.v1=c;this.v2=e},function(b){var c,e;c=THREE.Shape.Utils.b2(b,this.v0.x,this.v1.x,this.v2.x);e=THREE.Shape.Utils.b2(b,this.v0.y,this.v1.y,this.v2.y);b=THREE.Shape.Utils.b2(b,this.v0.z,this.v1.z,this.v2.z);return new THREE.Vector3(c,e,b)});THREE.CurvePath=function(){this.curves=[];this.bends=[]};THREE.CurvePath.prototype=new THREE.Curve;THREE.CurvePath.prototype.constructor=THREE.CurvePath;THREE.CurvePath.prototype.add=function(b){this.curves.push(b)}; -THREE.CurvePath.prototype.checkConnection=function(){};THREE.CurvePath.prototype.closePath=function(){};THREE.CurvePath.prototype.getPoint=function(b){for(var c=b*this.getLength(),e=this.getCurveLengths(),b=0;b=c)return c=e[b]-c,b=this.curves[b],c=1-c/b.getLength(),b.getPointAt(c);b++}return null};THREE.CurvePath.prototype.getLength=function(){var b=this.getCurveLengths();return b[b.length-1]}; -THREE.CurvePath.prototype.getCurveLengths=function(){if(this.cacheLengths&&this.cacheLengths.length==this.curves.length)return this.cacheLengths;var b=[],c=0,e,f=this.curves.length;for(e=0;ec)c=m.x;else if(m.xe)e=m.y;else if(m.y0?(k=e[e.length-1],w=k.x,z=k.y):(k=this.actions[f-1].args,w=k[k.length-2],z=k[k.length-1]);for(k=1;k<=b;k++)y=k/b,m=THREE.Shape.Utils.b2(y,w,t,n),y=THREE.Shape.Utils.b2(y,z,x, -u),e.push(new THREE.Vector2(m,y));break;case THREE.PathActions.BEZIER_CURVE_TO:n=m[4];u=m[5];t=m[0];x=m[1];p=m[2];v=m[3];e.length>0?(k=e[e.length-1],w=k.x,z=k.y):(k=this.actions[f-1].args,w=k[k.length-2],z=k[k.length-1]);for(k=1;k<=b;k++)y=k/b,m=THREE.Shape.Utils.b3(y,w,t,p,n),y=THREE.Shape.Utils.b3(y,z,x,v,u),e.push(new THREE.Vector2(m,y));break;case THREE.PathActions.CSPLINE_THRU:k=this.actions[f-1].args;k=[new THREE.Vector2(k[k.length-2],k[k.length-1])];y=b*m[0].length;k=k.concat(m[0]);m=new THREE.SplineCurve(k); -for(k=1;k<=y;k++)e.push(m.getPointAt(k/y));break;case THREE.PathActions.ARC:k=this.actions[f-1].args;n=m[0];u=m[1];p=m[2];t=m[3];y=m[4];x=!!m[5];v=k[k.length-2];w=k[k.length-1];k.length==0&&(v=w=0);z=y-t;var B=b*2;for(k=1;k<=B;k++)y=k/B,x||(y=1-y),y=t+y*z,m=v+n+p*Math.cos(y),y=w+u+p*Math.sin(y),e.push(new THREE.Vector2(m,y))}c&&e.push(e[0]);return e};THREE.Path.prototype.transform=function(b,c){this.getBoundingBox();return this.getWrapPoints(this.getPoints(c),b)}; -THREE.Path.prototype.nltransform=function(b,c,e,f,h,m){var k=this.getPoints(),n,u,p,v,t;n=0;for(u=k.length;n=0?n-1:e.length-1;m=k-1>=0?k-1:p.length-1;var y=[p[k],e[n],e[h]];t=THREE.FontUtils.Triangulate.area(y);var B=[p[k],p[m],e[n]];x=THREE.FontUtils.Triangulate.area(B);w=n;v=k;n+=1;k+=-1;n<0&&(n+=e.length);n%= -e.length;k<0&&(k+=p.length);k%=p.length;h=n-1>=0?n-1:e.length-1;m=k-1>=0?k-1:p.length-1;y=[p[k],e[n],e[h]];y=THREE.FontUtils.Triangulate.area(y);B=[p[k],p[m],e[n]];B=THREE.FontUtils.Triangulate.area(B);t+x>y+B&&(n=w,k=v,n<0&&(n+=e.length),n%=e.length,k<0&&(k+=p.length),k%=p.length,h=n-1>=0?n-1:e.length-1,m=k-1>=0?k-1:p.length-1);t=e.slice(0,n);x=e.slice(n);w=p.slice(k);v=p.slice(0,k);m=[p[k],p[m],e[n]];z.push([p[k],e[n],e[h]]);z.push(m);e=t.concat(w).concat(v).concat(x)}return{shape:e,isolatedPts:z, -allpoints:f}},triangulateShape:function(b,c){var e=THREE.Shape.Utils.removeHoles(b,c),f=e.allpoints,h=e.isolatedPts,e=THREE.FontUtils.Triangulate(e.shape,!1),m,k,n,u,p={};m=0;for(k=f.length;m1)console.log("THREE.Animation.update: Warning! Scale out of bounds:"+f+" on bone "+w),f=f<0?0:1;if(e==="pos")if(e=b.position,this.interpolationType===THREE.AnimationHandler.LINEAR)e.x=h[0]+(m[0]-h[0])*f,e.y=h[1]+(m[1]-h[1])*f,e.z=h[2]+(m[2]-h[2])*f;else{if(this.interpolationType===THREE.AnimationHandler.CATMULLROM||this.interpolationType===THREE.AnimationHandler.CATMULLROM_FORWARD)if(this.points[0]= -this.getPrevKeyWith("pos",w,k.index-1).pos,this.points[1]=h,this.points[2]=m,this.points[3]=this.getNextKeyWith("pos",w,n.index+1).pos,f=f*0.33+0.33,h=this.interpolateCatmullRom(this.points,f),e.x=h[0],e.y=h[1],e.z=h[2],this.interpolationType===THREE.AnimationHandler.CATMULLROM_FORWARD)f=this.interpolateCatmullRom(this.points,f*1.01),this.target.set(f[0],f[1],f[2]),this.target.subSelf(e),this.target.y=0,this.target.normalize(),f=Math.atan2(this.target.x,this.target.z),b.rotation.set(0,f,0)}else if(e=== -"rot")THREE.Quaternion.slerp(h,m,b.quaternion,f);else if(e==="scl")e=b.scale,e.x=h[0]+(m[0]-h[0])*f,e.y=h[1]+(m[1]-h[1])*f,e.z=h[2]+(m[2]-h[2])*f}}if(this.JITCompile&&v[0][p]===void 0){this.hierarchy[0].update(void 0,!0);for(w=0;wb.length-2?m:m+1;e[3]=m>b.length-3?m:m+2;m=b[e[0]];n=b[e[1]];u=b[e[2]];p=b[e[3]];e=h*h;k=h*e;f[0]=this.interpolate(m[0],n[0],u[0],p[0],h,e,k);f[1]=this.interpolate(m[1],n[1],u[1],p[1],h,e,k);f[2]=this.interpolate(m[2],n[2],u[2],p[2],h,e,k);return f}; -THREE.Animation.prototype.interpolate=function(b,c,e,f,h,m,k){b=(e-b)*0.5;f=(f-c)*0.5;return(2*(c-e)+b+f)*k+(-3*(c-e)-2*b-f)*m+b*h+c};THREE.Animation.prototype.getNextKeyWith=function(b,c,e){var f=this.data.hierarchy[c].keys;for(this.interpolationType===THREE.AnimationHandler.CATMULLROM||this.interpolationType===THREE.AnimationHandler.CATMULLROM_FORWARD?e=e0?e:0:e>=0?e:e+f.length;e>=0;e--)if(f[e][b]!==void 0)return f[e];return this.data.hierarchy[c].keys[f.length-1]}; -THREE.FirstPersonCamera=function(b){function c(b,c){return function(){c.apply(b,arguments)}}THREE.Camera.call(this,b.fov,b.aspect,b.near,b.far,b.target);this.movementSpeed=1;this.lookSpeed=0.005;this.noFly=!1;this.lookVertical=!0;this.autoForward=!1;this.activeLook=!0;this.heightSpeed=!1;this.heightCoef=1;this.heightMin=0;this.constrainVertical=!1;this.verticalMin=0;this.verticalMax=3.14;this.domElement=document;this.lastUpdate=(new Date).getTime();this.tdiff=0;if(b){if(b.movementSpeed!==void 0)this.movementSpeed= -b.movementSpeed;if(b.lookSpeed!==void 0)this.lookSpeed=b.lookSpeed;if(b.noFly!==void 0)this.noFly=b.noFly;if(b.lookVertical!==void 0)this.lookVertical=b.lookVertical;if(b.autoForward!==void 0)this.autoForward=b.autoForward;if(b.activeLook!==void 0)this.activeLook=b.activeLook;if(b.heightSpeed!==void 0)this.heightSpeed=b.heightSpeed;if(b.heightCoef!==void 0)this.heightCoef=b.heightCoef;if(b.heightMin!==void 0)this.heightMin=b.heightMin;if(b.heightMax!==void 0)this.heightMax=b.heightMax;if(b.constrainVertical!== -void 0)this.constrainVertical=b.constrainVertical;if(b.verticalMin!==void 0)this.verticalMin=b.verticalMin;if(b.verticalMax!==void 0)this.verticalMax=b.verticalMax;if(b.domElement!==void 0)this.domElement=b.domElement}this.theta=this.phi=this.lon=this.lat=this.mouseY=this.mouseX=this.autoSpeedFactor=0;this.mouseDragOn=this.freeze=this.moveRight=this.moveLeft=this.moveBackward=this.moveForward=!1;this.windowHalfX=window.innerWidth/2;this.windowHalfY=window.innerHeight/2;this.onMouseDown=function(b){b.preventDefault(); -b.stopPropagation();if(this.activeLook)switch(b.button){case 0:this.moveForward=!0;break;case 2:this.moveBackward=!0}this.mouseDragOn=!0};this.onMouseUp=function(b){b.preventDefault();b.stopPropagation();if(this.activeLook)switch(b.button){case 0:this.moveForward=!1;break;case 2:this.moveBackward=!1}this.mouseDragOn=!1};this.onMouseMove=function(b){this.mouseX=b.clientX-this.windowHalfX;this.mouseY=b.clientY-this.windowHalfY};this.onKeyDown=function(b){switch(b.keyCode){case 38:case 87:this.moveForward= -!0;break;case 37:case 65:this.moveLeft=!0;break;case 40:case 83:this.moveBackward=!0;break;case 39:case 68:this.moveRight=!0;break;case 82:this.moveUp=!0;break;case 70:this.moveDown=!0;break;case 81:this.freeze=!this.freeze}};this.onKeyUp=function(b){switch(b.keyCode){case 38:case 87:this.moveForward=!1;break;case 37:case 65:this.moveLeft=!1;break;case 40:case 83:this.moveBackward=!1;break;case 39:case 68:this.moveRight=!1;break;case 82:this.moveUp=!1;break;case 70:this.moveDown=!1}};this.update= -function(){var b=(new Date).getTime();this.tdiff=(b-this.lastUpdate)/1E3;this.lastUpdate=b;if(!this.freeze){this.autoSpeedFactor=this.heightSpeed?this.tdiff*((this.position.ythis.heightMax?this.heightMax:this.position.y)-this.heightMin)*this.heightCoef:0;var c=this.tdiff*this.movementSpeed;(this.moveForward||this.autoForward&&!this.moveBackward)&&this.translateZ(-(c+this.autoSpeedFactor));this.moveBackward&&this.translateZ(c);this.moveLeft&&this.translateX(-c); -this.moveRight&&this.translateX(c);this.moveUp&&this.translateY(c);this.moveDown&&this.translateY(-c);c=this.tdiff*this.lookSpeed;this.activeLook||(c=0);this.lon+=this.mouseX*c;this.lookVertical&&(this.lat-=this.mouseY*c);this.lat=Math.max(-85,Math.min(85,this.lat));this.phi=(90-this.lat)*Math.PI/180;this.theta=this.lon*Math.PI/180;var b=this.target.position,h=this.position;b.x=h.x+100*Math.sin(this.phi)*Math.cos(this.theta);b.y=h.y+100*Math.cos(this.phi);b.z=h.z+100*Math.sin(this.phi)*Math.sin(this.theta)}b= -1;this.constrainVertical&&(b=3.14/(this.verticalMax-this.verticalMin));this.lon+=this.mouseX*c;this.lookVertical&&(this.lat-=this.mouseY*c*b);this.lat=Math.max(-85,Math.min(85,this.lat));this.phi=(90-this.lat)*Math.PI/180;this.theta=this.lon*Math.PI/180;if(this.constrainVertical)this.phi=(this.phi-0)*(this.verticalMax-this.verticalMin)/3.14+this.verticalMin;b=this.target.position;h=this.position;b.x=h.x+100*Math.sin(this.phi)*Math.cos(this.theta);b.y=h.y+100*Math.cos(this.phi);b.z=h.z+100*Math.sin(this.phi)* -Math.sin(this.theta);this.supr.update.call(this)};this.domElement.addEventListener("contextmenu",function(b){b.preventDefault()},!1);this.domElement.addEventListener("mousemove",c(this,this.onMouseMove),!1);this.domElement.addEventListener("mousedown",c(this,this.onMouseDown),!1);this.domElement.addEventListener("mouseup",c(this,this.onMouseUp),!1);this.domElement.addEventListener("keydown",c(this,this.onKeyDown),!1);this.domElement.addEventListener("keyup",c(this,this.onKeyUp),!1)}; -THREE.FirstPersonCamera.prototype=new THREE.Camera;THREE.FirstPersonCamera.prototype.constructor=THREE.FirstPersonCamera;THREE.FirstPersonCamera.prototype.supr=THREE.Camera.prototype;THREE.FirstPersonCamera.prototype.translate=function(b,c){this.matrix.rotateAxis(c);if(this.noFly)c.y=0;this.position.addSelf(c.multiplyScalar(b));this.target.position.addSelf(c.multiplyScalar(b))}; -THREE.PathCamera=function(b){function c(b,e,c,f){var k={name:c,fps:0.6,length:f,hierarchy:[]},h,m=e.getControlPointsArray(),n=e.getLength(),u=m.length,G=0;h=u-1;e={parent:-1,keys:[]};e.keys[0]={time:0,pos:m[0],rot:[0,0,0,1],scl:[1,1,1]};e.keys[h]={time:f,pos:m[h],rot:[0,0,0,1],scl:[1,1,1]};for(h=1;h=0?f:f+h;f=this.verticalAngleMap.srcRange;k=this.verticalAngleMap.dstRange;var n=k[1]-k[0];this.phi= -TWEEN.Easing.Quadratic.EaseInOut(((this.phi-f[0])*(k[1]-k[0])/(f[1]-f[0])+k[0]-k[0])/n)*n+k[0];f=this.horizontalAngleMap.srcRange;k=this.horizontalAngleMap.dstRange;n=k[1]-k[0];this.theta=TWEEN.Easing.Quadratic.EaseInOut(((this.theta-f[0])*(k[1]-k[0])/(f[1]-f[0])+k[0]-k[0])/n)*n+k[0];f=this.target.position;f.x=100*Math.sin(this.phi)*Math.cos(this.theta);f.y=100*Math.cos(this.phi);f.z=100*Math.sin(this.phi)*Math.sin(this.theta);this.supr.update.call(this,b,e,c)};this.onMouseMove=function(b){this.mouseX= -b.clientX-this.windowHalfX;this.mouseY=b.clientY-this.windowHalfY};this.spline=new THREE.Spline;this.spline.initFromArray(this.waypoints);this.useConstantSpeed&&this.spline.reparametrizeByArcLength(this.resamplingCoef);if(this.createDebugDummy){var b=new THREE.MeshLambertMaterial({color:30719}),k=new THREE.MeshLambertMaterial({color:65280}),n=new THREE.CubeGeometry(10,10,20),u=new THREE.CubeGeometry(2,2,10);this.animationParent=new THREE.Mesh(n,b);b=new THREE.Mesh(u,k);b.position.set(0,10,0);this.animation= -c(this.animationParent,this.spline,this.id,this.duration);this.animationParent.addChild(this);this.animationParent.addChild(this.target);this.animationParent.addChild(b)}else this.animation=c(this.animationParent,this.spline,this.id,this.duration),this.animationParent.addChild(this.target),this.animationParent.addChild(this);this.createDebugPath&&f(this.debugPath,this.spline);this.domElement.addEventListener("mousemove",function(b,e){return function(){e.apply(b,arguments)}}(this,this.onMouseMove), -!1)};THREE.PathCamera.prototype=new THREE.Camera;THREE.PathCamera.prototype.constructor=THREE.PathCamera;THREE.PathCamera.prototype.supr=THREE.Camera.prototype;THREE.PathCameraIdCounter=0; -THREE.FlyCamera=function(b){function c(b,c){return function(){c.apply(b,arguments)}}THREE.Camera.call(this,b.fov,b.aspect,b.near,b.far,b.target);this.tmpQuaternion=new THREE.Quaternion;this.movementSpeed=1;this.rollSpeed=0.005;this.autoForward=this.dragToLook=!1;this.domElement=document;if(b){if(b.movementSpeed!==void 0)this.movementSpeed=b.movementSpeed;if(b.rollSpeed!==void 0)this.rollSpeed=b.rollSpeed;if(b.dragToLook!==void 0)this.dragToLook=b.dragToLook;if(b.autoForward!==void 0)this.autoForward= -b.autoForward;if(b.domElement!==void 0)this.domElement=b.domElement}this.useTarget=!1;this.useQuaternion=!0;this.mouseStatus=0;this.moveState={up:0,down:0,left:0,right:0,forward:0,back:0,pitchUp:0,pitchDown:0,yawLeft:0,yawRight:0,rollLeft:0,rollRight:0};this.moveVector=new THREE.Vector3(0,0,0);this.rotationVector=new THREE.Vector3(0,0,0);this.lastUpdate=-1;this.tdiff=0;this.handleEvent=function(b){if(typeof this[b.type]=="function")this[b.type](b)};this.keydown=function(b){if(!b.altKey){switch(b.keyCode){case 16:this.movementSpeedMultiplier= -0.1;break;case 87:this.moveState.forward=1;break;case 83:this.moveState.back=1;break;case 65:this.moveState.left=1;break;case 68:this.moveState.right=1;break;case 82:this.moveState.up=1;break;case 70:this.moveState.down=1;break;case 38:this.moveState.pitchUp=1;break;case 40:this.moveState.pitchDown=1;break;case 37:this.moveState.yawLeft=1;break;case 39:this.moveState.yawRight=1;break;case 81:this.moveState.rollLeft=1;break;case 69:this.moveState.rollRight=1}this.updateMovementVector();this.updateRotationVector()}}; -this.keyup=function(b){switch(b.keyCode){case 16:this.movementSpeedMultiplier=1;break;case 87:this.moveState.forward=0;break;case 83:this.moveState.back=0;break;case 65:this.moveState.left=0;break;case 68:this.moveState.right=0;break;case 82:this.moveState.up=0;break;case 70:this.moveState.down=0;break;case 38:this.moveState.pitchUp=0;break;case 40:this.moveState.pitchDown=0;break;case 37:this.moveState.yawLeft=0;break;case 39:this.moveState.yawRight=0;break;case 81:this.moveState.rollLeft=0;break; -case 69:this.moveState.rollRight=0}this.updateMovementVector();this.updateRotationVector()};this.mousedown=function(b){b.preventDefault();b.stopPropagation();if(this.dragToLook)this.mouseStatus++;else switch(b.button){case 0:this.moveForward=!0;break;case 2:this.moveBackward=!0}};this.mousemove=function(b){if(!this.dragToLook||this.mouseStatus>0){var c=this.getContainerDimensions(),h=c.size[0]/2,m=c.size[1]/2;this.moveState.yawLeft=-(b.clientX-c.offset[0]-h)/h;this.moveState.pitchDown=(b.clientY- -c.offset[1]-m)/m;this.updateRotationVector()}};this.mouseup=function(b){b.preventDefault();b.stopPropagation();if(this.dragToLook)this.mouseStatus--,this.moveState.yawLeft=this.moveState.pitchDown=0;else switch(b.button){case 0:this.moveForward=!1;break;case 2:this.moveBackward=!1}this.updateRotationVector()};this.update=function(){var b=(new Date).getTime();if(this.lastUpdate==-1)this.lastUpdate=b;this.tdiff=(b-this.lastUpdate)/1E3;this.lastUpdate=b;var b=this.tdiff*this.movementSpeed,c=this.tdiff* -this.rollSpeed;this.translateX(this.moveVector.x*b);this.translateY(this.moveVector.y*b);this.translateZ(this.moveVector.z*b);this.tmpQuaternion.set(this.rotationVector.x*c,this.rotationVector.y*c,this.rotationVector.z*c,1).normalize();this.quaternion.multiplySelf(this.tmpQuaternion);this.matrix.setPosition(this.position);this.matrix.setRotationFromQuaternion(this.quaternion);this.matrixWorldNeedsUpdate=!0;this.supr.update.call(this)};this.updateMovementVector=function(){var b=this.moveState.forward|| -this.autoForward&&!this.moveState.back?1:0;this.moveVector.x=-this.moveState.left+this.moveState.right;this.moveVector.y=-this.moveState.down+this.moveState.up;this.moveVector.z=-b+this.moveState.back};this.updateRotationVector=function(){this.rotationVector.x=-this.moveState.pitchDown+this.moveState.pitchUp;this.rotationVector.y=-this.moveState.yawRight+this.moveState.yawLeft;this.rotationVector.z=-this.moveState.rollRight+this.moveState.rollLeft};this.getContainerDimensions=function(){return this.domElement!= -document?{size:[this.domElement.offsetWidth,this.domElement.offsetHeight],offset:[this.domElement.offsetLeft,this.domElement.offsetTop]}:{size:[window.innerWidth,window.innerHeight],offset:[0,0]}};this.domElement.addEventListener("mousemove",c(this,this.mousemove),!1);this.domElement.addEventListener("mousedown",c(this,this.mousedown),!1);this.domElement.addEventListener("mouseup",c(this,this.mouseup),!1);window.addEventListener("keydown",c(this,this.keydown),!1);window.addEventListener("keyup",c(this, -this.keyup),!1);this.updateMovementVector();this.updateRotationVector()};THREE.FlyCamera.prototype=new THREE.Camera;THREE.FlyCamera.prototype.constructor=THREE.FlyCamera;THREE.FlyCamera.prototype.supr=THREE.Camera.prototype; -THREE.RollCamera=function(b,c,e,f){THREE.Camera.call(this,b,c,e,f);this.mouseLook=!0;this.autoForward=!1;this.rollSpeed=this.movementSpeed=this.lookSpeed=1;this.constrainVertical=[-0.9,0.9];this.domElement=document;this.matrixAutoUpdate=this.useTarget=!1;this.forward=new THREE.Vector3(0,0,1);this.roll=0;this.lastUpdate=-1;this.delta=0;var h=new THREE.Vector3,m=new THREE.Vector3,k=new THREE.Vector3,n=new THREE.Matrix4,u=!1,p=1,v=0,t=0,x=0,w=0,z=0,y=window.innerWidth/2,B=window.innerHeight/2;this.update= -function(){var b=(new Date).getTime();if(this.lastUpdate==-1)this.lastUpdate=b;this.delta=(b-this.lastUpdate)/1E3;this.lastUpdate=b;this.mouseLook&&(b=this.delta*this.lookSpeed,this.rotateHorizontally(b*w),this.rotateVertically(b*z));b=this.delta*this.movementSpeed;this.translateZ(b*(v>0||this.autoForward&&!(v<0)?1:v));this.translateX(b*t);this.translateY(b*x);u&&(this.roll+=this.rollSpeed*this.delta*p);if(this.forward.y>this.constrainVertical[1])this.forward.y=this.constrainVertical[1],this.forward.normalize(); -else if(this.forward.y1?e.normalize():e.z=Math.sqrt(1-f*f);h=this.position.clone().subSelf(this.target.position);f=this.up.clone().setLength(e.y);f.addSelf(this.up.clone().crossSelf(h).setLength(e.x));f.addSelf(h.setLength(e.z));return f}; -this.rotateCamera=function(){var b=Math.acos(m.dot(k)/m.length()/k.length());if(b){var c=(new THREE.Vector3).cross(m,k).normalize(),e=new THREE.Quaternion;b*=this.rotateSpeed;e.setFromAxisAngle(c,-b);e.multiplyVector3(h);e.multiplyVector3(this.up);e.multiplyVector3(k);this.staticMoving?m=k:(e.setFromAxisAngle(c,b*(this.dynamicDampingFactor-1)),e.multiplyVector3(m))}};this.zoomCamera=function(){var b=1+(u.y-n.y)*this.zoomSpeed;b!==1&&b>0&&(h.multiplyScalar(b),this.staticMoving?n=u:n.y+=(u.y-n.y)*this.dynamicDampingFactor)}; -this.panCamera=function(){var b=v.clone().subSelf(p);if(b.lengthSq()){b.multiplyScalar(h.length()*this.panSpeed);var c=h.clone().crossSelf(this.up).setLength(b.x);c.addSelf(this.up.clone().setLength(b.y));this.position.addSelf(c);this.target.position.addSelf(c);this.staticMoving?p=v:p.addSelf(b.sub(v,p).multiplyScalar(this.dynamicDampingFactor))}};this.checkDistances=function(){if(!this.noZoom||!this.noPan)this.position.lengthSq()>this.maxDistance*this.maxDistance&&this.position.setLength(this.maxDistance), -h.lengthSq()0){e=new THREE.Vector3(0,0,-1);k(0,0,-v-(m||0));for(u=b;u0){c=new THREE.Vector3(0,0,1);k(0,0,v+(h||0));for(u=b+b/2;u<2*b;u++)n.faces.push(new THREE.Face4(2*b+1,(2*u-2*b+2)%b+b,(2*u-2*b+1)%b+b,(2*u-2*b)%b+b,[c,c,c,c]))}u= -0;for(b=this.faces.length;ub&&(b+=Math.PI*2),anglec=(c+b)/2,new THREE.Vector2(-Math.cos(anglec),-Math.sin(anglec));return f.multiplyScalar(m).addSelf(n).subSelf(b).clone()}function h(b){for(L=b.length;--L>=0;){ga=L;da=L-1;da<0&&(da=b.length- -1);for(var c=0,e=w+v*2,c=0;c=0;S--){P=S/v;o=u*(1-P);P=p*Math.sin(P*Math.PI/2);L=0;for(O=G.length;L0||(v=this.vertices.push(new THREE.Vertex(new THREE.Vector3(t,n,x)))-1);p.push(v)}c.push(p)}for(var w,z,y,h=c.length,e=0;e0)for(f=0;f1&&(w= -this.vertices[k].position.clone(),z=this.vertices[u].position.clone(),y=this.vertices[p].position.clone(),w.normalize(),z.normalize(),y.normalize(),this.faces.push(new THREE.Face3(k,u,p,[new THREE.Vector3(w.x,w.y,w.z),new THREE.Vector3(z.x,z.y,z.z),new THREE.Vector3(y.x,y.y,y.z)])),this.faceVertexUvs[0].push([v,t,B]))}this.computeCentroids();this.computeFaceNormals();this.computeVertexNormals();this.boundingSphere={radius:b}};THREE.SphereGeometry.prototype=new THREE.Geometry; -THREE.SphereGeometry.prototype.constructor=THREE.SphereGeometry; -THREE.TextGeometry=function(b,c){var e=(new THREE.TextPath(b,c)).toShapes();c.amount=c.height!==void 0?c.height:50;if(c.bevelThickness===void 0)c.bevelThickness=10;if(c.bevelSize===void 0)c.bevelSize=8;if(c.bevelEnabled===void 0)c.bevelEnabled=!1;if(c.bend){var f=e[e.length-1].getBoundingBox().maxX;c.bendPath=new THREE.QuadraticBezierCurve(new THREE.Vector2(0,0),new THREE.Vector2(f/2,120),new THREE.Vector2(f,0))}THREE.ExtrudeGeometry.call(this,e,c)};THREE.TextGeometry.prototype=new THREE.ExtrudeGeometry; -THREE.TextGeometry.prototype.constructor=THREE.TextGeometry; -THREE.FontUtils={faces:{},face:"helvetiker",weight:"normal",style:"normal",size:150,divisions:10,getFace:function(){return this.faces[this.face][this.weight][this.style]},getTextShapes:function(b,c){return(new TextPath(b,c)).toShapes()},loadFace:function(b){var c=b.familyName.toLowerCase();this.faces[c]=this.faces[c]||{};this.faces[c][b.cssFontWeight]=this.faces[c][b.cssFontWeight]||{};this.faces[c][b.cssFontWeight][b.cssFontStyle]=b;return this.faces[c][b.cssFontWeight][b.cssFontStyle]=b},drawText:function(b){for(var c= -this.getFace(),e=this.size/c.resolution,f=0,h=String(b).split(""),m=h.length,k=[],b=0;b0)for(p=0;p2;){if(t--<=0){console.log("Warning, unable to triangulate polygon!");if(f)return n;return m}u=p;h<=u&&(u=0);p=u+1;h<=p&&(p=0);v=p+1;h<=v&&(v=0);var x;a:{x=b;var w=u,z=p,y=v,B=h,D=k,G=void 0,H=void 0,E=void 0, -N=void 0,F=void 0,I=void 0,C=void 0,K=void 0,U=void 0,H=x[D[w]].x,E=x[D[w]].y,N=x[D[z]].x,F=x[D[z]].y,I=x[D[y]].x,C=x[D[y]].y;if(1.0E-10>(N-H)*(C-E)-(F-E)*(I-H))x=!1;else{for(G=0;G=0&&S>=0&&o>=0){x=!1; -break a}}x=!0}}if(x){m.push([b[k[u]],b[k[p]],b[k[v]]]);n.push([k[u],k[p],k[v]]);u=p;for(v=p+1;v>7)-127;f|=(h&127)<<16|k<<8;if(f==0&&n==-127)return 0;return(1-2*(m>>7))*(1+f*Math.pow(2,-23))*Math.pow(2,n)}function h(b,c){var e=v(b,c),f=v(b,c+1),k=v(b,c+2);return(v(b,c+3)<<24)+(k<<16)+(f<<8)+e}function u(b,c){var e=v(b,c);return(v(b,c+1)<<8)+e}function p(b,c){var e=v(b,c);return e>127?e-256:e}function v(b,c){return b.charCodeAt(c)&255}function t(c){var e, -f,k;e=h(b,c);f=h(b,c+F);k=h(b,c+I);c=u(b,c+C);D.faces.push(new THREE.Face3(e,f,k,null,null,D.materials[c]))}function x(c){var e,f,k,m,o,p;e=h(b,c);f=h(b,c+F);k=h(b,c+I);m=u(b,c+C);o=h(b,c+K);p=h(b,c+U);c=h(b,c+L);m=D.materials[m];var t=E[p*3],v=E[p*3+1];p=E[p*3+2];var w=E[c*3],M=E[c*3+1],c=E[c*3+2];D.faces.push(new THREE.Face3(e,f,k,[new THREE.Vector3(E[o*3],E[o*3+1],E[o*3+2]),new THREE.Vector3(t,v,p),new THREE.Vector3(w,M,c)],null,m))}function w(c){var e,f,k,m;e=h(b,c);f=h(b,c+O);k=h(b,c+S);m=h(b, -c+P);c=u(b,c+o);D.faces.push(new THREE.Face4(e,f,k,m,null,null,D.materials[c]))}function z(c){var e,f,k,m,p,t,v,w;e=h(b,c);f=h(b,c+O);k=h(b,c+S);m=h(b,c+P);p=u(b,c+o);t=h(b,c+W);v=h(b,c+na);w=h(b,c+R);c=h(b,c+ia);p=D.materials[p];var x=E[v*3],M=E[v*3+1];v=E[v*3+2];var y=E[w*3],T=E[w*3+1];w=E[w*3+2];var z=E[c*3],B=E[c*3+1],c=E[c*3+2];D.faces.push(new THREE.Face4(e,f,k,m,[new THREE.Vector3(E[t*3],E[t*3+1],E[t*3+2]),new THREE.Vector3(x,M,v),new THREE.Vector3(y,T,w),new THREE.Vector3(z,B,c)],null,p))} -function y(c){var e,f,k,m;e=h(b,c);f=h(b,c+aa);k=h(b,c+ma);c=N[e*2];m=N[e*2+1];e=N[f*2];var o=D.faceVertexUvs[0];f=N[f*2+1];var p=N[k*2];k=N[k*2+1];var t=[];t.push(new THREE.UV(c,m));t.push(new THREE.UV(e,f));t.push(new THREE.UV(p,k));o.push(t)}function B(c){var e,f,k,m,o,p;e=h(b,c);f=h(b,c+fa);k=h(b,c+ga);m=h(b,c+da);c=N[e*2];o=N[e*2+1];e=N[f*2];p=N[f*2+1];f=N[k*2];var t=D.faceVertexUvs[0];k=N[k*2+1];var u=N[m*2];m=N[m*2+1];var v=[];v.push(new THREE.UV(c,o));v.push(new THREE.UV(e,p));v.push(new THREE.UV(f, -k));v.push(new THREE.UV(u,m));t.push(v)}var D=this,G=0,H,E=[],N=[],F,I,C,K,U,L,O,S,P,o,W,na,R,ia,aa,ma,fa,ga,da,$,ca,X,ja,ea,qa;THREE.Geometry.call(this);THREE.Loader.prototype.init_materials(D,f,c);H={signature:b.substr(G,8),header_bytes:v(b,G+8),vertex_coordinate_bytes:v(b,G+9),normal_coordinate_bytes:v(b,G+10),uv_coordinate_bytes:v(b,G+11),vertex_index_bytes:v(b,G+12),normal_index_bytes:v(b,G+13),uv_index_bytes:v(b,G+14),material_index_bytes:v(b,G+15),nvertices:h(b,G+16),nnormals:h(b,G+16+4),nuvs:h(b, -G+16+8),ntri_flat:h(b,G+16+12),ntri_smooth:h(b,G+16+16),ntri_flat_uv:h(b,G+16+20),ntri_smooth_uv:h(b,G+16+24),nquad_flat:h(b,G+16+28),nquad_smooth:h(b,G+16+32),nquad_flat_uv:h(b,G+16+36),nquad_smooth_uv:h(b,G+16+40)};G+=H.header_bytes;F=H.vertex_index_bytes;I=H.vertex_index_bytes*2;C=H.vertex_index_bytes*3;K=H.vertex_index_bytes*3+H.material_index_bytes;U=H.vertex_index_bytes*3+H.material_index_bytes+H.normal_index_bytes;L=H.vertex_index_bytes*3+H.material_index_bytes+H.normal_index_bytes*2;O=H.vertex_index_bytes; -S=H.vertex_index_bytes*2;P=H.vertex_index_bytes*3;o=H.vertex_index_bytes*4;W=H.vertex_index_bytes*4+H.material_index_bytes;na=H.vertex_index_bytes*4+H.material_index_bytes+H.normal_index_bytes;R=H.vertex_index_bytes*4+H.material_index_bytes+H.normal_index_bytes*2;ia=H.vertex_index_bytes*4+H.material_index_bytes+H.normal_index_bytes*3;aa=H.uv_index_bytes;ma=H.uv_index_bytes*2;fa=H.uv_index_bytes;ga=H.uv_index_bytes*2;da=H.uv_index_bytes*3;c=H.vertex_index_bytes*3+H.material_index_bytes;qa=H.vertex_index_bytes* -4+H.material_index_bytes;$=H.ntri_flat*c;ca=H.ntri_smooth*(c+H.normal_index_bytes*3);X=H.ntri_flat_uv*(c+H.uv_index_bytes*3);ja=H.ntri_smooth_uv*(c+H.normal_index_bytes*3+H.uv_index_bytes*3);ea=H.nquad_flat*qa;c=H.nquad_smooth*(qa+H.normal_index_bytes*4);qa=H.nquad_flat_uv*(qa+H.uv_index_bytes*4);G+=function(c){for(var f,h,m,n=H.vertex_coordinate_bytes*3,o=c+H.nvertices*n;c=0){y=o.invBindMatrices[u];p.invBindMatrix=y;p.skinningMatrix=new THREE.Matrix4;p.skinningMatrix.multiply(p.world,y);p.weights=[]; -for(y=0;y1){o=new THREE.MeshFaceMaterial;for(j=0;j1?e[1].substr(0,c):"0";e[1].length=0,m=k.indexOf("(")>=0,n;if(h)f=k.split("."),k=f.shift(),f.shift();else if(m){n=k.split("(");k=n.shift();for(f=0;fc){u=p.output[o];break}m=u!==void 0?u instanceof THREE.Matrix4?m.multiply(m,u):m.multiply(m,n.matrix):m.multiply(m,n.matrix)}else m=m.multiply(m,n.matrix);c=m;e.push({time:b,pos:[c.n14, -c.n24,c.n34],rotq:[0,0,0,1],scl:[1,1,1]})}this.keys=e}this.updateMatrix();return this};v.prototype.updateMatrix=function(){this.matrix.identity();for(var b=0;b3)for(k=2;k0&&(this[e.nodeName]=parseFloat(f[0].textContent))}}this.create();return this};K.prototype.create=function(){var b={},c=this.transparency!==void 0&& -this.transparency<1,e;for(e in this)switch(e){case "ambient":case "emission":case "diffuse":case "specular":var f=this[e];if(f instanceof C)if(f.isTexture()){if(this.effect.sampler&&this.effect.surface&&this.effect.sampler.source==this.effect.surface.sid&&(f=ea[this.effect.surface.init_from]))b.map=THREE.ImageUtils.loadTexture(wa+f.init_from),b.map.wrapS=THREE.RepeatWrapping,b.map.wrapT=THREE.RepeatWrapping,b.map.repeat.x=1,b.map.repeat.y=-1}else e=="diffuse"?b.color=f.color.getHex():c||(b[e]=f.color.getHex()); -break;case "shininess":case "reflectivity":b[e]=this[e];break;case "transparency":if(c)b.transparent=!0,b.opacity=this[e],c=!0}b.shading=Fa;return this.material=new THREE.MeshLambertMaterial(b)};U.prototype.parse=function(b){for(var c=0;c=0,f=b.indexOf("(")>=0,k,h;if(e)c=b.split("."),b=c.shift(),h=c.shift();else if(f){k=b.split("(");b=k.shift();for(c=0;c1&&(U=[new THREE.MeshFaceMaterial]);object=new THREE.Mesh(F,U);object.name=w;object.position.set(H[0],H[1],H[2]);q?(object.quaternion.set(q[0],q[1],q[2],q[3]),object.useQuaternion=!0):object.rotation.set(r[0],r[1],r[2]);object.scale.set(s[0],s[1],s[2]);object.visible=G.visible;R.scene.addObject(object);R.objects[w]=object;G.meshCollider&&(b=THREE.CollisionUtils.MeshColliderWBox(object),R.scene.collisions.colliders.push(b)); -if(G.castsShadow)b=new THREE.ShadowVolume(F),R.scene.addChild(b),b.position=object.position,b.rotation=object.rotation,b.scale=object.scale;G.trigger&&G.trigger.toLowerCase()!="none"&&(b={type:G.trigger,object:G},R.triggers[object.name]=b)}}else H=G.position,r=G.rotation,q=G.quaternion,s=G.scale,q=0,object=new THREE.Object3D,object.name=w,object.position.set(H[0],H[1],H[2]),q?(object.quaternion.set(q[0],q[1],q[2],q[3]),object.useQuaternion=!0):object.rotation.set(r[0],r[1],r[2]),object.scale.set(s[0], -s[1],s[2]),object.visible=G.visible!==void 0?G.visible:!1,R.scene.addObject(object),R.objects[w]=object,R.empties[w]=object,G.trigger&&G.trigger.toLowerCase()!="none"&&(b={type:G.trigger,object:G},R.triggers[object.name]=b)}function u(b){return function(c){R.geometries[b]=c;n();P-=1;e.onLoadComplete();v()}}function p(b){return function(c){R.geometries[b]=c}}function v(){e.callbackProgress({totalModels:W,totalTextures:na,loadedModels:W-P,loadedTextures:na-o},R);e.onLoadProgress();P==0&&o==0&&c(R)} -var t,x,w,z,y,B,D,G,H,E,N,F,I,C,K,U,L,O,S,P,o,W,na,R;O=b.data;K=new THREE.BinaryLoader;S=new THREE.JSONLoader;o=P=0;R={scene:new THREE.Scene,geometries:{},materials:{},textures:{},objects:{},cameras:{},lights:{},fogs:{},triggers:{},empties:{}};b=!1;for(w in O.objects)if(G=O.objects[w],G.meshCollider){b=!0;break}if(b)R.scene.collisions=new THREE.CollisionSystem;if(O.transform){b=O.transform.position;E=O.transform.rotation;var ia=O.transform.scale;b&&R.scene.position.set(b[0],b[1],b[2]);E&&R.scene.rotation.set(E[0], -E[1],E[2]);ia&&R.scene.scale.set(ia[0],ia[1],ia[2]);(b||E||ia)&&R.scene.updateMatrix()}b=function(){o-=1;v();e.onLoadComplete()};for(y in O.cameras){E=O.cameras[y];if(E.type=="perspective")I=new THREE.Camera(E.fov,E.aspect,E.near,E.far);else if(E.type=="ortho")I=new THREE.Camera,I.projectionMatrix=THREE.Matrix4.makeOrtho(E.left,E.right,E.top,E.bottom,E.near,E.far);H=E.position;E=E.target;I.position.set(H[0],H[1],H[2]);I.target.position.set(E[0],E[1],E[2]);R.cameras[y]=I}for(z in O.lights)y=O.lights[z], -I=y.color!==void 0?y.color:16777215,E=y.intensity!==void 0?y.intensity:1,y.type=="directional"?(H=y.direction,L=new THREE.DirectionalLight(I,E),L.position.set(H[0],H[1],H[2]),L.position.normalize()):y.type=="point"?(H=y.position,d=y.distance,L=new THREE.PointLight(I,E,d),L.position.set(H[0],H[1],H[2])):y.type=="ambient"&&(L=new THREE.AmbientLight(I)),R.scene.addLight(L),R.lights[z]=L;for(B in O.fogs)z=O.fogs[B],z.type=="linear"?C=new THREE.Fog(0,z.near,z.far):z.type=="exp2"&&(C=new THREE.FogExp2(0, -z.density)),E=z.color,C.color.setRGB(E[0],E[1],E[2]),R.fogs[B]=C;if(R.cameras&&O.defaults.camera)R.currentCamera=R.cameras[O.defaults.camera];if(R.fogs&&O.defaults.fog)R.scene.fog=R.fogs[O.defaults.fog];E=O.defaults.bgcolor;R.bgColor=new THREE.Color;R.bgColor.setRGB(E[0],E[1],E[2]);R.bgColorAlpha=O.defaults.bgalpha;for(t in O.geometries)if(B=O.geometries[t],B.type=="bin_mesh"||B.type=="ascii_mesh")P+=1,e.onLoadStart();W=P;for(t in O.geometries)B=O.geometries[t],B.type=="cube"?(F=new THREE.CubeGeometry(B.width, -B.height,B.depth,B.segmentsWidth,B.segmentsHeight,B.segmentsDepth,null,B.flipped,B.sides),R.geometries[t]=F):B.type=="plane"?(F=new THREE.PlaneGeometry(B.width,B.height,B.segmentsWidth,B.segmentsHeight),R.geometries[t]=F):B.type=="sphere"?(F=new THREE.SphereGeometry(B.radius,B.segmentsWidth,B.segmentsHeight),R.geometries[t]=F):B.type=="cylinder"?(F=new THREE.CylinderGeometry(B.numSegs,B.topRad,B.botRad,B.height,B.topOffset,B.botOffset),R.geometries[t]=F):B.type=="torus"?(F=new THREE.TorusGeometry(B.radius, -B.tube,B.segmentsR,B.segmentsT),R.geometries[t]=F):B.type=="icosahedron"?(F=new THREE.IcosahedronGeometry(B.subdivisions),R.geometries[t]=F):B.type=="bin_mesh"?K.load({model:f(B.url,O.urlBaseType),callback:u(t)}):B.type=="ascii_mesh"?S.load({model:f(B.url,O.urlBaseType),callback:u(t)}):B.type=="embedded_mesh"&&(B=O.embeds[B.id])&&S.createModel(B,p(t),"");for(D in O.textures)if(t=O.textures[D],t.url instanceof Array){o+=t.url.length;for(K=0;K=57344&&(c-=2048);c++;for(var e=new Float32Array(8*c),f=1,h=0;h<8;h++){for(var m=0,k=0;k>1^-(n&1);e[8*k+h]=m}f+=c}c=b.length-f;m=new Uint16Array(c);for(h=k=0;h=this.maxCount-3&&n(this)};this.begin=function(){this.count=0; -this.hasNormal=this.hasPos=!1};this.end=function(b){if(this.count!=0){for(var c=this.count*3;cthis.size-1&&(u=this.size-1);var x=Math.floor(p-n);x<1&&(x=1);p=Math.floor(p+n);p>this.size-1&&(p=this.size-1);var w=Math.floor(v-n);w<1&&(w=1);n=Math.floor(v+n);n>this.size-1&&(n=this.size- -1);for(var z,y,B,D,G,H;t0&&(this.field[B+z]+=D)}}};this.addPlaneX=function(b,c){var h,m,k,n,u,p=this.size,v=this.yd,t=this.zd,x=this.field,w=p*Math.sqrt(b/c);w>p&&(w=p);for(h=0;h0)for(m=0;mv&&(z=v);for(m=0;m0){u=m*t;for(h=0;hsize&&(dist=size);for(k=0;k0){u=zd*k;for(m=0;mm?this.hits.push(h):this.hits.unshift(h),m=f;return this.hits}; -THREE.CollisionSystem.prototype.rayCastNearest=function(b){var c=this.rayCastAll(b);if(c.length==0)return null;for(var e=0;c[e]instanceof THREE.MeshCollider;){var f=this.rayMesh(b,c[e]);if(f.distc.length)return null;return c[e]}; -THREE.CollisionSystem.prototype.rayCast=function(b,c){if(c instanceof THREE.PlaneCollider)return this.rayPlane(b,c);else if(c instanceof THREE.SphereCollider)return this.raySphere(b,c);else if(c instanceof THREE.BoxCollider)return this.rayBox(b,c);else if(c instanceof THREE.MeshCollider&&c.box)return this.rayBox(b,c.box)}; -THREE.CollisionSystem.prototype.rayMesh=function(b,c){for(var e=this.makeRayLocal(b,c.mesh),f=Number.MAX_VALUE,h,m=0;m=n*h))return Number.MAX_VALUE;k/=n;n=THREE.CollisionSystem.__v3;n.copy(b.direction);n.multiplyScalar(k);n.addSelf(b.origin);Math.abs(m.x)> -Math.abs(m.y)?Math.abs(m.x)>Math.abs(m.z)?(b=n.y-c.y,m=e.y-c.y,h=f.y-c.y,n=n.z-c.z,e=e.z-c.z,f=f.z-c.z):(b=n.x-c.x,m=e.x-c.x,h=f.x-c.x,n=n.y-c.y,e=e.y-c.y,f=f.y-c.y):Math.abs(m.y)>Math.abs(m.z)?(b=n.x-c.x,m=e.x-c.x,h=f.x-c.x,n=n.z-c.z,e=e.z-c.z,f=f.z-c.z):(b=n.x-c.x,m=e.x-c.x,h=f.x-c.x,n=n.y-c.y,e=e.y-c.y,f=f.y-c.y);c=m*f-e*h;if(c==0)return Number.MAX_VALUE;c=1/c;f=(b*f-n*h)*c;if(!(f>=0))return Number.MAX_VALUE;c*=m*n-e*b;if(!(c>=0))return Number.MAX_VALUE;if(!(1-f-c>=0))return Number.MAX_VALUE;return k}; -THREE.CollisionSystem.prototype.makeRayLocal=function(b,c){var e=THREE.CollisionSystem.__m;THREE.Matrix4.makeInvert(c.matrixWorld,e);var f=THREE.CollisionSystem.__r;f.origin.copy(b.origin);f.direction.copy(b.direction);e.multiplyVector3(f.origin);e.rotateAxis(f.direction);f.direction.normalize();return f}; -THREE.CollisionSystem.prototype.rayBox=function(b,c){var e;c.dynamic&&c.mesh&&c.mesh.matrixWorld?e=this.makeRayLocal(b,c.mesh):(e=THREE.CollisionSystem.__r,e.origin.copy(b.origin),e.direction.copy(b.direction));var f=0,h=0,m=0,k=0,n=0,u=0,p=!0;e.origin.xc.max.x&&(f=c.max.x-e.origin.x,f/=e.direction.x,p=!1,k=1);e.origin.yc.max.y&&(h=c.max.y-e.origin.y,h/=e.direction.y, -p=!1,n=1);e.origin.zc.max.z&&(m=c.max.z-e.origin.z,m/=e.direction.z,p=!1,u=1);if(p)return-1;p=0;h>f&&(p=1,f=h);m>f&&(p=2,f=m);switch(p){case 0:n=e.origin.y+e.direction.y*f;if(nc.max.y)return Number.MAX_VALUE;e=e.origin.z+e.direction.z*f;if(ec.max.z)return Number.MAX_VALUE;c.normal.set(k,0,0);break;case 1:k=e.origin.x+e.direction.x*f;if(kc.max.x)return Number.MAX_VALUE;e=e.origin.z+e.direction.z* -f;if(ec.max.z)return Number.MAX_VALUE;c.normal.set(0,n,0);break;case 2:k=e.origin.x+e.direction.x*f;if(kc.max.x)return Number.MAX_VALUE;n=e.origin.y+e.direction.y*f;if(nc.max.y)return Number.MAX_VALUE;c.normal.set(0,0,u)}return f};THREE.CollisionSystem.prototype.rayPlane=function(b,c){var e=b.direction.dot(c.normal),f=c.point.dot(c.normal);if(e<0)e=(f-b.origin.dot(c.normal))/e;else return Number.MAX_VALUE;return e>0?e:Number.MAX_VALUE}; -THREE.CollisionSystem.prototype.raySphere=function(b,c){var e=c.center.clone().subSelf(b.origin);if(e.lengthSq=0)return Math.abs(f)-Math.sqrt(e);return Number.MAX_VALUE};THREE.CollisionSystem.__v1=new THREE.Vector3;THREE.CollisionSystem.__v2=new THREE.Vector3;THREE.CollisionSystem.__v3=new THREE.Vector3;THREE.CollisionSystem.__nr=new THREE.Vector3;THREE.CollisionSystem.__m=new THREE.Matrix4; -THREE.CollisionSystem.__r=new THREE.Ray;THREE.CollisionUtils={};THREE.CollisionUtils.MeshOBB=function(b){b.geometry.computeBoundingBox();var c=b.geometry.boundingBox,e=new THREE.Vector3(c.x[0],c.y[0],c.z[0]),c=new THREE.Vector3(c.x[1],c.y[1],c.z[1]),e=new THREE.BoxCollider(e,c);e.mesh=b;return e};THREE.CollisionUtils.MeshAABB=function(b){var c=THREE.CollisionUtils.MeshOBB(b);c.min.addSelf(b.position);c.max.addSelf(b.position);c.dynamic=!1;return c}; -THREE.CollisionUtils.MeshColliderWBox=function(b){return new THREE.MeshCollider(b,THREE.CollisionUtils.MeshOBB(b))}; -if(THREE.WebGLRenderer)THREE.AnaglyphWebGLRenderer=function(b){THREE.WebGLRenderer.call(this,b);var c=this,e=this.setSize,f=this.render,h=new THREE.Camera,m=new THREE.Camera,k=new THREE.Matrix4,n=new THREE.Matrix4,u,p,v;h.useTarget=m.useTarget=!1;h.matrixAutoUpdate=m.matrixAutoUpdate=!1;var b={minFilter:THREE.LinearFilter,magFilter:THREE.NearestFilter,format:THREE.RGBAFormat},t=new THREE.WebGLRenderTarget(512,512,b),x=new THREE.WebGLRenderTarget(512,512,b),w=new THREE.Camera(53,1,1,1E4);w.position.z= -2;_material=new THREE.MeshShaderMaterial({uniforms:{mapLeft:{type:"t",value:0,texture:t},mapRight:{type:"t",value:1,texture:x}},vertexShader:"varying vec2 vUv;\nvoid main() {\nvUv = vec2( uv.x, 1.0 - uv.y );\ngl_Position = projectionMatrix * modelViewMatrix * vec4( position, 1.0 );\n}",fragmentShader:"uniform sampler2D mapLeft;\nuniform sampler2D mapRight;\nvarying vec2 vUv;\nvoid main() {\nvec4 colorL, colorR;\nvec2 uv = vUv;\ncolorL = texture2D( mapLeft, uv );\ncolorR = texture2D( mapRight, uv );\ngl_FragColor = vec4( colorL.g * 0.7 + colorL.b * 0.3, colorR.g, colorR.b, colorL.a + colorR.a ) * 1.1;\n}"}); -var z=new THREE.Scene;z.addObject(new THREE.Mesh(new THREE.PlaneGeometry(2,2),_material));this.setSize=function(b,f){e.call(c,b,f);t.width=b;t.height=f;x.width=b;x.height=f};this.render=function(b,e){e.update(null,!0);if(u!==e.aspect||p!==e.near||v!==e.fov){u=e.aspect;p=e.near;v=e.fov;var D=e.projectionMatrix.clone(),G=125/30*0.5,H=G*p/125,E=p*Math.tan(v*Math.PI/360),N;k.n14=G;n.n14=-G;G=-E*u+H;N=E*u+H;D.n11=2*p/(N-G);D.n13=(N+G)/(N-G);h.projectionMatrix=D.clone();G=-E*u-H;N=E*u-H;D.n11=2*p/(N-G); -D.n13=(N+G)/(N-G);m.projectionMatrix=D.clone()}h.matrix=e.matrixWorld.clone().multiplySelf(n);h.update(null,!0);h.position.copy(e.position);h.near=p;h.far=e.far;f.call(c,b,h,t,!0);m.matrix=e.matrixWorld.clone().multiplySelf(k);m.update(null,!0);m.position.copy(e.position);m.near=p;m.far=e.far;f.call(c,b,m,x,!0);f.call(c,z,w)}}; -if(THREE.WebGLRenderer)THREE.CrosseyedWebGLRenderer=function(b){THREE.WebGLRenderer.call(this,b);this.autoClear=!1;var c=this,e=this.setSize,f=this.render,h,m,k=new THREE.Camera,n=new THREE.Camera;c.separation=10;if(b&&b.separation!==void 0)c.separation=b.separation;(new THREE.Camera(53,window.innerWidth/2/window.innerHeight,1,1E4)).position.z=-10;this.setSize=function(b,f){e.call(c,b,f);h=b/2;m=f};this.render=function(b,e){this.clear();k.fov=e.fov;k.aspect=0.5*e.aspect;k.near=e.near;k.far=e.far; -k.updateProjectionMatrix();k.position.copy(e.position);k.target.position.copy(e.target.position);k.translateX(c.separation);n.projectionMatrix=k.projectionMatrix;n.position.copy(e.position);n.target.position.copy(e.target.position);n.translateX(-c.separation);this.setViewport(0,0,h,m);f.call(c,b,k);this.setViewport(h,0,h,m);f.call(c,b,n,!1)}}; diff --git a/tests/wpt/web-platform-tests/css/css-regions/elements/support/green-at-15.mp4 b/tests/wpt/web-platform-tests/css/css-regions/elements/support/green-at-15.mp4 deleted file mode 100644 index a9d2b979d412dbd223df0768fac8d751a2c51808..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 299193 zcmbTd2Ut_h*DtzL2%-1hLI>$ZKOiP!tgq z?1%_Kks>0YNDbL{cJ%#!=X~F}_qor>8bpxKf2ZV6>HqpI3C&1=z@RBp%I|-0KFNYFc5)1*O(Mg2HGO`p!k7E0zvHW0jLTD8TTbXWZWMB zw*f>5?+3a(zz%>yK(+&Y1B^=oi1eofa0SQ=(1A@5C`X9^K{(oiAnYrEOW+!@1BYr`~Kx_c^LjwSjF%Z5GTkimT4rC0-BoM?t0>GO95uT87*}=HCLD{`O z*U0>lG6rYYK{@Cj#SCyAjEndP8AA*R8xR&C$XE{n$^t<+?*;e?AQ%(j0*M3Y4M0VJ z?EpbMA!8$RLth2h1+K*bf_o5OpfrI_28fIS`bXjvy8sZ3&+sL}0~iw-4|)qw;LkOq zZ!l-1jNw;cE5a3n=O$2w%mdhm%ms~H-v>Id1>uAdi+~I087M>UL+qIY<7xx!0fKOX z_yoie;(rEzh#iQ}I{}UWMC=FmA?=WR8Gd^T5a9*P3Go&B2B^CWbifOv4H9!mj6DX3 z@B(Z@5DWN+rh$&k6DdPb8kF?|MB)b6!{80E9q|WJHxFb5=zIWyKN)k?0*J&F!gC`K zDi9F2jClb6G2$NK1k4G!kI5dCeFlQe7mUl`Oa@>BxJK**zCdi{djaqbC`0^(_-N`c z-UEotLlKlM|JS$-Ux9lW^8h?BIO70F1F{I_i`dcz>JdJWae_OHG<9=|726iy`LD~!fSpaoN%pvw6aSQr{#=*GN0KbE4q(5YS z2!F_WBLhTyiL~nk2x0|UPte-m`fmV{H~?h~`w))6T+l55TR|DJE|Az01tJH^9sxw` zL*fUNV=O@#Vl(g?!(TrDBJGg11ANa|`vU+UfU+VWlRyyek@{@_k$ZuiC}kjkFErqZ z5kp8HNMDE#K+G`af!Lu71o#;{3(7!WC@CPwelY9> zF~S)m){u1xgz+o^{z16?_t}H20fv2uf04fUfPniM{sl3}h{t8nehKJEj9dnfOTZ`E z2IzFKjx0bqupfCAav^gB^$b5FT*-kp2&bJu2lInQ0V45-^z#ZJ3qY{O{`Dbae|`eW z`al`rkFmc^0Uhz%4IrQ|6j)2hys-$U$T~q{4OvToYsR?E0KpiDZHP}9&%v?3^&ozb zHNseTNINh-$`F(RUU|L#)*+nDfpXw`WFJQCW9-KOkbMe+_+T8=1DhCj|K*GE{AC4Y z$ef-51oLOampsrxUyN7>JV79i82c6QCsK}X2W7oLN7fI*3o=LGe?}QHC&VXUu1sE_ z4B<>2;P1cf02honPyx6J1oVaa0Pri2UqDCtLHa}D5aAgaQxyoXo$*{~1v+vs3=pgt z#yao+t7`$o0iJcbc6#m5DXAxtopw?GB>a`G0~t5=@-lq;hn(?5>E)X z2uGSge-4li5X1xHnT(7L=FC{XT>$xkfc3ywzhJHiSI9Gh@!VPf2aP#1^D|A3)?@86e;i4d%tzXTY2o z=S?a=WId7rB6CN$#)5IHKp8SFXvgpwh(QLIZvi5l03I0Qg8LbBM7RTS{x3&Jf5^NT z{ee34LvZ~RT!T3=><9BkVh(Bnh{PeXen8)tC4dxAhKzyOkN6GY8QjmF~C>g8d-mU-~afk66gre1R$V2c!&722dIE+(3T;9 z2jqFlSO*AsBv6j;ce0|BN=s9)OI|3J~!lvgQCVg@7->3Bz8*CsROI0*I^+gd?z) z7=6zHoB-Dd2S}eFrvI~FA+~_nLE;rn26f0<0DLmy9^nPC58)5=h0Fu-2^RFjSm(&S zh&^8cBJ)OkD)CqE09X&o1^^;{K>9&=Apk_?f%FB&W%#!aU>mrW1c=1o4A7DOfX^9w zArgzoJfVn4pHQG9A0v=an1!J2;2s-br)xe0odEF^w;demUPI8uJK%^4_$K=SQ-L2Q zyup;>04>9S<`dx9BMzZV?m{S!SqK#&2BA{05b9hdgsO!hRC6PQdX@yCKC42gnNFNOx!*QQ{WF_s-_`K(*%U+z(Sbs7znfM31OL&A*|pugxxj) zVRtG(SjSZed#oP9hKoShWIYI*csj(_D-!t05yu3>yGM4-v`v1pZ9cC$MEE58Yd%_A zPnV!Z@Cgm~BWP*r62i6gHFXF+zS>&8n%hBztvYC+;o!W>MopJs?qUgA`uh2R3d_*2 zm|#EuNP@PerjDAnrj{ls42+Bn+o_=u6&0n9AtWf;&({O#5xK)7-0Nh3pRtx6!6z^r zu_}L;@3h{s{r!zJ6Z5v7smZjJ35?!HE7|5s@BY5hsGe zK-0e+{1fI8>hB-n7ip}fO^6H(2X{mm>k%S?gM7fa{}yNxPKGo3^9c&^ibTc?IvME~ z9_$4gA)|rmgS1xANpK6O2=@YI-u~fUA$}1+i}DK!2#gE^+6liHP;IQe{a@7sWRk!o zA;QP+q@T~JNMl`1q~~xiWX9os5rN>Qa37E0(9jcJfxtARKHSIHC)}S90x~szh$Y~{ zSX)P3lkksEXb2cZT@R>XNXNi~K=Fz;-mV3dh)BOMV_iZ}7$6Zi3~&rO^ZEz)2Vol` zg45=PUsf8*-HJB{LU$~XAzM}h2rtt6KR+Ljp8CK32g6i%ehQkLFIab!~MA{R(@Qdts%&;6bzqO86T zU3~4>#SXE0+t?OeOB;M^RTx(wL{HjZRd$-AP--h>?$J*sMU9M{>`<2bCx2FcrnF}k zeXZ5$BpjE{M5zY8DB)i@BpCw3;c^mGRN3bQ515Rqv~Zk%UE~r}aFj!}#zTN~I9sSc zNotkc308fYC~BeX^Mp^NTW)RyED`$tc;>=bsHa}e?~gA#*PsUk{|A__jvtdnbC2ws z*uVOU-Z92)eEp=&JM5$0nzp%M$PqFP)_JP&x!zg_tC z5vK2A>Ly~EWS$BI;0UuSVbGCX`7`A^fS3 z#rEkf^aSr}_c`&+mDIBfcLS98mI{i9Im@p)#vwfWI3+;IrUj}P)xlr9&#}KBewy@N zQEFg!y0Rxzh^4LUz}|+@MD)}rYnMq9oSFeivGzHrb8`D93A~wqQ&)m;Uh8R%?Wzvds_2PXRAoG~;B@9)5=o=#ux|dK z_f%NZu$ex~NlYj&bfYf( zg)t=zlc`;4VNnaiA9th~qCdRuC$ToHnVS_oD(={$y$pXUU^~stT1vd@a3J`L5D2MP ztmZD+C7RXby&LiD`7@)K$h+O--jvnLhbZA#af!WEUV*HkRogCh;(2}r9oiGHPxzm~ zH#mrgX@OU3*{_!=_8dhfBw?SyqOcs>FZA20z5df|JzQ=w_6?H6#EnLU;vE(Q@+I@v zeesx0s(2vBE@jIxhcNycIRm}#FeK;ZxOBKdxtwtKw&(61Cn8Gm>14)>QFedxb^*x0 zSM_u?RqI%m_irx^%o?ificxm?J*8sNSrlzp=?k$%@uxLwi+T6@kzUVjP>=lk@<0_M z)|135+b^^ZukguzU)~9Ee&F4I#?3ty&o(mZnf4=RltjO9ybZp~x$*r$Oz22*Udr3a z(u<}TiA%JAf*9HEu2F8Hr>C>F0jls*9jdL!{=$cVuXsy$#i?{%cx`Ck>^GH7(Tb3S zR%UY#`Q(SO+3jq@skJHZ6oiBGQVzx1q@W|pI@fvP)u!U>ynZG1TrlvJB4b!(s&>m} z?RZTz5H}Mh+vR{&dX>_IeEez? z6eV%0-?(atT09nNr7-sA0W$3m&1&jvILu`<@T zwjX$zTuFZQs#~&e^G!9Z0FAxWD5p`icvf%$X`1sSB6dX4xNz5YrPQYox7+=@#@}Sd zmF?mh%FS>hI?3em{Id8sDI*;*y)>?Eo*Y_4b9FTj;t5VkZVJboE)iab<74oC3h~+^ zZjFSDAWytQ)SdohoLc9+oLFD`h#6EgM;Ehb|LY-D~j z-49RQPdCC(Mf{Z`avFu(_=sbK!=6{0w13?q<2xWJ;{lhg}DU*zf4pjqr)@JSiz?2z#wi z)6l+=X)443UG|gQvEMjM<)rsB21=Ooy0e%r{3|hI89Ug7Ark|Zr)8A?{?2R zm-Xf*_Cr_w%>~E7xNL2{oQmVmUbRv^V=}1sSYddzi^573ee1AAf}1|9OPW(z^Bh#E zB_#*kr{ssI5l-9pHV5yXg5edhj&_Lk#0EX^4nNN0(-ku7a#(?wUlI%l?bw$oGcIn|7_iesBw-8k9NXaFhwQmm19dBSu9qeeMGngBem|c~hVodg z2pL==xEF)Rh5BKh_Y!oet&HAputGH2;LXpbX>(5zK|(=1s(>lQdU&3e1V{J1HDwmi zeT7Q>vD?$kjc)TH9$}W^5Zp zygDyW3Z|EqY^#>GaU!M#j>L7)9Jk3ck&Muj&ywe@^%DFaM43E*sV_Qt?z}Z6W8M!P z@6KOC-@nHh_lDS0)C||EZHkHPYb(;r>{tu~JD%D5{P-pW+GszX5&;DfXC(Q!PV_s(mKd%*Bq zeqCLH1y?jC{J=;oHl}fPngrKKWE3-> zv{uK%bv>;$jDpT201b- zu{Pn~4sf1(nI4d3{|k4t(f2A1e)ix^?4xt1#0#alKG`lz;*ZShpO_=RMc-w;ov-&P zbU9`D5YOzdhGT2$dDJ^(fTxHY#)-3Urz%g_*b5x^@qH5b% z^k{$oKy#~RFUC=3a4CX{+Q{iL&}M5#H4D$zz8Bau50^mU*MDMHgq7_)LykLfiEZi+ zdwAU?w_`5E%zx%@CPSaJzC664VlwyaoU$Esm9O2jY{e8tMTf0_lGWV9)=7!1+5EE&#io4wnJhg+qyOnZadikX<_*U$+e%_BJ0W~1M*eXvWtqZ&lmRm9t}wDoVoLT569{#wtuhh zd)B8;V<_v$`Jki$bbvbUY_s?3RLR~t)zvi=U-S$Qia-4A%j=JsXJSn6gcNWp$n&gE=hmRaE^7Ss3v#11JFeJQDCwzxB(k}aZ=^lB zSFmAcc(;I^MW7-(LhE?D6*2IR$9f9N7gCa|*>3eIAZJn3B>L(laZAZ7`c4uyaTJf0 z2s-BZ3DvSe%GIQBfkZY}5vFaQhpnu3*NQljHn=FL^dHS1xIS{ILiM-oc17nYY)!pl z4NBKg@bxk;#AyuZJlI#z0DEepqpd~NeaU%K8IT;krBK8^sd#vl^fpC%j<{K(CAHdK zu^=N~6bFB6CsI&y_aQ7q4oilAlQ9*80%BX&Vgzvz#u^*VH3YL&srcl2b~NJmm@6&#U77}0?}C^N!iBhlY0}BbL?}B(zL2SgovGZ`U+uhEhFXXE9b1rVbpD)v%4>_gp+l!;zsR;zVGY!=*F7My#?VJF?j;(@SvC#45e+n zflc4-KYx&tflf%XODZfokgsp@cKFM%A6cNW(vV(Ysh{ zcyq6yO*A%lt_aJ2(tP&ZBl<>vs}EDV^foi=*>aTFokW>vBIGQppYshKRN?upv(aJ| zIALzwaIE+%#9iA**U}gv!6{8fbZ!VF=!ExD3L}*QJVRLBBCYdDVC)m&yO!)bPkEcwJ!J3YrV6yxIw)@qL5ljceyw)dFS5$Ld zkhU)7cwI=JbFj>YY|JFLSaO+K!^6mx$ zU!qp!H|d0Ev_Nx;1F?ogSwJ)VoUCzai zjc;Y7+}Pm=uT>i^k*MZHb}7O(bpO_BF%M}kX2p4(TXu3koyIvv+MM!Q-X$>|w%A!E zf(j~!;ST2x)__Cf-g2tPmfE8#Q@Go)dA+CR6AHC>$GS~$x5nVtDbA%3|9j1i%QnYf z!o)bN6j}IJxzWWR*97W$jLI4e(y6CdqxW}K@l)%s0lK!ESJ;`|VfNsRhMZJ%0uQ;e zR-qIV0*1CJ>~(f3Z|hujqw$={7&~8T8grRfar9*luCuAIe}JgCu+7k;_=Tn0UGo?W zjMmv57vyu{T?AFvKZ{Mw^moh29UH-T%5-R#vT5dqiA59<|Ay~eZgi)Nwm;tgXrshu zs}sZg^&;~Vt6E8HxFf<_M$2^Q4)*KPKvG)XqUsr$PE__lS}xbf2#wc>d0v(xwV4y` z>89GpH0vpJzGn+f+>5SpF_dztgmd3FHm=DU?ZwtFjBBt_(2Dei>?Tci?qkvh4?Q6Q zk0ew=n-dW>KTD3T>grhj##PpOrC|Jc!W&qL7js3WPds=G#!HXFr9%rWvX`W_MY2m zM>Vw4R|$nyN6xN~v51kKqsLR$wc_L&#bpGoV@`x6=&KRc#*OWWS_vxgjW#>7^__)F zNb9%i-s_k_wj{`tf6;-oiV}F-zR9d`prhtk)G-(;UF=FRL<>GyP1mAPlWVU^v26{<@hXp;os#B{i^FiI9ek3eLRBIIM$qOJg@BQ< zA-}Q_8Q&w3(Mp6b9)njs_~q#6P{m<4Pu`R;&kjgc{sJoX^q0AKIn`}`rJ0$lRi8c6 zcAVd&{*z|68f~U%PME&c47F*9PN0oPJQwR?&fLG>^NgH4cTX{eD3aHv;K?GP&~~Nc z&i2ogXJb6V`R!|#oSFx9_t}$*KRZz4nZsN;&8$>p3zQ-9;#fmZ+${O5m{K9;c&+Kz ziI2@5^3}7Q>i1BdX*iYI_6AKD>_+PB%2)Qz@fN1__FmLoH~EZ(4l+qtT)JgaKP0AY zZv~-IXZwOEyuArdPJ-4Los6_IuLWC5w{EV|UB*U+oaH zvzM6-EMvCcxqR}hUz=QtL5h{7Pe&!?eA(A`c2BP*gu>(7HYomJ1BRN-D~138ZjO6D zo(OrQKrNy{Ar%61%*XAYU8J;Mz=k_-p!nUs^?cCPa+S-Oop1x zmO3!B6rbXd*|yfp*30sp4E|1s!kSmmKm?b<;#dMD3rf%!8s8d=FQ;##f<(*`4|s$#UqNPv3Ni+#akSx?VpB?W3qeNnVggig(wY z4H=VbuNF$4Dg1s+x}+G-wBj^kW>3)MfK2+?(AAh1wb&<3u?>yc4~Ru+DS;)rTc-KQSBzcwjZJga8j8#6c#k`FH$0RJ;{1t*n%Deqv%vgHPpXK(tkL zA|B-ck@(WlnQp;HU9(Bthka?N$RjTm7GOIfZfr(kj@gvCD4T0` zobc>X*hkA#hHEyR6Ew8;-f|wUD=QdWjdgx8atgIGpUspKRqe{*PIO$c~n* z&|gEEp>3n=N%Vu8iucR-KI^<4oFGIIT=seo^ z?HhMTMRCTcz_Lr&Z?4g%^?>ynull6jav3!cwV%9u(Cu2GMG_=YvgD}%m6GdnavVG| zDQsY4O_J=4nfpYO@#s$9BT?KJH1-tCb?9a-Sa5r2eikZA+|FIYBN$z{?HhOJ( z@3%9T0dKxFue4CDDw zCVcabyULTsHcpUBB|7pk5nHtR*}_okyNbFV&l53p`L$Uc__m<(q3=^i!3YjFNu#%Ct-0b)?2I?V(#3oY(6$NG+f{!_R#i zOXn()`%>v8=VvF69i{(3E7|7VS^Q$h9p@!3H`zof^hQOJtFU z40zTol0jIGn^z(SkP+-aaxOR8yzuZ(PYm15y$>kSAst5I=2DQi!i2rn5?@`UTqvB; z!}gKPtgdI_I^6a;3xBMMc+=DNQ9!M|tBKPvrcl&em>7-Ywo)Q!W2@*#WozN}iae=A z+i6ai&1U0~_Fla>j)6-~LK&w<;%HdwP-MlbI2(UA(3^eIQ|xU_LGqP{{d9 zs>@{QUER3nfaz2{l_^Y7s49*oyWYO5$k)wGi>1L6Ic#o!^O<0`#?{HP#@V-dcRi|_ z+G%!AN#h9A`p|T)(F!LE5&3q`t-)bD4R&uktv8R%HI94o%+6gFu4C`~-9AsiskaB2 z7k0?F$z%6>i6{gvShl`V1!vCS2TfuyK3W@}+^v1yjV<~mOidAYL=K+ltZ7^OY?kWD zF8HUOP|wWkFzG<J5>Ka|sZ8W?$l~KRfAerLE~L9txGW{1?$@+?y>6S@HV4;vb?RvxW^3J-E^vnS_>+)>=>{AON)n!R=jSC-} zTH;mh{ieMuLj-i0^bZM+fMdA+Vjc)0`raLmjxDFMgnJ=QD3(e?cnY-cvTKTAI9^3Q7c+pXH=H)(F{yms-jt5+7cc0V1ndjgJ@$bP_& zYzyF>6}o9&fgDdRZnC^EG>mhzGqBx>NA;f3;kF@-RE;Vf6G5BRtXUNom{J<-%P7ol zhh?t!9BTDlT@m9BvT-wlLLD@@v^xbHFN=8ny`r~AnJgSSW&1Um zU*?)^LCA$yd$vx69 z4lfB`LivX1B|o=Q-N7PHvsj*DfmBlWgZHyBd{UzuFY(e7ku#siSfBNC>A&gNQWCET zLJ!du(j6qPU#`wP`+Gf&&AZfFS@(ZAR?gh;#JIQzyFOG>}H~Ho2f(bEK}1-J6snvpvv&W z>uWZ|%e|XflH6!#e_>{6hj0An54ldRS?iB5=gNLhJ=k=b-gkFBsWTp%#&{b74=Uux zX%glY;P|m~&_WzfMICNVa7xm^s>N)`UCK`_h!|{-O50~%D9D=)6Nv{3G*Y#5TBRNk_M^SUA1dJz%ie_Ep zj|!E_Fgn7OKzDk8aptuM7CF$UWJDTTkb z_U!(Sb&PhyN}R_sAxqXd$97yfOZ%eTrhNxWnsDejP96K8>3e_Fr>DhlcXOxbI&P^9OP(3JtF(aficM(LWe5qF6^0BYr?;iJp=xA+<=Ln={ zzXYQyPLHU}!n8!)^qC*Gc1*&>GfIQpgy<4mTNCHQ-34pVt@>wVdz1#*`OQ_i!ld)+RC53|+t?Kon#I9MWLvbN9N1ZXWa~|jGVDbm+Yc6{$1UZsdzBn;g2&a5 zUHB?h^YHIO9xUo#;8$=hjNHMF(ye4vGT~4(bTsCIcrji@|7Ib)sHfOm*6Wf(eT;+eOg0nnq;)h zI)Be=lXtDFo{lF8oBGRm6S>C$YcW9+z3Y6Havn)^X6(^I1rGFp&o{yH&dFb1uLtUN zM!l2AgHN9}EaYw&ZESouYkY~qwEXe4w<~QSTkB*?;%akw9&@zQ?vbg_ab1v1l*Ki} zZCW7#cO%h70mV!EA3RA^=^CVaeNhOL{ZOj2!%n2ykX)^jbk^KN?%q^w8&2icm#!T; zI#E*So*3hBt7%K7vR)s!l$dg(AZb&h?EFaJ;Rcd$t^eY?dkwUvNtl+69&bd&+$X0! zk{l}9m`1(l^^Y6WB=QM6bFIYLs(R^4OcsTg)b669G%kM+Awg{M=Lf33b#+i7cwFzF zQ@h=mC}=SrYs^0v=#WR!YTTKi-I&#}q^qt|lS~*QihD)jpDvb4Q?jFrhzrcMZq)C$ z%JnS++hRbn5A`s&r?TE3igj{%L)H?sx1wLfO;s_S84abEA6g5tr-#z8AK%4&LQcwS zAA_o$kUu{L*^@)0x}z7HV7#dP=sPLG>oD|^gyl)4f?$@@JI|3;>Gdr_R6%yV$LEQj z7j3Phc8WWN;%hq3G99p@Mt4@2$_uP#749irW~C^Y-b}E5IFF7w>z#PBosuifV!Pc; zrrqmu4Mt-#L8%C`Oi%MP$OuDSC2n{7cuniet)`OhOEu?*Z6%I!E#I=$P0RMSj}Gk( zRlH#yBDg1GUnM+Wu#~EEb)(&5*@;AFJc_^~UME1{m%)ECKKL-L6v$Sa%`KbAefV8S z5(XtWBG{4ELKMzkmS>Oeo=N7ydUsJz(x38eP^vlZR)md=$CwnOiM-}2=rAGkeRxrc zqqaPpmrH3(3Ks_WuHLx~IiyzQifn0{bFyB1C-U^ymIHe#*H2x6%XR8-pF*?~*U%pP zV~S}67joiu_`2WQqTAN3Z7P0Vaw}*IdNm2tbGg@`y6c(mc?})@%?96%G3>Mu;%-D< zZc)69Y|YNK2r@e6P{9>HcgM#vBKv$s7I z>n#f}k_ zQt-$|&RL|3asQsN|LM52_ZCGYaq{XXZ`1VzR#$#Wmf}w_*TOI^gXdl+Y5od+YMLGI z#lzhpP02JN7g!qyWRh*(Es@-1r?xH3(?-#$J>mol?=AV{G|Qsa2QBsCL+DZ27oL{; znj1pLme@DDS@fMRUxi=#DO|5GJF7vI3#ffd9~bkWCHn}9a^<^{$mbetlG%=Kc9zkj zQ@H2TCi7UhjNmlqV1*>eu~VN17fWS|W_L7o9T$pDO))QgJ2F%JIpk2Ck$L+Yhmmyp zs906VLmmrzS?-mU3j%P5Y*)od5BrU%G3vRk`o9@W)&vj~(9oa!56I-EScX|f6+E0? z@MVAO@%-|^aYc8gd?!0qHi8_=mRFkMW+v_X;p1zcF>H?a&9QS>)7F*GKGAlgc$Aw5 znf0y^wJwI}U9KNvU3cV=)MBh1>KYRyKpg6Flh3nEgnCDd$*R*v4_8OEpQ<#^DmFW% zQe;rRtQjSrg5G=jcd9Q7NcZ@WWv%k3D@S@9J=*fYv{g>dM2^>si*EkwEo)(ErV;9f+EH1u4E4@bza;ydT4#^t ztnm-yZ#HZHU*~8J4@i5szC&MXa?PUUz@R1M+fbBqdvgWl;;3s4lci4_j;7xJo1it4 zb9&Q7@%&kKeoFBGhK+kv`=6s3IBslo)T_Je6WF}v%3A%L=}>SGsylIuk)OSw`c#K< zX55&$bn%DkRdU|U(Q)1cSDx#dOnJEv#y58JDR)^Zofk{BdQwFiK4A8Qq7Yg)`DnQ* z=IOPKB$~X3`@iS2-@w`T80jHHH>crFt4(TQ5<3UK_Mv!zW7)>7azfp2@e8k6)?^#* zRT+v3cm?KM&c7GkJO5M9f|qass&e;N{XWf7^7dFU`=H-U{ni)P3`^3VL-gKkn3`>R zi(HRS2T9uGT}YC)GS`0E1|4;g(6vksHlxxr~5$)Gy z6uyr?4tPn|+F+_FX_Vm|v1A;sGYh|ie>97Ut%RjCq5yg3;s8k5rZ}^z1mwPg%;VJ` zO8SjWO2MBnTux-RU(aQ7Zhp4Mv^(-)i?kI)y~51lCxtW`yaNt)W7c zmXYjjsh;aY{(Wc~^!b@KHeohhL&a+>l#|=NR-Nf~r7w^FgZAR3wD)ar2uwZGj$y)9 zE0U6ZxxAqLY1z~ZU*h%cZ!wX%YJ?!;WIc(b+JYN&>}a#=vfO-1TP+@?LKrBfvi9JP zyWv+qceiP-_8x=G-*j@7D~h=`&l?=I*`)Ke{~O<%NPP4B&6xCZMq^7qBsCwyA6{DK zFR{9E1h$xJ;4qXj?9}K8@w8KW>o5V52tM_{{ECUGr6h#@f zli$&z=fBTIsfR+^rgHP@}-_S@0=Bz!4V6-QN+^?D>;8S$k~ zlPSnqB|R|w@-Fe3nxcQ~w%|3{v0$-qa0b|uv>B3fLECg(qgserSy`@xni$4@y4phX z%&i(lmdZyBiVufsmbEO7Rd@xv_y^zvFxATsE@)rc41!r)oB!mH05!;eHUWzs$(fL{ zelHZWlFi0YO&TnQ-MI8>@=u^!8?_$LXz^J)^oqb0+R2m?Q1uTMv7bJ7@U_O~&bQPr8vVe>ay#`{nYi zThaz7H&wCmkEx za;nw0y8q*5Wixxtv#p5YB&g#QnaR&Y2c_9e@hll|`$+!ep!4lMIoP45%1D>{h9T#J zv7W}NxYJ4aH5pbj=Hqsr29n0J4(T@(%D5XI5ySRo?Eh39&EmF&j2%70#=TfqM& zOJpQZ^lx_r#v7Ot(LygK7WYecpZwNoGjZno%~@3rq8tj!{Rj!LDPvC#HR*qEiB=Q{ zANXB0-%Mpbw`FN;s5TyNa{uvqP#US~s?JiI36BtaG&J#UnB*}yMwGUKdqg)YPcCu~ zc|9dLpIFVxKcmlWxe&%7;8LOfyK_ZpKN~_%zi=Srbg_5VjJ;rRR}x zk5xqPs!<^;Hf`RLqS?6~9i`MmQENORAC*PUj@4X!fMLHpz`W_ybUHdcg!zSRkSF`o zI`)Kz#F~5i&YDdy4WiPbiz=j0qV|NN1D&njTXXq`()?rW&4T`^Qmv_&^tk*n2y*nf z`zwA_+_cf-+a&rQm-4Ns`NN~E(A&!|&V03cr6gJ=oF}k+VvR@NcnE88Wc!H@^uB#^ zl&d{;$JQ?PQD!3E>xFS2@z3C7Zf%f@t6tnHSx4cw5rs<+YY(iMWG7Aj8s+-NcZat4 zL5wJIS+zem6kW6_8o9JNMr(hX=FWXaP&djn#p7PY+M-YIhbBD}r=vDaT1>iFfdg^y zVQWDZ^h)p7y7S8UgNG+N#}D5)xbMcf1Khh`6hBglGNBsaI&`>j$Aa#Uo%!9G$oUI= z)(kN?{65~I?aDrb`Mrx}Snr&Ev(vfKLY6l6QENdDn!wDa6^i6@0~ zBgMbbX4}Z;?&Z4k7|+7isPUNbhW8O~j{exi++o|Fj9QX$^2MY^PP9KpPNwsV;Img(U`*e7;0iN+~{mZ9bFiE|{$< zFjI7_{C0hX)XIt}(-)m*%8EhhK^Jgu1DzyG=9}PN!C*~zNELfe9RWwL`@Zo8$o=p*&NO2GNQ3n5V{IXxgKECYi>$2M^_+nAnTd`bX0ddDh zc_g@Y?~0%szOJ`vmvD`LI3e}zdR;t!PXD##6q_nSX4(hI?rozD_E$cQ_5SvBlO*tW zqrjik#>mVqq9JE8T-a;mS|0T5^;6-3fAbIMrfGMhjT0KNzN!ZYYo3k8?$|mh706k` zA3GccH*>Rmv(-j((c(5l(Pd}Vk_Dze9pn|Z@R6y8x8v~cgyiaraz7tz(P@(&ybtuo zHotmvDy1wC9p@LCX&jp1vD?B(^@&Vg(ne}B5PmgIR$@sOjP=96&8ku6NF3>^b&t|d_q@bgyk z3d&eKoj06{-bG_8C&5>+CV$iOZ~vF&SLbi;J~9JOS!!EVSMEA7}cQu3~)+!g60c11b8mJAbe5Dt;T- zpG78m;>QcO=q4uTbas@FYb?b>^!YpduUq9pi+m3WU^OdN$hK6e)?bO@snj$Yv)|I` zNUrf@&!*FC=NK;v#Tm)mQp~||n;&L-{D>ALyGUwjIu*qSyLJzi;qV&V7mjE`-1q`$ zcjD>XTtcsBnNuS*!JunW=DTI3f$bB~SOYWl7&E4!vulO1O|AT1`!K2|JyrkYvU2Gc?>Hq;J{z3 zG08PIh+Ezeg0u}!`v=fa`Lp)9EO%-04sB^~re4w;H<>P*9o1Q^Bgq7?R)z~o8G8vG zA~ss^-mIPfLF$EqTw*$n*XC=5YloUHP%_x>NR_kDn)&NoaQA4h8%XTI!d&T`bWNWYNp--xw*k zsytfylf8ee{~7i9f@m!w!*)Y-q^gm*1=7u`i!soV>^ za_C*UOqP5mp{C4y;QdZJ0(ekQYbZF$9z9jKrUDufK=y|;!pUolBo%)>hHM|lP`0=USJzMhaVNi7XJTuG4VYtnrvxihke^RsFrgytCsp-KP#Czr-{0$ z9^4SDRLiu6YR>h=Z+>Jw=F-(Zl8N88PYC4y|GbzKryYIA;in3>vJe!z)3cNmzKd@5 zQB)ymH!~qhS>tT`S(EEDxrx^2dB@w+E>Z;!#hc0F(N{8ei7RIucoFKQ{JRSEOLd8g zJKQB&dF|xx%r18O#^4tBoTGQ=4G#X#mlM`M*(Q?b$S5T8p#8}(tGV$1!`XXAHMO>F zyE7qygc^Dg>AfRTl#lL?1B6H3-Mv1OA(n;K>6gDc zXsSQX-?|DlgS|8s#!bShttsh`gA9Pe*QQ7Il@-M(P7B9EynR-aP|V^z;V!rR0(7qK zJ2V7QXq9-`@c_#GY&bGH+fZ0MBebY~MXxR6{d3Zf&#k?Ik%)r+f`gw^$8FdGuY|b@ zMMH!YI+GGVZ$VWL`s1-EH@buB%t|G&J$dw3H1>7nIl{4`m#lqKb9z>I)?lsgz6c}|8eOb@bF(7VzB23tV&&S3 zmY&IzuV!>t>4v>q?u^$c(Do-~+Sy9#nTRG04oi^xW@GkxT>Jb}XYJWJaECE7JdNRQ z5SQ0kAmx&0gGhyYI{EUxf%y%$_|x{Vl@wA5=d;V>>{kSu8&{dGVU zuTSmD?6D#doyAEqW2kQ!mNNzeNSrKL@xd*{=c5!5NeLt*3^+#cR;;5LA%0qn#3LZ& zQ7IFC;=$UZ#C>LmWB6Cfna+OqEW8~^CY!&ED=fVo?&2O7X8KRAva@%BlnFQ!9C(M9 z5sE>PWJ$0KT7HGxHY9eJ$eK-TkxD$Io1Y2Dfn?Uo;Vinke3CD&QH4?yZqtjrdpV|X zqVoyA$GHdfxGaut^9fgd>iS3%A5dd3Cc`8s+n2zHt8z~Ef59w^5>V=KcqNTYBJQGU^5oLA)k&_tZs7HY%Y!B#dKcBE^NR(f8@_N}e z|AgrwRPvAnXS#5^cMb59YJhYg@lN9+DGxAQN&4Lvb;^3qR#k*(FI}w(a5z z81tV4vu({YbPbX}M|1HME`TGVr z`xWb<$E-C?n(3^+T3OCP#k!#OKuHG|MGsl2wcp`ntQF99qYHx4C$Pe>N?-9*&Wi5z zp5Pr`xj3)nlQdhmZLkt9N(4C*C$YUJ}b&-feYjyd|DXPs-1!)8edjcB+wF?Y+5rrs`C+aDvD zo9hGW*sUm^6uRDMg60cr70Nh%P-RgEEUK-x2*%7d3)mKONZq8n-({t(oib@FB5ONG5m-1>K4_6fk}et_zrnAkla!R z*&7uxI!~{P%N;}Eq}VNf;yJ3MBmB=$9ydWH?xJ&rAo0~Uvx_-*Exgt@BQHUr58@Kx zMCo9=tyhgC%igb}FVx%F=8mv9pQlp|zvG@0RWBUrx<_=nbX~)Z&+NBs8IaN1r7EU! zEr6xQ@;1@?a8*aO)Nm5d#fPlfbnV+Yw?FQ)ssnBnWIAr)Qik25Vv{=ei;I?F@yhC! zaah+cMVn)s{G(i%DKZAHXxzr-cc~D4#E`l09Fd=-skiMOcf^ZJljX>pXvYiH1Gcf3ZpookEHFI z6cw_qN56p2|8MZEaPsh|RfZkBTRd&>paM3{VxjWd8D+2%l6+8pL#(?ikEr*aIL^ee$VI%+h6Hz z|5qTzCgvoGDy+<;`s`I;*S#^;u_MOpkc>JDwW`Gd_({Fbd+0#?U;CHFLJFbKJ@>r) zCk%=z-)KAg@tOA3U*tR*jyi>J6m4Mb^>#k#zCa4lK%!>rQq{suEN2F-1V3VTvhguj z!sKd(-pLfNpzOxaLD87bj-Dgm9C7i#)50tsFgZiNYs`8F*w%VRb*aPN`m1x(+6zlc3>$sbeU~aN&11sk)eO-7re-m zdN=oE2N~nt#fI+DDH^U)!2ZdP%xq((k&;rn@wlNyUCP9aK#aEWoa$f_fO>*C36?-x zbDb~CWfwYDus!S2v)W**LW4so62qp`C7cJ~DaY?|X^+lo954YS8ltTCXLAnYS#Ze;jv*QD0VPOY9h5a*$p7W_ z>QfN;;6%DaVxK^5$p%L7i@*tmEq^h<=ErX>;~O3{bBq9Y(oF}|k`T<+>bBn(Tt^V8 zXQZ8(b&XCY3(~kaN>ut|5BZ#b`KoAwUSyoQ95Xo7LBw&ykX{iH%B_cnYoe_M8b`62 z^B5urra(nF^?tY8og0@?iwgt0cuFF9-Q{NTC7A1w?-?;#=Hp)MWvF?7Nzw47^UR~$~?N!QpO7ob0nFN^u|ex>)+vn z3%#0mL#|@O)VWdS)=1@-_<5z=eQ=pe$M__C*61ar+F3nb$@FMJEgKxx_w4nHM-P zRo{3=R<~`%(7EpK*|^z#C+px~SNN%qb?$7ROzMe|9%X>?xP@4pQY5Yme3>qviWrFyM-$5w*^Kf zb?M8A5SB2Y=DUZ9Yg&NS_Eq4hv!oil?pnWb9FSvyi`u&ezb+SB)1!!$QpX{q1eJZM zfY`ciMC#YDFe5;mD)&k4sWkwI1E_%%jXl?=$|vwri1upL8|eKk3{KrUD{X zATO?OfZWAYz!!t<^FuEOgpXWAdSti(XC7Xb<6hw@hNV){U+@|?B=)tF)upZalfXq- zfghK_X2as49OHx9e^CY!XmF>D!gTI}1%JdM;3GLOVfCX93F6_QXY+WqdWO2e_FVVz z_5Itq{p+X?o2J1}^F5m2pFGKQ(i1_X{U0cNrABIw4cB9-@5`W6?%`O^1bn=-sGLo0rnD&F;)H1u(GDhGmeB68H+X*1G!QkwCyOLy4%e>^vkHXK}nUTDU ziwGuT=bke@F>>Et3fsJiEEv91ef5FlOUSHD$tpBf6mM#}*8G0cQ2uR>l}HSbm~eOj zf1+~*cl^7k``Eiy&iVWN5l0_^Uq|i{d5no%5emFR>+xuyuUsMD!vB^;L%u~X>he)M zJ;xW=z7o}4K&0V93PcnJ7_i_uc~-OcI7wg4#j*%lHca7|FI2T}9*QH4$B#qab*^gw z0}#c{zl7OQ`#>z*1<|Hu%~aB9&X~!w7w9CDUM9bI+!A}43cTiDSa_BNX4^Z;*PG2n0SM9s6_1Rx%sN+u}nD(I-K!20n2}~sO-_IxWYV7co4IC-<L`(jdYKZt@~vqPLazBW(Msw8FxLsA$Mcy6(OhA|Dm2*1u>#M!LP zZbF+?{!HL*X$ace=f*1yqRMr=x%*`dR>0%R0XrIyA9qoTeGOEX2<1hWHOOo^qU6(K z<=-zzc-ATQaz(q-4Rj59qBgJWOyH6iYWZ)`8o>CO$J*?uHI`0edLr^F;MyV`oXd9` zXH$PtC1hQrN;7G2yUH>q2Es+f?sO05aM^9MvUpK0NRTHNv;kU4S`jcLTNNu2C|43M zRO>x6Sv?NWs$;Vd{~F!E~x_F^-l9Im{he^psVotiMS1(%IAd zQM6&E9T1%V(wVY#JsAglpB|1+P<2v55tEs8$&96brhqq+;$qdJe`tm9f#gzc@GZkwv7eA7l9YI zNZes3u1s?=hh&X;KTz1nu%EEpJYNH~oEx~-ui}9SdGu<8Lp7)OybFz|C@Tyt^d_o4 z>kI$s_CF277$G3Uz4gN}&VNvF|B^JezftfRNpN)e-q*CPVg$e0%KE^?!QlzBfJ7If zUAdg(M3gaow35~($=2@=-7KRM@2!4}WKb-*mTX9fQrGMYWBD#MsNhe-F+o>j4QSfQ zM4N2PM;WKP4s5N$ek(kpcj-aBgi!ymETQZiob06MGp9OR+UCKZL;pBmzQn`wq?>i0!hZQ31AB)lj3k**J`ii8 zmj|5Hwa|%wg7p9N$upPP?X4E!FEZBIN1wV%3)iz z9d0ufyJd8{#!4AkL?GF)nZeGtb6c5lg>52vHMspqUxv0m99n-6bJqbmI!{g|R|~(M z=sYsH@k;Oh(aImX$TOS&{_8{dcf*$5{^1kgor`z8-q6pNFQz8?!1^H?^O`4(2Y!Z- zEV2*m9(F5w&hXX7H6)$Z&X>qG`8Um?Y@c{H6kH3}F^#?8%kd@R!L#*VU@Ecy8W=3NB-^+;U=DA)fbi2K&I=q!L)N5Q=yI4i+Oc)|Nfog>N+4+uLX2-=GJZH3yJ-$v?_()^i$ zVq$^TlGe{1Ynw1khp`-6Dlp@jLfos z58|o!rrZYk^?VG;*GIgjm*0gK4-$o?y%nZ4%_l8H)3QtcZO6G9|@ z?a$44PWu3N@>!KV|AxZY;egHE(B%)pl1N5n$0cu!LBSTHvi`$WvQ59g;k%rM@5~zR z*Rza7t&g+6QdFILvP-bsZM?7Hz)D354ldFmx-Y)?D}tTG?6LB@+fo0Xz_G5%lkn_1 zWMu1qxD^MUt!6Sanms9a5QQ_|o;W^rz4fCjzY*uX^Wqe$KU?pY#z6PU?eg@aNRM<@ zWA7M`iqLH0Zpy4pCWc=ejD2x2C6AL(GBMz2_#Pb>iMN8dW)Oo8x)*o$N!lPzd?Jb* z6t;0+rRU~E3|BsYL5;?3W+Wgg?0_`FtfCct7h znYZJDhWo2KF8o)IcDxqSxg_qN^d2I0>*<9d*ei)Uii7v)=<-v#BztE695pGv?9r_T z8Q(F34@0(xsnL73oU0Y~65)fkBbn%F6%4BnU4%3GW%X=q))IFw3c#QHOLgPvPjszk zMqz?acJ`J?>WqbYqnp0*g&2X@e#hza0nHDyTah-W1zf9&J{Mm!AOYXU>uWv~!4!}H z(;}}xhi2yD9FUW_!kv7V)bfMv)d+S>)=yNN|Jov+CL+Y2>`1&Rue1gETyWAtN4w{# zZq9KJ#kc{kApuB${G;zV$P%4|dzRZ9C^UtMOV3Bk_jeHRPGjMsXHj{EAWY5ko5KkM zJrBStt@UX!v3G>?z}fT@X%1WU6rF|-%=n)=&sFKPXtG%TLss1&h5OMrTaT8qUX6%` zlMlyR3#uhh+1K(ipIXzh;)+7Jb@8aSS|VIkuP;Z!#$3t)a-=5Q_8mH+fpSq>Wx{)Z z`K0iP``K3sXY~D0F;5Wj54oGe++=AN{l~U!%F@D?qV4rquG(rHU4&&fnkTPZ+w}SE zpIRx7LKr*$&_(06{0r;D7ux0yb4+u^Rb;emM%JO^x&+i6tS{45P7Spejzf78>fZDg=4gyz01OO{G1UK{q>uz}LD$UWE9)vY!vmr=R=DRZVyg3M+RIDoq2*FJ@V!#pQ}O)#V8pk|^}(@jEx}dj0zQFR^(t^y?(TtG zx#w?$d;$>G0TS?rTrO5Hu@J#6cetoh2f%alTDHbFD#IhhkHu5v>1=V_ej4tHcJwEv z03V^b`VBq48t^7zQBnI(;rxVgsBu8zE{?xlFhnp7YQV~bNN0lc6gkEupdH1_nP2Jt zC3Nm~+_=a2q<)-~o!`xh8G{S?)3r5H2X=vSB5_$sa_!%SF27V@E zF6em!#I99{=2(myGQh|uamE-Ea9lzA2aSZCkvB7D#W$Q!W9i*TiZEGI`}X!hmj#q( zoV){Tg#zv92boeJmVcGZ6RJ>%aT8Msx%F>rtVY& zw&_1gWdqRVG1}46y$gj~3lif=>O!yu`X21pe~4Rfi~|;TLRY9VW;;oR<#G7m&k!B1veLe-xKZ%9HAHv*ef#3x# zob9iz+{s0z8LYL}zHAE=C(^-2L1_tgVtIpxZ|0W&LKb|@=4IkKx6;m7*HFQLg1!mwI+j!v-jw~HB5L&(A;A2qgL~}G{`ShG)8CvtQUL;YMPJ!n@VLY zpA1?TENg0t$59WEAneaIR|B3uAgAq#dc6rEL;f7uNHl^;(&e+Up^|IkNr9_TvhZt$ z21j_Ar#wlg?2OhqO*Cb3C9d&wy3guJD=H4(iUH*=!R5BJYT4?8Oz-_1YM)(#eG-QB zNmd^#GpFv5Ljovv(~krH+1@Cefx|yG*i{Tp|0x&@azWD7ME2Hwp}%Y%aR&Cg?BmWF ztxw=4*8x)4pOkyNKs|h%H`N#Pe{hqKj-Ni?iW63W!w15Q@;q0#FW*GRKi#mUbGZiW z6?Su8_N7ydIX9?vElGSQd3dEv&Tf{|w>aXLeqVJ(oPsIsc6pVG8YCoQRv!J1qOz00 z&jq%d%o6TI>}+g7Qo`m??%}R$-EQ)DDcrW0AE2adyGMxwso71%pfVkps2zGaAf2K4-J4SmrxC*uoqSd$7CP zjH+;d^00n~Yx=unz@v^s!F8-hC{X3#sC9U(Vl1Y5DuMuHZF<&=!Bj&RS-m&MnCxwg z#E~CZ;~_r?ah~PLj02Rue;uHJ&KA4@#?NQD_=PVTM2NgJHJMj>>_?x#)Q=NX%by)c z40IUkqxib!1rcznNnA0gkI74Pr#suFe{VJn2z_QZirsO??7>#fkex8?xwLpC%6)k< z|68LBVhpGVuujB#LO9OXlS;0*kg~?CWJ$9TD_Ww@D+dKvnSV(w!hlj<5X&~9@%0jw zGF4rLUS=9~o_<_xq=V8~6(JMZn@6%hd5pB%XHvh&{0=H4T~;S_lNWx(T&82w@ZFy? z7D;itx!!|ITFdu@H@bx|PZ94r;W2zdFEW1D{EG;(G2xY$V=QnNp>B8%Q-&?(+eHX? z+#>5gnJs7J+h|4qX(6Lo75RTQ5Ey+>eS@7Nmxlo7H%IN~?-dL}#(W=djD{H|HYI8# z(j^z{?&$l{c%qp#>;hqq=XZCvu#_&JY`6XHkN^9WCHfcb-`g8Azbkv?(~ktBz&Pc2 z`=}shn@yqTqlEt)wD?byzbD`!93Lz8lkbd`!v94A0rANiv_S=trX3P!{Z_cf#e}8f ztaNB#ul9}eeShi)&05{Iq>R^HjW<(lkbCS+WYntnq28EtKM z^U}`9!mx;^iPvK+*XYZOyM^BJ*XBo_>s~L|0{1o%eIla$Bx8fg*`jxEAo5C zMp=H=?At>N_c(~dyvr%1BXWfjX#?kisbH7&;xSz@M)tQ<+0)SuFMq~HgGf!MdsR)C zC?Y;Dic3oUDfMOw$rgw{|N87GD(>{SWr$4l+rqB6y1(rNd^^;G*lu@|v9U=ba43Nm z(TOWhpUQ^cqk68g84HmiUpuhlOg#Sh@t(#Hj~U%wHn7`!;tKi3*!}MRFg`4~iz|SK z`2V@DDO^wezm^ZaFc=>lf?U2@JxYgzpDd z#To(Eb*p5;pM5`zQ?}^NGHh(}KMQpqd=jbgMU`vfYoJ);(P*_cA9lUuIz`DEtjgFi zt~&ad{@CCBR>o=R(r$G3u7S;8vCtIM6$B^L7X|r1TpOzAq7G%f18_9r-csML9xo?n z_FA7mEpy)|w+zv7=OI6ZVDBp(Fx=hoOV$%r-!A2YOkMV59{sDB+D z6vni&-aoF#J@8*_57}xt`jkgf`C;@AF;|4rlQ8i-F7=-kKm&JhGV28`P97e3Nth>0 zKNS|-<)BjV-6@9W>vEBvRzK4H&A&lNfcPheyVv(1HqCwD)J5oCGWT4AV+*{~0ivoS zXO!#s`UX+SL;7~LuT4z^h#HwWlfgfipINF-C-z@t4~xSM-7&#a{MjScvCLvZjp`S# zwO)Z2rxXbIZvbD}2PTYLgLoDo zT7$fW^Nu9IU+7mt*I9a=L9y*NBtV4|_e2OrEtRATi3g_PCk0?ORn6`q(iwI$tDVmh}6#cdVj4D9olx;B!EFCz3FU zMo|B}SJS~CzJVRW?7(l>lNUE>%qX%9GwRg32aNlKeHrP}d7?d&N%LPFu=U2kuL}k| zy7WfR`bgmNgpcgiFN-XoKo0mv661eB@Cy-ycer!+K|{Q`&f?{8?3a_N_@dqjgSP?QiO8ZpNJ zcxaGADO?UUbDzN9+p(pRQ+sfd`JrNTh;cUk1AG3p{`|1b?VpNglbIeD|ZRMa71lR;UY6GCl1N6-A0V*t} zKmrmzjSN+}&wd~XCOsPtRwMD<50>ZZFx=4-8j%_%Q^o2E6BL)z+h}5ZG4p3O$T&Dl z%GQMdvs<~@AK7^X`0#a&Y%J;XX_kPk6T$x&GdNL+~bA_+=bWzNQvh^Dz zoB8Qmtc~k$d4jCV%N6a6B@$c z#2Ye7o7-c8I#j89C^@@=!E<0~8JGRt`h7ZKkSHE?d4B;Y9W;weMy;yKTsg9C<+Bfr z{>`%K8+6=H=F&m22>KXz`moTtW8luA$FJRR5ae;n$Mj5Tn_)kqz!QL2=A->fkM@8~ zy3n?HSs2NfD;AKcS5T3#9B#=`B~)8`9-(p5ZK9?*DnC%FwNe#KYGouip}0v852)d4 zM4P!)PuFX_MTcHZ^<&O zFsq;y<~fuo`Q)f}V&4`#*M;Re4sjP}dt`JKjTHZ{ap~{oBSQjHZp8F^~0TyF+KafGdW_t24EeMVS%A=5rvf}z2>5~$p6>{bHVcJqhcFh z#D$isxEticEqHulimK-8aB+K%{O5;kbw z|7N6(x%)8z2}8u|CF%D(=*a$=bVg?cSlO*1{{P`{dh=vGt)86o-FQF#o4vurN=qVzd!U zmG;Dmgf{|BnA7n0&a5~DnGGj~yI1Ro+uQZ^)q+gLEs-x#$RJi`$3YZ7NFwfgf{j(m z=x~NJYN;PMvRU~omIv_Z`Q)-c-&1|yx0LWMKh7e(>wXuv(U=A*lq-ve_W}8bddNO2{#Y{d%+iZZ!{VWt@<;;|N}u^m9D#U?l>vc6 z^if}OT53~nKnJ^ioM>DG-I^f=sJ9K-L=MZMm_egfxQOlL&9yH$4#MZXGoq0`ZP+hl zUWXf($lQkgb2mbMEslvIfNI_iz%%!*jzIix@VMuqt%XYAId&WdGzn@6jC))xjc)yX z^A{YNygQ!1hgrAirZyV&vM)!}o<1KbyV+_^6IM>|3 zDV3uEw!a#qo@^$lE1-7cTrL+MM`fI0bSt)H!pg1SS!024Kh3dnOh_yS_=O2lIVn3#z;U); zD@WqA$>NXuM$02wA#N-#vy^q-u8Un`f}{%?_q!o4lk1&+Mr(ev4(?z5#*)#=@De8S zdETx&yKO+Z2^04vVG*JQ+6^azc1?EV67bj#x+`=7$r`R02?qf;K-Ks1zRPC_BxoUD z+w==q>9MS&tO{i^x?@u!S6I)B&!v+7*0GEvXm9Ln_Z~=^mrQKGA>7BlaYN1g%)sWu zDLUNax;_WJJ^boIYy1?6Ul|xcqkr6q1xwoun1*ghJHxdVvFKjXtmtkR zlEaZilWIx+iXLOK&Ux%*yv)E6I)jnb4-Cs;EmMR$E_Ceb21_jR#Z(b1vMa5Pr&|i=I0`7%=&LOvpaG>N=Xqk|`d{UDW`Eg~&g zvXx|GVFWJ2!Ifpr8Lr#XCPauJDe-2t~D%)9-(_luP&%A%PA7J>5Mz}$5G1Cxg%N$qtl z#&KM6Z`pcY`6(wit0nIiE>Gc-01wyJTm5CrsmYsceHlqkFM0mNSs z?yxErOy~t<{~L!u79s_-|uI2?Z;X;I4g5NHQB#!FPrO&GUYZ&f$R1HSAP*Cd z(?~X26yEpDl*;wFx}L47dEu;*(hSrMdBZIvVkQ3}p_~pNNEBRaqFu2;Z3tjT8@td668$opn|tO?b>FaFD?2rD;yK|hW^F3cn5S$5QK zW8va+EFCG{fZ+R-IfrGmuOMJqbw|_<#;~QJ2L>oRw_;ZI0<&>Z;2btm)b%_+b#!75 zh75uj&T?f*iAP-KA^*T>n?HXP*6@!DW@&$f%uk{pE$cl|Cb~8;|8g^sc+S>v>lNkS z+`Csl@yr|37szV5F8Kw&_8Jj!XXZnHB;AAGXTmIy3Ke+W+Y+ziPQ)cl59DHn;{rK6 z=i~KGSl)*}(K9K>6|~)SpKoWbMgWX%=KZ?+PrAdJT+96*n5FA8!1vJd7w*g9{-P=} zu;&K3=i6NoZs4<+`Sa}?IY=*8R+_b@ELcm6b1v|5eVy53!+qnhTQfxY#M_nV$Ly)c zuIWZu_A>0@e?tEZ&TA=C6ZqjoKKnfy9E4NTB#5hGJ1QgFELiCRxsbbI$6#X?tS^}0>-XHdsgEkV<1)a7QDGo)>{{-wL@CTi`6O}N0-jI72*0A(HLT@up4)%7w+YU1x~XgYIBtog!)+b)~u$FfS@piH@y@ zP|MtA6^;71A^YWsF@`P1A{ARAnhqmS{E6+#(Xr`RmN8wMFZ1`EeXtGgMnSF*4qJoz zMI!k`F-S?PRY=BouhwYE7Z357!joh4u3XyoS^plNp7~eA6B{1F-!~J0PX7Nkc>6L8 z-Zynnum|OQQEIQq$h32D1;a9)YFwTw0hy#XnV~V2J&Uspa9u00kwgWZKl)$kl<8U2 z#vn;(x$(KbdZVZIYJV@7vlfGVedg~mw8RlIf^aFr(FTXb6+qmeLeL~=h@QWGU`-&P zNx4$Ia%STWc29BV&=aqox1Q>~EGy0FwT8zE;>(t!2R!_^>j8cUccZaaqgGlN{m-Ng z)-)eIU-Ssxz<~O1T49=}!TK*6H`$C2C#>kq!qhTnpM-e+0C6&kDMh0_LTl4#I1Pnp z+7~{yFADod6-_PyH!xV#PDG+xyL2|r4UX43Nhya+i_J!jKP<+Hp-+^!5Qu_{>0J=L$I<})cad{}_1R<=KF4TL@4AVt`VFN~+BJ+3U1g`g>>ILsK;Y%kk2O z5}87suX{#XwJW%A!Me9b>md7dy)W3aw2ZMG+Jt0v_sUKeguNSSBmy};wdEr4$`8zq zRtx*22Z5IdlRBo>9ww$BW69jv#{vlixhU%}SiJI!(dY%^wJMWSMxs#i4L7FTmDt>B zG?C*@mh1z4^}Ms&uAx-$;tel2%vnx>>0m(MwqqDMvMmRGY3(%kz0De;3soIUTkA1-^c|hsmTKF*h23KHLZ`opZ@#{*0(AOr zqPJ;@_0QPtpKh|ls~e5?1>AXBz%KElM6{s}1Mebo=?E9MK5aPe)_45$w9s>Im2uE~ zeQ;zY7{?#tUM-(S-v;0c!tpCYryVw*lm++TkD}Y6Vxej8>pIVz2tm{7ZNiT+ElJ*Q zv=A_}{Y+Ky2gCMlw%rwe^O8vOUhU>xBH*^ z^&&G4jEB=h*_2lW3Z9*@D!2=0|MDXm7#dA~iw<4fTg(mRSC;rmfn6Jly0CK(UD&B( z�dp>E%D_0AZHjbBnQ;;-_ZCmJByGjh28TDCk92vlIrR;uu)YBjIGwc-N!ME@idt zK0Po}WR<#OfBd38BX) z5PmG`+(gBiy$GiF&{Ina5Wjy}WzS;JqD8(Kd&lWE>hM^SUyolDjYa;R(iz8aG2W!R z9yrLMR47l>yo!$PCqPQ|7?VYIB=o2D2kL-65__2pBpiG7S)S;r!=loiY@0J~>vWla z@9J6n&`j~KGtcvaJ16=!MMbIX-}bG7&3D95o;^+2|zUPn5+L}`1ZZJZKwj2P@| z7;5d!Ex1Spl>o7j;3YbEV*xRezYb0xpTjg0^s-0P-?w3|kzQ1S!K=3W0AD`am%=9n zl!_HJt40z7PZ&bZV@eZMBLX)*$EEwg-si4$wau!)q~CffcxMu0mwXlWoJ1duG~VO- zetdMmk3UVyUiH3O9TO$DuK>H4&EE3B#K^WdGWmSnFrGeIKsf)J9%;wS-Gp)`%7;=0 zX-}#h|IC_`IPeWLv_miIdw>Y`uBjgJbN0=QXv1Jkj!HI8lXurt&#@dAWV%$B_n3wx z=W=m!Zq%Ve8PU!oN@&We9M5+1UU6xPpca;HfiM{YjvQ_LnY_1{PBe_+BC&^_G{~P2 ze+QT0`@*vKD0??JbFlrft}V(Bx{p;j{GI@T{e!DAjszYpJ`Ow@FK(+anvv0teHjrF zn#|*;E)!NUW#G5S#oWm@)ajN46#V~E<@O7&2AcJT5uyYQ<>dQEXK#hP+V7zjF$t0`C z*shSCv0S|wtvu+x30^n+r-<;MDzMpqs=%khVpD{E)WM=70tfv*@#}t=gH8ZU*XX>2xP;^Y1&6rXAUV&I_}?z^xwbc`@zg_mM(_ z<*$U#>3th_PuG!BnIiGUr8z{KB-yDL1z3N1R zewzwRo<8mH2li2u^X?Sh=(}Z}jLz`wF<-?(H~~q%hQ0nJ%kfz9R6F=H2<}ktra3(J zYHa$=aeePv&Ez=(){Eo3`)6y`*nNldI$_yWIs=@VyN_homz038VxW*r64Ym=I5 ze0^T%u6B+=TykEGfwGaipK)BDY|I=?{!VnClZ#^gLE0#SfWQ-T+h0{ow{5iXeEn#` zB}O%q{bzav<5`C83j~(Hg=$A}15^{5A0L579SXD}a1%w<; z%!oG${`z6B5<^@6&28Y2_5ZZi>;f&1c66G$diG|EV+0y^=x^c!gc-cSI7SyMmHf~4 zB*2e-bZ1&WQZH$OH~3=N0?x`4EF~Ow{Ep%Uk1RLi9=g@%0@puV1z{c9)&mypeOf1`7MbL#{O3~u0X2pvnPIVi&(LZXmeKTjtq-!}@w`DsH4nb4C{-uJ=OZLGdU#6}(3IC^1Sw-HE*w3@f zZTXpNbiLD;hS7+3<1e?`G@LNxX5on2lU_Q5(9q37`5x15a=3y>y-+|A)60SY7?Fp9 zR8%@f!{U_jU$?+Ri07kXiw#DYM?m0FTL^J&fsCY9@D;^J{$h%`zAt-;5_aja^9pcG z5W~kVLl_p^x$o=QP5^dbydFec$UsY7U3T2zFhIltt*Nz1|Ix7vxRir{3$tpSJ&E^6 zONH;qwl7UJXnUo#fHpxeG~@ zaTk)YuE#Hr3`zc#@u$aXqxZTLPE#&I)^z}^7_&j}lkvA4Wj97#?MUxjD}g!b^9B)H zq$mM4=)`^Lchi#;X01~7oT;wNucfZ8LCQ$GM=}$-c7>FAWt8uJhiOi`MCKQGCI-^t zCzSf`oUnUI-N_Axs0OeAZYC91f}IieMe2bKdfaFs2%aYtk-qVwnTq{y%355<9EWtA zfYdv)sJb#ejEH-W|6JQ}x{W{|a1yrh>0%hR2AWr2mLq?9Mr~-!r?%D*5)|Xzmo33} z!v9rHQ+Jy7o#mF4(S2TuG1Tc(=Fd%RYcw}yR~WWaU~Srksu(I7qSZcRY84KyZ=>Tl z!>L-Wh=;lXO^&xTS~?wa7$A#x{33}ddyk~@yxU9@Ox>AytX#(RRgau<;r_hTpDU|>pCe-3qx?{D0X$9?~C{eN9oopavr*ZcW;K1Epk)uTU?tn!%jgQ*Xr zN7}sNzbtBznB;ZzVVGYVio6@8Cs--Em5Cp;?pcsN7P|zn7(x!@J=u&_i&1c3>p0^g zvDS2CwT51sx46Zwywq!wI8X}}>Ay5f;g|Rty@j-dY)az)W#|P4x7QVe8haxBZy$&# zzF(1pv^GYa-r0;cRXQXv)zVldm?~Ma#XLt`k+yIqe6qJ{k=2ci7$D*0djrB>p_MZ@e8`9i5Li+QBv7BSPIIlO8Dn{gtGQUtx^g81Qv_{Px|d zy&S3;v_P00as9MA@ubWRF?*=aRRTJH|9gm<+U6ZDaR1oE|NKwAD{AHUZ6DK*wJ2(9 z-YO20vk~gEHX=dKjRr~$FVx9oNc(}t3k37;K#?ET0i3lHo2+H@Yv(+=Ty6M15QQ7= zG&p7J?yCaVQiTr_)+=J!DIFYYhp>p`~2eAx%@FdVt7p*)?n}FJUedeJ3p>F&G z5t=+#uZvy|zEH}$FIFKZ<>EK=GKG7Ic*9^234O@YiIiHra_F1dX^j+z(Y=^^bkKNs zXLFS*;tKv(e%~IcZ9^w=yZF&!v(;Zz_=Tms%GdZy*BA++UYrAECo{@41}9765Phci zg=*^mXCiq)NwI9F-!%KLho|El z^H-}^HoPKbqq$sZ!+?*}R)FZu8#?&1b2d3b+XY`-C!cQUyA(5^iiA$(-r2p%r+auX zsbX~+UR~krZd`DRmKC;5n|w%Ix5UevZ86I}Jdl%?f?I2+OfH*Y>{`{_A^@)@kanN& z-41Eg|Cjgx1OE1jZH>K^~P<+aRIronRr%VAiRtfI6HeXL5e z-2($k4EJs)F9)s~-xMdoF4wi0g{%SQEAm;R=Pb1^U()|N$~sjTU{VKaVWQX_GJk7f z?w+#xktWGoaYQi}_*{iC33c#yqPgtlLD@6wug3J41YC?ac+??`Kk?O!XOjS)>1JMJ z;2$T&)h6#q|RKo*EIbffHTc*k2{+2D;FxOouU)OB3nZ^#0 z{f(Z8;@UuG`V?lINmrpoCLJz5+Wpn$kwk1{0EcB z%&$#ICq7r?RiPPn0bsHfV+Y;N>lI$ zs>W<+nXwE5RSsZgN5{hPK&;>QMk#x|*M2>Fc)b1wB(3tM^#>ifCjPpfO$G_wUM95dg$flE9-~^ne9@15kP@_=~QA28FgPS>G(%-*Z>tvh%_4 z<>Ibg!Q-`;XM*H;^S-l@>}y-t^#zY?=-6O2Xw%1!*q4x6rdb<#Fc@o+#`9tk$xPmZ z{7+aJTc*$cY?=NN-QrX(C&Di0CpS=-&2bXP-{X{R(ePiVav(CD<+@y|-`tJY{yNxE z_XY4kDqN@#=0G;Rn#5*_pWraf;1O^On-8;Z-)B&AU;Krfw8iW?H~jO@wF9)*& z67l-J^k!Jm9T%pBh-IE8CAG`2fE2-tlR2Q`>TJBqNx^vtaQ@^vqM|I^C+EwN$FAuR zi8}MTP=(c_gbQz|`)R-b-)x)H;oCQPMw}>KKviEICXcj3sqrwAa_yLlvbu~u8@%Mv z-xtT!!_OWAyMxL1wHj3z;YI4p`wblCPnbyWCCsKzb8D__q^s{H$w->) zPF#jG9K*sHR20AJ%fzF?FTe&*@-%h%g-Rb$3ot1x&w8Bs!a;7<`kDI9KGuoDln*m} zd=kf_ZE}lIC&eSavEj^FyF~1Saw(wqC4mtoYJ(;7USkclnfr1<8@L&uu`VAnI<7iqzS{SH93GEyvg?~zs7iwEglYq&F~$+7!R zdC?84R{lUL9Wx%>cM7$Wb2e$0-n>HOyji0>@X>)ht>5b(PUqg=bdTTt!RLD;hrhBv zLrZS>20jHDl_Z}SH`IRDd@TFRpj0_JcfHL^`b}f)$upEN0O^~Ou_pcUo)NQs#U9B` zqVmwMYwww(Gr#(96VZ56+1GZC)uVn6EvU$iIyRImx69qY!<L}Ij z;%!Y+P08av1(eas8hN9U1{Za?i&|1`UK=^g=a+gazrZ-@8%euF0ii4#xOMW(4ap~1 zws@Evv8H?PcSextfK&9JAd&SdZwO%h{e_bb30QgRGz89q{t6OV0ss|=ZaIJ*^47r$ zjc$&5jTXP|CUk8o*XL&Na{(~ZfuI}zN)qLs6ODuDL}R~lumJLfqPj8fxXvXNaGfw@ zySQo+XFuUF5wo#e@r_QBZzvoo&3yxj4Xsb?dzhoXf6bE$E=wZYZ`ibke@oQLj5{JL ziSjuK)U`Wg#er`ZHepVyj)WDuy1h?7u{aHpxX@==WBRB@5Fn6L>l=}aE4i`sh!Ncv_&B}%$+0G{_BhzfA}$%+S6 z|DR!^0@7=wET@&zh7KuGV6W!r7PIDAcXuuMB7rw?NewNz5n<-p=t-5@+l2ON2T*o(Bzz1-FK%BHK$~e{03#iL$fS zhJ*f!4`aH&oT}CaV?-Ncm6!o^40jNu;p@TbhWd=$F#C(2PsM8qrDW0$-4k7CHa~-{ ze75np`4Zh0G}>|87QqRo&Kq*;g#$5q9=Q+;mv2n3Vkq5pOM7a4G#YY=0>o_Rz*$Q2 zRs$5xVKE6cXZ>|C4BQ(uGlINbuj4?l#@BAgKd00IB?ylM&gD+6Cn@*Jj}Gepm0MZ< z2e(r8YM4NIBXW=^X1cSBsn(_y9IJ{cpew)f%4}!nsmIWXeGG&TjDJ4buFlKb69^1k z0r>6R0+U3Q;??q$)H#{homif%w;$Hac@C=x^L>&t#hNMFeQ$6R$Y90114;w5hL`Xh zx{5rwP!U7uZpKt~04pVWV9@0W(uxJ8(8z7&yCXv_-bnx&Dn$2Tvc? zijf2?yRGhTHfa-9p)EdI64~2IMMi$ey-!jnJV)5|nTodw#?`Qj9H>qg-~YAGa-{=c}y#{?U|nX5rW&E(sSt(hxh zhw#xT;a@Y?FEkiTN4uqOG8~?|-b}Kazan9aaZB=)39G+wo6|i)*MB;2O0!1+<`qDX z(3y&PUXJ;EpPt%xC<>3gEe!FYxf`6 zi5KfMkgbi9o74WBOgLnse`I=%jQ%}yPXRv@#ar_mMrwY*`|@%H`0XGo*$i#;k!D8 z{Q)!%TeNTG<)K5;!u&gu3ocm8aRkYaq*<+dB4W&dRHh*$Gac~s*NVz&b#J{H2`akZeZqK)OW}^7B|9b|7;c;2Bv*Yz&C#G?B&W{0Sm&SwUC()eiL zRk&yMUOrO5U+*C#@Y=|@l?^y9Q~o6L%4;_MF(J>gXtjWQHca3sHa z`48emz&FNpHuVS5ob??R0||k<0mfX7Y{i8%k?N_Mxmm!jW%p_IS@%Lr^}_1M28Oo9 zX`clAB-tKoVZy%aB?`5}D#*G2@=prHfG%yMc4cuZK%{-os}5YE1-E`j1e?%}RDqk= zh>`THcPXi}%Fx)SF;e&0-cVzC#zrG#L1jz&wT|lp51VCZ$kjQ&5-TM+KO|~C`N@|&y1W5$B^Rq-in5Vd?1tqg2^-#QrPARAZpx?ruam0TF~wz*sT3pru36Wn||y!AB}Iz|~o8rTJ}hi4+I{;1HG+D=c%73&*t~4e?R7 zg~ENq&1&XH(}44}JO;D4#As%WoPnA^f{K!#9b9e+7nc@hEg7!&X&0J^xLRK{x|TPJ z6)U2PCHU`K;$nzbpsHuNg9B+x(fdPoqw3igk*(D8Z*M1g`iWur0NVoQa4BZS8!Z$i&a;-n!nawC9zc3>{w)V zMDCNeh)53j)*leMNn+;GL8e`*_K|e}p_6ybc6EsxTS}CeJYLR1q!?BDx!}g^HCk_f zd)+ZYXBuQE_StSbidBf#v0R)u1GFed^>T>JAiMtkqY^8*!5bKJ2wR|JyXbP>Ap6QQuK%b zf=O-DOPV;{!XZxK3NirobAeikJUDQ}_@>FN6Z)BFvgg|M-nh*4^3J(d-qfsslvQ8w z@HZks1Z&TWB{(ETvv4>*u7j`+rySfLI8M;%1uCd$BJ2meK(3;zyF1|+6!S>H%IMx_ zKP-C>l#>U0N8qpzV4~eB5(k+!hqM?Ne%&igzsU;1)F6PO2LdSY&90%ICD{BUiigccWPsz6{8hHd-qvtfLZpCJySQeM z9z^y|VJN8#e$0zU#yK)L*eIfCcMMds zM(HHQ7H9zCjW3C5h*Q3Y)lU-$u{}yTUoT% zduD!2=7~A%lRJe>u%M!Joda?cpJ)on+iY_{4UqLGahEepwW+Rfh!c;~FkF@8A(ak0UkWdNkxyUWA#m;XES+%aXE%bp#wt8| znDkN+`!n~K^Npnt<_3ooI z6iGZEMLd1QbAHx{jF0d-wtYRBsW{A>4}`(q-|N=Yr_4QP77(RM$t?>JEy@QM++BrH zbtad5hyX@fA2d;Z(NK$&!{*h;L{7Cystau`q4v_-ZH(XF8IKzOi}=7>e*d45dKi!M z)m(c*i^|sZjrF&oEO%RFa>g4-TRA%Ow3VLz^+rCBq(F@f^=Zn3?RyLx_gHzOcUL`i z6}+G*YVU&VeB?W=&okEounhf-y->aBmt4opdP^6bCDge_;fPAkIWZ*ZltvV!

eq z`j2VWfC~6Lb*1oy2>D1ESX_4 z;fub>LM)Mx{P;r@PSS$6XdeI5K{A}>QBXl9G~X~s62$p1K9_jl+nO~L9wG!0XN8=F?&@ki?u$DgQ-P3ZUmkR)3*b+YVg;i% zfa<95RyiM_aO%DU>*w%iCKem5Uru<8xnh<-r#1tcqCqx9K$UPkzcYP&0Bbeg;3ge-HPk@ER@dB2A> zQf>>Mc&}x!!%)nQz5Ywv4+bZN51AK!?zxReq~iaTKH{sKX7aL%#R3?O;}`Uy$I*nh zF?3Ry&FC13Ia*U~6a?+RxQsHXY(1MZKp;K7b&58E4FU52*pzNB9L`!f^@01k-?M}3 zr1gvJW-%=|8!38+!D9`@KfX$`?bdZ=NAHlz)qTbzH?IBdtL#ftgXtYSJ~_ye_U7#K z$8>~)wTfh<+(~ZVvcZK3s`H=RYWzQQtG4<9NBXzhN4YI-qRq#G-RuP3e>XnI#Z!iY zAD@sM^kh1Q-7ik7$+=_pKxUXjVC%-xAkcN7ymLy{?-_r~H!ys(wm+npXtHS$V3zCn zoD>gC#W=?^>Gaw>#>evLq190>C%`y_oTNmFuVRu_yIEMlJ5>f;ui)~p2NmGy)*$g8 z!V_1AU*akJAKr@Pj3C*6VeELxAMhIjRc(3VHyM`~=YPQUI>jWGrHnzN%fQ>qXGgP% zZ&{o(jedPv-vraE;oIreLws~HpD7Q0X!l;aX>tJ5<%hM4(8t;m^Fj40PU4BP5!v!M zI@U7#J-8j>xKkp6$7>I3|6<5GUAK7*+E-H#W+ zCDw<5E*sLn@~(}*lK7=fAt)l^U4tDrVVe%w35O2x35thXCNCMcdOx&rtvOO^0D37^ zpPd*|{o0KM4f~0X&Y2{(_f>LXgI+yeKjUhxCHbe;`Peb93dN)K4?J^>vFG*3i)qKj3$+I^n zpT=U&9;63^KcepY)LGP_TL|)Lb~I6{$`UKncu~$>2fW(h!ve1Z1H8u+snm)~SHvCH1}{T2-~ z!bc`IM#-Bv(kLu=W&}XhA6YYe)VjutM@%`Kkw%f#NwpeUszjC_$91oZk78NB5%lGQ zC&d{Oly<_$%~Kfhha6Xx0>@c?;^gL$i_ zkKck08`q6NXolO1R`m9A<0s!mBs> zp!;ZuIoFL{=m_yZLJWpi;_>O5XMObQq)(56M9CdzzeEwhL#NGTZ7!w;XA4LY%?%RX z>OB8`mdIjrF#sMhOm&c1JyOL@y4r5?ml=gZYc@W5+>YL^q`rQ4JvZ+X-s(p-G(`aN zaW$Jj$K~bWvvU5VIZa>d0H%9?8PK3Rb?A$(x4i-Wk7{cL78kt!P{}qqc9e7o?_Ym! z!8`isOK{C#-5;X|8xS5*Xwqx>9Nl* z0*EiBb`OVlPVHfHt!xBzgn1~h?U!I-e14`HGmzmb^ZJJdSLy65_LBmW_bJSN3PN=& zREvd>c+-G^ zdh5~d5z0a|)UVG-l$BU5*P)B|}Vn`7s1|Ned!Ycbwn>4$?oywzTk7rTWW+=n;+9 zf=@3G!do(ur6phnV-K~{=Xg3!voLl+cY^-YCYQW(Z!0H3bh7;Hw<#LS8SoSEZhK63 zZyhPBu6vfnpqh_UP^CRRe}5groFc0d!26B^NQAjoU}Mgw7e1yabS7rM@n!Uk1}`vr zod+>Qma1rMgZ~7R z^rdl>u!PgnSp5s`BBmCXKwjL8^BdDrx9hu+k1V#seDXJO6*fR%2@6^Pd$oW zx3t`^drfS9wi_2JXM`Zkr{rj9ZxPA|ciyAJKeT|zN=%m!C{1s9mV{^bl2a(Ut+2xi zO_W`#aSCg}K658Ix1;I!(trC>Uj9aymIv%e3D?C>=IrXkr{W_?Sg|;jrxWgQ`l`YR zf{702mcCv-!C%)6o<)`a#5cE;>3T$#D|^+eRWb5YCE-@lXE?L$Y-XoJBp-eFmwGRY zOs~j0QIG?1Gu`vVe)%>3PSg%5SGG8xzF?U`deHYY9CC)L7Z0 z+#0isd6y%K*g-;>cf4NW_(zJ>!gQ9C+SY<+kS?M)+D|6~luIfu{;l1M(fh-)?C*W{ zj}6bQ>AGzy-Uq{J;0BoRFiT0h8BUKoR|o<;L?OTczx3j}+;aK$`4g0>2!ca)3Kq$v zsKQ~Abs)}KrS!*+`|eC2y5h>29$$0nRgoh3nxs7)|F;K-1b(-JEDr-o?lBRAQ&_a^ z9bMv&m#)dN=;iwjEo=8b88|yY<7tvz?rj3fIj~g%L#f|wXKy9k3qD#OmMVzJaBwq< z&>_uX8_WFZ6a?(QqmhdipT5>NY>5>yiSj2(iNJOy_vM+EUS58cu7hRMpvlV&vW&2u zCVc#(+e0WoenCILfq@bA?A&uKsOx;LZ%*dj1*VR2e@3bY3!vA1Be`56zifhXEU@{~ zQ*mg115#A1EH}bEf8YM42>uM&MDU)?6JBKSg}kdOYRAWF{m;>ajb$$SC3dF-T|iZ- z$?1A)-a)W0o!5m8_n#-E zrTY*#@%?=+HjtBC;O~gE%U6mACk%D(!fvUJE8}j1muN0buCA7cIUp$Is3xdd;<65j zuW*y@8Pwe9a<=R}tIg+$2>g-aOA1pvL|`O;R;Z1zB2ad}jlrrk;^y%Q`jXTcU8oLI z34>o|NK^!Kg^hb4L5c@<;PUExJDcolBBQiLkf)8=(Rr2$k7$X_=rH>lCNh+TN9Aqs z*$`P5`afS>z-AJIWcm%L91j3Oy)NnP3ZjW>VeJHVh)+IPC(^C@!pZs|H^Y9uC za`l6NrpR?r#b*M-DJ7Ac>zl6;wVs;k;nThlUpB{mJP!ArfI%0fiA=X7GP=f(3=XrA7R3g8m%M{QKcq=EDI(#otijF+Dfe+t2uq?R*tD#b8v>%6>iq!is9p23aqUy2YR= zO{&lLNV9KNmUfm2{lzr)e(PVV>?RO|n*Eqn7)YmhC-RZ&(K2e9f!8(y3G~}SoLKg^ zB`~>;<(9;L4D&u5lH@db@2W5ck)X($G5bKpO-pH6;k@B1&@bZKXbBZ|gW|uwxI>b_k0@b_ zDBB~ML?9iANZ!$?#hcmO?qAx#OP=m;^dLAgDGc)%8zN^z zvu=`IBy5N{3L-n)Ge=!BJc&_==6Q=9U#WxO0CB32uS=$YIpU{EFIGphi{m z=*x#BR-=#Qt*?zP;Cqtz@RYCUPc0CthKRADA>CoKijH@(8TI|LLyKy!2$0MVlJi zw0E6+qh))Qk3oR@nt;N=j+xJyxfB+?$ERJ*yC`?Gm-(!7b=I1H3f_QR?e4Sy#%s!ay#iJy>%R}f@p@?`L`-BW7pfsBdMdo~QLGwwnge&bn0t`I<9>xfS1cPT z=E2q7F|CHg&nfOGfQKW^$==q63VZQihP>bfS-ozW^6$pI%C;Kmz%5~6z*^h-t?>Q| zEs@peGdJLVG*+XBKL~rt@Xl}@>RKbH9kUNI9gmF}TKwCr0(0K6)6kW2-rBDc4Bp?6 zpDWyWJ_3*gw2CnuT$Km4!viZWj zR(w?&vc3k-Xl`E<#uir^@FyN5G1!{PtDssMFcbEUt6Md2Lm{2IqYcn3F92M?G~ z!AHHhaONPl9K9V|jupjejmh7&qIfJ{SM=jJXRJ+UNyvmqUe_lAI0U9UboetU76|l* zdpPJmE_oWEqqs-y9M8pq3saus&<;mtaPa%0NceGkH2xrO;fNuqEUbwd%td#!C7HAP zWj(E#yX*Pg${y>dB>v7#C?NT>QEj`Yp83z*;g0WCFUG$)r2T6(Q0Vsp7-KW=0p#-B zi^CCy(%&3=DKp+5O~Cg6-JP*5GvL4pZ2Rc+~4=(G;u>xBQD6FbO@;3|=b`+<2*{I7Uj{v$S8 z_PElSQsDRR?ET2UV}=sYCGyk)9N_)!8ta4aZO7=UwCb7Qw4XI;z+m!QCYnjSHgSXS0z_cgi~9}v3IIpujfKQ~16w1XD^Ibfu%)&0ZK3wYl*tvGaoIqHIZrgVOt-ux={A zU%um)uQ#N;$+^3ajb9dZ9XUUVes5wAly;ssvgY!;6CD26sWcD#!C%=Pxezi&eETb^ z!QVzaCmy1hpB$cL$8MZthDeTLI&;+7TZzNSTbypIpz|Z@cjC3euRrOFV#wxW~1!ETEECaWC)oELUKd^zR4Pl%$^{(*D(FB}fYZm1GH_S^-@Jp6So8B z=YS8=DQ9okO59zeP?OAcIfAPU*DC!SE&_Y1YKlfzSvHuas6Fr8L;HJgew8UfL9mV| zUyXc7|Mdy>A#Cm$Gpk(K!ifYeRd!2#F$Hc#CWD`6C^KBKV|9m!Q0Xs7J4Y`U*%Mu+ zB|a0g6hZSMnLC9e%zgeh3T~B85`BQSOa5XeX`^&XQ~pbfzT>1`{yRfI2w9tJj~%F} z;0dP@sn+L_a_j`$nbC)O-4wySZu~mmb!_g|inRsi=a~fC zul|8yysH(Eg6a=BaAdMsYBc|4U;06RG`9AloXVJcQ*=b`;_mWuPmSi+y}_DLW<#$FU^Xbdz@uh*N%Qz<(ImB#%vedU$d+5=B6*$+SYIlj}6-km*Es?rs zm;L(w*yJO`RhRI)Lq>pE$gQ~O4>dF zTPdU_{hrMG>~PM9M|OYJd_h5z(W=@ zyE_KBAH^GutY0Ml?@mc`z`N+tdTyRd>sL_s*V5 zCs$TZh`Y`G7)6wtzHj4?{dk`ycY*d8-mB1gH%aTUX@fet`Ho^K-HaU*+ZCg^KNX|B zVz+NiZupnnlc1h^vKk!Va_a@1bZ+P8Q$0Kn#KG5)GK$pnd1AfHF|nNoof?~-%SC|y5b$>ukCGg?qMF2j<_oHioj zIWcvaIK<*-t|$o!aX2H8g4BC?NclBA@@ZBfyk_J(94He{f3N1WwVY6{+mLeat|WPR z2ivR6_Nn>K#G&#R3v*%c3fswzpJB@|w0-;FuQ(JUwAi=5?*~L&v9w!>fdf4_UCL_W z&V_HC)tej(#Z%x;-xugIQ~?GSgfPke%>_N*7Hgsy5}4fh&YZllM_XXF;?^)#_b56> zA5gfHv8L^k9AIHSTBBIDSvylXPgWp<3%2RtGz-zP=VtWJYikm~UJ_BtJu@u<-$uk{I9BEM8IyY-yf}#7a1MQUOhErFl zwnLVCHR>wAF%q@nvuoG&F$En-nMgh(kN_F*0k;|sOXhwjwAcRr=vP7H?`Lwx zA~z`LW9Zm)U3M<_bJix-w7W^uF7}IGe?;5&G_d|a9}uJJvF`XeC5>>q)rqQ$O@&p6g_LK$`l!Y+_-*u06N0= zA%jV%x26krrSLZ@#H6&_rWckR0$`P%+N}_Iol0jbR77lcFt_g<|4a~B@^6qG zv`cJ_a<_OPjhPG8@q(D)^i4L$IX{|9^)BrUar1q+^1Mf~6fnS+Kvv;d{- zHbheK^#+ZqX$|e?_pKg~;tCw$MbnV1#^Hb|Tf10M6=33T%@^B=OjAzriX6-bqGA#W zZ-yCBB+CZVyA%f|^_t=gVDLGpk73+7BSk~Z+{8mEEdkjAw*0B+3GSI5XcPY~psB{I zlMZ;i{A3REAs`Ng{&CzFV9-jrcfM?-La151gBlfCxqT|G7sBB^2|A; zlX}TVf9f6Bvqoxb=`W7z2lrk${SzRHd%RBF-a7`O9)r&}{)XG@4o!}3Wd;@Z*}gBL zp0mP1jkL-F_e2Y7te;JEP4fc`a`)xh3JI28DxoN?^2|JjHqH><6aC>?&t$5hFT%k& zftX60`W{2XPMgKswzq3R3~&X1>Jp5|x#NwYW8Z^FD=}-`lhNGcl3jPk2%s2Bk-B8{ z1JU3ac3<~7;~C)I>6zfDFlJ%!`?h;);tOs-s9bxSxiI6VKn5zxAPM)}4~8*4u}Uuo z_t9|cNl1Lah!OJz^=@?{S4ENCeQ~e3)X@PS#^y0o&{Z9I6)bPvx4z&BkpiWvPWp8{ z(tm72$VW@jYtKoPgv8HR{>~=_1b6=Ua;$n!#%dVcv;gIF2K3FOYeio79{5Rcs0+d0 zxJ$9kFbe1>5!J`^?Dz=hR~Iz)rqJhf0>*Y9?k*P+mJ$*nt>C0@fVg*0oz=lDyjSR-! z5AgZ2u5g&=d(eQtisSqiUliB+7;k-X*{+C@ZrF`_^+e8_hGlV_my>+J5R-Furs!{r77R_=3qW zy%Mr2YU-LQnmC^z(PZEW53EE1qVvPRR+rg~nP-->&mq2>fc>;yILhcOS%RG&rI!fTN70srM=RtnRs?u5pqhf{CQc0#W0A-ot)n zIuPT!_d6kE+zEo7D$US~VhsOHpG)kr;?%_x&x!dy3DLw;ieWQKNg z?I|&Ww6t_)yL!h9b2&lHnbL^jA{Td)-=~ea=wQPcZ6zg=z}bpr@Z)e?N>h@kEOqo# zZ*?{_SEMpf=tW@qmX78LkKP2mN6kxI5)1tlV(I1Bl$Xgq0+>WQN12Me2=rfZFhcMy z9f26O=WdX0PZ<)z|DZJ?405P@n{B(d!S3d2slm=yiH)1OOE93lztCtSY)urtF)zc# zAls7(G*K@0|BH=A`0ZR$L!Dc70P+mbrZX9rap9-enfh{5J3zzZ3ek*fwkbmL_47Q* zh}K(wY&2R%++er!MRr)ON+vl+66{viGQ+gciJ@*gLk8(YWp(4JenvY9JP^#^B=Wp_ zl^Bl2cG3T6X=qCTaeel6-OWLgI_4%YG>bpioT5(R%?L#WqLptL$hz zE7O|DDkYpk#JotBDR-H+eHg)G8h9ub8$BBq!Ym%1#Pv(E*>K^*#P4(JpSKH9toz~s zKjsQ9NekN3qBD#5$%^8gO)qY^p2`EwU;_l*28Yoigm&0pQzVi@4UyH3vP(I>o}y7r*K@?1{H2vjD)4M)k}JtG&9 zz}8%ZUZ3A2f!_B+kemBQcad)OL2W;{9i&e@P1VRRvEl|$9G?|}Nw9L~+$5E@X5%sO za*Evf_au}4uz{(>$!HeIkiWKR^`Rv56p;|xw)GuMB>6BBNe8|{UCzq?GNJnd^po)F zCPis)t+;xlfuz{en!szL@X^hE!_VpXvYfww)F0qq(#@?Qq^>AqxMWId_ngxZm(x0A zt}!Oxcka^dS<)p;60e_W1N}n9P=$jlhB6-BQ2;(?h|h->c0x6 zZH1B&Rv4)yQMf}bBzf?erV(h+JkdeCnNC*H`TG>9mujRu6P5r1PEj%4U@1v3DJ{wR z;P9qPMmRn12p?0ZYWcF6*l3ay8@SVaPQvp9G!0GM$zq@Prw}y{@8w$mzmVZzl zZ19SJB+y%$VFl(Dz&Db#>h3Xn$NK_7^kg;m5GzX;3E^ele}0MNQJiZh0&#~oTF&9- zeLleib(LqPN!;o8Ff3pEXD?w83bV4^Za*?7K(qUUxWoOB&jAo*z3|J~-2YJ46qTIt zl;Y0vp3B(x#Q2+v{-HiQg9DjH4aXez`X&?faTebPjUV(}))YLZ^?hl?m|K)DAYOT6cg{N+ z)FQS&J7hrg?%nw9L*v7>f04P5wu>AWnv;7kA6!5 zbzrJn;u>v<)Q>y1#5MAb0|g;WUhg4@Ipbm9)sXMTcuE?(YT11GcZU#7^o6|un!pFjGBIUJZQTaCBBj5PXl_ zuYS{;vY`hC$K4S-KDzCKm~?$*#RExxCW>T+qvp8hNfr(7T&%_?b)}%&T88SmDv+n- z>z8NJLlpkNsY+le8sy0tE0lYCjD=+yT@DnenG36F(|<*ED+in%SRLWDg+Y!b31D+A zQy!=tuHHPw_+ZUfWjuv7MIu1UAQ;k=3QAl}W@i+WfOpkm*M9UzH+^xnAcKo{i1@&a9Ki8R`A zf`+UJ+{f+`**X=5eENH@hG`r6S_q=Pk*&b`pxBLho*3DELX}}uiG~fKfu4}+zHp{e zjn$SL5`MLm6Z|iFWKT^KaMMTuTsYBcJw5x=|Do;84)&W6O|djn8qGI(0SR{b z_o0;iYv-#W{6Wg+fPH=W0;OVug#j2#(G`ZU@#h|gZq$5DIYqV}Ohd$`vmq~V2rzO@ z6ex*Oku=w+?+NIVyNAt@Age8C|D<(SO<{Nl3ZC;r>>L;J8$gjf0^eWc($KX3tQL=? zTV@RRN=?Zjev3te_UZUyuca05f>IUE_mrs{xlf6Q|9q;0GXrSVPF$c}?RtnROL7ps zoodT9Sp)GmKmS-CTkihJ9HEe=gGVW?AxbVLhzUPX+o&f2cW*G@yhiA*zejF3%UAMG zVsh_Ie@VkXWJ|!mTAiz=M6f&9Es8muT*53@u=(VX4L(x@4V-JDBP8J`!4{iQIUqf| zdMkx2dL?U)td%-?`%W7XFmDyl-IR&)jB@ynluHI4=sX)X;Sumjt}&psIW#1j{j|rw z(XwwC^H$rRr1KJ7o3q9gA7ec|;d390kuueq^^`qUto z+(rvn***;jS#}WF+~fbAKAE2vq7H zS)|j*+ae;WZ-n{(=6zKvS%+Gxug+;&mgl$oS_#{E7mOM=Icn%yKv_m?n< zN~4L{^VZu1OBjo3)Xzan7l|u-P<=`J+kLcyo2xf=O-b``^l=yy(leD|2fouu0UL-RuL%yrn zX$vP_^Apt-d--qhWbSt%2xxS*J)TGmG;cGq>I66GGdm`Pxf+*3xl0`8RvJh zF|z4B9^f)=SCIsCNN)idc!SH2svaZs>8IRQ=?f;C`lq5@YeROc@*8^6?LY+lIt((- z^HWV``V8z`dC|w9wD?y5(^%lmueedx1R1ASzcqq|`GeMaGt%J7W}EhP zI<+fLWgJqw@|f(ZDVa~Ebn({dG*OfGjtvJroj^j)?! zd>3akWmN{ywO)bo^HjKvk0(Wx5r>_R+}bledkvDnk2?TJmNdxsIE%^RrGmO75(^M z0Ph_YeFwkjB&eZxxTed1%0Bb!h97HZA+)1WH2hzVuTBYw<~nDBF=He=DQG0!7q9* zunE7?3<~HCAKIgN-YQL*>jE!ytmr9V{uON((vnaebSK1^!q~wu{%}xJ-V7@ z^`s=}tI@bk7T&kh)I7BVxLbU{=9@q3y|sPwg2G6;DjBar43I5gO0hL|6bkK8>wP4xq3 zQtZtL@MigEEA+9asQ8$YiR5?a0o1{NOXyX}zXqAI#o1v7bOMe10mt*BBCvdcj(dE? z(CqSWu0Gn>0v^Z+NTBd+PsnCmokj+awLBMJ2_g9&0+df>CrNIu)p9`S_K7n1oP-$#v|NL97Bb6zm1Jl z@&xzXgklsEvu4_$bs(Q6rzOvU21YAsOdRS>CB297Lk0F@(+?-KJ=e#m&ZAH?(@Sf? zEWK?YzdUbSn!i{hKwAw{MTnv>CCu9yRKi$K$m~*On#D!_P-WsRn|-AiiZOTz{=2hZ z;U%0a%;{MhxnLa9-|WRQUm_;cFYBHcn;4ZB=MsnQxSYjH1`o)RV{3u^taNa zTv1Wpj_76S_3`bMMQgU2#AXmPSF2>q5d8hE#{Xxg(kYtRa6 z_8s09$lv_QQDWsweR_UjS!t)Wfy|>K!c9!z@7#*oO9EzpRkqk z7Fk#ehh9fxJWE_-22WdqPxkJD2@@LHC670ryI`I?S zTJt$Dt8&a-T-BeC^+u3EqqviQXf|WxB$!0etb0gl+Izz%(KKZxLl&KU>@SnoV>S`; z?RUOExY|T_G>GwBPLfc^&8I8pUvD4rMG3EIsq&wnjBXh6*PuY;P3Qw}$1FTCE4WfK zGNU=cL}ypG^pt}2e3LHn(giP`$9{ciIF(kc7WL*(xW9xo<>RO9FXsjWCn(l&CNEO) zFrkl;Mc?2bd)C^3_hV;=YeH}B-&=SR&pql?bx&!cQWf5xHFrias>Pk8{dp#k`DjEd z56nGP>!isww213Sx%}Ri$;f)2C(63UxTBl5Rr_O^07Xv%oyHk>538Fq^~NA=#Rsrk}|r%LCSKJxfSxm;yVH2xIBUS|lK zH`E<~ej2I_Y}UA@wvc_wt}NKhPTQd6tK~wKUd3vyc)E_j zIl-KfFm}BbG$P>g181<CH(FK`p zS~XTYKxqD^{VXRsk;bj`j6hejxI5o>qq~$yd|G6VfZe6*vv)BgY>uCxkBrq$2lRUG z5x#P_vgNA{c2DBP%Ys9j1`WP+=Ha#mDD<0WqaV|5VTlm_hU~oUHPT~JAj2mwLVL_d z|84@e4=FlEBr#}NnU&SLF>!7M6UMNgqP$nkw*GITP5fs&J)bYvMYj|8lL2wopDvM0 zprEWpV&d@us#D2=4JyLW5y!NjZ$0as>%rI&6)kNJ2l*lK7PY`H31VyOL-&eg@O|cU zS_?>xv@c;l3 zs07$e%hRxI`3-Nobsr7P_#xjGG%pfvH;>`A9l8nc-aDoVe&P|&tqLf=lS6cL{1>Zc zV5Th8V7f*9+j{%)&{tzPQgAD9r`itI((rI~xY|Ta}`t#`;+V8K})_9|gn%C75IO^3s(*nlVO>v`Zc$EGD>}cS2j8i2GUTqhBBEf zEp+=a6LKX)lv{EBvjR%;3~r%E=OW1MRjPz3DHBly2d>#4f9(`pu+Q=-o5~09&|BrA z$IKQq$&h(A6!P1agdUDLp`Ze ztpzpSZGK`(H?d!FYNuS0jy+(Of8(T{W_>Cgk{cwE_m*HmZWPN4K`)LL=^qfysUnp1GFlmQ51sy{ z9$MZKK_2~I+^)YsG|`3NAs3X~?mP-|$nSD!#QCw;zMnSA`IN(kprb&xp4L9La#|(D|uVgyx0>U%T5~Odi=z0rhd2eD(n~3BuLV=MCp3{?0hr{Sx4$)pB zk0FYaW5Ue>?%0>qc%K2!RN#FI|A>nv1_jLe zGx);JG?g#E#XRBl^GmxH$6O!lf~N!bO3JY7SZ zJE^}n3f$5>&4?CM!X2A*Q-8LCdZ-T)xp*x}_o}<|c2j?cgYRAUvZ1-{%_rY&?5q@m z+^huBe2i_`q>pg!2dSC$aNs`tO5y>BNb4F6&)g&cMkAFyG=Twfq}DfTC?xLWd{P8Z z)9EcpnUbJDaX8jAWJFzYV1{_^o3 z;p-{goy(7oMNqT;lZm5C0tR>gefL3`{#*F^Zk=ZAQ^-`q*Iq~hH?BN}kNPTbf2pX3 z;qm!W@K2WUl;1S2;dh_JKA~m}S0I09Am*)*n1dnPU#=qeS>fl=5$_Txc&knCT1@D?!RyyXZz@ogziFGVQtcfBdzlMepCQsKEq#d3B|a1$>=vwgzDXwnB!XLRq-VbomvTUV5NvF_!|v2 z$EdUhs@nAq9KDBlH7FX@J|O~LTvr*5_y~}_k_|tAoA6A(62M9bHr%0fB&Y`3xDQlx zP6!Cob3f_y0g$b9cCP;?w<{;7xLY}Y0y^`5S{GPR)vnX-Ewx5kP!cfKsS1mni`FZ@H&Qgw%j(_6^3R41hKgom`3ZEL(IWb)jOok zHE;wh0f%BG(RmC|l_p;BnLur_??xZCcTutGr9u$5=l7s!Pe?IVm4+7gw zsh)Q!lzCU02s3A|gAvyc`~faA$hpTC_GQw1f@}NB@Z}7?UM=m0&gg5BIKv52_?J-C z=N6bviy&8;ZTfwAub=cf*BjuEM_%DO$yYiWbH!oPHU(ly8=c;)G$#9?BJcE4z+-{T zfs?kloX4t`bB8pO6e(K6r+#!c6)FwuIIFixs0C{m z;3N-fICV}M@-eOawe~y{_xgG?rSDpzLQ0YKSr-nHZ5(#)?nkHFBeS zWpyt#eS?Zv=P3F~v$Z$M48JI;SWcMg#uPl8mCG==OFX>Y82GCS()uf_0zosmI|`y; zdKqlEbZ+ZSV+M#hO|b>Axv@ZC_}JsK996+_zO*fAz}uj2FPVQy#EZ(9`Qvik)epJ0 zQ+ptOha|!{Q^xzV2JK>#;3J4JMlSUjPU7zoFIM}w?R2k9thBwQUYdO_ZP@)+^EP6`Wb+-tzdN<>`%n}+B zW%1*^&-$&(;&SE=u7@V z;bGMOM1YME*}o_=AZg6nwc;j<+7SAg^OALq{u0bhO^KvpS)Hl-ztLqrPmaZ=svGeO zSE!q8pUUL5NiI8fTUT?6gz36_VS|-tZw?&vi}NR3Dgs&TkEg7we`$Zfe_PBDCOLwRz=hEzDX#&$WICn+}EnhT8K!n#8jAlB9ax9m1Kx>f8fVz|1KI zk0sKxLjEZdpPK;M?ugP}Sk(%ZXGvy=#o6`$0?gp_k2WGgsp2Aj4CM~&j@GXotbQPg zW&}wFx-RwLtfANyx|sn3PX!@ciY-kTzh175;LL!hSU?Jwkc>JC;PvPk>| zn{kTyS;P3sgPg?y&EaW8neBQQwIvcFZyHmx+*+>RUGY ze3BNh;;UyRB>O~U!H1t4=Sd1q)$ABTVl2{umF?v+_Ea}DJf}yz0v(uM9dTginS9oO z-0l_;b(qm~mzG{Hh< zQL>P6yR~8RN0&jDt0&=z=xBrKQXfFMKJHQBM&iZ1l#TECMJGicBHg0j1hL;c)Z&wv zg*MjB80#N~FAME~DnSqKxR6-c6Bu!ET^oCuBp+*Lr>SiHm8&cM(?2-|#_B|fjGj#B zZsqyBATxc1{A4#r-5)U~KB#>X@#-3amGXcvVht%iBzCJ8;tbnU7)}xg`zOfh?CrFf zwK1!!<3{>mrY`0`J&8}du&IJhIm@Y@fi>DczMu6eEp#~Gs$r$YbPG?66VR9f>jYAHXPxkhj z7(45HdJ$}!0D=es!7P%%9@CXFbO)5k4P|Ge%hr^$A0r_YvR9$JNejz?^lB=x8?jrL zfSUOKA|FZ2BfV{Z^zt+_f+A|vk<5StC9gg}KpAexL2s+yec$&-*X16_fqrIK0 zv&M>}=+DPuNic#A#86k2bI>VL<|Ur_^Ai`eh+oA7(B?rdXa7o+bUS^N^~g5mX7_?p zZiLwBc&i9{Jk!l(mE#x`c27@d(j*b4;BPI$>t}>arw(92!vQD7wWj9B!E%kX1G6RR zRj00=IuhnLZM8PSk9{x8nP^3Nv3b(VNMwiBeyell88}4%(T9Bfajn8xX`kIQlW$bC zzg50^Sj-%KsmnRZwEE_TekMHD9d^8f9fcuDU=E|=Htklm&-rAyspPU`*L z=?2<%SCO~35HI&T`j6(fci(`TtfwYv6&nmh2lEwC;7)EKJODg) zwdy;iOfs=e#BH`tW2K=+BMs?Tgl0D=c*Aqq_!uWWwWypIDEe%9qZ|1u>vC%xEyKl^ z*6^l|>+@#Y^Y0}GtA9KmE;T;A6vg@L0e%Y&{$-2qE*k&8uxHAza{%^q6&DG~m_!l} zteEEN9Dm8dA8h73TtowK@OmW*a0xNuI_^B`D!d$&E15z)l2Qk+UAu!<=Ne86CVZd@ z0Xlkg_C8gZdDgyORt9iE3x;(XrnLm!^*fmu`HY3lu}qP+D&G@SW@1j_{Dn!H6r6-Z zh!!9_0C~T&dG9AI>Y@6#31T`1iRK9D-Bx2WoQ#`|)R4 zy-izmi4rd#-IkeEzq3GyerTN4TH;`;cJyG?odZQiz+rISrK%Ay*$Z`O_HWJ74RUld zK&Ot~>7;?NC}Jp36UV=8nVjm_T(KcWufs=OpE98jGJY64@Ac()KzN`m!#>v20;`u& zpG9`%xwdRP%{4Iy{W7Gk)b~taL1&5^Z%EgMLbKVY-)RaXsVojflC7JWfVa}PE*m?V z&mN~$+3e>Cl9`m#K?bZEB-o3gr$mi`hx;Y)MHk$O`em7i?PA8_-?zqvb*!Hx`v5zZHjeN+M+g8W5yE)R{x+~$Vd6~GNhzP!M zl5_Kf$dr6kPaLQV=tnecXm)ltzm6(nD!aexR znGGX_%Jpi&rL4t{WFyXmHa^Zar-g)#?F8U%t7QNimb=J2B|G!o6rf9oyF3db+M2*$ zHdIPmDmx6he@t4A*Zfr&Pc(o}YGcqH-r{eVP`*S~7R@`7dS<-#`Psgg>GATP<0|}O zXQuO>bLCWZ6a{=^FmiK;LYCVqAe*9}lfbcTKG=kArQIjxwB4xJM^;0_99b}68CqM3 zY1jZhVq#8jNbd!UE3TB;zkji;?x%)pjjOJ15A_&)9&EULK_wDi-^o`EuSY7u72zJn zp_E{p{ohSgX!%Zbp`Am9(ZQm<@PN(t7iR{C&)Wc;@tuj1tD<2jr|t`6GwFmQdubF<=0F`I}npLI5; zyfDgBUZoN~!&Wxt^m$3f4kl$tj(*lr=X_!F6>7hwAOqhHAT+zn^^+b|Si9Z}p_iaE z(w_YIG1&N$fX~e~qNcRC8h@6{@pYbL9!g%9c4B<(hml1?W6TxY0lSBVXcs`KyfuXb zgLkv2O;+++a`r%2`dUrt?YUTVZixn9*K&bY>g-Vo@X5Xe&G5-uCaMgm#G*&qoB{ie z)ZWm-G$&~k)MfP8+iuS2?(246QB!)sGLP=KyCd&>#v|_?U7~mqq7@p`J5>(HhPEGe z&kiOUPEsL==r5N!N*)wfLL(x1<-JLO z$eKlX%KNY|eL$2X{aW#!ISm^gD#(6_=6t~f;DTC@%#X^E*QY40-d~GywE=mLjP5={ z%6U&nu+MHc0|}I@p0$!jL)t*R_?UIGu3#`A2n zD=1kC-7jPv2rtGB>?xIr?c{p1AzR&R;_k8yZG?4_8-^5ITG0kW7G|%5wEmw+mY@=S z{zWAbeLRR(4x|LYZsdQ87B}JswMGE3s;KH(Om+t*a@o;>f=qj;Wrd zN4v2SSZz^Gj7E09S zi2fTD3+eRbQxOd;+Oil_)h~}wvIfs0p@4a`vK-FomF!qstHY6VDEg8A8@ZAc>@@A? zZ$A!v5&tZNVm#r}5l9llck|G6s5aNIXarK?*gl2suxm_>jlt}gq9ICgt7$bjk`m2m z7(k(w%j$J3ou36nF~$`N(Gt>l;ujZ(nd@Zt{CGU=!~k^|PW#vWBe!x(gP zXj09!+?^chMgwO|LCbzGZ<-JZ8h~$_{$Z9IC$CyKL!pN*pP%ld_QB<%nGa92U{JZH zA;{mZdMi71w4^9l317Xvgyv|u5@lGM!c5;KKRG2gZVg1wtuJzQO|qHjOljXSKG1LQ z=S<$;Ozr4^+Uq2(lB|!eR`W`WZgk7u;NsA0iMhXi3|^dE*qT)C^7w#Q`ahxYo+oEl zz~Yh1WKncBcy7Cc&*jX0@=i-kxU0Gom8S-w#E?Tti!J5m59U*-i^QU*DU5d@W!Q`ec z5h_B`4CPnNb5`irzR_F}rFu*w^YW;R!XXJLbx|1g2Vw&>mq*$AuQ~5PY@*mhagxzv zmS~*Tlco^#!ObmE`du(&m;Vo8Zkma-@Z@iW4UR$I*=@yPNb zkZrL97M+Ol9R5EhfxRku2^6B4DdGIzui_BNo&0FG8bdYNvwU#&Ke`=KZ1-i#`*SG% z3q{lcBvvDq%pz*pwkX=GTT}lwE77Nb>2U2E^>E4WSYLzEf72rWZL`0R_j-CFU}FWv z@Ea8AwEh<;5=@2{P*A8~zPsO){C|SVRbG)s;)GDYmWKJkKbNowr4za~CMUhGF-Lvw zCm?>VyS_DhVi?Y5uLMp9CE|0-WoR+1W|+=1ugpz8SfJxK)4~o8EBiw@+y;LvxNV&z zXKH1iH!fKL94o}gmXoAd| zu$j9rTh3&3(3gOmn(pUgJ|a`%`VK5faND@pO5-3M9q$oW_tjq zaKVCe_ulP!nW9N-|Hcz@bRO^nyD>-NAmU&-hIpZU>ebjeu`Bw26ih-p3MQJqU-)vj zQ4-KPA0vCer4FkzGo@_KDITrdE1r~oEA-Y*H-`8ZGx8<18lz!f&t>~ha;zlpHW~Q$ zDZMpIM$5`r~_Sx@P)_yW_Mz__LOs9#@I#o(VlC}g6BHP3O3esZ~I z51~?gbI6G=#@orlPD?roTq01Q?t zOF4IAFnqx9fIMr=atuk7m5`M+*Ou)i^|ZcvdE>=3rriCy`drQXc>UYo$VE%&pPxPz z`n5-*ThFZAV*g#@S?ShWe>|rsN1YjlC=Rt!Dy0T+LSLt`an|zFvRD$tGDQi^Ht%3+ zW}j&8;k#wOS8CIh95%>X@gVz(CaI{53lS~E2|=@b<>OIYUPIG*>8k-?r#y!4Y$>}) zEI~7rregiauAfPY&C~oE+0zA$2e74{;LuML@`}KpIw?V08<<}cq9HBa3NXy> z?JE&~q%>s0J=l11?+r&$Ec6Tb(LEyzPW{j@b@n9``VR(7IV7h656SklVoyI zrb!071)k6r=rbWY*sVZQTmB&vj9D7YtHU4)75n^Q2(wbNAXTOP&t5DH>QE~!az26! z@vJlk-~9FUSnbrRNv$7_jKVzd?92XV88djsUeCq;NFI&~TVM9WI%armX-1oE3haG_ z0XI&y7ix$m4u+wkWujMn2!+qH-pSEbW@QD-O)5nG2cK<go#*tjBL~IYIK>?BySjlalEfnsaTZ)Qg zo$`+k_v0-`zpkL_$whG%v)DuwG%kzkCwBB}~9L3B8;9;C6qghX% zWIOsmwCAVcIT0jRf#ESN(RDxs?^hq8s>~@YHE6Jid26RTB!1WD` zJV6dRKmgfc&-`r9bXR6xGw=)e;XvkPK&a8G7^%>%O&DBAQw0*PJWA z_7cq<`+QTA@jNn-#px~o@ooDMUsU3VgZxFEjoUP-;^0$xuf8aWn-=y@2PS2eGlZn# z#Z*d;sKz@|+x$|DzumGA|8dJ^HHUw@#r}!6QiJ-b4=(7bB>Y`Ki`Y$X{cATvMA+Xn zEUe{@9EraqX^qjEgVPu}1Qi9t${yGcWiyQ^NM3q|zc|HTrOc-2X*M_fnaA3Ez7|Lq zh!M+4`^;>6eF(zaQk`**1#HQ1R-d_H%9LQe9kiLUtCBs&_D3a)5TRL5-=yguwsDx%>Sw=xjoVP+urm)~Poho|7D$;>JE;BVvm={>SDe zNBAk&4y_Yx_s77Mc9ASp_&fDT09O1#6w8MF{R!~$)4>l*eN!qr-Mot7s$yWF*8;xk zG3eCcRC0TY_^h6Md#zs+ouumsWUb!U3?r=2W9ir2N)U$d#dy)&idJ8+i4ZE6X;1(^bk>}3fq2F>DMCgV=zoX{Nq{p-6=Bm4KS7@LbEY3yc;dwx<`Uj#-3c*)h;D zOQxw5c%q@ZPQlr)?_~DiF9$WP#IU??0x9^_%&S#3xxO_vhO#U6r2Aej16hxtIWpzh zY>Y9=5%2@xBo-!eZc>R_m@(frAc=3=E$P*_nMs2*e6Ta)ARkXtA_{z8<(||t&A;Hp&c`ne6Ft?exPZ`Au{F-QZaAC&Lu^N7(k z6r`RfEe=3{9?w~@U!6DmYyPV-^B-%0<3XyU4>U*{ zn3kY>#R-5(^&!Qkuk+A{1-{oPXyf;{!U#<+yYPGzdz=%|pY^O9?m0-$H^OnpK^S%0 zw|tBJ;k2=sMScF(V%P$_rif@(SAZQdNk#@mflyDzdH+)&dj)*Y;H|Y>)JdA6fLEfI zFQoSWF3>o3V8y?P%D&!jYiWMuf`4kR&$bkNn#if%Td=#Om6744bEj((s=b5IC@sfZ?>+129ODl9#u4h|XdWM>Ev*P$xrxp9R zA0>}Cs_uO+QRkp)okAp|zz@3y()Zs?CZZknC6{Y=TDf~Y5(f;Owd}6Fu6s%ONG;b0 z!#okp)nkjF_~DG;#+FrTukH;@l5!g(O&^vMb`}5pZ?eF z=%_+M&E=cEuJ@v0plGARlzrS{BxOqHPdkeGbicNnmNkJ6 zTewKmLidC~>E=T*nERg3S&Q-ZPnyN8F$@ukM;_o5=WTc#TH3m=dVLI;gz&bPtPi?( z?^Wa?(Kb1y(((CIzL@MWzKJE!1=oCxjF=EqD2K%gE7u>-8vK|ByHIjt?--sTHAdva z8`vqoFw+ZPe%+W7F3p6cZ$$*0f8@AtWOXU-_yyV?BFyuSs<>=Leb6wp^ZKpV6qyM+ z;0&j`siibiL4PT`OLbdpWJ8$f7L~V>0PJrjiFZ*huHS>aYdlr z-aEd(dMloh>8s=6O^x-+uFIU8F2CZ212~BnVcwyf(ECk z)o2MVP>C*6gq*GerA?a!W&_i6|V->?j7nNBC{ z;>?hV&XYVSE9L^K7b45~Hx5zALVixi;_(Kv{sXi$h)B_2t&4blJorluF4({?eeHp> z)J_d7>}zi60s!eLV%*!XHK|18!C}Ft4YVbMW3^@(iqhB1;ka^eJ|)&@dl#<45Lz=C zA(1vR5YGFwj-Ohq`A*A*4~)@U+Y^SU&YE4nRy2@`bU{EQ)peyAAVHqKr_qql@)C(2 z7y^Ki+W6$NUJ!L8-aSj?-TH$Hy|#8EH2rs*3F8nWmDif;n@oU3t;WS=z6OXC`D<-L zhS{S#{I(YZ?eh5!37tN%^s81w{;U?ACVW`y(E<6n(A%E9j*svxwSqk1n5;Qw*G(AP zA?A1%!lVV(f7tfQsv@T`R7@@gFG)Ls= zz>Cw@ooE~PgRB!K?;`B1CMs@dc{jWpq}NMu2rA&vkdJ7- z*a{Np`J?H_eo{&#T0u^nFgAuZy4YG)oHh<#)%NLOLz|qs912v-Syh1mdQdE?SeL#R z(jr!@bbAB+&Pi*1)UZaM&Q%ePX0d&es!1-I>WWq<`8?J|a<|NcYya-iC|7;R`{yM3 zH?+k`ZMhsH?!%COfk#x&4HP$>k$RQ25V(5|btBbdK5&4<77{g^m)ptagYkZoc zlKIN-s|(uVf2eH}ji7mhk%2oSYzXU4R;N-F_liu{hP354il#qXy{~-XeKTXkxa1kT zD3-t<3C~$3v9R?reTSsTe&Y)87fFiPg*t6lpRG;}a1|Hq*LCa7=cqx} zwr5W?YY`;#-lA8W62qWp)>{<9u9RQKP}|yrpcaT>XU-9L=-7?iUgI*lAr2eP!qR^!nbNm1sP3^(y zQi+2wN{Zy_TNW#$w}|P3nZo7aAUqxjXEga9?9;O}zaQCoy(SEJZCBFd{&uHCvt?`a zBrEwV1BHHFtUXv<)?*3Bd_POGo#KYBv(3_l-cM~Gyi%TH+w(m=H_})1stlH4NykJX z^7Rgk*?y)KTe|5-XN(-BUOk=JwxnLTXaEcOJ=90 z`C<+_J(`XW7AVP%fYoMq?EVjXK|KA_`~CbS1AU%@XN^~-aMHvB+fb}IFxABWBqu`N zC``m_@(U~F0}ZP+mT|FL{OW@-OPbaroUmjCFnZ@sNKz_@)omnd4d4qjnTq7-`%py{p4Qk`fL+f^=QuW^6Iz_g6d*&WjCYaAF zhHS-`PnrVql0aBLiNy_{BiTin96Ovm8HmwqsX_K9vYNZ??=!}cz{tL5r7+SWjZ7eBW3 ztu6f0n6K^Umo10-#*95jBKaj-l>DECgh4VkWUerY7Co}Oxo+Rqek?9*238~Sfq439%|Yy8hEA9@(onQGU7EHpRK)a|vIWAChUF#HW9$_oQ!T-I64{s$G5T!+_?}KZ+vU-2V0BB2-Wr zpuld`Y6P8A?dBKnhH;a+&H(zHszvV>flaxr5pZB1BTUGeHI^xy%n}!%JNemuIdY0! z0w==~*JdV<#XrBb@BnM9=MfQoIj5a4Vo7ezh5iTmWe;AXnA-+locl(|Af!#H*>#oX z)`BLy8*dlUn*)ATu^HX_(y``?_Z$y~w3^*tb%8PUlgQRMwxjNi2waDcMOUw5w$~XlU`kXRrMo&2hpmB-n6u4XcBrv2HyN z2D=?}GetzHnbWv}>Cir_rRT#WVAGTP8mB8l^hTWM9$jyePk&wK1lWg}3hLb>SoKl( zD?Xs+CYN#XR((HUzte}w*%Ch(t5mI1gG3q3lWMEm+!d6co-! z^Ijn9Zf&K(CMYn+dykIciIVU}uENZN|BwR9? z`e>=&;$*|Csq?gOEe+OGZai&-S?}wWHz06ps`Z9|qREYD?WENH+hoqgvY%!dVe&$Z z=0V@NCY9otpS*}yqC0TKF=aznJ^1ZqlwXwYB&8>2ss?ho4jcDOWF%wr8&Fwe?8q3g z@+cM#QHcjuM1RtzDuC4(Te67@z_F=#qK^pZ&1bLkJ|qw#00W{`fs<_}0O$i^wOp>6 z{C#-ZbxP=mhS>{GmX;}pt9`!E(x4%1Ya*pVIPZP}=goxUn0B(YQo&zq=VnJ7;X{V|dsaxdIw(OOxHawyIWmGu_Zkt!A|9+jag)q%pKzj?QsxH^3BN%m z(mD~;gw9nf{Je4V^%52A&BO5gr9tHFIOUXwq;{|hV`IaYN$dN)3&*bszF`jn9*~Hn*H2Q?_mt~=J--2z@SEfgt&(;Z9et?A$oTVn+9r}LQHGe(=>ze0{WEqcD1frtw& zWZ1(N5tu^g!u4Eom}^kel=k@&F-mK-&29z#6j(vu8AI-1U5xp&$Bc!HT1D&fe+nxx z_iKP{m)yicBI94ha|(Wc^aC}IelVgd+H&~2T?sBBsRi`Ok@OGO+9Yrbr`_1z;ESVk zEH=3wY;pu+kI$?Q;vhk`Fr=*zZQS%KKEv|3=V?-F3z+IkZqkIX%X|dEvK-9u%j2-0 zqwBun0s9u6pBS5Nm(gN*4ZWd+Bw9JkX=X}AB1EE3X{Z4+&EZ)bOQjw%uDX;2(MU9S z_fpU*AN?|-HC*D#CjP0qELxHtJl$0Lb%N%N5EnpyD#(SM_X!a~HlTwO6e!!4+=vIN z*@CLsKc2|BJ&_Bv%M#}_=vf;=kZq=#?elYs`Y%L~mXlG&a6uJ9VRIiX+mVz1$KKz!yC2+1k>7RH7$x zbH0e&=BTx<=((C1=l-_uGgC&ZtLb;Ul%uN@qWSQuCDQ=-SJAQ)5b1C(U=TPmPK(-T zVV#ODO|VdkF(8{Se2V|{L5x4%=ijB4oJcAP(U=2Cl`!>oTy-(DEWZT~AY+wIp+3F~ z^VIoOL{~8&v&;NUf;F1R%I;G}NU2|{)I&V|F>7F#&@L{CqkxYm8>8ZVy*F;c+LlDc zJbUjo3p5plRkaGb@E+$t>cKG_NOs;^g-sliar;8jhSl=*Lo@!3Y^4$csj0_=5I6Xl zQQZE`NaD>6K-JaQB#@ErYu^qq`$iZb&TTuXA{_^S;E?jG07NF+20-XGZ$>8lU!V+4rqzCCZX)Axn$h45rAwWrDMa zVITZ}OArn)Nd4}0`s2^La+^OP4cFo-iua z)!vA6&;3iNfAOuCu1Eg;bbJNjYU z5IzY=!UEumu5P-tC#{o97oC%Bg_V=Dv1iB#Aw?}|3yA!({*rv}?|#8o=)4HEeD^jv zW#m~bLJLB_C<&7KPYSS!k_iHiwte{f0q-Jzi=MmDcDw^RcI#4A$PHp`-0Sczp86wf zdvO<{U4)iMq_jdz>knO6WWBbFvdKIM=KT+P)H=5odqYVNGOUagBYe)*`1AldWx9t* zk7lVG&GLhT7kC(6+ zRy%$Ks`l78tIvReXx=0#nt2)D6g)0$f#l=tbELvCubKQd@gC1WnFVl9!34RP1MEdb z#prRbb8}ElKQmn6l|>n$$4XHMS;o$yq^E_>1h#r1J^ZZ^n?`VVkF2-}PlLZc3nR=&2(liPBDAGo?pJZfgf;`pi*q{|JCI-yf-H=*8ZfB%8Qkslom5DdrLBgH65w zUAmFBDom*)Qq5Ktvw%^_>?`upje!*p8Jc>qAR=G3RtR4n5ny*f?HLSX|{k$6I znN*1|@{zlFkd>8SFp`+<(7SeQrSKkP*Ht!6zVpjbWP=cGd{sOlheH4G-8HxT9`NzV zK_)7yyD3@v9t|ozKbrpbx?I-7u)D%=k*oeTIFq-x>S1&m&YlzvBBLCbqT1N;+os9* z+BxkFtn%Fko3L^Dou6#s4`k-fD)nAXM1|IE-W5J~S4=)lurJ0s6`ZBjhDF>i0QesV zFg5T1%FzKdp{(7WZItKOs#sBD$AQ_H7cVbewP|9mAC52?tuW`{7jv&>aE^}7A3mY- zaHpkM(~_C#%hUL_($?#55PkFQmpjYu*1%e#Dc9^(n@})!E`@9Ar_#43KoS`^|7y6f zJWh5ZHmb1uhAK8UGzyc`3JlZ3ti_pO zDpy*6!&Use^(I2R;}+j*>U;+*^XN}5w7txhJW1!qJh5hP^n*ZKn^y**;+|y4vBMct zjs+u@oPkNVy@ZWNi+DZX&^0xSh?n>J#aImvJSD(6bI;}+4R&5U7!lr)2!(5orYrQE zYGQY0=9cN1oo4P!P3QTr_A7*tgvK3LhCn6aZny0q4V>d!Ty?C)rbu*crqpu#SSp9! za)Px;g@Tu<-KJHU{$rz%oIj=%7K1NeOobBW*1Ge(FqDLt8}s1j*EDnkFA%uGdDJ4vRu@(lI^gwmy$c0 z*k~+HZw;H(#SW-2^0{+ZQGtN91J+7oGk^t2A&zfAn_)2aXr=O1Gb7{kx*)QB^^l6^ z#A*SJ*;UV6QDZ^~;g*#W5YrW{$_hV{GwSj(gO z3f4RK98lj65mA}^66Im60-m82{-~5VDTxM9X#TNTGk;mL(>Uw$=h6ty zglgH}z33lXEyatQ0`2B>c^rwl z?Y&R6!EyTbSuE!^IAY+lEL?OATTF+4rJ)>H=lDQ)GlSqxw~m-j5p>W9I1RZH@5Vc8~) zb1N8^D>Rz!(fX+3rwDqMimWf6b9O54M!NLoRHVUug&mYV*Lo0Yck*fA3t(^$0A*Z| z7u>bBqPnA|Bl|{-1g0nR6fQ;T-^5kl$gT^{ysilOIHAG%Xc zlj9`>T4}fhx;uJyj^>~(jxfF z_zy~_wR68F;S4~rvCKDQ#Mz(QzZgv}yYwprzuJWl|(>9P~J83bXGkB zrpdiv5KJ=5*a8D$C@jU7yGNkD1kc=oKpRZN{sRD^$N#EKJhbwwv42VX3lH@rBzNJ# zG6VK#BVs@OECO4Jy>*v-3EAV1wO9*GoJ{%t;l`L-&;%(<62gLJDG`yc7|Z2ku%-^) zw(d_cu6>x?1}p0bUj(ZTEeQ#z34~b_XsyQ*);nVVLg}bL7N%Q=G!NXBlXm{FI7XzP z^j`>KJ=1K)aA~8>MZ3y-?uk?(>pRAOx|eo;4?Ow9%4sAO5zb_4 zAUELL)?c}!UH(r0@ZtQKT^Da^+L_%)KG8I+#EN<5V*Ik0FGgzyZ;gicPn>4U`>_ip zetag+*V;j(V$E|2o~_P*(motn^)zNs|G~KEOwUtgq=53m%A80^ZbpHk5t#g<-n$JN za@i(@O5O^(W!4q<>lx&mal5*IVZ`g>zTX>O``6JlP_{po{daB-`#v{kYJJ&orJLS_ z%2m^*-2rH|e$*Isj!H?%k)MS^DSljKaERqyE>`NX6TSn z6m#eEj!KC>)=(WsEA9@rO+8Cg+eN^Vrpbt}}?n|69-9>!p( zxGd4gt`|ukb>6wy!N4YmMjQHpO8#k>=77A2A1JJhlR<%uUhd&KpHh%F65emB4RE}+ z!mxQ6r>Q*3@^+ov`wDr+b%HVT_wqkW5Cu>Pg74TKNZ*Bt=6@?IKmMIMSOi!T+62Zd9(_1Dn|ih188DQN36P!EH!T1bMl!hziq%T>6?3iF3|a%++# zY<-VUKwY9PoXxyf=L{r@mpARt*6B)rTmU_?_sMOiYmlpo$8~N!p0eb3I@Zg4lh4Bpsr#*704ITmD zTc`2_wglszFe*3^r%Y70%P=sWI3rR?dvUIdCk43>5JGT?emnf%Bz~eoyFsXD-XUz?6!mHRsrMFRnfArK|A6lwhu*`6=WqU%`mykJw=7#| zJhvxVIs!W_{f^GpTE4ndEG3+Vc6*xuZrWvzT6+kg*>6k2u$_B-Wk~!x6xe?7*O1Mz z8Wa-uq`UxYRx)BRE>IUs6WI>E_%Cs8?8hMY$~}9;3OoeS$z&iTh6ul&$dW)=X$9VFU*uNgQ}2wZ=1s$&9C{Ekxx9JB znpb%*?~{7vfd=-TzkgrmqSzEF9k}lbRGkpT?E**TW(d|WC2YncOMD+0`iJ)@I#&l< z`zA&906Hi2HHGwikG2r?wGrLrxkp z?CK##PVUa5%WV>**93}hXx7vb z5e>ZMC0DB=lr;fCLzF7w$#nG0Wo0k(dtXBsLA|Ga)<-)sE-q;iic_jAe;A$tij#Q@Qa-?ywEGWFJg`Uy#@MfC0&Xn+jXj z>{+#=Bwo!sq8~Zfc`~w%*$-7+2m~YOPyiD)Mu=gQ@L=VXjwsj0Cw8WaFCE(*v7Ke7 z^-{Krif`Oh$OrEpuc#x#r^Q(o3I+Vqwh2DAJr4qXUTuHd6|Ie)k-I2zwYApXq%kE) z2fuYfC+4FXCJE-!9Xlq&IK*ppwH3&nh2a^pWhYBoH0CM1uNE=jl z{k1Y$lT-{#!%d!&<(fXV25@$ZTb}7NH`;Np7CKX#bdHpbyzSo0T^6NF=XbwH39O7l z1EMsXi0J4=h|v-Pa9n5$<%W{$&q9kRfCyWkczeZ!7abz{ zqZvS6%l3S5Y$VD}tDu4tBIwb^4OzbXBG<7KOQyMY$*CBY!AvFqpA<|DnpI4*ckf?3 zF*#ROzU@rGxYTP9_>N8!QFwqUajJCG8GL^}h|WMAI5qOhnk6&k>zM=EOlf@YRLa=0 zRH-ZgLivH*v9gdXPjI)PTWo~+QpX*N)V+6K@%6}HQKf7OUEsKAhUV{iu$tHKTWfhD zfoOTfK6LJqC_++uv!oQ4(%Ymm=MB?`dG)mV&YomjCvrYJaf(LOzsOr#SRs??8f`tZ z+>FD=vhCP0SK{)WGi9mzdK#wy+_MTV0|x#O2I*$7vQ=;$2wkK%mNV(2TV>%k;giJg?g|yP@Nup&v3HBXJg;4jYfk2!BSpL+3io_+L3x#18Ij?2 zySxShDd(-6Cc{iq5iAI8UR&ih7tt7xQ6ln#_PHNvz!8CaZgz)j7~S=v?13X``4C+h z``yWa^T1QO9GVt=q%L>RkVO5}K?%bn40vV1MiE1^bNbCNWuF!%pUGIBnnw=yY@$Gm zvDD4(!%uv4nF{n73_a^y?6N899}c!<0(AU=T299TzN9M3H?>v03wo*cdEr9)Q$-B8 zN!N@~=!^oJnACs_UG*j1$PkUewgJ&YtF~Q1}8Qy1W7cabg6?7!M z>*onkalr{}Pbz!sT?|zNF<7%CfO*LEF>igGrdWQ4j5z=7=AtaiZJ83QH@$?a+fB8+ba;LzNY*BUwEM)G$Jnt=lc->zw87Y3kBeP+IY4F_G5 zqIk1a8f}8=?jO|$^j~QW3SmFMU9=5PodF_ge6UDu(MqcUdzriddOst@34k^sGC=++9%wZn)5x(6xn^IA+#%jH$UTdiw!1zX z+dr5&(idKNc=FNsjAGBRUY!owA#_MyxjH$5q@mb#8X8n^t=MEasG5F4u7_8?R_--Z6EI-Em{0X}@zIHSi;gZWC|` z_uIcb^v4Fi%mo85CIyUMjHZgFI~OY>`hW2jdI9C7J92!a%{_z@_&Bk=;)jZHAF1d5LN z)~o<#ij%=NHS}bZ1R5lXFeA|DaPg(Mdz=JVu6STnV5h@oti6S{2$&H5?9I&1a}cEC z_W;DOX_kpn(<%#^MX<28!I0z=Y1F+Yd60AsFj65TSkmzBt_NK09XGc#PKf2XX%KSU!sOU z*OtMQ=X&pHUq~7UW3)uD&` zb~!wnTc-s$^H6y$Y&`G#%}ejH!%sN4xJIuZdR3S>TNuKm7jg~DemuojKh>^6jFrpb$XZtwL&-se-|3x46Kd>A#X^}^U@H&`~x-LIuX2# zwACWnc67DNY_RKi;z97s%zECIkVKCQuy%1{s$%6aNc_skvOQ`XP835L*{{(`n8E3J zXw{0zB`62&-)8=UZQwj>bA9f~VT0zBQOdf5N1JMm&#Um3B!FtfQ?>ZGm>X~58GE|2 z-|L*hZim1_L7t)TFXu4ZkvNGN#XOJ%(S=vJvwk({dPpv%lM>&X^kg_pfMDggH729C zi@@gk>b?CMEA|nm4_BOe*;(iK_0@?rSS)7l5Wrk4x^bDk{O(#G74X-Qv@k21pa&>H zqOr8dB-+mYD?-wk_@61D$Zi`(T4~^1XD;?7;X@F&4s0|M;44%X13T0;k#9ChUjh+mva^QEWVn-OPY zZEpMMofSnQS~yMzjSS;11LErXGcVfn6e-%UZaw;<@V5-`!_rl-OJx1i%BX>Lm^ZZ>#9Xy1|2vpi5H|?|&6IA9&msqLMIkS7bNZ;IRADum;!wk_8QJUiLu4 z*_gRxdj?yw=0D`2yU#e%?1q_ePzK@vFaB_q`IP5$EP#xxg!#FEGqbasRVASEwtden z9dD+A{-0{sTTx2UvHFHPLoQEKDZ##qClB-A=?8>qgr}RF35UTsbte&kv5%oK{xQ0h zZHGkBM%Nz||{ zFkhqqvzK%i@`m}hR2&z*W*h_y4S3QR-Lm&PHjwqJNTs0B2Hh_VI1<2pS~>#u;L{Zy znFFKtj;$a#dna`+t8ak{e0hAiPrXSAgn%}KPYZcVO}?oq5xCNZd8_6}^}gpG)5^=4 z+&YLEc!Iv&lcLD@+Vf*GHigt=MBS* zJMTMb0k}TFON;CGg0C7fCE#+n<(q5j*U*7>i$?`~XD&IxvQJy{UMN#f>k}rxp9qY$ zU1~44`Vxho&P{GyeIv%a+5!;?GE;Khh`hY@3s53D=H z${2XE*AY#Z^G^sg4g~mtU3Q_ZM8S?TD~d-3jU`KDa_?r64|5qSKbU6zP?4s=SCjjs zAPOA*Jdc4D-Ro^&wZ1gq${J&2UOW5bxyifWpp)=*;JOaM z)Ir^uxWR1W7F4m(r2GymU?%oz^+FFGxMll@>qq@JGW~hg&sk%Smskw41V3tHVx&K` zq?;!(xe81AHZl2PJhrWMZgs)eU~iGHl-4vK6M&JdSLqr7C6V8_%u6g};fbn6f>khu zWFGR-9dL|_1CR!W@kmquns@@~==2HEi(P|J+Q->a$o2{~Oh@7(vF!-^e4x@xfWpGY zi|hRgXgDCPSu(yUx+XwD!*NH2`~W6^9jb$x%Q7LpVi{d*rxaAlWA1srs&U;1IvTZ3 z+2p;@e0}9@e|e)F9{yrzC|{d7T3*VX=SBQB34Y?HuyF~`-P8%-_QO-oi;CBz##&Ym z^2dZPOK`To_buteV41!omqd4NEOgDqRq1nulSOpo(^*dIi;-QiG{o^6vDDMDVbDcG z(_u(8A*tp0*I20vob@1WmGdr=Ntw=_z#`!EFn!{r!&}YVDsq6&gQ_x_W*Dn-?DbFQ z#3aR(RRAneQ(xd%5S_7-d+$W?X~SBjNEdHjyLJ+$+H3HAi2xID>Z62^v7M+l&SRRy zd-_^Hl_+A%JA=8io^2$uA^XZ}cj*p1kpKu77|UR~(Qpo|BslgoM#6Bd2L~d_kX@ev)dyNNH9MT{GkEa zUX2H+y0Q8t;IP)(%yfE(gDbCpTD{bTY9GbsZ;=qvu z$OiyY4l>c(sRD5E7f}-N04$mn)NheYa>wu&l+}_o_Yurg51s5DsqaTzi9mSEmWo2jXnGATAP1Y6f<2sApSr! zEybJZh^$SF(UD7l>V>7sEniLcYlAmj|wN8~D8PSH^ z*_SRE5Nk!ek+fK}(E-VLov1AQ@44+W`%p2G_#K`9kCEDc%;KD&@oTTaU8$IQ zq2p9WF$pGY!uz2)G$pUuf0>}oy@kEh{%V$?_gEv9gvueucPld8WW1Bx?-?Us{gpu@ z_|rg;;^)vdJ|OAqCBCl&BVRIP(;m#r*_y1Y%6qV$Tt4#eHf;>E+kLT;9+B9ycOoVx zcW%X0s}-$T^-@Wj;~F_J&Jpj)6#5^D_F_AAAVi#sDJEz5|3yol4KXI|X*jI@q2c(O zJ20R5VVs@N!Vq$*wUCqicn|C?W^mU+{{@}BL9ImLiQ`(vf=ex{^%k1u`~q;~`66oJ zWpkCINT4Q-uKJPAsgBmT8a7q0JHgjQwg!UYenbJUqcYAp3zeQ~0!-5i%H7_vv1O_< zb=B@;)=mT#?z(_=Bl1l1pSn%@#rU;1I(Q&zuf*MeF}&TmW|QsqRB1d_ELybu6)v7%SKHD)9k5}mlsE#VJ2B=^(*%RsszWh z9*`U(cpQA}*3O`~ZyE#{k;_{?^A)9tgK)0DM1y~!2nc=9HwpP?)%YbX0O~89x<2{T z2aK$14#qhb1kwn@M0YG}@SMl@P;8VN$Le7>YoxAibX#}7UHqLQiha`Sd`q$eFyA$A zYZ?y;2{Q+*eyiv7Qq0mOZP`ND51#7F-xqk0@2f;*^f43zfUfL;i$SQKR4#j7_g- z;osN-(9avnEgsc|OoV&eMc}HV-Q5#WKMj7=F&Zxdo!ZzFQW{8w0gtP|L) z^rd2B-D_=gq3HGl|ZGg7CV0@wkWK|=!Oui_Fh~p?7s7x zsq?Xp(aM`~tx&D2PA>}h;4H!8xbaV}K+W>V*+IhX{NOs=GdQQZeOT_nmd;c|Mq5p{ zTmuJRA4Yj<;b4CX>U${7<25})u&v&Anvkq zE__UR-gVoeAes%)H#0D6hVMU^GA&b*CBa>S+Z32_e5dwXTgv(Tzi3H-iv2C3);BR@Pth5eNjB@61y;)G)h;9$~7M!{Hp5yS?=4Pew2@1qYN^U zVL}%DUvpo?IH-?Axam6Z1I59U{;^=bI*7`j1S{`*$rZxRm_i+{hgM~sNOUJ-CXwmh z{Qc#+S#p1Zp?Y}7``c;~c{x7mY)l%S)yI;b_O%CjTt#$3o2KQ=RTgQ*1E4W)C^bzL6kiT;s zjdT@tCvPyq)*Y!-= zH;Y8BggIJ=NZetfAUe^G5?LtPlii^m79|8`ymS*$xwjydUBn+3%Rk+Af%y|@l80zc z569phTOxVhhjosAGs#>uu;n8>P!LS4`i~wL6^WObu90VoYi8eE4!~Z@u-u5=eCrN+ zJ^+i`C(%$Ecqxj_;x@f;n!8rsyr!rjUEtYso5rH&CRg&U{-gFkQ zKDa3CG}D}>KY8v{_TVmih0nij$jN{9iK{*}7(QHPJQD)ujSO%<3FS;(VC~#Q5og^A z?9ZA`-HVbAig;>A)l-}QitoRbgr9*$uHxsqFwBrmc7&ho3nzn7n?dBN*VwLqE0 zyjz3^3_w;urAsl*%R*lSfuF)U@EKEieZvU~k_Kq)?&{!H$EqQxJ5F5-P%>eVuszLj zdpJn=m;Ed_=<1T|f>zsWZ0$kSO!A7>MtNQrPbY6I;Kr=}6_5y(wf3q8f0K)0D;;NV zJa7C)QD4y406rFEehLF=e{95foj1S8992I4wtN=|>O^&48ppohabvynLp*k8d#4XU z8rg2WACSP@vt$-Zfs+vB54h-hYQu=#l(wRc^qe=NIAJuhrT?Ebt*-OaE$x@SPNmWj zVbYtN9UnObHV)eGgjXKPr)1BH;D7P=Khlz$xBRm+UY|JM9eJfa z=7atKCeAx{4g3=EuJ%V)(nR#H%498fx(i_Vc4W7oR?aB-uoqWuf6_qzh( zaxTIKKJOJ=)rDr#EuH_6i_eacfsGGpvk%)^$N)HbIPkiqIY9HjgNs=&ddM(I`+~3| z_U?{Uy(!2`b43=hBuF!&%nRI2^8GHNdE}X4{1LBBDLvcwk1%eV_j6`{?fl-ykCpeg z>yCF2N%PQ{$8L~z%jIysVF>x|?J8#+^Z!*X>m2-($&;4Z3I2L98f9rz%;v28(H54o(_AGg-ZFwJo=c)b_X6sbv}OFiX^*~w+06TV zK02LLD#eV*SBI?J^Cm4>l2+_)ZBa~@F*zUS9EzItdYO82er{qu>Vkja>nW$Eu+Ter z`JV;|1T9v;C8+{kg{G&8Y!}q*`bds3Bg#2MhQ9lOZZlGU+FAi)Cfw3CrPu;Qnx(Bg z?3!Sft{3|@sL6fi4i#>x9(gHHI{CLgDtC-v3>R8CdrWi+!4tDoHiN}LN9tEKq+Lf6 zq#oh1_qgSr8=*&0U}HU{8T5->#m=o1ICv&@+?Jl$}6V`_czcHl(| z`1Nk`lttG2lotnC6X z5Z_n(Fu3G>*9a`0!+T^8;+4PsQZSZ`qtdyr-nb%1CRCow{$uOjveswN*QX=og#B86 z1><;ih-%74Zg7F+`>iyecGc9pAA-G7t&;>C1}vj|OpOps+4Kh7EumrBwwv({d-bkS z2#J8ANTQ9)H~rsX?)oy&?#{Xd+~ebY7hLBmMx#im{Z#V~B(xpTr8;xjJ59tK9Eq0x$$1(Ad6j%tv(8Y$qG|nP!ioDF<5$VIVtcPQlBIk;5)CK9QY)-? zLyT?)w_Y`knY=&yJ4%3_$OBhT>zdt&QB&TS$D6zkUP4#Sxp2x=_14>g9N7!0N$c{ggoFHCC!k#MnWS1_E%uT}~2Wi_$E zEAf!HTd}g_1=jS!BZFUWd?a=+_B_VXyd&tZ_Fo~}()hhm0wkT{``!pM2fmm} zF0)Iy7^r+k{iHQMbL=qz%L=?i>f;uAn{+dSJAFOJ{eQ=e9At-Ws*Gm5+T_qYJr<*& z8wSB$Pp2LAPGhgPf6+-`>RDK#_@1&=KpI|tH_+zh?Jpo;#hm=;jj{A`Yfxs;7jX}U zVE8G-9B^-Jn}3}-C5`56=F2{aoWP6%d+;E!+=7R)i#WyP;fmj7*TbRZ?#T>+dwdKS z<9^}ePk^rkI%30|3KspL1Ydlw&cd6(a!iQ%UeW8F4ROOe{lDvZwJqqp6<&U@b1)cd zz7x)>HJt=w`IH^LrPuPPn%~a{(|Ve{kM0Mu0?X%j;ukYs*B>W;^B6)I_=QhTcrAoI zlbH+&bWjdMkmtLLf<}KGLuIa4Quvy3Z_R#CxyW?$rJ8Z$LgmLa6qz*l^y&a2 zdF9x^$&*o?_`QVdbDvN0IZz_6;2<)_#$-jq(C{r}yPFn6=K zBWhr$jfFHMER;k~Ges*_1TXG<^4@24Nm&if65aRS@|yR{9uTYR#K`ra$Z`ny$En1` z%t*Om9+fmle1TKNtz8>t;cMZ+gga$IbTuZo|)hfA74V z;o;a)*07Oa9c44b)(&T3i{hX`iyu6AEbLdPPFkSYI2j+aaqex*f2zId|8Q$_Kokts zT8v!(s)l>=RF3nT2Biby7oUU~zSDsvA>NNZ0bLla3Q{ea7;lhx~YS} z=xtVdnm}9L@bXRNgESr@?YK&s1nIn7s3XgE$iK?(wt6}2Nt1YpQBLq6!OiKH#jKm5 zlQtg?c7;ABt*p7ELWOG=rqXZ_V`#h$W-7%q<6tgn6#WBgEqBZhe)eYck?Fg8SSx{abe$LR03C0L=K6;98dE{quJ_?*OK1qW|0RUA8C| z!V`KBYdln2#(O?d>YVN;QF=n50_x(jvhLYK)ndpfJlsO*cO4B?bIswyPVIq!_aLr0 zf;cTDnNi5vf!(Stg!o)MxC@^29Q0pTKg`!gODfwJj@H)T=^Ymx{zj5Pw+~?HuUK}x zPKf*1&doP7TsUpM7tm*5D#Bi$J%RA5@@bUdT;_Ozw|xXp7B?}HXIIeTEK_YsU3pQc zrM7gy+-c63Mq8su$mqRuBRt`#&B2f)ahuV8yASz^3nt!xA>kCz0@G9!|a)V}N4wbPWc}-TQKd zZPsp@^|#Q$i{IP60;jyg2Rx}Qc;MtQ%9PnNy(XdW62--Z&RG5f&*eyt?O@xD`)NU_ zzK)~Me|VBc6Ulfi!=Mg>Qi>TCC7P8f%B@`Rw)_S`HXm*f=vjj9xjIcQj?4-;Kg+7$ z$x}PnZI;3ug|7o-9m|$ij|0pBCrviPo$-W8%ApO(a6;W{wG}%|lrxJ1b+7}U(;4(O z&ZX%fJ&aH5LD?%p?0l~oXhZ+nlTE|;;)Z6#J^GLwfue>DKXj)IOf~niERa5Yi*wsXh!y{mLr~ zqv5iUJSmAVNj(xwHqbKbf#Ic-cALUZ`a`B{p~t?p$9s6VqyB3l-Rk?(eto2(H9Hk)=fMitI(E7euM8_NPW zMu+oC##6G!Bfnqe!<+z>2>JnQ+_!I*xC*1M8|?yjjjFPp$dQeiW|)cbB$~FtCBK~6 z?fOOKc=XeAban)ZZx0v#RGwP<$M`FHpbh=K(*ZCv=GpI!CY{@3CrH^USE)spMH$2a zD@bB%>e}DY)Zewb&S1qXR|GrsTX^Nmeb7Hb$lrP^Ld80>ro$UMsuy4N{lsB$aK$92 z{nkymM=-xSAQAn<`Vt#If2QwofFNu*5lgjl?!D9&SzK~=o$MN|HzMG2#gX3oYcof% z(rjA#<`tdQ&4}yte3H`6bXgvsagN=LLwBkZw&?)jXM@9f+xp4vpN>woNl|QO^KGNM z>cNN1C({b7j|DoA5f;g8<2rQ7)lI{7I5V+%^Ce72nD<9g+?k1kO-j8DAn~&Nmka&q zCxS3mxQ{j}Z1jChvi+{jGkE1PP$(+RFF*k{XpU7+reizdR_X^gw9M{!i0mM>5a?U> zxQQzO^;p7|AU*AbbD7hgn_IJ(Gi(&I`&D16AXYTtte^b-}U9yUYg z4Ec*EyY$ES1^G0#DvDgTk3?+YD93)@`T17 zuejl_!6ALXAI`*uB%oFOp*yt&n|OuM<(U(3HvO7S z@W(fcML?H$8Als6G&zxi(DkrPgC}9~cLtrVLVw z-20&ef61_NrFh}RK5m!e&#>>G_ZX{IZNKfvTHQH2=<{&95_^~{#`ZwIzi8H-%bPk) z3yAL~H{r%{r=~E`kJ;3M$k>Lhp^8l%>Er{-Auh_OV{4?zS5+B}<-m)b;>6IO*6$4& zX#=+~$U}tBwZnfn#P<3s^c61b+H|BtpKJ9q$s#xr{m_lBrd?icMjn?x{*~GmWu9Vb z#8`)4GMM}Xp*O%!&RF>0blok=(13ORoyb0$;?wq{U5;ROmZS=WK@~UoqLb1tf1nxA{%_W!rt9wuV=Kc?7kCzMS{}1KlG>7S86DGosskX&U^Y;K2q*! zAik#m_*uOO=mNv1S6DjmD8-bDPiq&HWP>-;^U(Q)-`x%gg}11L=WP6e5#M5*dP~iw zWnI!ntBPv5igm<{TLtD;KNZG#&nzuX`fW zP_D>mGS<3NSA_m8bF{Vg207_4n;sV0;Ks-5gut6Z^(VM^5a)@iBb3)t5dpHCgP@2y`qU(ITrL7RHJQRf;(|X|*dn)aX~$ zBr}rA|$dAMu=`{&7Z4^C?e=E9~*N zm|J*{Dx8LkC)0$zn=)B4bXVU)3M0NfmSL%oR2A3_bJ4=;zfSrGPq_5Nd;Grvh2JP- zcc_WTtl6IAVWW|y*MDC@V8S1HaG6x~&42r?)f@r)7_k8D1*pUuze1zE6M8SlxxB!< z44=6c$hB%{_xFDy0D4hFX6k=&bxS$La;9LOKmRoGL!{UN)qzEAuS^6o8Zwv;dTE=+ z#s7z^8+cF~(oID0wAMhkl`mV?EVfvb@`d*P0VknGfHu;3i1F2Qu70iD4e>Wb>1;m2 zxEm2!^KfwQj#58T;cI(bkWAyx`<`v%1?O{lWm4ULfl;LFLW+2v{?o`C1ZBGVt%}c4KdKKwPAvfASa!zIYVIgq^O$88);?lvKPPDiFTD+Yl*O)!zQ^a}B?eA8_6 zN;8X%o6*pvohNXS+O;uR*{~C-49&JYuR_a5ITY_;alr~T!-SSeuT3c+|9PA;$MeO_ zl}KqeI)KaGFiAl6Z$Y>1A>(v;aDoC6-~1szq4xT(T{a~mM=|GCnjCO6TP*bQ!b>^b z3_&`!fk4jUn-RZgs=w5xI_?Ui)}2mn2RulHw7NBXbr5rqN8 zucf7WJ4ygodcLvgFxa%I<3p(BhF79Q3DSU=PuRKl%1oPMMs|Dk$6n<=RM|B}Gt z%fA$()ul@FMQ!0q&ujUsyZ%(&mViC3@F5}`ilsj!3Fz&K3EAQ10U_4haN_&^I)M38 zdBM>e0PBaS5bKTJqi=uMmvrDi@0>4YaWNHMe%Jg&;}V-nr>d~-9#&ZWg#VolnAGsq zkv8)ZJDY^3!=Ik5?Nf!jodmFvF`#LH%D$=FJ^ae*GwYV?8-GmQ)S~kUCTY|I{eIW4 zIzLa<2BZWS>u|H)+DUFu!>mv;o!Qymu|p`~4BD5VLTFt5&}4cdSBMC$TtB>46=b9)LXi7mwW{>vX(7zUK(MR3NyYjAcqbrwLSr{NR(XyJ za94jfQhmXNm<%VNY`glOxM?VL;a_3nFY5YN0CjGCzYEy!$qbW7GJ1cv)YG8XV!|H? z%0E2Z!)|~pXX%F>5pHKn@i9bTSrEbAj9%?mMEm?bdLD{QYh`^iByM`QTi=~yP(p%Uz11%l-3x*{dOr-0rA=2}OoaEQ0T@Hc3E1 z5H#{>#HXCZu4T&^M6_yz>Z&b~mU~kEaq~rYHJ-X5BL?O~tme<8us&)5933iASM-AI zy@Dp!PfgNV{nEGo zKa{<9R8x7|w!ISqB-GHGK6#k_pWcPS@XB->||g2{2kYEstKqFK5d<*o}Rl%g%7T~ zM*Q=KbmUj&^>CY|%)(A*r(#TmiRHu=_jOfTh4yemmK$doFK~h0kn=2H=_rsJQ3t6D z$Op0y-A<5aQ8BOUcQL7GfM3C-8N~()3KzN^aJ16{>n_#kfMP}1<*#}oK>K(){!VPC zKc*!@K-LXBKOsfHfYWSf!QuAS46IwI|L0`P?+yySjGm79D3g!BJNgPeOvTScoc0ED z#qT^gJi$65@q3|__on`R>>algumeo-uU1Dd4rv}jv!1f+1gwt|R`ra`xBmV*&<@qX z3S4kt(9s2_!F;fRkJUGFyoSfGN?a{@mk@$TtyW~J%(!z2c z`KAMti4V7rQ5)?85Ndid;C4FB!%}KltMjkE9`GFO<)1y|EiCw3)$$7jdbmDhH!U1M zu&!9PCEovNs(6YYo9NE!CrujX7=uHUd`PD@AC6gcmM<2aY zJtlqBHq1sHeQ7w*8zW4@#EGR6R{9|Wkl6PrDO8+7Hwi@C_orZwA1+&0EzGnw-O2r{ zapD!6nJ9_1V3NU0Irp(>QXw1REv601Foo`K6RVuhYu?Avd9&B9g%ZHi6N`E6+tZ@y zi?1Y3eR;}QyCl!)^Y;KiduBp@Ib2JT^x)z-^FoBoz8gH2;(qsc&aN^W@{>I+{U_hh zS|ymR!T-o{vmgIdWY;07=rSpYaY(o5n~78O#L!Gk0bMyO>a=Kc@6#uP8du_Pp9{tP z&vg=)N-xRg&j6ZBH={+vCagP#f=8Ngd~(du7rpxS+9Wm`FX~YZ$fg8He+?3%XrYRr zzga_Vy4oH=kAQ!Jf?MXu>t>hd*VOUSnq4PW@@=vv zn9tF*a2Dhp;OS3sf94mcfO7XZcty!LWVc4O%eIE^nGnEY_Q# zZ>pXFsJ>!aY}af5H$5B>ZaQm;F1BQ-q$H_kQO9&3- zO|@-&5{xxkizRFIcgieMgb+)AO89sz;Gs}{kGaBvpO*7~HDb{WC^ue+JH$!F99Oqg z1NVMBhr!QQ4REa8%M(<%k7J`Qk!dY_G9zXVl5C7bv8L!4tZ*S%P65w>NLdeJqCYqH zcm6$7ZoDCzdKha83Iht6FdlpRk+FNNa+LcjuT8S|dMdu&RLkt5vea%}-IxpvV{umq z`Qu_-0NuW&hBVv2!BRIfdU_(=C&rnx+zI|e0H&>4)0lWvr8v#V(p@HkeHt|TelX^q!iDT?Q@ zg)$q!@dpdn{-Tf1{(6bMK>+5fmUPkiuJR*wtstty^!;x=L~9y2(xZ^d_aiqR)maux zGB`z|LlhwQQJ08^{n$zjc|*0?zG}|>=0=hUH9>I^=YperKx{<6tj58nEIvC|_%MuY@KST4g6=K(W8pMtWaJj#%_B^o*EcbDbqUm` zD$WP+^xyiSoKxW*=5u*;j~fsk1l>iF3YH5=6hTsp72PGlk;HnFBLcAg{=R~MrLVJ` z=}~L(PKo+ccntue0CMQMiqOq(Bt&u}#AnsA+W=NtPIao=Gn7-=(%M(C^U4B3@4CF(C$U z9#4B8hX-;Prl5|S*fZXgd$N4kH7l|87d$c-DL7ICq1-!Vb|tzId8Z0qnsvSy=%f&o zNkk;6?5Y`EqBkJu#GtwdjzsS&)hP%4=oGNA5`^0fTL}AL3i#l0jV7@Y=aTK$=L<#V^TJP9N`CE{&i2}c}U@r_fp6Tc!RQ3{BggpWc<2dm|jl#$~%G=Of z139^>B)ge(6ly|wC8n$CW^vMSPG%mG$Ru_&+KJg6n~LtG(>ppm7JCANwKPj9IW%Wu z3#0{o$+08di7ksqqU-w?NqfWqSa$SB>GZ1tJ2<|$ z-tVxZqH@`-Fz_JlftR)bG(y|%FcYM1_NX#-{-9e6yiFJ9VGWZ|1I53)o~xrK4p!Rx za52bSJBofx|Fn0^>DWA-3f%GeqvX`KhU(Bd>OTWmNw=uUnklGx9s8o;D&s>!b_iA~1|u|BwD_c6bFx`#lgLxzV9b;e9!lNFW=# z{qDa$)c&7&`~M?~ZFC1KHH1a&->q&(gC%*uz^}}PEJ>ofL{L^(P9A%{lx0c2-SC(K zH2Ds?baGHTm(C!$7!g?h)3}#8n@Jg6F5^#oo`O-VAp?RPrY-3#jBR-~6GB>5F)17c z+cj1)Yr?6P3@DifKv{-N2W`ripvDdW*w;hnW;jm+ z@Z5l>ewks;5eIQM3K5XB9Wot95g&L)DdTFDcDuC4AzuCLQNc|$620>2mlr{lb*L;*Q@ch;Qi|*VMcV(jZ|O zZMdH0NKLF&8w{yXeDy$s&cx8?vP)O7g5?kIhV9J8-=+?v-lkOjd93^Zrw!y@=JE^v z$ODJz6WhnJ*CM#YQ^FQ2={=0U8fO_(Q^U*Ks=X+jpepr%>GS*$m#5JI?>t1pWMfo}fX)??v|L*w-FH_G#x0Jy^<; zK4^+Dii9{2+81Yt5{|AeJ3!jn*$*(&yXSj9FE~>{yc)m1?`PXQj<`0aoe@K2E zh%}&ZUfbO}WdKQQni`gts{Tx8n`pHF5fB7p0KPwDR}%C!EnP}Ii9b*(qTK3}Mf|Up zwkI{f_!}XK4U|BAd*N=Ex+&TBpmsa;f(lwG+jFZiTZ+o0VXu`gx76M3$VqNbU(M*Qz^1I}9i!C< ziIDT0G?TB|p2_!DB^!;dp2q;n)u`+8rM@a`o7y&_BnpdiVeiA0mHr~6NM+YO4o-Q zga0c|-Yc&Lfe!}jYrz{KH4-gRF&W})G%3?(5%v$9BIR!nx~Ax)qZH?l7F_LoKVL61 zh<&;5DkJ^`3~2%v8&WIOJ)QEWxZ0aP;fq4}U3m>=*WA_@6B`7XqH20#av;m|Mc`P7 z*!06xnEUA;AJ#kE{#jg2l9o>X`0mv#p;2mw1!9BfcWdF`@(WL&KZ^!g5Ap9}z%@tK zOSj+=NqeYAQb4%#+^(dyH7cCQ%DpDEg}46Hjdq{PdoGbZgGnH+yPokXu3tMIaHC|x z$TOI#%+fwv9*rtXzmuK{cTVrOLMF<~yYx2)+}S=tb|fCgfTJLeWS5ez+G3(A+#tnA|?oMr&CElLkN-*T-Zg6G2SNk=U zOE2g?5i#Gf)@f7Eid*S-wShRZWslPMrMQS_`$n^?mUC!i8Fvd)^!Wq4NEt-rWcXFT z1^+vzhNvkmskM41^+z-`posxmhQwFFnShSX5Dd?uORw>MdnC5>J>bYt51O1p=fCVo zOfjJu)+Ec=7)$#-=!@?;7}W(qP=x~aeg^)he07oJ(cEi|C!GJJ9N>!*?EYTLp(#2} ze;FUouM4~$@N(Q(1x&X4>W)}Bo9UgIf3$_!g=?85JttDDei(df))QN2wqpnk>0(h; z*es~TFv1m&V0#gfLnCc~(fuop_a9DhGRGLR)tRiFa^1*Lo?vjbnZq+PeM((oEb9Jh zC%q5PhQ=sb%IU{K!z>hu0nM-#!|n_SdOQPwr?;`Ei$MhxD82=sh2JfHUhnYN=^>e?Lr z;7G@H>Iml%>v1Z?7;t$k8s8URb}D^!X@MwF2Teh3Os&4TcNo%tQwVmfe-dIPG=iLo zKo~?W;lk{m!@aXur&!Bk20w`!L+FZp@% z?Bg;#+ovN);kT2%9`bB+p}@ z4r;+LqZ^ihGtB`^j*bmsnLK&=vKU+FB=>6<*Xcx!fPDsePR!hA9r@60`f+b#&naYH#jHYKATp{9IqhaB^nRf%%u-!8s7miTaar?N zHy@F)`Rg+W>xqTC&_j_TYb~=>4TG6G?Hjiu)pr2BGbxWGUIJlH6Z95@3NW>NTtjxp zi3}k*ZMh=pk5m7`hJ;0?92oZ24azcsA1jG{PL$YCzG6JU)$vrM>Ddl}`t#r-mcfwn zew#Sz9vWs|WA7PBv9CdMHUqc7Dpt05y?2i)XYRyX-`T@RDBbMa>=CS7KDkE3ZmTUX zZ@^cyYiZ(#bhGPMyUlvA*5VKs5pac=BnL5}Nop%QL9X54HsF3GfF&U%uVyl}jyvxx zM*d9KQ*gZpf?{+RhrNE_6aU@z`1I$jcH1xKf^E5vu$k>QJx(0tPfksCw_fg$E_X&g zqyTzH>Ie(?O`WhP`H6S?>mB$*DE4P61#cS$cQy30z94a*cD{K&q4s-AeWWLlQ@s@) z1sn*QPO6-EAb|OiZTN&!b)gHrY96N2Er)1s{>)Pfm}LDWJlPvEqSGB7ViG8laeZbd zxbR*|#G#j)zC^09tvacZsjH~D$|&y~(infQ2P#tW8ujFaLHcLx6C{GD5aYoB{o6UKMf2?S&7 z^jSI6B~F&x`6EqH>4Qe2W`~jB3l24yz==eEy!yG5I!vgEhF#b(FB&u07^T1c0qLTG z7^7%XlQ$_^Gh{;UWEAGsCdC5${hj!gQo6abK@C%FoRt7E0fF>w!>rQ{_^Z6uc$RWM zQyh4H5TmdYt<9+iq4bf{b{q6L(8Va2ZM!!$nQvKhiD5sY39BRX4DCgyEyfRzL6y0o zQ-%Dl-X5e9S)ab;KfYMWfVBYBds7AaIpG1*V=e)<@AliWQ-_=tPTFs#HD4Bqm96F3 zNMeDCvVK(8H1L=>owU6nL5At!o*!Ca2j7tnBMcagJlJrc_I75bv=|QV%PM(MDK|OE zKw)vihF9{)9;O0~ptVv=?MO88$2G$Fw<0NfoCy7+%}W^<|-m>591w`)d^klo#01^szZ z(r5&txEb?^VyRWbxNkE_Rd9GNGg0F6{N^ha7Nm=qc7+>&;t&BccIE~64b$)ruI|LG z%L!ekw0ES>SL;d3M4As*RQ;C?mqyqtCLwN%sqYMd>k5tJ-9t*?hAPL=o=`;c%*;zg zRLn{~cvZyQyugPq&7lcG_TY7i8asP%T)ZlcBIyk?5x`s3%8iVBDTz{m#cTOvD|m5k zt~;4s;%@+bI&Ju|ftlW8It1l>L%1YJt5mlhDPwb;HIo?25rMrdC`UegMw!Fi0;&7U z4H5TtrE*yF+j{oL!q{DQ ze>~Z2V#v;jkYN@4g{<6Q#n}_V=h0)?9v7e#lGOTR$GABp^Qzn}fdtP9ya~1Q1^FF9 zG52wJhdYO+LHdZV)xFCMEUW3k_YS!T<@i=`7}>}`^~VL($rG5LaxC%ayd#OlY1Cg` z+LuBXsX63|9D;vt^j+{v0+tnmqc(V*>O=U5m(8?T(IOR1>J5ercA~unu77DYzbDEB zhDGti9y#>F(fZKF0BFX`v*BMzu&Kf()xi%G{z3WOkxR(<*Nc%$Jk9SL(KyFw=_MP1 z4AEFq%bjn2G=>GrF?FzX3h45kRR=6)56tg@`3#!m#O7-ojr@Ub&(7y(W5AcLXh0O= z$rOF?^TSZvo7>+5c*OWl8t2Qhc)b5f1?y3^=-mTUW%id|Oaz|g;pxDwHhtF}(3We_ zD+a!7;TEp!$AiZfuot>%Q!OOj?j{TB4>L*C$_Pm%#H`D|Ub+PLvP@0U>&j#yShR(O z1V0co`0cIe=L?L1$hD8zoV3Iv45fuC+-@Kdh_a*Is;q^P#Z96b`dvDyUfz%Fgl^{X*!Z zB5oe{Crtbky;tyQI}eW-(Y0NY+gmtZHM+)fQ&DWfj`t3{xHm2c4cVZZL(CrkU}pEPXcC2ivOJ z<3aRAN>s#B`7Df}Mkr3-bLE=foSV}&`HEZYA^+o*6sXxtI>D<`R`TSf&}`87IdCkC zBsYYhwH2CP8?DW_*!wj`r(HIJz#89B>HX2P#INy%gxRBkzU`*3@0P_X{-;ma{_`1y9~w`eAFop4D5qTR8rC-YRaVphp6I7d{`~{`zh!Y zO%Za-@W}|6wkL%IB`cTm9zoiMec4gd z38{hWTufqN|Muse(fkA8v;S9*;cZVVsj`oPPz&jY-=Z%a`Dq#j^>Kf|`b{4=ZKWr0 z6cBuR+M{-YI0uOWd?y8<`fH7uw3h5YaLb-P_j@{SKn61cE+Z`DMUKN#xy6kdP+KDy>D$WQp$Qb zGM_sQ-t36^P#!<}xvY(M?*l(N5$GrRjDMJEl>V-AK%jVb(V!dlMx_ z4o?sf;2}pg$DcEf-HYHEhq?_X?2!AV{MFY(By)Lz{QuES@s+4wNO5Rast>?fS#gvxQ}$?V*0t9 zcs2*$P)8vdQ0Tg>vVEDF#Pb;Ftd8r7K44c~MfKizsTfyuR3(3P*or>{pP77M(sb|u zvj|UTeT;cRHTT&fag1G!)VX!%y(O%=z5EQk4j7KPNtN^(bb!NxosXMtdm%?D+cR|_ zKe|mSp6fG_r`pncIjV^B^5X`JUJpcsdUaJKC-UT`904rN{`=s9?>JB9xMeJZ2!E6E z6)ROC@JabC0^En;N899at3o{DQ;jfyaK?(8G?0n6v^-L}vctLowq`Gfy||c{YorG< zF2YYa@d3Ia3VDbfw?}(~3pDl#OTkW*$UYy-t<|+&`f$X*j;TPY_ui8~Cl=MLjR=7# zhXvPTI@mZg3!y&ch1A-edg4hY(Dldwdf^zuobcwkwKt^4erUbsNxnnDw$di>%i}@? zX6o7a3lc@MUgJV%x7{q+7|0TYv&?w-R%LHw@0akN3rJ-gHjQ6|ivg%o)7Xz^w>l}1 zze@s6r?sAZxF`~QqwTXCa-H(*or9Jv3$t$bHHM!yHi5T#L>U07OSbz?Pem(^9aszpE=qXx__emLk^-Zf z>3#6+FJ@$oqu*GjZQk-1bVjL8HEb=nX1OUDfbG~_Cw|pqOLqmhK@Z6sC~w^2j@*6H zO`Xu1`L;y;d0?Mlo@-2Uc1spkyd5i3CGv5?0k%Q+Wt8s8{)X))+W%(DA|NNUrMOx0 z3a<8E&0AA?-U<}Oxt_MI#~yX)zR_0G*;L-OW|LV8w6^^xdo~^j z(6E-Ne^V{hdto1V*A*i~p=}mTDCyT~)@a#&YEKXt$WPS+Cn6E1DOq<^B>k!JO)+F( zx~0u(_W3v)Y=6){ny>R2@{|%x>D-hvkT3>Tv-rhpU7uc4n;&?2w^%E!W7Q0MjL-pd+(cOmSFCL{93C(g?5`rQnN@b@dFhgM#uv_7QDjzU=G zsy4_>?B3jJVD5Qsa^^ok6{!fUYywvIayjsy{|GkUAwM@{P9tDgZeicbb~&bxe3Ub6 zcS3Wd?gPVj2z{``BDG`K=9!29)GNJp^D|cL!8Z#f?@g%~(Odh8Pl`5yg^3;YMLkPd zBO#X3A`0=$`sWEws?2N|;|V$(AC#2p;fdTHg2~wyZLWVc1@wA3Bm#ew6Yz>>)$+$5 zF~z?RIp`H?c&IFZPHfy4u`>#wy$*Gu>lgESet3UUkDnpaeTA^X3mY6%vp(RZWu8~C z$HSe=KTLzji~oB<12fteD)v>tT9I?S{YM@bfJFC5W+#IPd5KK!pUq9x(H(Xb@JCZ{ zFWdwF?q-;AEICM#i3DHUUEFnX`y@Qoc(Rp?Vd4Cst-tCq{;;7zb#0hYOyKKH+zB^E zyf;Mcf^Ru<#*OKvW;h%NONiMgHKk~F?Cd8DN$lx%%8+)W{yqe0eM1>0UlB3R!4fh7 zJknad8^q6(VBr*EzKh*RTvK6CF7Us*!^<)3VLKrE6tluC_e$;_8rYm#6KYgGljFh@}Ghb zfUpNgfmcU|yzg*QlM4HYdp0qzfqAR`wh7qTr!%$snFSi44aCzK(c@YGpSrHyI)ooL zmh)u(ttO&Mx2$5bt8banzD~k~WGZ%8HBanf!OShwz{`u}(Qa3zIGE0<3s_M`C>&oU z!YL|pR`bi@L1cX>us;FC>gze#fmYG2oNF~$!IbEOD;~@p-qS&UnywAt?;Apsq&NfZ zcK=jeuk2q#W+SsHAOJ1d9PNZ0kQZ$F5qXy=B#dHsA#)BZ^>lHI^O3}EK+*3|a{#;n zc=n>af6a@IZ*|*l?*`?CY~yZOFUJ1NNhd3CigF@U5~wKJp5_VcQAW^-de2jT5V1_+ zAH6@@RLl{RN@~0CHrK#PtU46un#a0odn*Net@CgeGD18bU$qVSV6%dmyZHs26ve{0;V_^i>BBe>c3q$Z`d) zU`yj&s##zkfNgM9_hiH}LiCBRSj~x!pH#5h+I^8}n(BjKGK1BL+=$(grVdK!`q)Pc z^;I{@$#zOZuPN}LM9;^&{6evIR>5`<$1$nKETu2@)KHpl3TFX;vQeq zo>QBn74*>%7^vFav*P-jfY-dn;;f2X-mzgHYS0|DyDk(6+~&bipKaS1lJ44TmLn2Qp%c@S1Do|NqUdstRN%$AodC-;pM=D; zre;eFvi4vj`q!$aR--7%i8ElL#w+e8*^i#IqC~Zf?xb^)pY)*>@d>-K&N2l1ue6O@@$QRJZ*YUPRA2CK-i-%*9vrIiuPal; z8384dELGtI)_y4xA7B8Eh|Lq9w=A}v=(PB`RlYdEN#wT4t->av;SE>lA^bh@a;Z`q zr%5OJ4LSrNlkiP9)=cKtnZB z*f?~YLu**nN+q7r`sCw;{U}$!s(7GA;J(T|Y8#?b?ena9D}5u33_Ew)fvWb4brI-y zZ{0ohi*>oC_T}nRD@8tV!VxuE4;nogs=Uzsx>>jrQkt&h8s`wAUih<7bvt&ieQ)(3 zLohA?Mdwy0w^zC=v8uCf9Nbw5!!~+c;oLMV+p<%QJnSf|MepWZn6H#6TUqMvwV6L zO>IkeUidr_jPhDzIJDC>4vr_iROu%}BVtV9SCHBCCRWYba8A}*N z)pgZSd+Sz)aVl78K{u#huE~Jo(yRRK+Lp(>MUo)~0Q|<(QBe~j%ydb5ZkFEgNby0Z ztzP8vWU2f>6s#{s@2o$bvS5#I1C%S>p^M*NDNsTzhnkbZGV4QHZrgN-aP<`(TwfsJ5%-j%j|t!5uXyw2 z5X9n5JBYtjIXT!ff(K!Fcqa1g>}0Ur+VW0&B3E=<^3fR#dzh=@2J*vB5SGa^?FnHs zqUBCiDwVB6`R0+JQ{1)Ihjvi@R3C0_ts20^S4B+8yh1kWJ#ft=J7<*z1#97^+f3ey zY2h*)_u)ez+inn{uBIJdKq+Qz+W6PC91(UbBNg%H#A|Gt%c=L{P z1sy&0oqPBTHz@Hp9?EY0Z*2+^VjquPU||5Hp9pCud}O z?N$`CCr5szj57yZ&)zeOK_xV7tFc&a`Uz!cuS z{UE>{Ze<5m_$DY1s8K6Bch2k3tqXHtzY5?P?gE2nUGiFk^2GJ3^{IRG3&J-)`V*L7 zNGgAQB}i}fOXi`-UOOZhPIRgGECqj8nd5kwt5Sfo3u}mM==kv zc?sRNS%-CDAr5Yh2UjevTyYSns z3DJWAON)Db*!xgM7gz6w?Db*mjsum6%UQ^Q7jq*U28}vd>DQR#U3WemfgaU}V<1D# z!fXu|fOCGC1h=0rEY%oX=j!oyGM_YvP|KOTd*A^te~;Qfc0kLZ63jBNGzTb!a#+sP zgRlT2w;IPn2qNfJ)QH*Tmi58~y-fle!TsI0-EpuPJ1Ix89_`Z35^rQFo0vwWP)Wj8 z|I!RXc>g3e^<|x^RYtDkBTqi0ie2fMIxJ60e+f35<=>@G)rXc{iba>jQJ@b&9OiT! zicsH_;xS**GF?x$$PG?rnm`Se0zb-mLikJW*ZAgt^qAkTy7Y=pQ~UWQtzr^pJTkD84M0EMJ=`Vcv%>S#9yc-DqV!SeEVHDPw78d?Wr{;}bM z`kmo`DegX6ihIcoGG3|U!o$~~F1y!#c4vn$$$AwL0MVOezbh^p?EOfYErjmasrTmB zb9hEKV;de8R5^W*^sY6pIZwIqZwUQg2>OTT3yhV`^G*IeS#&IW@|3-r?2UidWS{;| zO|~_A^y$|gBQ_6vSriTLa%7zNg8n4Sl>mAP|6&g&IGA}S)6>wI#&@Gm3U@m|b&5Hd z;*zb~>|;B3N{$@;VvUUh+s{ltBL(riUlOd@qSq4Uy?5;pmXTXKcf#odOv_Y#!Mbci z?a|CsO{pEw8}Zm~zj;4(LdNx9o14Jf-zgC-%Pk{Ve^I%uzauN$L}xp>nm*DP{a_Kk z^p_afbgL_Xu4F&QvB{Egwean|#YAXz{5%sImg6@_Jxes1 zgZFMxNe%&y;61GW4t7%3a50jTlhBEy{Ko2u;7AJj6O|}awBd#g4$!%w(aCFe;9jDO zp8fqDH<9S`QUL&Lc()ngGm^Yj*q2(65vTl>@5zKv6FLoIdTA*e4_A)6;tn>TrPF1o z!BTU%j4eZq8a&|}J^#Z(qP!d33Fj{^Lx(Lt{wuOgfGZv0gMRAH=kR)4moB4iYq7XV zZQQS`!WdDGubaYwqJ4tH(b!KNJYUe zMH`3eV#)MpV-F}oBtDC*KYH8x{)i(Md9_S@^}e*P%f`Z#VK8p-@2Qh^5t#l2E+q$v zbee=gDn%JcuY0q~ond-;viIFwg=0$Qk_F z29;%YE7pdqd{W-opH}3jT>0r8M`=piB8;`K4CIsSO_nb;t77Po0kl|ZS`XcF8Y z&r*u&i>H!c>qVCtB&k$i6|_Z!ccTdC%F33^zk}Z)M%fD&^_GawK`oX;dtC(5`+d0` zP9^6y%IzNLm1+vwSzb{Wg}L}k0^?NIG6EFiTu10bv zz?o~R2g_U3JS6Tie5#q}7Cl*@a))%=lR!giy0h0UBkC^82nMu~T-2L%syA@4T%@}T z0daGT-!r;hS#h8L3Duwz+PF(ytl8RUWnohcfP*@V=}j4I=C~G?f9GI-=FHU>V4d z^$=(rCg7G`X8=L6Ti~Ia@j@usB<17Ujd)!kqFbiimikPn3u4MeWit!zJ9E#l^Nxq> zxcs5BfawddMQ_4}H6!ZgPPl80|0Dia{t=&K#AW@1(__qUZ37Tg{m_XFlbSw}0xqxo z1IO`fY+(m3SU+Lg-rr}I%1E5N2sQ{UAJt6nABsjtodmy_mh|ktlpkjl1{V z=V7nO!00i#?pQDV4sC&eh?|=?XzYwnOiKcD(<;B*R%O|qe zwl}t&5K(t=c|ma23AsMN`l8p15Y(~j;&%Lh%~tJdMcR<~SepwTTyhZ!@Lt2E-wD(+ z$n59{>J<}(?7P>I7s=rtT3xv@$@Ow)jh^^|C@lLn`;G{wv&ON_vFfRCO8^z{dK?GtlJ11{d3M$KBUsA?ht(VLrI>-r>Sae1BVqGtW zq%U|DSB9DlVAha2pL}}j3xF(iCJ~LYFROV?Wxvzv+`Q!b%=cr}R$W}nU{h3{B{_bhQr$mF_TXWLl;^?Yq;-j!C*$^)Z=~$x zMj*ri;|8bO*wm}2v8ZmAdIOJ6`PKCu*yn-pZ}DR5>jsP%8`4o}$9{Efy7Lr?)+Cz` zQ7RyAgC1{sv=6v_k%0-7ac~jrrDOJX+rhlbZOGRCS-%M1QW*r{5d3G&8VKiEli(D? z$xDj|<|jDX0*~nAE{)&28b0x?dU~EnJ@hV@Ui^)M9x4vKiX=(D!6&>ZNt7K-nIwmWMiE#n>g^Do_4HAn*DK7vP*A6c zmD9)NwSuQh2JlR>OxaCNx7SJU=|wn`KJeP-<3||+@CO;OH+jUez%9yD-oV#OH>eB) z!#8>MuYI>h!{ZqPdsBnIJ0PZFN(~>L-i_#`f}ld6S8i_Wv$&D#cB8wOQ|49=O$WoUam|H9j;MP4!Q zD(!{5J;FiwPxSVi{OHb{h$C_a7vxsTKF`z{GIQPp*^e3FhB8++SX9ZK{YmLh>l3=P zMEmc;JD4pYO7ojbGL7n|+;CndmusUAd#*k(DQ+P835t$l*q`3jBi0#@GoeMH(%}5tPE2f%mzclZi-;fK)WH z0BV2nVwdkx{qUwXN%-uW&b5{;_VPj!w}|!xfVOd&DpN`G^v)DvFY5e@ z8TQ^IE@bCJ#9N36fmsb|)t-Oxl@Kdqs{(;&?Gs&Y59Qq+v@e8dJ4Wc+$vXG0P&f?B zvUeal@BveSIegrIyd{xM#whWq{4kM|S-F&NNVo1y{c%^SF2{n|kY{7SA%9B)g&q3p zqkZPO_s*k(S>i9*rwrQ9P!`Z(>}PR>|} zJ`}}^F6Md|`Z;3+r0XqAKe;I)i9C*$gu&l^$nLg+Dd#hApj>gbsC{)5)(sU*Fm|$Q zE%{qka@`ArJZMP$O^dUBWYa%+W@D}-_~D~|=XJjb4<}1Az{>wXF{Ro;?@MDhnAd|8 zKnYR_58KGscS?+0F7mBMgk1Rpc1YwCer>2W_b#>%V*lFZt;S16)h0X)YylE3SnF-S zA!}5ewSD1Fwu(7P+!1&leRuGbpF#J|-m3vrDoiz)VBp5%Iceg*1LZC6Z;jJ*#be{Y z4c!Y_G+a+3^`a6gP&|!_stxT6fC~EY*gbam=TuJ0_(CsFq^nap2mI zih2XwsBFZL(7iZ@E%pl?N5wJLd=E|~e4^4Y`#l>c@Zoo^cfIU^)6XvgiUz}tCflUc zU^pY|!w`#E%lWTy(^)*YYnW(LOnWi_Cie1RIdY4AC zY71%>CkU8lq&EM}**~5||0gwZI}Y3=EVn5XUUrgM3i4LMp@rq$5pwE~Cy06@LF^v5 zvD+H>ykj7hFjb?J#8*3}@ zJ*hdUFZmx5{2gGVMGY1?7pJV?PVfhr`@$^V3SZQX1249l#B^7w=!b;Oi5>q(z7p>{ z_$M;%mqIOcI0X?*7U{LrrgLf;%y<;m6KFfvdMsh>BjGc=nkfG|Y6xqFq{p6zEXHYY zVkG44vJ`xBn-1Ya+;jKSJLN=A#7jGgoi+@V8+kqNuF4$uEAoodr~T@I?@i#EA~+=b zOeN?7!<3gBYZGi+yYza@d+<3o+1dN}1f#zLuTyP9+x2r}K?De2)1!?(k2Xamb)qd< z*G+}vPA`?JCY~?n%no>;X8ruRd*b!5n}upW^EsJipAUN7vX4`1?pbWpq{-i4@gCQ{^x=^(D^4cin_ZkQ&#R&{6&J)fjGe#oTVcB zz~cdnWg)VD*uFdoFXtwa!7-67-&$XidjSmVr4@N_4T<)*%me8s7M4gu&Xl?=P)PzR zdN&hd`eq8Ol(ccBGUA zg!L=`G4<0)pMc<(wk$3qIIQ4~AMvcYKJih9>)F{fo}LBd6YU*kTC&4{Ja?W(QD=qU zLB|^SnZEiR0p;?t8DlfC@N4U{;S-83fc)*`NsmqHqQ2{QW_P!%^jOekqUyU=1C3a@ z{ljrB6kRB1k8PRf|;#G-Q6ebLj6VsgV@42YLP)m)Kc)3@ML zuEfFq&Yf4_{bZKNOkHJa^mu)XrF4LR&^!+$Cw2R()WwNn&aYs|wws$Z2HULW^v9UU zY-~TWTRh+gp#lqx%2oS}_3+ah!1wVf{;U3hZ2r`iCTxegWe()TefG0LeINe9lt7c= zS*{p<&Q_m^>+X(?j1hz_29~BLB;Zs}5=%$bF|N2pK+IU#=+Vv5dL_zmG|}Qloh~)B zL9Q<{iegMk`F*BF)8F0tLl_k^iPFJCI9Xyqi3#fZTOn6`$NhlQ^l2oP2g=Lrsx(i1<2`n^R-OO|)9dsPY6zTJ_y zM8{W%e@Tbqiq7I?P%(b(-^IYXo!lONp9+3y@edfIC!P~!gpaxMXf&>7&wAs z@-BD~Iie<2B2acm#851F*?-x!!Qa1ETq%n{a($`)sy$(8$nvG+WjfwG&gx>n8pC7SHc&C6 zVABZH!w?{D(|N}l&qGwz-gU(t^?-GQNUzg% zMYMH!daxL#5{nsyS2W6=%&E(@WrAsYs(a1W75*Hi;w~=!O#YXL;=`Y`=og3)IaVQb z7v7~6P6e$axjycBR!sPhU`YG`=*y%Lyw(BvLL2e>K)C=Y8@Y%B#g70{mdy-nUjJy? z^lB5q2Z|>PV5`I-U4>o(t|OR+{Y{;fDP(+sLS_4WKamUvPC{=#s@0k;VHq-g8?(ZY ze9Z9-rXunzg1RRci9-`QBfcl53V32WSNo^7{Gcb$w8|Owr|YM&zn3C`Oo7F%d;hJQ zll~L*=uA;|*q}x+Rw|GY+mYvuA4n$WL_S9lCg)(nDH>6LOs!a7v+?4G5&y;$vaqs% zOLc%1*gA9hM$)WW^AM)Yk zH>wut<(&iH4PTRJlba(!|0|lu^RLHR6bSPvnp`9;I~twP{iabi-DBc1y@PBvGfUmQ^p7uKHJQ>%TB9%SwH?`e{-GyWC!68GBNx~&}#%rW! z-sx5ID~s?m!D6QH_rv6Txk?ddRJX%zeTa^jm(|(VIuQ8r%Wa7^Zc{lFA)Y`irb|LoD=}IIZ=74>z zdEfZ9M%k3DvVN`yUy-&2#98oRPop%2#$;gG6iU3}_?iu6o4TrZWd%`}q36Tf`pu7l zR=Ryxjhx5qBguZ&qAGjjZn(og$c$&S6!?;3g{%zQ-{kI{0x#k9DQ&~R|CH6(|CVPX ztGWr0*b)`yM&N-YF9!A_-Bq2F%#0OvLi2tN02c})4?mptfR3Fik-|HiTY@059Bh32 zl5)30MBkW;6yY-OqqbrT$^Ogw-WoAi4@C?1fY?g!vk`R3(^1R zMK)Yvg(Uf$G7@Y2Xw$JG&Y^d)Uo{!Rc|8r}c2lAiqpPOXdamvAn@FIiknuO{ifTbt z!!qk|E88~;lzlyRVAkzk+}Uk+_bf!tGap4Q%+jz$orr%{$oZR(eDRdK++Z75@juvg znxOO-(Sy-)_YaM8GmD~o47ysJ(DF$7{FP1p9~B&sXknseztoD@W9qlN_Qh)5mVWj% z;*udY6J^D6^uZMZV+6pnK3%4v(#qxJebSI^r0y!X{4xvPUQ#;~5j<_kc%>2r+fmD1 zNUtgrgBjKvZ_mncJL)5aKBs$_3K0lUkpYzMs|V(___!*HZFx|2eVF?PovwT+U5+9p zng}OA%2^tgAFjkH6TyNT&{l$oIDcS$olQN7(_gp<6mVDnnHe)dE4xJuh;1xe;$xn! zZHK=ZdYqz0Tg~K_ZIYXBrT%dLc|g?8Nch^nlVWJY?-zX#*@(cW@+$+(j@j)ux+&C~ zwP+b8Ttes%eUgFmp|rPLuF6v}=Pykpo(p|5{?5LXxbJmLS#}WQ_Hc`+g4s1Xz3rW+ znE~5SeUghPJa1IM_F&}pF3~pT&S4XA_UhbU?8aL@uJ2|bCrl^%Qxe{$fv5M?PcOhU zEgp@;v~t|PQvNr=L6N>)Bkzoz_NM^P501|M$5vu1PP3KN;kw2~c8{E_kM~g~+S38y zA{}8rU|Td@$*T|py0ub31ze!)p^DJ+5`Q#vc&B3*B>ZZa`<9UgP2cCYTh9kiDpZHk zYHkej>J<^dsN3H?H?`6j)`zkOepsO&$R?iC4<;+0i4@`JVqzpL4MX)PD>2%0o3u=q zmznfIe>p_J<<#9Ps{e5#zoeFbNic5V zHld$e_EHv%lizeqeo9g&L8x9b$bObers-(xb$c*D`{%g>oZ$eq+cTU9u1$VJR>v04 zeEy`yuK1UAaMhzKz>%2bmlA4w-K{=|@GCTgKAW$Se~=0x^J5;v3>`UAlh}bQH>S}} zr3X97EOw&3jL!qoOJF8UK4(g2N!cc;%0Jl%*P~ntC1}_qd=Ja79iw?DNli<1Qza<; zaJBJ+p2lsK&W)2Xv*PQ{pY=Ftn*p38zpVgH0FK1zo;VM5oTsNGk@ZGUnmul#f&)&U zHn*zivsv|r9d933W^DMQOSMSg1MGOU;gCZ`2v=sQrqlSLFr0jy&$wx!h!l_ce2GGP z8n}8i$lgIIy8aRBV94GMlb3icoLY(xe?XSJ7KZutN!sc+{L{c;{ht~*AW1EU zG>Uxtc44j9zMejwrOzU_Uh{Uj-6RT(TQDZ?$1>lnc~INM8ofTwn)+(#kVXf%peG;Z zrkY9TI-mhf?Amm$gB5nJDmBNM=5C10EZrCMyCJy5yg#z_ZNxG)hYb$cUt;E=K;k|6 zHMaaEvin-o_xs4*+kmE#j8S&W_{=J*VYN_7;ureq+PJj z{8SP?$oQPtH&WYdDbrAntdzBb)#))cb9g}vwK&cUD12)-OUB<%VZ;@P}fUQZndd{#eow0ahLL2vE$vht{|smt87oZM9hmoJO= zr$OuuKhsM$XZ|G$RJM(QItNIsCrGKuGOk^sC1nv|EPhstn|}{r_h<9fC5*9I(g=0Y z9rEbPw|f?gpW@N_tg?zYCVu<3OxiSv&B!)X-i<(zld z{7+fnUz~>OeL{4s?^v;R3tvlFg5cJk9hT+sna$%oIEg(?g~7D7+6G!oso3vaFXV7} zWJdlJXA|Bd6AZ^;K=?err-Yl}Ww_|C~u`C9B0)J4z%HtDK zZq?uLG`MF6?qaD)TrlACaF!NJS#=9~>I@2`c{zyjzNEtoRx?A*C*`=Ap>M>^+9+Z1 zaOQU8Tm5e`9M1Nfqh?brb%`2Mc`jB_#VG`)&da?W^+DZ zx2w?&e|X?P^A?^Vh1{u9KZSJMuX^s9=(jk@sE{E`8fItW!DnQ1QlB-)PQQz903&eb z$^f3y<(QP%y~u@pno(t0T_^@E>J$An5mZXm@aI)+A&S4hCJ$Uv8FOp=@IQF6OcOS;W&{iXJOs~-4PWlR zJ2?vLIP!xEB75#BS;wl4n=PFc0wBIcG0@<_pxa(p-&7BtKp_Rb2ndsn_%mbM=6cY`C{kD5`dQi~ zkmcYah1Oe*qEvUbI6kfiXJQ^4V_%CyJuemL!wZTNbO&CWUUBbI&-q*&aoJxAtm5z` zG(iVn2j2-kZu%-_IG>2U_K$eFK?-KrcMv#t_~KM`ag^LAEYT6fCn-fYF+_+d)D-3b zN5X!F^v7|pwUZD9vFa{9%U94MW!;}EJo}${s0=Xuri)V!_Zknb=zmt=(Gg9BI>s01 zA8Raue6-hssKT0HEUP%fW%iZ)DJf~71e-ZF2#S(YWMVdgK20RVDrFKZ+5-^<*W$L z*ed~INHIJ}J#dv^Kg3Ye!ym<_KNF+xTgzs>CkDlAeJDdYy6@yb=1U#mNImxS%MzFZ zm|X(a+Fm~H^j=$S@wDmgHnnFo*rTR5NzFMD-#p0|LqapNu}Z7pFUjv%LtdPJtyW!m z#i{{++g&kPkn=M?+wO=MQz+;jv>C{*Ra6&L#TeZ*GiZww%^=Emw zu8uoknbmo(3_mc+vBxjlDa&rHnJj{>HY$nAyx)bU6*n-I`?q9%=1_3E^O$cZ^rrY& zd<^d`N3*V5I0n7W+rLq1y{?PzaF zjW2$;yZF2}dSY$QuwfFPp_ItQ?8)XeS!!@7hyedLWy)3iQB5n4InVY>oT0eZ1hX?c zs5%~jpv?ci^9{aB@QIa}Ce%P3{|WE>t4d>3Q!@lS0*EpUdxNnPpB}CUVr<3oFeioA zM)8cWRe@RB#NgmM5ACP?XEa3>0~2f}_&ijbmhh$E8THgY1ouSTHIw0Liu1h8qnTFZ z2C(*zX&YzI=BYSp7A>xBdU@TAEP)Ze=QfB-+EqtzJUc{nPew`52(1~<=-BH2R~i%p z8I2f}9(OW|%GL>reoQ_7jM%>KJ6cN*h45P)f;JlExq)Rr$jrR;bgbI(Y-+PnZ}R?jR z94E$QP+p(a-KE=OvB12VQpt($#M7?I@Y64F`imXjiz!(B@GYc?@%K!=-`c>4^x+SSN)A+?Pqxfuv4p zJ&k(ma$B9HUW&?l)WDYA(1*3Tgu6KjWo0-a?tNi`2H9QXexV3-gUWHduJOVRm6+tP z+>AWDHeHrV1QVw2B;Bb&0y@HcZ! zEfI0Bi&+Hc9@@H~EQk>Ar@Jb{e$r_iBMRiww0v%ZbSvK^oUr!-j;OLlZGu||5RvVX z?DpNS?!+k9m*C+gF7S1I?InYU@f{;Ut}o}OMy+-XznU6)b?RtIL$=Mc?*#AflbE-K z$h?QNLE+h{$C9WtA6_L2Xmp73jWtM+XdzrG2xWMYS%O?HD(gW&Rq5vVBI2UJc!Q-W z6>U)5CbFrFH|6oG;Z`*`GkO*xJ;t$DtNWbO#&z~m=Zps zN~?W{jeW2d*`|dIq|+XZpR#3u38dNWDgY2L3yiG6K67)VH)FEp7%!!MUuzYf-1jnK-a7laH>y8tdNQMrKU z>X8-qOMA8oLIpxr_kFWvGDI+{ET?jV*YRejtD5jwA60*W8&%;1?lI>Oi+I)(Yb^x` z;gbhQH#GgV;HtmJS`_|!LMRTUsg7`xn{Ex{@mdWMZW9^oUW+SXZF=-lOGMQiiJw~G zj&T&qpC<;eMNhM(7|G&YU$L~L{qe=opRvIa|HggcLKqW7(nzuz!ycp!8oO_krL@HtN9%h& zQSE~$2vt804^FDluK|HmV=bfeTdzZ#XSs476(f7Mb~D;TxdX8 z?Es#!XV0Su1}3pZY_CDHG|M~dxNvm0zCb14?s0$02B}{+OKMgNNE^c#e<+L~mAw+W zI-sNpZqQOS5bsm4OD#8c-swwtCn{-)LLB`j(Q`>zFXR^Pj-H{R(1WU~IKV2ZdOSg@ zOVdAaS%nH4D`TjaGwZVgDG?Pa`23$-P!=OgTF9WtOe!kQ=L2`Zy%MtzM^$f}`v7s= zUuq1suXNq}!QM*2oJ%Gjs}%ID{D&O(dE7Dfg>9Q2_|pLzw??)Xf|5@k7z)1obBKNw z#|A|*<}ozNo#fRW>Y8Hdzk=9f65sSR5F|$CtU#__nTtY+~-iWn97S|)KO{1cyXO_oVU9>vEwc1#D7v`ZdG>F+qTkl1`nyuhBTtdQiES*|n z2U|m5JAmJVa4d(rt@FN_MMn~%F+qGUR`C9W-|}&(Sxon!NF;ve zWw?H%6B*N)f!~{_&Ku*;=Ta^dByV0RD7>E`DK5(8MDHBiBz8d!zDk-d2L-fPO#FA65|)1$X#CkBJ4AfF=&XE4BDCq>}h z&3+hwe9l)opQG_8RV?Z$@v(0K=v+DbIJbW!lRaw>e8^cq$s(S=;gxisUg&Dw z=YculL)$$*Y=uo&_Eb<0O{)5SFKR;}4{nQZ9RRqdbNeYiMEM8|{?=#S(l?AU0|NaO zMuv*0FlC6#GbO71yK(cBmkF0qpZU(r%xk%K&#uvF9D{BD<@Cj_S()ZUPBxGH`lX+H zFgJsPdvp6O2`$k5z^#(%1E?f2@U#3n{k8_Rw!VTcCYaE7VV{yMUSZgOm|~eAfwz}2 z_7iD$VS6;Na0zdZ8x%JpQGoZz!*{L>)T?p+P|U4e{(lvPz}VNuW9ue{69S|R4)(V> zh8Y4YTv=`E22Wyeef%x>@2n7vE#Nsk(Ew@c&GLNJxSBcV)9Uw$qBfN|fl-PHtTgY= zEtb z@s*B99VbQP@+$7iJ4i>uUZK0d={94pJbB$1LEuWY<{7Xi1m!u$o^qMFsv*Y5ZVCIk z^u_NOZD36VFnD51@c8n`g0Isj=JfnHn}BT?f#IR~%c8DxGXyV`t@2*e$ScnGN%=b{ z?1Pj^C^PIS{n4 zv^NFQ#6c40;6eP3x7ejQ`RUs|?b)-N(DN&p;uNNWq8~t5SgCh$M3DlR- z*gqH@xpT(#dmBu}8GjfnbNora+|J?%jy_|C zMnQTo2*kV-P>+1}Xb7+msAf3BnU;B3%U$UTl}WFGn?z0(z-0HiEHnnwMH^4Gqi2U= zsEaWa*@Zane|>%e;6JZTHB8R^m4$@ETFR8L~-kmUS zs2#4>+-WX@HP(>Q8O42=9Q(R(BU#nmu;eUCvOztU%B6EKLbiS{!wY{i*LOuf$d&xy zka&8EvLILU>AV0DnaIBIe&=B0ObKHX4{+*nqJqT;9!WJ27;tBQD5YtnBN5;?OE%LI zWXra?AeI|Wc2_Z{AMAMkKG-3WkYV>|e@0?>@W)Huo(Wd7eHp}DYHFNaUwfHy13#vn zRGfE4m3`!n!|2gimSZS6)^0}dd0qkV;JdZ2uE{<3$QL0obfb@r%1Vp}l+h$9!7x?7 z&Bt8NFExQrvdx@YZ>rORrV)R=gSkQiPZq_DLK81~B#>@tf3ktJ*huTv&v|vZ>y7J{ zF$iC2I?;U2mRb8ivJLG8KlG^x*x=HLNs@`U))7elT-7l5*B7p>X^#ly@uJD z1sZj)Bjr3f3Y*ZI^o@~z|NhU()KSQ61s@pyAt)wgU-lH&mfCZVl9(u&4S`roS>`x+ zyx;c}q^oB(oP$93_Be3gl8{GB2zTh$>WInMI*Wuvhye9I>APdq1<;1F^ntAv|ByGa zj|-@mvB#*2)P_GL7C8XKdp z`jz#%mD?hh-R)>=(7b%G{6p_P0=00%V({Oa2E)PGGOVV0x;tgMMbnWx)alr2Ln{qT ze-(%ww0P%x>>7GLRvWTYRkGsHZcHGE20l9_t`11~LXCqpk zaQ9w^n+%${+~AjpwZ3kSv3E1r`e|lZ)4%;@W3O_@Uj-!kuX^)=uL^tP4)({_HD@aw z%e@H5vy5gj+$+5XhlU6~RE?Ca%vpgiH76NFfoWFLA7?&ze=ef7da{FNJn3ug>YkG& zat8}R&?ZsEws_gYuX)|$-@%^?zmo>vn&k}^<&!GE=AR8trM6;j(?29DhNA3u1cWwb ztqlpc_$%Avd14lfo{efs^<|3B&2!87@?T;<(VPF(>j1CpUFImqs`pZ9Ff)C7#JK6M zFulM}z8#NOTXz15w1Xm)e^%>U-PHt5A?cl7mr)D3J01tmWzn%4fK#ciH!Vl&x*_S9 zbHuKVHA|itNou^iOe*^j7#1KO!8Fjx=@Q@gQdTdjX5VUA@_vckTjcb6h$eRXm}Ywq z!+!LfPqc@b{C|zpe=_0^bXiU@j+~;#@5B9WC7Tnp?8NMsi-cQ%BovFWVHfB8+UrIc zaF)*qq{y>P|F}zZnyV4%SwdiJTXdnxVER!B1uN-RU@2X!--Zu_?oPxbq zfsY|C6vKYqOdcE{?)^gy*MtAomA7y0B}qD51V~T7;$k?}ReWv1%0!%YtNPqnSMNWV zP35N?P83G=&`DRe%!2*suMnj*?!m9C^=kZDO?J3ISMiN*%xX#b!XWy-JZ z?i@V*hRTJAf4#0b zmDtg6jeAYLX6T`YrL!Vg{_~aQv*}i{_DquuqxK_+7DbJu+a_j%=f<3`OT3yYjn~|z z=%H+g+CSO1KiR9@GAAkkRjPW3(5jHrH}DKkJMb`_)+*_6VnCmv0{-E5FG!%FeKr>J z!M6S8MgH63tEo73Qcep5i`j*$G_Y>ty8tKaOAuvqe=rAGG~TpQ$$u?lIVX95P@~u^ z7W)FciMezDxBFYiTx@DVt@*z;Fx|#UGMz}w`I%hXQ8>X8^q`pYQ0JNBX4XRbDa<#^ za_5aSom8NxU}>gWrQLgC(jUI<=94!F{<>=04MRvggc+XFa)2DQ&%_i!-Qp9i6=mZ% z@%)7IO~qSHNoVg}-eQ16o*hf-!7tHI%39;4Ooiz69}W* z$n5rS2n$-hbw|H}`-xyILJ{egRngnj_(A?JxdQgHFdrX_$Ucvf4wsIBw zE^&MzLu?$5@F?Ro!?If^B6>>w;%GXLe}1Pn>=0rf&zGhZ6WAjh?<>4K@Y`b<==qo` zF{%}}UePNjQs0nF$_^4siWg!m0K!67aTV;{sXp>MWE?$=n@-up8f1mt2iW=jI zjApXL!v>%wz!WM$)n(b${60;pS03`&d?Z5P?pG8#wJ#F{Y6c-YpRLe=niyqac0p_i z!kmQ-s7e2INJ}<5$h$EHqP$NoxXR7f!eY;~Bq>nG(E202S4C0iTAbb0{2uLh#CGOrimC&dGsX=RWqz|aM(P5e(BLsxOlK}s=H|6sg@geS? z=XauKsrDhPj3Os&3{~w)rT5*v=X*Mk=S^=o@wEk+;YmlO`XD1_0V$#tQD`!gc zZobr*&HA0Fad)-JZE^dwt2l26ezIe?hc4R^6#i-+I)*NkPtvI+)H2^Cu=L(KW6^D0 zz%9R+&P=S$NU<-6W^*_1gklAnAy7t5!?EYt{83$GW`)Q=SM6BMpksikYM7I-9ZeX* z!E*Dv`n|f90k8qo((L47*V}%snUU*!`ZqKul@*%%)^i)8i7;BNu8)$S-i)KKHzM8u z2W<5#a^^tF_9rr~fI;koE38dMs?XLsQ9Y5pf-Jc^0B4GE2 z=Tdgm&N<#ogA=*KW85-a1zN_%nz8RWG)&={obwqeU#PkKM-T}`kYXzX-LM-{=fCdt z=;QbWimgYZYi{eDQf~si))71zy?Rt`?as%_V1pg@afZIyI5Bz_R*a#bRvCI5L&EC? znW5LV8tl3Kr(~FjzAzw*IVyaj4{>5jx%fd+jIuM}I~-GWMbM5z!4)O)u-6M<$8Z-H zzRhlCkWFwf!@9a=@op|RKCPYQ1rtEc*-A_xcjqqlgs!-zdr@=^AMfSnkuvsM!P3^) zljl}Lk0Xx3q{@rtdBl2Kqy&)l$?^31PxrQs3a!87^J)$KfnH({@jp!9Uiz_KBj_?V zv9MDKQ_zNI+jZ+tbQ7tH|K3UVn3cy1j@}z>Bz`3@W<^;{z9C(1fHS4F!soqKZFFU> z2~Bh)`3?duZIQN!lSdY3$QpHN+^0*_9BDJyA=YYQ-$4v_z+!pin%9ARG!^k;=A`m_ zBFfvL2y*P6UIZ8b8c(qpC)@O|Aw3x9eY{)8DyD+5pMM8oFYrS>x<%|N-p-~Wuw8;0 z6lphfTpT0)W#H%baAcd1@vwBPV%|%TcX}KZ-~n_hGGa<~SeY@2J;M_u%d#DhyCOk3 zqTJfqnOYVj?Qtxfkb#l1LyvfcaFk;2LwEwJ&aPx=6%~*_G7ddOqZo&y>_PLi@LvPZ zapv@Y2A)U=0UUTL>&wL*^spFxrv+E$3U86o*{2M6MI0Rg+Y#3XM@U0uCC>Ebk8DbN z&Zw5=RS{vEs5ILfbeZ4~^By1pex4G_$CsNm+}35-ASg zX#?~LZVW;;Pu4ng|8)3+p1?9rv3jMvrnR*QqU0PZ7lEGV1m)8*ZdAiR;hzm0=FzT} z4$~w1-YSFIlB<8MChB&Pg{>!>lY^Vg*>>Acx{xgi)z2$j-MO4 zKb=uyenr!uFT2_%K`W=gY)~~2(D~reU$NRziGD{Yy|!*eo5ebDs59;{cvzHkU`{57 ze68VC@dLIDyWH@tlj`5*|`PJSG5Q#7E}NFooIt40oZ< zSurb{@%3R$4<>}Kfhl!Mv3P;7^2(0f?^f7loRDNx{5SA-32YA(=(cG{vLVxlQ^Xr` zyPOq9HdhXv@G=s@3Woe(K3(+ARna^7wV#c@F1y7LQSgwH;RfL3lbId?(x69xG_;tm zg|FJOI}3NrX=>&xO63rnvKa(cr$W9VcU?G`Q-H~NHSvj;( z%#71Tc$_tUf4TFWbnmO|xVN^ZO;^KF&(f;rW1U$_vU9+{Ac6_ZFrgq&jG_@V5d38n zxS4jc(`)pld3@01?+2~3P4+e*{i1y4iex@s$|2zucS#0_s7u_f0JLbP;U#Al-sTvb zB;OAW%!=pvwAlW_j%bw2NacGXe6+6&Aq{5v#nWbg7`>NoOMqFFcm z=l0>s_6%gxQ-Z{zLO|#fWs71ql2?JYZy`F>oUd+5R*1bnCN+pM}ef_t$(bde6=ZG(y;*hT5W<#T$ka z)7Gh+VU>pa6hDjAg^!5P@}l82Cdyo?ioKK4!Y*{~QX8*7(g;x1k>Sh(cCDXHqO$2g zcI$#cAa1g|o_0`kwqVs`Sh*D=92I2 zjnnpx2YEN)-gE*a_xk;fi$NS2;VVH8JDwj*y3RZP+EwwD= zh1bbo5)k=>xyS14umR>kc1Pf4_%PtjKdiOx*Y&k8d(KET4v;u~_XJHvzcdl>ckI6( zjEgh=`mxViVy>7YUZeP?wW(}qa4hcOL#IgBC{gq zzFxyPNgRGFguCAQBOjzj-pbJqHh}x&y&F-J)tIMTjm zT*QcW_z?3%nx^v6?h{P%I|KJGb-x$^YZc1cEawEemP6%LIq)mp_vB4N4%xq2KUjA{ z;e+6Glbe^NIl?quP={+phmz`kJzzEEP%o+YynI!9dfJ873ik-a?gO)wCa+U-w-m#!}Ae2uU=tDnyTi3R zsv01^jTdbx_d4$ek$4teC|*)@*neq9^?!@<)Qy3Y z7j9GFO2S)IQtPd(NWCV!WxW4yHlKt>^_>H9DUhY*mmRjt8_E;0GEjNqlXa-uX}pV; zN-X)zH+91?g5hGo!)2-`FRzEj-ps@8ey7{>v;iZ03F-XoqZ2a=Z%f&C3+JIRh=cZ0 z%}vW33j+rT-Gzhlzr#}`?^xYhCW{sY9o!M!N4jC!1p`=;l#qPGHtbI)0WSXg@lR}; zpg(rMTzB_mB4P=jk+XfM7Y}Okkh^Er9{2?M;-V+jZ3IKyQsvka_yhZdk~H|88A4bb zQ~7+}XTxG$G3#F$;dYIo>=y&p$!f7KQ@`hDXN$QVz}l|vVCu*h`L(ra>cywl#%EM_ zw*}(434;{fs6yRc_HF{GiEoRNzY`nk;DK`kH2FoUH>Dhkb}Z zEmW?Q7rCPal+g@eJm9%BhcF zskOTPY-*Br0~`m4*A~}O?Zc6X@nBS^hisO7zp>FYL#?`{S8g-%dw=d?zLqQbF)dCQ z?$w!VBVhWR%=vYvV5*pK=OEze63Lx!>7xT3y$CxlzCPa+f-y626ild5nP|n%d<9p(p=ZjQ-i?O1g?Wsd)EtM49H5WO6m{(q0cgVFTgzEtDku# z~)k$0~I?F81 zuzZ=si3`vFrO`x8PR+m`e}r*$kysj%gOXy9%ypNBMQCgdu)u@%gf9rP8^C3-7_&be zlQAGbf3eqA4GF~B2pzPJY zF<=80xfN+E4DZ-ELWbe4igFQ*2jfU(3;=PtCFBMOi)bv*Nw<3NkfC8*^=TS|n4Ngf zGpjg6EogvLYY~uJ!Qh%k?StxvtOQ9@4ZhBDPQg=`KtNVzJj1ZB z{YIe27u2@=E6~$I=R(?=552Wgr`n%xkbnTJs6z;oAHFwj2h)r5J_dXb;k_kr6oWO! zcs{rJ@tc#rnNOH-RGX1PUfZKlRxCdd!u@1J-4bh$^@?V?h(TN{D+^}8%U)bww_=v~ zi-?D?Zp{=gM1WZyXZp3sXrJP@8=2>y$D_4bcheUINT}9vBRM4PD|l4nl?DHDPG&e+ zk`N7loGoHJ7LUOqYS#Q<1T1S1`@7N^kDRgcYuLIM$r>q<;@GZ)sDCPN)|U82Hm*O^ zX99RvUCwy4wzO$k$4dt82QBM^B$VW{TDc5mKNY@Wa<*Ab9A>B zqt+GWu=k3TWQ7VYd(+~zr&6mw@O5QL!JrMcvY?8$Q1X%H8*KQle8H%tzxzuI%q9;qxDge)Z$i(P7c< zn7(X#lT0<21~-= zeB+5eny1CrwbS-{eOtqv`YOcTH}Ae61w{Yc<94H@S|P?c+H)GKUXKqzoV%Q|GDOSWO*I5h$;Vo zI>|Sc9Ay|X)6T2_!krBz%=Y3P85%oiK#`fnynD5l#*qZU3j-)A2(mlA zUgd;Xxh|L9eOQXHgz2dTPBu05W|oi1uhzoi4NvnR>z%e9A?PJwuI;JU`A$(1(1ZK2 zqQV)w%EHT)ra(FkZWK^I8T(|^TmQz95>o~CwWxF?lAbB=J$9q2Q#S$P`{~i>0Ju;< zc~&SP-)|^`KWxbtk8nm6GO(k&(+(x?j3=;xn*`RQUk}fBt@eC4)iduZ5W0FW1OCt( zs^I!&I73DK!C>8?#Ji)-J~n(Y7oWv;Tyrm@eCn18elZ_dD6n=Ka{p6!%Z}%)xg^9Z zb8pjt{ZFz2sCQt<=XRz{WCh*W#a_RQQ7*#&E zQ?qtJC6n9Or^=RKij-Sh@*2t!a8f$tdMtXO4^seJ-%DS`1-?wB92^<@(S_fWd8Ow& z^i0x&za*aE2lvKXVNq&gHbJ)iB!n~aC9a_h54;sz6yojgf?^v8Tn4wxX?Xy>kyn}1~&X*`;p5pW)IH|TRz62u1Q~1g28E-7j;ySI@e84W4liGTq z`N0LUD8F|v_c(Oko%OT$DL%lJ@Y|h3TCcr9=i;(3c+?W%VAv@{;0wUg=lDk@MW6jf zpnC%&(Qb<%qn9%auEy3?ub$Uv<$b;C?+k~xgv?iw;>Wb9@rkP6DFFYIaTE1QK3JzK z3CgR!utTut{rv1q$$4&R8=cFNlJ8jL#ktOurRc2~9Fpg?IxpZ0bVdR883~dXo(8onUuARo%Xwu zLL>vREVZzVt5K#e&wb0i9P8>S*vTN&q%JUcQLhMA2&iRIM75SQG+hU312BxXry~&Y zBV-5Zl_NErgfm`G+2s$AcLz9igT%f^$s?bAG|{KVGq2=N$F&NY6L_(GO?qV2D@{SP zYcyK3Lxl15$>g-`>gYEsqsaM8Jo3#8kV+}pAe@Ep@ZI1*{_>|MXo7e%6NzzOnZ103 z4JP}qf6CyjYx4|3AiN~r+c!L;7E(zc#)omk5>g`UoE&ypcmFV;BPs(H%(}No7fk~$ zvR>ofyGVN^MI&erUm&&$KQfdaf7 z>`{rql?5(o=FMF%9cuP@bI=zccr^sd8GK$jf4nx0IkAm=Aw|myB=OR^ zbHB0e8}K|&UF^L_Y1$(#*j7nhKAm;w|1Sja71SV5?~4=%)|?%&|}9#oCyX zFC7Rtb5_k&M((5FP(DN41v1Mup(^<9(fqGT@{s}P{&yaZv~Q1dxv!NnquL3`(OmmA z3_UZMm^S3EzsHpZTwU>K7KiN$pSe_kG~Gv>KVwY1HTm0v($ws48&@Czm3ijW%W^#e z&U0%L=WM2hvMme}$_}xaM%&}lR>{r1OLxi4k9XR?nyKYM<(bR$BA1qM%VNxKe^!|2 zYjD7??dji!ccz)gZE46i;tAskupsG5&;Rtd;%k_JzyzeT9h6>B*G;R%iTvVR&t18UL-l%MJUplqTrA}3wGTG{6H z{-Yj0IvD>%rp*xC$4~;Uy(UU;pDM>EPbrZuSW8;Pqok`ue0;$F;HRyXCv))_ zRa`KyD97RA$($v1mDhI`xzC)`FQzd&{jDBv{RfBQ%L@~kik9PU29PiLA;=&0ZW#ZY z0^P4>Dw<>9DE|o46y8f|_RX%>3J6Tj$E5Cc9BuGk9!Y5vJ}?RdAHA5?*vXvttx-;> zL@Q{I2JX@tHSe!;tMVm2bPw|_x|Ifh7_O)RA~M~2^7jKmYurX16zP2+h=)HWIZ-Mp zxLe%#RRN+w_(gF<#T}@MaOvZ?s*-#}&734hThjT?0pe`TuWc%ie30G<0%zNsSo8lR zrXf3kgiIo(?lcN8z6J3P(n^&I@aQabjn!{cF+MI8Or*gvIe<=Obs?`C7wiHN6q4t$ z_vyrIqIrzVvbLNwJEs~qbu@CG|Gz#O#~gQ;CjqddkAh1n#N9TpX+(h-COa%%1p&>@ zb|LCdPq?~)M)KbX=w~}IwB_YRbHCSZ@aIpRZ7?O^Ih7v?H9Wq9mpNJOvZP;o_(|ej zjgSgKgn5_A*+ZOy7F~>8$sgTLJ^v3*Mr<2=+Tdg)#oeeciT71<7oN+*JT7Ge;L3q}5$ak#nlww;WAb3EoKj-K7c0<<#FSviCdKGRBgy>9 zM@~Hnh--AktAuKZCcuJgV9;72zi*=tm6KEgw0i85Xsl96k_g!?N` z3BA8HuAsv*w#?8jJS%abx{Bw+OH06xPgpefUF@XI1SNYv+YL3L+FpB^WapZIv^}CP9$r=bIR<>~By9)hT z;oi9tO>8WWdUcW>jn^rrHf=Llw(ZH-v~^CR;$O?mT1l zCq+NE6|Wu|rKJAUb}&c=3{#yB?hjbe?S>+n(jm1`6_~3)19$z!PHUm zi?TRzYAxqWekzTw}Kp!H-G?l!M4D6 zg1-hST@x3}WZ7Z0ASDxO0DfED<++fZqj^0d_`UNtVx!7GniTkl57B_-$%t$P8iw;Lf3p3_h+LJ z`B=Z1*E^L|0y2|8&&>Km2QAo21YfQ1%vTsy>hdR=_riDYIjIm=i_{UNvL1;OCg%Q_ z>L=@GD!~{1pJ|36!m036=QLn-Oorh>hzFm_wLNac6>OJ+;FZKW0Dm1|uF{?&!5tSDQMPd*ma>ZC~L5r3N3}aB;>y-mZgz@BY$n)+cRbU9B zxbjGd4XN%d3v+=_e4jJz z)1=yb4GGkd+Sa{G#tez9=~?6oi7Oa`s|aex`%f|(6;2z~crfTY2~ z@}Jl`T-Wyl%I=n|=_4nFQvuc5q{^a|3!l4P#~yhwAXqcv_mn*?UP&at?A9!o))rgL zLCd!^I4{ncKT71e-0<{S)(~`5`n9`>V_j8n^UVgs-1CqN`Lx}6g=GN=MkGYARr%&( zVRM_WFy|YmjZP3gxpKWaAd4=SiP=;?F2;#469k}|*KKW#e^&NHKn3y8!ArK)2zl8>NRk*c04TZSW^qqEndYPu?JJ168;+`^hve}Tm z78HD|tMu<1*=V^V(4O9L_Uoj!kb)hBigIq7en^Z9wCn+cISA5}(m@&-|t;9qW;+dT4e=-jD#<|rtF4{UONnW`VeZc8Gs3R}<|jV)IH5W5xN7cEHa zZk)?D&*07=ozAj+63bDQ;QeLv#h~y@G>BiEU<`@?iWX9BxHxg5f21Ib+Zbi-5jE+2tGH9{!)%;XR+dO|iB?$!`_{npI>dvNJ$)}0LBd&aZ z=@vu%_qh0=&lX7YT{6jPok&uQRNM8&u7Z&t)rGim&=VO#sR+KKkHKi1ZfYb$WPfyA zKxFLVdKkX$MuEoa|75D|%>4;JOQX+@oh?y*uSnOKQWvtl)qIqp0zdSK0>_&lLV^lH zt7ARZj#6_JKem+i&bW2%Ocft&x77f*5M_9>4#V~^_|_YP`aa4}wE0I~&L7T4)L%7gI=@ z8yS|bnHc64E$oyC#yP7*2WN#eWfP`h@>kHt(D)}HT@&jX4jPsqs!*%_i|NSGN;BVE z@RgV!+<~NRItc6!L%6r6EFfyb)c${HdlP6VwlC+}55;2xYh_pzy5rvSk#9++)FV%fN_kI7K=Q-#9KmXr3IgM@3 z%r&mLzTfxf{eHc90lpiHDR0$8e_2Rg$Qs+r50QYf;ZPxokyc&4hdJWT2CF-yCM+1O z&7gpPLTCP24CLz;noGzdFwU@6|C??sdDt|)mp38(ux_8x=W?fiix?gPi`}10dAzJK z)P`;Yn#;*i;#Vgv2cL3mU;NjMAz0n{DU42_TyKW3cP}~oP8do;2F#T~-FRHM!iu~X zhy<-S(SABh7Xxk5i3Ch2hcY<~Ie?%F%k96}O61UgK;>Dr3$`(U&Da_K&K*Ms#AM*`{+5Mu) z{g?a6-=5_|rUyF{HF{nwwtRVf>-6+iH6Jv#!~j|yiHw5lA}+D*b*0oE*A0wl{%gRw za|v(?rTv)lI<{-UxvYozde9L?Vn0ZZ&j}v@d)*Tj&(;GYE52`GEq7lpV;SMSY$>9T z;bEjU!3kt8MG4A=dhd2xQl=(rDGi!X!+Zp%zNg)ZOO+8|A+x^SBMPBId@FJnOC7*k zQr80<7UTw#^31y}Uls@xKWZTIrk~(})9t7IhLG2-+e?WjzmdLAQJ3nUeNdV_)fJ;f z%3L$(;mLNL18X}U|0@!AcQyXUq`q78F3THNvNkC<72{S692|L4J3;1p-79+__({aO zB%OA0Q|Sab&1d>-3pH!y_>9sUD_=pyD=QH*T+!Yf;5^~z!xALt9yZAPVeIiu69;kTnIakl?}%s?%3?=v7v7HOh)iIU_? zJG3y=Or19+4Qx`CE4Kp3S6^T&dby>!k4EdxxVIh@wDBUuxzJ7;__?W|)g$XI|3=Gx zZ(`xhe0xm@u0N5io0N)HjOspiIpC*78rrzB=k|j@MMGk`ectYZ#WmfxY1oHa0FuKQ&pa z?N_Sr(U91WWku_&JM$dT>XXl263(0UPjvGs7i|Sd#RMEh*y1IDwN8tp`ij~*g15y+ znzezci>P6`3l(_3`9?y2iQKb#T$pp5Xr~SMF2mzFA1iEem=2Y# zs%+V8>v)&MLkU#%f}cP)eMxsSoF~8#u5%I&ns9F3ddNu5CP_MaJ(|T@$Ve9o9O=HI zpVbf!?T?!}`c`YWeR2jt7#O_rAcK*+FcXY4JO+K7oa)cn9qIk0cqg}-OY^efc*Eou z$-djdt_B8=kK7WU4DO(GDQ1*!x<--_`)f!~s+;bDY#9;D`>3AV>vM9-WVNeX zMahm540YJcKiO3Ry>qH4C`MMWuIC&j!JW}EUmYJ|qV;9|yNAb9!C-MLV58{u`s4|z zd$ku1)NFD&ye$*o7ziga&Dp{3mEjlwTr<19Tq5Gap3M6oiCRA%vOgvAVX26rAFDw1 zBmfQAVmG{b4O6LFd87w_rpII^wdoao3?|N31E)fe3)?~s3;_AO-C^2Hu)0He&j<;- zaV9&nC~UJigDJi>63{XV+CTYt=YT4a9hLsE<fQAscDUQ;h?>hR$smVy7S;%Ko^ z)+~A=;{0pZ)CLCGoheLl2g357*cA;#>sN>#-Vejf0K~{Xwc%>j+@jKh21^DX?DPig z=h4VtYi`Kb4ppUwDa~u!<9XB>d>~%_*R!3v^{)_NRBW7~X4ioO#al;$i0Mp?T&LUY zvyo4H2u}!hUtgo69lUG_bfK0juWkiIBZ78){~Li_YBaOEV+I?ehOf{rIJqm$bBu&Z z6|fPNj@hP~ElrBIfJrBiH1UVpmc3M*1#;=N)j%4fA@4cAmZ-_TcRRJLZhpB$>0%@2 zw7gq5>1`-ck;zu_f|UUcXg|-r@4?46va>uPsrARy2yPc(+QDu-#0r)KG%0std6L8Y z4*k2OM#MQC>le=eFVYo4=N+0kiu_>Au+X*p+*ty>-CgUXP5;+0);j6M{t2<|H&~fz z>d4$L$keW(W{-f3<{tpdW&N3u7IeV)NinB)-!i_n{7h3`X<-{MXL`yEh6gx_Ea!fA zBmE8!a8DA=E*D1Vc1>?y3J4s-gQg(}_;&X@K#;v8^;lrUX0bX2G(T*1Ih6PznF2P- zb0G!^<(FIHo-TDS4u|ob^^4yB?mg_!UMOG`R6=zWqCtUvKMJm=mPIRS;u;l&j6IXA zI+r6S4>DI`Q+|^+Aqk<4umpp!;%G1~FdYtC8vC~0w9^i4e>KYg+eEVxW)TOF;Q$&) z=gQ=w1)upgAQgO*z?^5+MulJ9_Nl?Kpmx(x?Uapqm$ zMXmH-VX(K#?6x4m>a8ajNQrUA-P0Y?PyWZ9P+FNEHhQ&uD}w$fOR)=|{Jl)hTyuH5 zVvtjXGZyOPQUQCRAUM9&g9%~rp%-Z<^3ZIwj6Nf`eY2rp7t%ldG~IV^#Ij*!_d?8$ zM7>yT?-d6u*E5z{oTdFChP%v_S6fyv+ColqLuHh2#NbTP{rQKl$)8Ao6 zela+9d!&Yw?V;SzT<5kb*4k=c;7f!A_rJMGODx=T{dq~+tRmIr^`Hf>;2 zk`FqzyZe^L=7AA7UrQHr9#}3d%@wC z@;`cGcs8-%Nh9-Dxon(WQXr7X(kyM3IB4A^f0paygg5&0&Hl^3qM1Jb-cG5BUmV;I zLihiHXW`Y;um?vPpK>NomnrIJo(g#v`M>89j+1)MJses6PXC=t_&+$EAa;L|0EG${ zc=${zwl!axT)d`z!mO03QroDSC~>AsWz_>6NR#)U?YBiE&dtwH5V>3)hLj{c=@Sy) z&Se0_u9so;rYB3-YyNJjP9}K-qf96h3zT_5(@^wT?>K;DI45802JD#s=e@^S?w zE#_pz`6^=dxWh@VXK%lc8u~EvXCGDdh4!zcmWIF5X6D)n^`=_hY?-(%m+si&SZG@{ zLhVwb1(l;g)}^Uv9Op6(FQc=3aku5@B>tm4sTi4VMr8Y@Bb>!oDw9hLcNbTZTn9?7 zd@XXGe9m^UWs=*NA=U=D$G-$z5S3Y;#mvMv6+OCh{d5hj1upRpt^ACi2DQ3r*r>j6 z*|pN;fRRaG$RVHR<-!Ko@%!1WuT81x8t9iNzOAvwCV0OL5?(a=w-6&l{IAjlo(&R& zWs)T>0a}&rjpV0XU$cDB{+^H=8Ff|)3t$}H(JJvrm@al-Y=4s@cC6|9VK0fR2QW<< zDBNF8%VcP^-q7zY6q~*Qpwfs<+EaBN$FZqx&6V)F#9E!nLz+8v6<@1xS+WHT0KY}7 ziUZ1b#FBRdz)l`7Cr!xzi}z-SE8u4A(l$7IJN1EGmlO?MlVnQ}fcME$CVmksffSJA z*(BXC!NIXO{s{|ipJH!Ocm+%S>tYT7$-*Ny^^c!dC-L4sYb7@MRpV)t%HoFu0_Sq# zSDg#P*pE=3%B17;%KVee{l!m)u`Dq_*#6%a_&3%QJVd|K42=U3d(1*rIG`MWVBL-@ ze_UnrAdAIp1ae^snY9>zXAM`W3eS1Kx!a{gx?>6{ZhS#LbiOLyc&Xs)=qv&q3nZM@ zb{7cUeyFE9?nJ*d=}0XuAj#cIzFU>1R{We1vwE>Lc1}H-XX0Vp_3iMYocCga?1eEX zvTQm>$~*W;jV7C1G)!s*Y*u<8Yjr97wT5q6jLrgxZJ{I@RJ~`NB(a}jQM`lRk##Tn zcp`Jorx{#tMZIQu#KKyicjELMrb|Cc#?`-xlM$EQtzZ7i5+lHqC=G}0rh%7^Co`F$ zzIEzSu0JfR9d5U0jXy=ZGW@Fc;T?|2m-SQhLS242b4ed;a&V^!;{?j}`9Jp)pjQca z`VWasg@Kv>?1*A=he3J4Ei77y$Kt33MeM!xTxmLsxhT|OBZTR~^wX7yN)rc4UbP1| zLZv;N(e55Z-N7*h=y(TFu0K{(Y05&d>8ZxKjA}ioOac4JgAUk~M`Ov*V%~%7*?_&> zl$$J&OO_WZGrz%DqWwp!(w{EXwC=TZvUX|~2y{`LaT6`-dofP{ifC9Si3=PFbH6E(mC1Ja?UD*9)v-OGdLZ zq-@=w_8sqDJyZM%Wunj2#AR4i-4;B4{FnEX&px_;99jId8}nqRPb%EtcaxIu6y?lw zoX{xblaxpQm34~h-yS6w#Wv>$-}y#2^;N2qvC=Inxg7;LO0FQYB@1j(`YuKzl-RR* z3JJR2Yv%InAPzuviSkN#WHj81xeubD{PoEqWZ_rwTCk+zBxO-8C!fuZrDf$YTK79+0Outt zPK166H}^W;R+7&;4j9F`Tr(DI2yfgzD`t}Sl~0ay=qci80Rw0}-A@w{5xgZgv@}2a zujrlKs=7Zz*njcYSp1OhBj7v_)hkDLhd?dXWFUV$;5;yoYvVx2oVw-9imr44*)`1N zn}lJ#k>Z~n6i*&zbQiHyr;rp%OT)u9-DLa=2vnwn^7=ZfRp39}nGoYQT7a?6 zPklNxMum|ixcl|x)$Na~l-z$N|G;<*u>DtqOL!D^rKdJuzZTOZeStl5K0vjE0zg8vsvfU~G6{ zT%gvrZ6$Ic!27K=-0!(mgTjGKZr~JF0-s=LBC$WbixXt&^Y@dD1|)d(Hq!HcMsoda z<%H>hYYZ^i`)4{@!=`OOOlOEPZjdoc^CR>PSHakvzySw*hvnn5gWT;Gzftc50_g(W zlaE~hlh9J#((Ui6&b@}k`XN7d&frR38wH$c25!$C1UZ1ISm5a5;lZ7NM8cXl2UAGk zr;WHZh88hl*FYl)TX7I@vlo?cpA=t*jZ1wXojzLE(@1v@l9e7a`mNpP@$_LWH~}}o z=>oz}%yY(TzSFpYkQrYZ%JJ$y)~D@k`jo=@fpo?e2rQtmMhTgFu5Pyq=7mv`{0v89 z?tN*ItNmh~$%ifWk^O1J@CPD(y&eoZAM4J=C2c(LEThlnzZLB@Z2bS-OEdHjF%M+O zc*()=`AF?hDQ|C_4j7)sG1}EZ5CJu z*i~b^pyPVt^drZU>*-3IQF*Mpm|_nW z{7Hf6&vE8RiXT{bh0=Ky<<}nK{~}LMXxB4i>isO&<^SNod+xmZTgtg<3V+&4eO12L zn)8wO)SHQ7971@A4r&=?Nx-{ER#0Zlj20 ziT4ru40b=S9(-CbfmE>87p|DQQ?A6s<7PE=gRXvDhFi#vED?Eo9CI(mf!X?iqfYz! z(;exyg-w0wQinl{Gp}VguNwT7<8MU#o4LF3pRTEO?(9onMlM)1$xa?c$)T7H0bL#! zdsz?N%QojtS&xuGD={TexR}N}cMY#A^jn+{{NyjFzu{hk$OZxMZ&rn+W(L^Cr{9Nt z7cBF6*4-8AAG3|d?-p@>Lx%5}nPh!9!MPI${Y+&#F3fpa$mi0qzCDZ4ea>D!)+{nx z;f#b%o!D>qyWNE+S-!YBp;0AlNE^^2foC$P zI{$&c|9`Q?nEfegLSbP^^Ma+O%V_h*VxAMAVRIYnK1YQ_48xBc5Az{j>27n&RCcfU zjr{BSgZy);{+GI@8#u^=y?#}G^5y><@=x|~z|F*ob^=YxohW*h^n|&ZsK8X}AG=)@ zH+L(SJ1>6x8g6ck9`8-t%#NH9CE)NlSWL}vT} z)!&NPb!C(}*}DgEUG?(1)@5w)zsF%Y|KWTpiN=``f7m=T8)z^#rqh;?1&f?_1cI0? z)%NIpATgcOaS;^xsRvPV**Br}s$qalj|xF|2DIT;HylDvH`Os9DksIZ^`N1j-(01x zDr~z_4YZU55&8eMVq6G0qj`}{vS9+a6wPA)d}Prb=k<|!6di;X1O0iAa%RX%Yk z90^q8P6my1G*b*j$IRMeEV7STaH@-+oL(Q%zBp?oheZeeI%GMyAQQOmWA0->vWigB zmUpaWX8w_K#%9j(EwAkk*gRZ7_-%{%rwozks#TSIomW{8tq0$GCDtCz9t-i&i_8oQ z);@Br2Ea)*AMfMlr;sx%^`8}6Y!q4|3w5}euvO7k);r;trKjl5j&E9l@s)nE%|%z; zSjfR|XC}Gm(tFA4$Y?auF>`2J?mk{9Kf0t4PC?@>nL9$##;Q>fQwY}0pTq*X*HhC>b)zGN{T@?kl7!UG9OQ>D!0TIHvy>c&(2;iI1Y;W5j z&olx1v%fHd8Mjqw3<3+LAn=_HGZ`W~YO1LDA}4N;P(e{Sv70j5pG~V7J&fOVOfugynNOe?Sws9t;*Af|hvQY` zl~k8Lx_8(#@K104$FaF9xNg-Tr?wnA=bjJ>Bz~_1J7dms?DDSR0=H!a3 z{AS{Ns0qDBLPYajK=&`aJ=9#zt$Gi~VQ~$VKCK?1e#CNzge(R_R=>Q2&H~*j<4`PS zqGaxZ;m>;H9zAxK2j7W=o#^VyN1ozhy_9~=&)RK!YiRA0j8?a!VikeX>md$_to%(& zZzd*~{RzVI65eR2@6BawQGqqdXS+SI0UCHrq|j=`=3Y)_&dw0o==y zyQQa!#6qw1{Vb0NhaJ?lRV35+^kDJz7^!nMUQ6Qh#Z`kIPH>n81#NJ2nrnNeZf$C; zm8EzZd7A1y{KGC_7rRYVjM8peo%oZdtR{LGXoJA*pdgAlMZ77ENT5$%i+=T4#R+Jt zHCU{s2*yIF+^z&AfM2sW)_!6j_gW9YHsXI{A6VQvQM)q#A0s>Zm4wJyUIo zTxach_cgxPY4y>AShfev5G`;0Z#uTRXMS>VtwW{QihPl&^8U%Ni-cK|OqSz*$3&5$pb^>VDJ& zth)bOf_myJ2ddLh(Me(Z%g0^C7mempQId9(7|$ZaUS;wQ^OH?=GoJl^cdWw%M}cbP)9!gBw}x>&C+-cTyY zxETD8sAR{bjdt#TZMfehXmh7kT$(Ga=!{s?X0g5AjFD&^4nTcpY^2mhu1e-RA3R~o&=}1!r`W^ z@p|ol{W}K--MegUU49ySG`?K=Ho)$8_vRh(p>xb>yF?l4eti{E3_^Vuti9+HrNR*c zJLdSpER~bx=O5WNB;s`Q?8bjNVebAhqW9PRs}tS90Kx0b>A$PnQeFPX*yIu!Zye-z zNKe}4eS68l72i!8qWf9TSoNe4d7%!d?b4^!!8rfxp3?2V7t|q&mGPk4UqtDZI{7-e zsPr4%(J~Zdn4i!rC!G|%T9jFM7vs9%Jx;2{gl0awjy=(ob7>tO#Ip`8aJv~ey1LW=Fd{o>_CBgw)E%##(0(Kh9^fB7-||I%nrMr^BQ z8C(SVE(W#ij{_0G)^^UH?oCg4C?p-M(5S^%OG zbIACM@COStWPZ9yZ#@JvjxV*Ll3~8%5)xIkL)5zfnPnd}V&w4{D`RGo4qm1y)O`DH^Zi%PaLu ztuBNZoiRjZcsRTWja~~8!GC|kNy27A9;J$(56r%Go(>>14P`E_ zWtqMoNH}dZK(1LC@!GdY>Hy|{mP`Wp6R~gr&r^Mj<8}_9`eJX%t9orwDez|MHLvKb zfFR$M_|N`Cfu@`1FE>G#7Ks4S4e-flv&BuKGT^eZ=d?v+xxO23Xx~g3xxGVN;@5?ZDx~BIo0_ozTr#7eT?4GH=-oA zk%-f?Tur2HOjOCcrtK&umgi*k#7O@r?1N+Sn?FOSY?%T$VrniN!ttcqgnQpZ*2Z)H6KgbNU95cA*Ngm9D#A~q~$kQ6BfFG$&Qh)Q{y4XSM+wVv< zn&M!Xh}BSl0zXEpTZUE!aKb7swpUynG}qC}5f$!9aGsdli5?i>NPe785rPF&%*5=O z(RwNvtK^hO;#tV3-ylK=Ci%Yzj0`EuxW`XA;IG_UO+5B3G$YuY*D&J2#;f-dmAk*9HEP7D+7CgV;(^FApV-^Om38X!QbGGt;MG za6Fm`?>6ud8SsTfC$sw!IZjrFek(zSihM!@EkLaxV(wq1_Vr&Y1MlRZfpnC>X5aO6 z00}dTvX#QJ(>J`eW>1&tT6+#w%b?TXV45USH1SWb2Zk z{dW6!mtVyo*(Ru{&N5X&bkX6TP?P&+U4(kU*kiTMEB!DwlH+4p+T!ZBk&gsUOMoVH zdfW@OtP|E2&4fY{i6!YUffcfa$2YrEl-ZsDpi}P^k zO9O}c?V&NU4paDbpkTku&q~p33r(qI`vhCl=Uk*HDG@A&r}k?Q%WCt-AOhy6%uM)r z%;;!ndprdqmvDUW7QtXh5B}vmwG42R^q!i{^hNl=7z9Gcs>pzbLr%z3(RZw@iioGGhXqJ zbCO^Wo#RyTOcv+juo^1fM~7d;GN7^m8ynggb}a-}K>B2N^H(t$G1vl(Ul`FPZ_u=& z#4}4s@7+GYo6%rxIu`2gh>^mP`A-{Q>?K!10zQWFv39RE`#%-Eo1c!=-8078OwfiN z{$Vh-daY5tg3L7hInMIOj+@FyNpC&ZYWVl0C?Xz9-1UfGFe&2}20}sfILiroL;%;WODP&0}a> z%FHYzXIm~cB>-s!K)Hx@B_nW*8(P4?y@J(7 z_1D(6ddhDA@yOxVCSMtFNQ2)}KimZoJoL`v1Z_D<(`JCs$bcZ{RO9X|cRT&~@aSzs zT@#M03CEp-)wL=J75y9{$f~`kC@fVabnf1)=*twX>jMN_>uipjyg%E(%i`{@;mjwN zxmGu!#DQ%7i=&E-qHX=`q`AExW7;}M0?cb(#!ar#n%gB9^`?UtziqdQ{raT7(Z4vW z>!2gLCYr2LYPI==T@VK8}g8Ww(BoNPN(UD(e|C{1bU z6=!^&g{PgX4T(5G7Pvo{$I7W2-Xpf!adk|qEn}ncLJ)ybJyBEyScNURe&fWkN64lf z+H_wkU~C)g;rt*Q0$AiOdq*%@D{aTiBI{wM@23U?_q7T;XDmkoARbjGjB;c3`0$vglnkT;ck$S;PkifwF3g+&%MVQp z^NKYb4k5q>2&jr+c~Q@$QNodOCaC?0I#ukbH*Nf}!5XWKnV>Jl*;l;$RPeqOI@7V$ z<%Q_+k~eQOU!~y)n+w`fM71mBD+ukkP7vgicN?YXTUAdjwD&PpZNU%|U~up;q++LMPM#MdPQ{i*OT5X(gL z?b7}}#yCxv9Be;VKa5Yt@GQzOdj>9NUBsFo z)*T;21lb0gYMO8f`+Rj0sP02Tuo4QhDHUJB5S2MH;)%^q+xRbvg(NA)IijY-45(Ms za;0n;-~|#=f;gpa1iTps-eH{!lR6R-!Bfw32vRaMKaK?0q3L>9l!N`p@XziL<72?q z`VHg~{CglXnez-WQo}q;PLC1IZgM#r!2uDp{t!X|FSO)C5jZ;+1bOToals>@cK2Fp z0xsN~X}w7~B=_^~HGTIR;zV|pves(k=~I7oTE}OQRIWFnT7?=>H}OKB!Z+SN73Ol^qe@vb8YPkvRmlLBUETR+ z@(@<(Y;ujC$E9&`;^7QL`3@XlY8}_Way5{cr%zj-!Ha%^jTPX2G(=rHX2pJzm4rA_ zo-X9z?KDCfQ7#ud$VasLdS z#?h`{nPu!nodMm)ta+|Zngzvx&c zRPe=|6KZ+ZO?+E=fKdUoHv0aK5Y>KmUEWrK;VnDV)Vsj_B^nwvVtpn zENL>zgj5!A|F)0G32BVg7h9tS9D#v6^S1Ez|3Bl;U@ z;0p%~CKdraLnLPnnR7B|0i=Qi9v>)yu3+^*U&f6)ivX$bq1G}v?r|%xMPz|b&MwD9{0{* zguZRXcd`I**>jm@KwvvOk@+QK4tt!6r<)7Ig^|~Jtln-eZ-6UIYHpE|R7N$U;tB_f0cO(ta)e-0O z4Z2Udm?xsp+PP|kJkqCme@4r{n&Pc-5V0=lz_Qliq+SF(5;k(!*n6-@KTRSXht5}q ztZQc8$+M&^Y^t@oDT%WkyK$=b3h~?%uUy7wMPy!G1pzINK8!hd{&Z< z|Aa7Hk_efN2AI(h=3WEFz**Hv%z3SukFLrTJ}8aT(sfKg%v7b9MxgOtpJ~E!7fu4m z#Sj8npON6)KE_xR;sHtqyst$PNK%UoH-aR9eUn>ufH}je6kK5Ummal^maAIWN28-1 zX>s+2Jo`5L^o9&#G0*9_NU5P$N6t;cEqCIY(WfGfP4;!{MVsCy?0<|tShXCO^=ke9 z%5M9A+rCr4@qqDfV}MQz6hIrJWqh^Nb^toym_3G>7cg`#nq$4lDh_@Vvfy1>xfON8?ujFIjtH}X9ASfA|i z3T0M%ap{?q6G!W|?|g5lW)@&xSXE02oEQy9JXYZKEny2Tl8y+AdG)nuk>JBTHZx;? zg_1;(H~K~g_J>aMxXv*8NJe|K#O?}Agm|t`ZCnUC_{<}!vjrPHQ z2v^NhH%CM~xhw-I-WSjKtjvdyJJ>!kRH8M-e}HGSgC&e&c`;K#sXWPQeuEt}AHO6Y zxz>ithHrD=^jSkLmMEq^XJ5Q>rR4zgGp^*av?LDQFFZKiwPxCNcc=p-@3Z=Aq0cAy z@AxSS95GbG6cs^%J<+kj0T%4~5R}IWai(i-id`#LEu-7ux9~Dj?j&GCUFz(n@RVse z>KDf>Fly__xG@yqF5Am&ZXKbgGZ7j-LfDDxnxTif84Ww^^g*x7UGSIHr)qH-b?tnk zIJW##2P^@l&#m7E3!Rp{akvU0@@n>pFsmt9ay;3xh$~WC6Ghp1n(yRK;pS_TWY%?v zz7Fx@B8mBK&QVdEKTd@V{Td$J>?jNcY(?O6KQ_8A_OBtPM5jcD;Ng<4^VOzA?xQ9|%I0?2(qpKzk)S13b;eD^j_up3 z!4~ZrY0pqWY`aS6y;ZMO34FPvBQ#1bWaB&MnV5l&o8rIP9MY1Mz;E}2 zRxXXDok*6}lm(Q`Sh};~PCeP94VXk$6%JZZPT#UWI^Xi42cG0#aRHsHEHW|0Su$&F zp3(So=J0vV@=S{p@g3RH!s|<>vJms@#XCZ9a;B@y^??!}t&sKeRg1~Z% zfM56eMrvD0^2!5m*Ky!BiZ{;8hkk3d`FS7f<%7A*Y$2gonAn93G2r!_IA!$U ziGqHxR`;yM{^R+PpCO-I_-CxsNPK~f(yL@Qk(7x^jVTI&0z)40FMJi|CBWyFBW<4* zEw|!>yS$Tba(VjA3pWVS|Kqv%PV@cGv+HgFr@s*2kGC*;Z5@gvL}~QJCF*3(FsRo# ziAL`bS+{v<3tS>BTzVpV0naR==Z(V-sqOv5`rS_u4#Asl$MaUFCOwFd4&(!9brz)S z?)`!sIy|_0?v0c(#OPwwL z9#8g^k%&!%?9yE^;OplfDXh35Jw2*m*gkuenX5gEl!xf(O8DWMLsX=d>0!bjpK#ospFYb zT6@orz64)zMAuwI7#GCq7zgx5vu zYArM;CH?-3{qje}hqi~O$$YgkBW8fI2CXJzI_2ByDVY(JP&?*Q|3Nkry#rlIC%TI} zv$Q!nZS>N@G3=aykRO=yCN+=u1x`m!x$e64_74{U7F$&h4#O4}WSrLTtLnM^VO<;Y^c0=2iY1Ip!0g|%_20i6n8Yr7;{9(vu6kGVjZ}LT zO1T{+@8R27qb&72=z|oXp@wG0Bz{ThqO$Di+-B41ycL#JMw0pBPr^d_-tpj?kHFWM%VnIdzQuqLC5(%~dh18n4U7bJh{|@+fqR;>(UmM+ ztCW(Pz@+U^0@o3I*;e|7>4K)wnL7-iiTmR6Wye5?++G#U@&|$%okHoaf~)9k`_+VN zU$UJ~UwcQo=lxPp7Hnbm@J$du<3rqQeKxgbL5%I?w<`T6$^9I=i6GT@v%URGarc*U z>teD}@1744ig`4rJiy<Yg{D^r5oqM{EyLIVn2#X_mi$~ykgX4 zVJnfsqq-`k0jY6vqS1=UgW(cwDewAE92XPtkXV;ztcoue39(W+G)^bcw!TjkYtlBN z(3FqY(8b%n;Uf&%iL!9lwvdV3rKtn1X`7J-->8h-X;6p!OSjT#;r@gq+o7O_w$Lv} zW_?15h?bLwz92>doS-JIB(APAo*%-`1oy73z8C%q#cH1@uLeKrVy<1af`K2QR%f1p{d`4_s@YWAl6SVB+b6cJ;y)3u( zYv;}jV1^i)wrhZ{JV(!LAK?tKh~wo4$FH}-YWq0bx7nE%kHkkX_X)QZWFC60_So`x z_qfXIv&fy-;lInp z#Yb#57RI$k{U6n-)YO|7pGd$IvKh9b;ggO9OW%Ht7HnN?ce7`jwq>phUYqEOQulE~ zBhH$Pi02bW%|c>c_$82t3PdHC@=D}w^6JK82=`s@$LFQs!P|JQU z#9y;=_0VpyGl__)w|Z2NMl@PFI!6>6|}4= zfA4NRNeU@=xFX_A<`W~~ZRycA55C>Q#rba67Z%#WASZBv`(@=wZ2$!^10XQH|8BVT zXXN#NZ@ul$pzdV}fVi2l+Bv$RgD+)m!&%kGfqk>3X-Ze7;#?2WE|}1wAOcI(KxMhk z$830jlM3PIvDkY`hEBPCE13r93)isysWfP!=jX<<;z=UJ&pZZu%+CyUHwA+ZOJkz@ z(eLWx7KE`v^w!AHbx2wd`Q5PornA|;;k_KJv!O+MByPoGE|H{&f(3E0!PoSY%D(#- zFn*eHP=R>+2^j_*U>ip5xB8s$psD@ltdCNOEAJkq+^Tl^tNJHu|xc6*tV{b zMk=2O7Q9PN*nYP?I>1d&u8lqhSUJa%Q#fmO@V)Q8f?}Jegi7Ym%Ak~EvJ>-+z&G@K zn~H}Ye1;%%h?M|sG*^S)$FqRQl4ExdUVgU_5M)JEV%X0KQp}}m_kVXDdS0|8xd0x{ zXzc;@hY(Hgvd(S^NxSciz>i)rnAq8t@a$u_`-Iq zg_LmSXZXZ?eDz!;fFB$#e!3PPLxylXYPKS4U2t=_uMg9lklNSBxF{zQ1&W+r6TiYO z5hW!JA-}w19yNHfhjSo;6z!$x{#!E|@otWN`*SCcGuTe5%S8(X&d-ETcl!4k!@?7d9 zM6gcdMs8=G9`YoP!q0IDu{O>Lz@FwL0}=PJN%<0_YnFTfvo{ekOa?B?1ER5La!tu? zmWzSCFe`EB(6eC79t+NJm^cTX+59J=72^n z+`(=!zSU+s+=hXcSiodD0br9)3YAZlQ9}3tZYDhxF(Z?=JOGNs%$@`*^tuZSZVJ@v z9eu2Zt`q*`pJC7mwhkkc+-cxnnm!ru`H%?Z_3W<5Vd-yKE2FZKK?-aNVQ5B1iZp1f(v#Z#{_4su{YhrCYb=kR$B?ky>jr7r+7yN zq#RRxn^hehf@*4KhaL)Ir|%rD3@?A-$NW%x-5z0?ct4}%=#?lctM%u1lJ~^1JUHNa zS-VA;9qWJzE3v&=AK-8Z2QI#rzC-*e8>L7)tg)&^V`Kv^(H(n%@2{Brs~7;PUh?`S zxa#8Z;jlbgfRtD$;ReLPoY+L&CcDtRe#2<}7e0@2^335vLwdt*&C@rlAU2tWD`vCDc|daH5Og3#o-vgyJ!_p1|RlxVZ(@ z?jpD?TmXsU?f}yCqLID{W^M5bin+LMwyeq5I)HM(z7dijsR@P@v(jl>T-c0fpQX9* zB4|&WpD%GvSxI&^VJTl;r_Q%IK#?2+JOK;7RMHCX+g0hKAE<$4ij9rMTQgMXz4Byl zC6dPDF)`*Za4a}&o+Blid>oIiZ4dCZi(kKy>9m8VL7j#H!c`yzqB5D z+$m-vPTKkM(b4<5E+L&{Cee+=hct-tH;r_U%$qf}ORYVZHYf577&WaCXF^pei2HM0 zOj07k@dK+sqsQKp9l2ti!HxtTPi;!D8?Sbfb2WXyY!97+-U5SFnr87S+MUf!4GmuhD$uXX1&l%*?r5;vk5gD_52(yZPIRNK1u|P;L z!xZYC{c|I9t(D11Z?}E93 zi_gZ*a8eb3UyIX8$H((~aL(Kp;JPKUxIvvcW9$IV`mctu1(|6Zw{zvcy)_eJj>(mE z8DQTZ!^V2)hfQz7O+1V`NZbp5O6i;XATZXPB@NxD`b2aB1VdbcAK{{2nwg>N#L5h_ zq&YfLDTX2$L~Jee37~5)+H`8T2FO$H=MOT@gZa~AOyBm9q4l?{jlmqxuP{2Am6zE2 zYk*~2^E6hjkeb@Bm2fqpi{~7{EY@3(liAo zoM{FQ?KmCY($kN9vLm*6*_a0IA2roY2TIuAR7{Pn`uA-i@TzTGzH2!l7H7P3#T3G8 zL9gF0oWwn+p}M8b*r1w3En9(mgjJZr53h9TG$I<|m-Ui@a(QWh4M}b{Tz<1b<$69# zk??5Vd zW_FBS!*whY?BB<4g2NDIU|5y7LsV;jHTlk~UmU;{SIdZvO#+bgejYTd!V?N7r;@F( z5c8eZ8i#;@gHh%KN^ffzaDjYVd;po(BO(nP+PH9Ef<1;J;1}(yfigP0y#lQ?9RJ3dVnG@t$*MN8&4-2lKeWAhIF$eU z|9#DZvG4mXYh>TDjxDk)mC7z5*;*`FW-zv_k?dQcg`$$BFk=uxL`9St*;2{a2gCd> z)%){#f4}$fyZ^Y4Z(bM5Erd_B*{LqiV9KTlgp0Spwf%;_Fj^RLp*Nah&4U!>Ma zqWFtmwo!?;o=c}BQdG?e%M4QuqoVt<#?)-*T9c1tN!nEQ$7|5%J@Lg;ja1)|ne@!1 zXv3s(@5=~b>4S~03vKr=u+zO^mu+NvLD+|wVG=+UG#A_*9oLIQ6!OlUf@$JnQrPZ_ z$0jIzmOP~d7-Qjg)gA8`yg6D+@QY3)DaF23*!q%uk_cQbSd^;2xLYG|>KNp(wDyn0 z+_R`)pUt0mz!u@o)-;hLyb$?XFgHkd`@t_?1)g)XLJ6mNeHo-> zA1GAhW%O^iznlEYoA(4@N{suUPs8w$wAxWnFA+F|q6)}E)dX2laSm)Ze3K>%B}`af zui=27Fehi-GH7d20eD$M9A(A0P0kx&*e-Cxagqh55RB;}qwRDv`#E(^i0|YNmnjiB z_k%0w<*f;RC&NG23keM|`)kfJ_fVjzC$kQpi$liX&;ZF83I${n843l)Anc!+l;L$y z_Zme^Mu(3-1%Aoo+b4~p_gGuNcGs&b6(Hx_`y3M_z_=nz~F zvQHczV*P=p(JqQZp*8av52d-k3mj6zBQec&%gVG3L_yRy13-<3 z9V79%(y(mpTRCu_#rP|88Ae%I8DKvm`3z`)pr6YzbwBH6>u#3%&_{nq&cc?Kw)t^5 z^v;FEr{DAfN|qwSO|Ko5moHnHD*m?B`Dpph6z_tKAw}TkCo7I=hWG?Y_J#Z#6J2~` zqWdC)_H^U*fIPJAZA#Cj>sy;t+`Iq=;AC^ZX$nxrX}m0TySfGId6}057i&M+rxqWV z>@mv?LUI=D=r*Ia&?->YliKhB{a5FVf<>D8Z?+lk(I|IG#dR`z1!e-=^aRb@-4twN zx3iA>g52i*ZNmnTxfX|J4JOPm|lq~b&$4C?s%2j}x;h^Yp)-6-_*#HCta5w2lW8oiLUMCw;NpWLq zx3L5I)E#C7wD08=Ld4P z)n$ky{$ObPCi&LlmK~*&0Hy=VUFPcg!)@1NRr=MiPLr!ac!Z3Eov}V6IfTv-gpHHo z?R01RsVqu4q5fJ_3Deq^X|5Aga&M^0^Z&o{p#QfWDzFDq`g@>BbqCQZMlm#bg=^$h z&H$|5ouw1rsobNeF+ljv0!V82H164#>#K^bv3xs0T1Ai_qhcG22};S-U9_2-QIFk@ zn>U*@)@(0M^kYISPMVQ63M!s{OVox0)#c)O5(Y}P3SRb=zUoM1Yn+0VW5tb3Bfs}+ zB{@aMjnfKTd=M2x_n0M#qLR7_Ct81@l##{B;+G=A+#G#Fo1Xp@<02wFr*F=_0Ocj; zGl9%#QCM6cM_ed-?h!fpGNr^=Z85mJ7!nEj46m2Pv29lEuWcws8hz4nt0gQA({|Rg z3vYh<3*abH!k-9&lV5IQKZ?3HIMK}xy?K1&XF-BZ3nOdk^GH$5TbExMD@q+E%y2Xl zqW8;3d+#3Av(t4SN9p_>uxrfJ{a7dGaM!-TmrpKvVeY;56;X2=Xy_=G75uD$);jj6 zQU4diwmYj{K_?FKs~Xfrd2EO1>@iJ0k_vI<<*`Tu@)uN zoJbQU8YOilDQA|N-S9Zs7&I+I^n$;hqA3v_5Mf#ZWuhiO^uK0?zuP+!hPK#?WYw8V zgRs266WLMqTp++7g?HotBZhLz7ksA)3I6q#9 zLU=`ENCS6NIY;Vhm}$gi`Fk$hU^|z@KaS++%13F6(}}#aCk!UOM{^jC1VHtPLiu(I zD-VW#)q&!MYG%`vm!@T&U$*ttGeFDesnqqXtgdbY(MnMBT9f=fpXQ{n-1~qk#cb{D zVvN{%VZVk#D~g9qpY?v* z%IPXBGle)REy6Z{a--7RxX=UWC)_<;@-OhXnf&XY8HVN3Cv9$6t08SB<~oz2MCXoE7FF8mr?BZu#HY0l@UrLCPS{Q zJaq0bkh~?CdFv!zT5lWs+7Q{mo;iMk(8X8*SQPq_g!SmI`ZbE*xSD|G?x<-YA0rKa z)BbA{eXRZ3x^3Tsx|gNAP666~#>qZvYryHwPAebhte55b1383_SB>AKz(+c@1qY&l z#@jb8|VYr8O}ZGut!7V?#2wc5o8Nv z3WaGH008ozk)EjoNlxRon*_i!1H4CnbVDY z$ik(jV+CO@O^YfQSfH_G9f!W8(L(iyzfiYtF=SN*>p@B`Yq_~;CHDKpiuG6@xqW~g zKUCbQZeC1+of#INOHE_7DKJ2>j4a9T-K>Ocmo}#hW zS6d|xa2vX5Cu398JIyWa0>mMljKD)Q=EQWt;U28aggHl?XNR99=lmV$Ui3r1?3ng# z{Ewu=Sj5ZWfwG$3&q&g1{>a3Q>+J3D)Rye%N`3foh#HrmEKqy@HO?BMguCvTEq8{R zL}VadZ{Pn&8#QfE_lkNn0rg{6a(_~#VO+nY(tX+|S;N%DnEk@5l$)gO9tpK+ycQIcXi{pV&AoO%#*%N5!Vhj1GSm%7O3Ge zHAP-e-BI$|#%?dUm*t`$THp28fNQ&vGiRz%!j+!6>+j2Pea)64w+B!N;WgAZJ~ft1 z9K_#1Qtj}xy>-GeAa0^$T#@#<-DU4R9Js}Ake!e)ev2*Zn?TMa1%VaxjBTjg^X_)( z;GC%2C$CY9f1^9Tza*Rd1#r!w!FzV%_h^z%$p-k*0kSS2ehh{~5Pc2%!yy43dVEHr zIKGsIlthrO{T7o-&U(TrCd1p2#y{&OU7l)u?ZrRn4q9ab%k$GvK_7GuQsAm8Spn`f zJ}?^Tnpg~6c)fs57A7P>4RigG`vRTAStA!SJ8CT3eL;4I@8MtGTQe+Y42N~_LM1r4 z`@G}y=jRFANmL3q9VRD=^pt}~DPnx1WM+s`MMPYD60%HU<3I2?-fIS`A0~a^(Dnb# znL`0yFToi@Ofv#;^6%jt=pnd%4;<+X#|hPRrWWl6>D?>#v3vUB+i``s*p7O}RY`-! zy`#hiV#7_3ggbhYYF5x1Nf)J$Mc^ilH)*mh>Fdca#X5JC;MY3Kg+Ci6MlV!uT@4XZ z;9sCF5;brlEo-O9=4%JmMsUiI(-kKf&N}5^)ria?iDE>N5vWkNS3_hE_vf;Ih7A`r zq2-(qV(8u*DwZdtDbJ?a{EZf~(bW9z`K5aBgTlEHwVC4B>0wzi1u(fpjl_$`nS%3% z)p%8FaNsba@~pWi{=>wIAQj;xXz2uca#nHY{^iMG{D1M}NU|A4j6@qy+3MAh;CTTD z(!hd5XLa+?%+V?K7|CD>Zf1Re5U@eG{A~MXjJq|P%*wq0&_c^IoI6TTIiJ?Ow7Sh? z#2#k^$i`hB86t;_>^@;<{_Dhngws5J6tNc0z@it7w$I*P}OCR6NSp=ORI<$9g#13qqrg*Y;P0 zNjqnuy5!mr3eoAI_P@-HA~89h@ByO_D^aDBm%1E0>DOBfS{V0QVIt1yGL7TMBwwen zt;xJGVKN_eIM39eq_u0XJ8t~FZW;3rSIr5$```S|b*YqLGWHUkf{WR|bkCG*f=mxw zEVXR4j$U{*(ofk^gvPxR5ll2KhSL?)9VXL^N@mY2vQgY;+Lh6?Mdx z)R4|$^R-Ge*zDwnva>N9x^nwE7H3{$H34MBNJp;*K^{F)M#(hU#S_IK7Z?(6j}Nsc zK`hzt<|je#y2zl;%pZ_66HKcAao}h{WW>ZDIBJxH|8L$l_rc>ly8IuO-W~9&()^AW z{Vp>rB{h|SJ0QQKclT8bO?%*ho{_fs;xlZkNat6Re4ggAeEo^v)uucb)JaI6kzvcy$O6|tBuoDWK@qZFN$z9 zJM2GA{!56%J<9)#MQ8d^e0dlqW>hD9pwa&)6Ur6UdA-g?ajP_&An+U{U! zRc}pXGv6t;)7B;KrfdH-*1P|@H$$Cfe9LXMU7;>bM*Y-gsJ(O%a_X4JqW(#%s-GyC zMJ^pdHt0z@&lD05Pcq^h3pj#!Shi~_=#ui0+r*N60-_p|vCCl?BiSy6TmyeO2!sTY z$U1e(d}$z9WLD*kXjIOr3kNBvbBLY}OiR#L8wBGazXqY?;n`!2g~_g%Y0fBdaCt46 z#5_LWIz>Jm8xF!c7Lju>3!V<8&WOOwBl`nl=eb_}-&ol(K)?(?)L;XjTXj)*bM_y_ zqFAcN?-6AL@%Ocr?bYy)8jI}=~4Ebry-8luygUGNWUYwi{O-yF^S8;-hyx!4`62UK% z2q=8mzZpy*M*P55uQNO=gdok_3b!CFuV1u(UDw7~)M=HVi=(iA~ zKP8YCf9N8o+csdObO$T*p(FX3QLi=}iOw?nZa9!!!}Wv?E#oQhjBo3yLpcb^{`R!h zV0U)C$*Y5rL(B)qErN*jVMF^_jm*A&>Cy`4j0?{)an8go2UWS3HQiN-yYhTVO@1?n66blse_ElV<++SHL~(n{BEvpK?0V`;BSU|C>#Z%&raFL)gopk2m>V_cbw-n*MgSW5CXRcxL#DS=F5(r1I^#OK z^_tEL6Vq(f%iHwtI|SPFyWerNPMZTpLxhde9cSng72G00Xy2N3I#TQ93X~u8Nu}!& zQJF#!G|#D`rCqN3KQXyF;ThkQSy zL=UEPfTVCZ~ zySg~AmR}xzUbrM<7B0V4tDvDX(;T;1=qY}vnTEUp|3G!Sw0_cu3-VYOB@o}SD#@6LqnRIt za?D10n*S)Lb39(KjQs7hF?{!r&t^`}B9#brGkY@`1MqAgDbw#c*mI}iFMs`hyPokM zn+>?4{kP3#Xn=tZfQtXLo=N1?M4^joRUhw*u14hdwt~bfXCc??)R95bL=G?yrn}+P00Kr{Zj)K`gber)ZGZ+6ST1P_G8`gkkc^bm2vL zQf%emlF=$NFQBCIUh`}6CN9tG;dv_Rdt@vM;@;{1(3h6}J;vv1Mb{?jCX<}lDN{ST zG`V}L4sQ7=@D>#E3Dj$+>Aim-Nv1$r=KHH(2t3>Ect@!Gyue{VmD)6t!UorNItEMj z0q7MVk6yPKWh{CB5!#F(e^9H61uU#Mye4xtN--RLbJo!-`@t8lVbApM|JOEZ0lwaQ z{x*W>l~v*Z3soUgYXGl)&wo2U)fF1d&!Z9O#N!mOv_?un@fgzM=VpwG4ZvEUyDpKM zpk+Y125+QWsYY|GoYpwxics616^f48Yb93P^&-Qbm0hICj3y!qO2)-mKBLpBKHj)) zuqfB_lQMh&ed9*2aa2c34xcfOlB6(*g%22rQg~?O9u|tJ*Xb#kCZtY<;aNYHOlL9L z2K|OObDd;;B-v_1MMuI#tAU>DIk^0Ugnvq>a`27x$B=%Iyn;rY&AjLB>?*RmbYJ~$ zsfI27YVdMB*w2}HiX2x;qTjL?Ug4^4Z&ER!l$P8|dwMak7xQk=o|*qH^!3n~!1CfV zaj|4^>1mPuV0M?rcEn;5Qnz^>DzY{b*^Kv3h?k)ftFOe0d$gx4z8xt8!Lh(PoOU)aFVpI*_cF2&{W z-k*{b3uIg!kP_&>+ZSatRAGcG(D!uIh8tskrOvY#TVxE=E=lqW(zA;CB?S_SKzhU#137k&b@8dY zUJiM7)L7|_&~vSl%rFl<73rmr-7?Ja%~CNtF$sRr)b>$d6R~TA^E)vX@BsY^n(N>g z6RHtk$pdxbA%`j+qd#kr&$N6i(Nu7ZLdDcA58?X3LjpCb2ecN#xObdM@Xv^V1I4*& zH8ydv2sE7kK-cswRwY9CajfktvRoi9(#1nk#$}4S7B6{ z4bHk3aY>ljy<{&&2!?MdtNbQ+5RAw!k6b`;sY2cI`{Uy5=lS<7NBGEon@DqXXCWINdll-lMpAPQ~ zMVPnx?*Esx%ujd8b#v(w$9a|N4`Jk7_%jfLSBLJul<8iSxrVwiebR{Oz;u4I?SGoi zPx}31I+xi>!gb7c*A(cM^Eo9t4R(hL@gdo#2|E1?SsYq@TE^ptzVOkx{dPuzrt|#~ z4z3Iu&3U%3;iUCcDtywGX~I%kuL@_pXWlAdXW7z1k2V|7aVTZUmUX%90CPY^bv-3q zxpCb1X^RpXdA!kK{b@w^gB_5}hO&A=K0|akxUZ{!cZhVIY#qjQqiZGYu=I4nxY6)E z$;}nx6?MGcHRBj|!aaLF;(12XQ##MXM`x^69cqD6Tfs(!bxyg=U;|K>l8CnFCJS#- z2Mce!6}0b>-)EQE$mgDBt1o|Fe(sJX-v&cL`0xo%BNR?EfQ_yGf_=*Nftv=M3N}%< zZaM%>^dAv+%%g?@_K|WOx_clzjT5FUF+4l}O2meoHy5mj1Ai&li3Fi5V7FEXE=GI+ zw8ZoTyyq5^) z#V^*cx$Nh_8dTx8C^ig*`X|i{;WgH1wl=RQJk3+9r`$jO#ZE3b5YWuO*~H(p4Tc5r z^|Eh0;c9)H6#XA<`9V#+5p0B4Bs1$1D_K0)+&QFNBMGF@z*RCsIpQ@Bop$NQOQx-< zDwSK@m+Es`Rr+?EkbHcXJD7x_8H%tkD6MF_hJmlY6W`F5M|i+T7QXShCexu-t2Tw zko&H+fi{1EHA={(;lEoqw&(MrYz*=8EtiZw74(!g(Ls$DQfklYH$0~I|E0=-{jZql zJ$N!eG0{P@1Dv|i_|>lJ;e;e6Ov{9$>t*KQJyI{*VFQ-=5AsoJN?bN~wUll0UjvTsq~RAIqB~QS$@S{tt%f zfOrRI{N4J{YQXd=!#v}6-YW|FzU>a8>b z;p&wVrnt*7r|zeyMHbkgsM{y|)mUT75UFvo#lWkRKX!KnNw8V!N^f>iN`rP&az;Ly zN&2zevg_{d3x@d8guMq?7W$b69xcqZqB&B1ltU7u?5#=wX?HurJQGEj{Pc7DoUHq+ z&6yfnJ_s{7bZsrRaZT9wTXq1!9M4`oGu6eg9~03?1l05}k1*UCZ(T~wAc2-w^43lj zyl9(Tmv>vGoMcJp=FwCD{G4(o0Ou3e>6pqb$$HFUteFgL!|gJ$q|qxH!Ru z(bUo~9`Zi3s+hW?l)|ZvyXfvI%D#SqD5}Nnnv7&u7-tRWb^IbDmjxMFcyyWQaisKU ze52W;e*3|Yp`F*NH1Wg0`o|u%ynIVG;l4#zT`F2EX3^~H-F`3eqy+tR?jsw7H~hBG zsWMehXA-^+D2Ex&$R#tN?4-`BZ0nUa+#Am)x*{l81#AsRQgV7`(EHDEnt{!u;(pvAA1&u_WXA^6enG?=}n*qKZiDn){}ra*-D(}zCSGQMYq5##2R zxr6zHPrscEV~C%6(fxxh*<%)>I%hc93D8KEexLjdnEeWEpW@nuQJ0fQ^p_ht+Xh!D z6#0}og0d1l*8huPhsN}<0AgLf=TCP0o_LIUCe~(KN|ghi|J;bZw#|*4yo1bWs%3)NUOX}y^YJP2yzz-?{4l-EPpbBSme*!)(RxaZA%cZwY%*(q{GQ}O z|6Z8{Nb#Pj-4*Ry{3P-8uJ|)r^E;Q&z5~gOf`+MyGy8S{eae=I*j`YlTu%;|BHd~u z2R?(n^0jSyg!=87QDp1T+>AR$_v>OYCXMwSEADF4tGAJfJR;t48}*F+Ui&$0P+3mM zxYX1uy_W%-(0Byd4PZCih_XpRyT`52cRvRpKr#t_f5EpG53WNnnApOe{jraFm;I8kOsQfAFp-@ zj~@^QIsUpf0gI>2Frd0mllmDZf8B-v?YrGk?zG^K{iD2xz{ZwGH1nARE;^8k)qOQ- zlu273z6&CV>WD72vuOF>;O-QC^%ZCYv{Oxm^?X@PLFN{l_SE|ckL5SiAn0SeXDA!Y z06Rw6|62}mq(htv+sia(N(0@uJBv=hF|LHFh z#wAUX~EhI}20H109?od+@~UuCo{~Yh1ZH@PGzG6k7}3j)Jth-R_T!Qhf|> zy#1R$Xou%Bn?k@OS^+ml`Hx(wB);0BctJn4{8v`iQJ0}~jRU282ModiAYkIfrk=oz zOFL7*3Ofd55VGUlANf`mpp;R8XdbqTVA!Fiix*Mg4gBI(te_I!adO;75u9jXtv@G8 zGirF)e^om8VUxJW+DG>5`HXNe6&IIN(oK#=*{$)duT62kl!Z9*k^uX@3|F=Bq15XGTPWca0cwCb7O?$dj_K#h#RArz7A zMRlp3{6C^jOdYewzr8Y2r5<~Y_8Q6X3c``$QeOD&+(tA2;^J6SQJju`5mqN8+MChtl``AoNA2Vf@gKx8vENFGbI`3X$}IO z*_<-zNh`lj@7~0${%8N^0eB_3es`C^6%PUi=2L)%yhhcV#=;vcrnbLGU)1KQe0$L0 zV@9KH`NI_)HtM3q^^`dZDBxrS1)OKDlG3Luh8g62(%u3_QSvrP1z|hZEcR%G@)oCY zb*AGx^1wHG(Z|?5a-hZEwGWxTDlu3qAN+R7uD?0RrD&dMPgRGIx$Ai^S0LX{~J5}pk>q;fl9MR#iBE0-f zA?{j0wztl&q&rH%S0oOyD0u&%G#$}sX@x}QG%Cb^93>ntmdXnzQn zAm%%xP@|0e^K$wM&7|F8Zwm)7ka7YM7TpHYN32HHghyrpO{(cKa$xbE1op#<H3Q zFO-fNKW(iO~$Dd9VHhE(uhXF6bG>Iw8V7w_=K%)1n&)>OJK?6KM-=%31qXLg7tPD4D zHng9o^Dy?rI|%uHSy-(jjXUof{qN{8^S)u4c=|IrWB)UlGWxssbaYsXt^#L;L);k5_L=3#2?tIcVjg~NoRKR( zyHN)ncVfgz!oX;X*N3(v>-1|gC!-`krO=|`*UU5;-s-TurM``(PHQck zKcJ1h555%Z1{w8J%itTPHRjtAz+F@MrGeH_{p{a)@5t-+AnK+Nt%Eg41oI_rh7`u! zv9RtLqz=hz3E#gG4}= zwu-z8``3YPiu)5#E{n9XS_Q?fQVt;|{!_=#P|5?mw>`VF&oF;LMMY4=V)K2DZ$x2# zD01zPt$x3>4i=%n;y-HANo(XI>v-LKL}a++FeC}Wx2dK+HCAyS;8$rOO3;N(BQxjD z4I9RG9f)HdPy`xk=9562WPMHTeaU>6mYgO-J$uqPM>;e`H?n4r{A>@G{(cmH>>zkD?GBaM zuS+nCetbfBkK{nLq#*zuhn zzF;RVB!l5>#nkrn^j8aj^K|Gvf_-$!w1^1?XGXMmVP_D8ND>Nm<&xgd9%5qXtW?lD zwEwSuIm4ie^mk=&E{5?B1v?5V*r!fyJ~l=bJJ(k~96ofQl=+=LX_d=dNR|*L6~C(x zUnu?Ulo5b?a@T?cY~#Zb%b-*S*_;N(P8=Ma(0N}u^%x#q*56ak#HHvr_TZ&uZnUuf z5z4@`?@Cxvcd5ARho4`LSf*kg@BUt&0Pp{_=SnCnvRy=zZ;-u4@FDMbNjRuMGqw%J zn4u0tDfDHr6a%2+m0DX}+2Qh2S1bIATD(uJ&!zNO`ZxCxx~B06a-u)^p{&#AHvkY(#2ruXR9 z^P~o$ot=|)Sj4D`#4W}4BhUYM3*9IES0$@0eYOpX;J_(#7F>fNv3{q_%eCX_2ykg6 z)G4mhg8IGU(B8kTDF>JLAm_|W0ej~ML1*EHFE3jUx6>Dxw}lPv8`L9T0i07=+n(ZE zp_b1Z37A@(bbNd`0z$&VjVqC^~sBDPTl9$e41f%^ACWi`TAwR zMk(^0f9Hfx5ru%iD}K_Mmhw-(9Qr8aB>`=$@mMeX^cY)#Up~89;3g?&l~vq*C1|2x)KlW5ntYD8STdniP&PMh$Oeot8)Bb$vX;I#rTHx7Y>L$~RQy5Y zM3yH}uJljjfGcG|XV8sGd(ryU$n6BD`~v-9JS|XL4{eIKwWe z!7KWu486wGzdM3|<3l=iLhy1hjP{d~7>q^@`tK<*j~WE6Bn=;ddwpIE`U*T_mkiKM z%Dy9F`MY19(#}SW!&%HEt`zKkSz(i!o_E>5&CI4Adzm{*>&~~;-csadYCqM=nnofh^;#MB|9X{a9V>S|{0z0Ko@; zkKJua`n9lufgq5anAn`@qc6!mtyV+@K-|e)GXZTx8XUb8ba*%)kmJs-Ct#;geO<9mV*ddUkfJ{sEomXy*yyyK9he&U$+1H+@LK#9W$>B5>HibU_TIySr0 ztioY&lnzK{W6v^s6hx9Vb2^AJ>#}{w?`gZ44xJ>t?QTWc<&5-a!d1(w7`O?5a{LG) zEN}{!nA>ul?^m7}y@*W&a$%+~h4se@t$NwduyrjLuyAZe07NAclwp-CEJ!p__wIP) zGAQul1rljg+`F913*q0N?t*P}cRok#Qah6&@PcwD)Xwi|zK^ky65dTS*tzOJF*rlK zo@dM;h$!3W`4z){JcYs5D0i`_Q}u>lhop*k+^!tZsTw~PG5L59H12A~4L_fD{!x{f z({$*D%IGaa@`b~UFMV*=p+7FK5vT|L!N1!>+kcx5U^swIjfhwYY=yKty6 z7mNhCs=>&`^G0{2^U(523+F1F#;Y9%DX-*R{_3uBXx8e+WB8(i$5dundvX?aU9db< zyP=5)Z{e%0y!tdsSsM^CMySFc%*D=MQuehd`5ewjHGDW^t@}o7_qnfzjuDY>lDq!r z&r-@!e8k3wJUW^d+BB!1iQ!1&Z8Ikb%P;0M*Vw%rGV)x6wSYzzGoTunje4~@u ztBf>#?2dze+&eW?8pM4deo}_U(%A%=$E2LZC6VMu7S?wALN<<{OUWvVGVK#JTXLcF&Z z*wPQ145fz=fe_~~>^Uf#$R|2a#q8Hd$0=l{TTFc5e?==B&fgE@Pml8L(+Eg#K*kBE zk9((mBSHwlv7-z-P9(vBR>z0SSe(!)gh-I*FlzA}PlRI$V{hgzEnGeQLRhsMg_iv% zcwU0HhUpiAecxti5cUi@d`qJc-J$QMA*5%*9TvD=9}1mex76ahr{6x zA)1r>04t;LjbAV>`fIu1`#SdIIU_40gEbm95J>yHXb*wl``f=Q;U1DSv}EgxZ8X>}#Tjh+nNEX3ncyPb45=nAaFwY;uM+$qcl zd+tZ~;wHmBH7|Eu8$a1FKpj0BE+#F93u2eV^W})V4BtXg5;~KN?ICuaACz@$b%SZE zL})E&L((pFc{5>QXov!X#O(S%XNhCEv`;`HG7ct0Q(56!)5sNm*jsHsU-X?7+WYu9P8h4Zm6Gok z2E*s1V=uMIKYln?UU7&m|CbnCQg6Ew%xk`FRr%%zK|*{7@s}4)ux}E%9yy$ZsRot# z>4_-hFkPcv@uYpq82&DJt_WrDUA1}yRG(g!P(`gHloPj zdv}Cyt(6H0+O*GSB$(lBk1aGQ^=9i{LlhT6)c24owk|1yXU*Bb2{5!1j+>(6^e$=q)hGf85C)G9Od z-q9=n@$AKwqqq9MJBUdL5zvE~9QZ;IzyTj^_$7$C$NjEga|%{2KTm=?KT24VWl52l zRlo1Eu8#zROPO%Mq!q0nlx1|7u66ll#6l~@uoITV0us~BFuLC*@3BSz^VR?#R5}KB zi#mF#%Xep6uM7W0KE(nV?i9!;%MOI|zs};I2SV(+YeL zErM`sc_9{M;)la1RjX%M6L;d?rKIYBJw=BOY+7nx+=#AbS?J+Uj zl4CzB_4LEOMz%W=Xgk419O`wdi(d$uwrxI}L!}HucyU<~K3GrBBXOU=uqsN^_{T#c zuD`@6fUT;1AB^5{nA5D@l*zK4Ord#MvrlGe@5r6WGTy`x`=dxSzW&K8v%A%Bn_DW+ zD;Q$-pXhQbmS((@eG#V&yg9C78h_@l3)c{WDE#`f=8fvY$L}8;6Jx#c2=Bg7Jn*d! zSk2UUIKjQM&x&ONgj3UfYe&9K86`=t_}1YVtjQKNNjMc}%bs^!eBLqBXfecXo5H5E znHx+Mv-k>TRA?N)9H`{EE0SQ0W4UGPL~m!O3hGtAu~Mi)(de+(%irmjv4t3Srx;H2 zO@1O7u<77B|3EzR(!&IR2~mLO1Dp_N%kH3IHT7OKnx|-hwM?|1# zH-#CDp7$^BLQFJHsC}A34A|eL3{~+FK0Y=-x&=PCu__2uGnAzJ0YXiZ&C~D>-7398d zK1ZLvy!$i~MaT!PUU?Y1QcNAEr@l%vy((T}HhZR&mAoW&$qGw82}zS9BLoHJpS>z` zKyuw*C%%d4<{q6K=&t*|y$}5GAKJSRB2Bz`r4Fb$=J9Q#P3`qfY41xfxJF?x*iV0d zecmBG5?>7IIX#uSH};tVaf?N~Tfk0JLBWp0h!2i^phYMWCk=St>U{3gQW2kI2fY#V zyf^EKW)POT-x=|uVF;k-H_Y+7g<3*BqI3Dqw;hhz|7u>lMWycQO^q6wR7TVSB5AIa z+j@lF78slU*_f6~Fq?<^; z_4vip>7jMuDrnJU&rSV?b?Dfl0_oBn0cJ+2vhkT~UU54^k@8B^pn6PH_o(3>xVOCT zIZ~3BG|*KtqQ4S>XnAIJo=V*m?8{s|`zai%pxMGG5=-K`o9+AFUj; zM_UeQfQu{{pUQD9prV-wJg`Scu8<%-tOI16-Tgn~AZhKXzZW#q8h_5p6d#*ztKixVE zjTlPSiC?C!s&>XThkS#qP%4tgn`!cxuL0Mh84owN!4Lof6C!3AuZF5~Hy+C(BrshH zGVE;;N<5(iK&Mi3>j`K^UJt4BB5j%)=cji8mVol~o5GT8D=Im=IEeJFu`h8^yAw$t zV>Ln8D^@e?ZLVueTH!rYL;^#|FtPJYA2~@CX^l+EoS1r*(^S@N{j~mmN-z$t3hvek zrtMYPZ=atzY)zs~snp0kHg|fa!$NYDU39cuOYa&d!!C7u&gW~J+BUWwxZF2*_9t~W z^6RgHZDO@`>dT9WH5QzWiL=l15r5GYYl#x;e$pNfcF_@GI^V-f^F{3&ff0H$;o?wi z&P#yX>^04PtCwM2<%4g-e zz?h|!^P86$7HmlBZEw66jV9}Lf2)u@GM~)|G{&79#lTdev0wlF^M@4S%{8laI&wV3 zeXcnw)w0TNZ>ap;k(=_*clSP7tH=f67<9#tTh4mJz-5ZNx-i4eMk9Y*kG6(>mFr6Z z9fWqxW=VSERaGUR|FATZ;)g;DpGyV>q}xUNlP~RiseheyJVcTd&Ak|ldEI#Ap^~j9;rN#Z1O`B-rO4q(zsGVn4Y^TtrA2GQn z%AF;eDw&pO8IX{;Bky?n?u>4W93&FZDJ32{BA`TyOuYZJ<;?CBpBIw(Ue?6+lX(K# zME1nZmCu1>_!It1ZvsZQ=)~Tz_?8-Wa9$wxRvx2O&g9T^rPVZi9$hWc=^c9m_!>8n zwQK>>dX{6M4GWrARzb{T1|I6Fi*K#6h{+u`ESEvo^n78AB>ZP{vgBcv}HUhEA#D@!2cW)Gj@VkNNcLr_y^9 z*nqtTP9Mf!S8ysA#y1Wh^f!lk{|{?#9u4*XzyCjH48}h8CCk{?vKHB9Y#~Hi5ZSYo zENyl(c0xoU3L#XAHd2(bk^AFm!cl9m5ySu1so&uekuxk-<`Wj$e(XT`(#bEhe z;#`a(X-B5zXS<4=k)Ed#HHmx+>cGjY1AO;OeT*J_&7?v!rEXl==)HL+F1(q;rhbs> zQ+vrAH5kLvuX!qtqbKDHVBqhYA~KA-wfGBdj1`v*Nm;>yN z0959oF95S}qgo;WPL?b{s)JrOp!@MF&e#mc+6p}<&K&PxozX)mGX&9oN~2QbQ#Nbr zbmBdb5d#H~Ug%KXW3h2``$YPi2bldf)aU|Q;$be%N7HUyaRiTUCJOpik2$0a;LY_6 z3uSGbt>3zH>^xP}v0K-OwmW9lLmfpQ5_(eA?6G(ngvH2p(S#4sTYr^cs8A31oxIMc zI1HVEiP5GQBRY=GktMjErabI@D^EQk%o_-!zj^qK{-!2&ZDHPf(41t8BV7=o6P&u} zL_Uf{g@Hen(PQztfEYT6e%xLXVa_X0pPhU7^8c?NGAJyAdjt7|=MseoPahbIDEyF( zCye*Ofm2lOpePD!!Wh>0f;?Ai!;3}?n=nPOHGogRxJp#lg{3IzjLxn1j`w>+%Q*cg z?>yXr2zdNgii7OB(^DQ|n9ptL$`4YB$FIkZMIcI{3~n;_YeMSGTHLopu@JqjI8!GLW< z6)*)Nw5Uqzs4dvK4Ec%plhe-3+s9s?z)UN}FjmwMd6Ob*^g~uBZ>~q;OP8-)g`Q0v zHg=P#b zmNQV$!{zbn9V|OWYCPT;ug4k^)qug{tpvJumS@xwq!pC>1d29GdU>Ou01a->7ATgj zQ&^Z0m@27h4GlA01it!3ivU5uHR@ny3S3l;ALhzDbs0>Rq`hDSw?`ixrGxADcuzw! z)h@`HCm1R+l^-|t+YtR&|Nm@?ZN0$G%E1Ww?ktXGclKwvQo>s=#TjuiLA>p+`$3PS zsLjc{5&W>uk;s};ELag&Qz!eF_U>+Xf_kM1yjyOMM8%?t3xUTPV2i7;#;}N3(2Ma7 z5t$ku3hH3Aq*^x8W8qm7B!qWrhayMp8HL&nu&8)Y2OUq}sInHOz;rA7X+)OeKQ@1g zAMh%pFrwNnQHJmn3!@U6RC20djG|7!o`48U?LK}K)(xIJ{ybhX0o(N@+4mbEwaJJEtyBIn>Lno83wI5%U*l!-7}2Qy%eDcw1A{IcM&6`w zO!~>|M#~H&n%?`}v5w7vC}Ex7xR& zDe6SH!-KH*Ho%@dc%w<03%?dm1gzfj+Ntaf2NCoMq?{;J;O&fZc0{NR$%YIhQ7_$g zBX_Ciypeqo)3Wsv7&cADn_v3510M4AJkUkHR@@qRewq$Kk3J$LI!mu#!X5BB5^UNw zLlSoG`^Z?Jskwtp7mzSycV4~HlwXElKX56w0S;8bqms>BhT@;dwW9%~s9Hk_M6G}T z?n}wX<@eMPAzqo?y7X4v8FB)%cI5_P=W4I+tkW1t6h>>T^zN8l;5uz5in12ZBE`q1 z(HoigrJp^gAk`3ZZ}&-AybSr_Ot&OgV6c$Bl*@wBU!}1Ro$-iyYyZ+9F))BK*hrN( zQ6tB34zjo&D~^jHz?}{j!96*zFKJ%H#o<*t-=-0MK{!tIcO-wI!C<=k+WT9bQtE%V z-c+sVOBfKBc1GJh=|(m5uslLvGoU#trA+;<@14$VY-IGtwzx+)ss8~4*_HM?Ib=Na z7J~G1=U=|cYi<4{Lvgp(w7s>`0kvHBw`|R)a7X^TC$?dGfyM}#d?JqYK1)hpBO!kY z2?cc@YAP95a*tB7)XYn!8JHRV!vzZe6#c8sn@i~j5w^7Wg4gCd)85V=>NHD$)=DS+ zlEDJ4eg_N$w0yPfpts7=oT{Mqob@9(h>ytX6q9%Dy@q^w^NBeCEc z8oXpw@SbH@u)eWlIj+xV_2?S>$Tk0}OKJNqlyI2bC)Y^xJ-aXd{kgVlp!@2_lO8^| zxEa!}HWMXg!6$G10c5k_L;Ug{x?*LSS{VjAhCP69kWIf`VHkM(h~=Lo_tC$IKw4G6 zUdM(v(QPe*|3P96mA=-_PCC-Q_=@76%3g419r=G2epVZRhP>P%!Hjdeo$_r(Wmz-5!pE1A@xXO_kC93n>|clJf0>EPtB{nXp<8#cD1J*+`_fupqb#` zKl#t%>tw}mp;r4277Nb!U4i>(M0vGVnN91p1AE$t_USY+>-1{Hp#;~%zwDc2h4#UT2&4tkC6521o7v~VqI`n3+mii68=;4nnZ1E8Y;48!p zp_qdkg?5%;O0>9Mvz?54OrZvH^ncD<)7i&{zW^lai6t@v2DZa6JlIh>b@a7UA}T_Q z24ut!t&vCB)<9%la4$&;W?}`*J34c-W)Bu4_zw$|CCB{KQ)*LsqD}AoJst){%5J@( z&uoxX|MeI?2LL8;!3SDebR$Az1ZS_h7lIxvNiDZ^Oel&C3TZ)O*`9<~J)`k|aJ?0A zR@;`d*LnF0bL>9jAHDP&+juM)_a5_!+GA7#8ML_S0h#4u-InK#_IkhpStFt@P*uiM zJ+YdRp$LdQeLbs9^CV!Et!ZIK)TL7`t*jAgvuO~ar>U>$FAvL)@AG&jAQj0MB8tE6YZY z5M;uF>3cujHGgxy%#^+CfXgXQ6mQ&ecnH0K-p#tpKz^=7qWy`lPlSnAdHeeEQrF_6 z&;x4Dx5wlj?6wT2&{wPLn0#f5A_$xr9u^5zZP$JL zwzHH@zLdiqL|7s-AM73Ilv;?77gDeE@kUflk{Hgz=nLQYLI z*pRuE@ExMN8XW$S^i#2*GI~l)u%2fBEM6SVCbFAPLgTy1%VjfKBnPwnbqw^(Z9z&~wCfZgCySTc^54X?-u24RlzXa)yCTc?;72w( z$-iBx`nZ40B#>a^<#h;_I37XvH5=l(I(bjNpanpXkHYi>p>KfG`F;~H%vPx9Hxr{r zlcD6ARu{==BO)ravfec*xcMw+_mSX_A$;TO#A!m3TPg6OY|)m@BKx| z(hGF*Q^aL2HLlojNb*s)kWO;ye}0zm;7ji7j#b={Lt`f-a!CVjq0qnSAv7k`lGFsz z*$`$i_CDHDf>eaGzLtNk=dsf~vV}J}nBBRhORcMy=7?wJkok$s$b@FI`PG*!`x0i9w#Y%g$fN@vM8vj@-+E5!sfK{`bwA^*>tRP)4bN_#yZqvu zy_dKg70JbX{sl7s`q0(#@r;wg*2nAe`XA-B-r?oSLEDKo*93e(2<^i>+)L>9O^2CD z>qbSKm9M8BlxpE=Aqqrltf<~JNI5%m_d{z-3Ci9Gg;kB$Yg#6dWdAUvP%LA?6z>~$lBRv?bglPulpeya{5wsH%V)@m$_huLp=@OyiT zAe&6Xg79EnwIM`#{fm}HqI`mvaa+sEH=e?bYhl#g_AlN3NtA#KP_Q~==kx(a+WGiV zjJmZT_3Zv~qG_MBpy66h;jcJ8II?NhxD=D-ELsL$eh^Lr+Pm~TR2Lyq7}2DR^^VX* z7PN=mMU}7Nh2^9k2%_v}ZL^nPA%x6}KX_B`kVtQBiin6XV7761^hsNX#W2uGh?IS9 z6neFZne~dEdY(t+la{A9M5i9KY@Qp2j`I%`G6{cb?1G&y%)1Clx1krk4`TPrfo1H% zYOqHt5H_)wzk0+bCMqYQo4^wY)O9Kq76F%hz4;l9{^XdQM5-{US58fB4xu);1enJa z3Pa^yIQ6m@M=p20a=j3bFReQlK6Gzuoj;Tnli1jSMCOX{&|k=4L!YO9EHJQ)*; zTN4oF>MG-bet!neS>3wz)C)oPZcrM)# z_%}RKwS7=w@J$y5I-=!=vV>>PG(j!rh9ig6JmHrrpAcT55^el+z6{cnYUE3JT5{{P zzSNE`Pg6{vAMG>y$N2|2ehAE};HA%;h#1V8b;>5pW*H=5xAq&M%)3Ah^}AGM zVgC86VR=&X3YomTHLzC?2qRR26PrFQ{a@P;o%N9re4-VO4w5<7x!cxw|)`AjgY&Vtk@pVmM{r z2~(k#QOFM0c93W43Gz&@YJ(_((b9+qKg!KnZwp6U{hBWIv#s7{A%o`8iZXt!=`+2M zc@2Gb(~?u%<-0%3{1>AMQDkNgRbJaZ(x1uA3%8-~A^xzlUxe{~iHhL8XJomU{u!q|tg<>Fecb#O}){ z)9OH5Z+#ETvJ|lUj^zJSY<{DM-(_K)-l|^zoc)96Pv~h*ys{kU$*T*W;?sDrdw@u& zcZ)~k-6P2!ZRu*h7ANYO*a4)pFd05*KZZ6(!c3GjxJ+*dCq*jx)0bmpL+bw%8u|5I z?zaBlGcLmj$*^rdT{0_yvOe6rNV=!q=XhAKBinQ;b;M72xk-j9!)7{}adhc)yoi)a z^+_JJ*MP=V+gA@qrpD-bTgC_EP(u@(fvDky@4?kEGWK(` zrjt~t*5Mnx8nIa<54UHxz(I%!h*5aM^4(U;?me$ZH|MT}@OV1;(~Yy2Z)!g>Eq2#4d=H1N{w_Rda`GR`EdyH!R?9A$EBj!LZ}D!+&yc7`w^h= z52TtJB`uFWp;%C0-349^95^hjKPDaZ5HWjI@j--8E8Yd9golL|6y=3lih&+qsmF;+54NrXA3Zl_(=U2KoNds zXbbw)??(Pf2nySI$1k) z1Wsk^g#X1bZFmdaiH>ya7l@_zdPD^m@op7N)9GF{p?i{LO53cWOJbH2j#O@JQ43n7{#bC; zz&r2N4zuAqn=y+9+AHV8Pft!+r4dxce2XmzB?YuTE-CPWM57BJ%!sLVf+DkCeBL;c z|1y02^L4knbyVnnNG;+rG*qkw0%bz#zWBtVZFL9JeJx<)qd`>`KN|j)`~6c>`ePGr z@mDq4;vZhdJ%^RBB{bBj(2h~>FA(p;2cY?4!X3@qd62C)tgq_ym+SPuQzHpWS$IUx ztL!+UoY5Q3TaiPzBGxxhY_U@R;uVPCyHt9|0sd;C;j+r)R^>jIJ0HN<@uDmUMB)dF z@Inp~cn_Z0s#X)a#+zeJ&KxX+3v0<;oLkCJton`473a2q$+P&oN5bOxV{~00U!Tg< zoxW+>=2hx_1N#Fprt)U+3yqf;`e6yDC{u>@hJCpN@Jc0LccAu$Omh6Hf$&n4ex*(W zTD#d*DwbJ(H}l7KOSN$@XVmWyk~(K~^kB$5DEdg!E6K%Y`=}yb{IL&y4~N!6@)oYI z(cAC6H96Qs1>OvOP?F;0lTUE4*vFgemn~q>?S43iCR9!6r)sktt!LdPkiPR>$psE0 zmGOdUvV{_bCI%We^4Ok;qi8M89;m;F4Bgo4)?)OQ(LS>uZyqlk0iv@y$h zk^&{?5fh@n52nyCbJ}Ln)xp8r6Dl)v+w#IM_W8GOcycL|2rY3rUYN3t5`3V-{YhJ! z5O%?7wN?M73RE3xa=IjD94gx(jucRM-RbES?|dOSH3r{hU(;W&8#J8 zYpjt3h7;eJ^ldtUiOl1t)l7^(*^MRBKu&_J^?UcE@+ER z)Q`Wf?bC~)%41>}tZW9$UXjMis=dyE)2@;bhw?f%W zM71P_jITjFQvneTc4RU;k@^v98Q{`}aw0dI4BS#LW(eGupt6l;Z_q(_Zoe#apGVT2 zCWQjykk!=T-F(p5(%hoW%YK6UCe@6iS{29+^fH%H=W}YfB-{81ID6_N`qT23YbyM^ z#B8{-PPN|6daM&0_CG&B(zZWUb30n9DdX~4GW-EoV|Z!uWj&Qy` z@Mf{SiA7g_h2$VqmL!xda^9}89{H%nDZ~S4^eX`bi*BW9^yAX#A1wk2+B7dRNXV~q zGzKIJmNbuBuvvEC42RciOmW>QVk@XbYg!my0}yPiFQV=`=5Osd_+ zcof=ht#e;laO`ayBSrFX@9yhh0_Td5_l>0(BVpEA<)78tlqK0CELCohvmzHBH8_%L zjZgHh?QY82nvMfjk@9wn_0jU)mYES-t6icBMtX)*FUwGk?>p0BV5{r@YWm$ z?A5i|1e&qhkva=KUPVlP{doo(3eKqiIa-=h2|QcL(2tjWu*VJ;M%f?#)M?}xx-O9r zW=`SDFo&Iq82;6`HPN7$GPJZ*_t`v+$8`6i3_R|1WUP6be@H~Cs?I%Yj}J`U;4RI$ z!>KH$Q#9OU0G-JXEF2`W7-<>ZWbD|2F6A4jf$ue$+dY~FAZoV3OYe%D&nXm?+CSpx zzbOYiYk%)Y#Chf`i(o8578yIv%Zsl`_BhN)8{I&d1L>Dgl(!^2T1#;#+|SsuEv`pyGNSCZ-w?fXlOh<$?kXRr_BBFp9Vjg<>#RJ?(J1)Inb?uTLKEY zpKaI%va%fDr^va9gCS(uuRQebw7cw1OnCUu;V`GVCRJ@cZ!b$%4(r+Ajs#)7-Uvty z6|wZ@GgQLH=F2a)aYh6=yzK164fWNSWBPkL@agkW-%eIz;B`!d9&Ew0PC z^2CA@B^2wc$l~2D&Tsk@<&F3@=V>iZKihgDeu|uZ^JhuFk33ta5PMwM#49#=xyo1g z^~Gx)zFRS-ede9;$}0lpoY_@plFUnr0uUNyX@$FMwPAd+@k`mHy#9lHDcqL}o<1gD z-!j~83fS67t1m}UI+MMUcDaWq9Y=5_K>})DN!?*>YWDYo$s`i1r^u{B7gAdk1J{_& z-UpkByJq;ps=2b6zwI?qw2f|}G4DB#x0xfL!oOeZB@f$y{7k$ce)d*xt2~tyv+Erq zMdq_b2wRo!b$-3I!;<1^Ztw#AgP8UQ+OkRyU1_k3{rkDtJ}0#dh-oH#Bjl}oGeg$$ zARSpNb`4OIuZ1y{x3UxUoF%53wg7`4;`8 z_FU<2$#g9T)8*qMJL((OB6|*>CG790?w>k{7 zoV49=UdF7Ya0F;Nj$Nt1cyG2i$H*kc%vP)8Fip%&%F#;6Cd;9*`1AHp)KPQq)=CDD zXEcAC%ujQD?LlqP7wJUS({GPBYOYdHVE6gt5h?Rc$K_!Bp)s-!u|UXxB-OxB4zsJhH6Qo!?F5U-&7gK(f>0l-w{U%eUX z1;3u^Dbws#UdE)p8LM;^FiTGI)JqA4+`;a39;(s&TKni)`|YyihFn%BGmxF(_;^B2 zE=$oKW-sa(RpXlWUPkm_$mZtN|A0)>*XVzC^R10FPR%%gFOvE^ z=sq1HtrP35?{YB!=*;ScAm9uAI*15(4Mps=6Qf(2*~>{Gu;YoLcH0WKMn*08$)a&U zb5^xe)t|JsTRFd;i3`t;D@zKNOr@{tuLN(mN9zItpEWkhEd#g9qbW=hgZ7FMU{lF| zLfUBX6)m(a-~0tK&A=a<6dnzp5yaS50OP zRs7p_VtQtnO+@PX!hYcDLgHp$EM&$neD*AzQ;tK}^K}q(X_%h(DF6uttm6@ittVsb zndzcrwFfA+2)Fv}aupSgo8k^lXkC|*x4yFI#% zK$KdAHVj+9+6|@8zDA8m=e&dc_k1pQEAH<6x~t> zttj8EhagUQ{Wd(%dPf-2QJgu60<{~t^^7btTXJ8NkiviA$!HLN0?%77zSwcSI02YU z6VrvoBT$8Y_o<~QVw%_$7!u12;OubUl{~(l zbK#dULv&B{YUVWdV@AMtWsBQw9rp zp+k6)5>Rw@zc%g)<-aC!^U^^iKM7G*HsDZTC!xY)KKiNaZ9?Bm4jOQZu77%Vff!&R z&1dxeo$LA0+-Z;wTMr+l=I2o-Ybn*VviAF5^AvMvb{CmPH(+_ zOsDv&pZr9-y+$Da7tUH_N3q!^rZN~ovJsY9&G*^Oyj4%#`F-{j{kFpl_t(;hz~S|A zUPVHRv9Ka3BN}olV@y1)>g3Q_GH=W_E-0b(8wwgsTtS{j(Y4^)W4h>I+r`!8h@gf- zKA65&Q02w28NeCK?F zzMM9fc|vItL8-ii+tJZlnMfr{9+SA&&c}Q4rjlJ0N2y{}5iC!C%+ZFkK>Ox;-;$+}-^Owg7I zeMc7GiL(x3O0UmmGJQH!a=W%U%wLKli&=Je=C1Z$BEQv^#D#u;Q^?*Imqs_3Nng&8 z>ThhtYJk7j|2#R}curD$iCIIW;C-DDm!Datw9W~%GTIqp%dGJU)3EuL%!1;4cX1Sf zHQD-hd@A$Z2RA`u?qUWr^^p`wxl8bHDlJ3zAWh z1p^S_L=RlHm*MZ9G~OjCU)2>JT<1F3!ksOlMJ7Zle2nQr3$Ce&#mYgW%S)2T#b5T?@Em=*BXwYgyGN%UW_Ct7S)PXn z-!hz$e>{8_jjXLaJA|UsX&fIPH>hQAt-ysWwUqA0K?4?ViA_ZQlyT+)aSxIZ!$9HMW!}Lk(gVDg9>BJ18|y8<){nyJ^`C zN&0-pX#VczGtR`^Qf?FUT2_fer2%{0ZIMQrUuu3z+Ch?-3)%YW5G~XPFWh|t54jf( zbX^T)f(rw>In=i?sLR6~B3dwu+yX-t<;%kv(e?YLUrnC82Ucg63%P1cQbYug4cG?I zLjw%iYPdun)n=Y?7IyvQ_bE){Sfp_gGf7FBGr1j_v*qBe`bY%0P$YO>sw^4*n2^_f zL+n7)GRNm3A73Uw2+jNKLp|LnONz6j4aOAiW+DL$pUFSKLO;ldLrtzaV4Vb{S~SnK zu0oa14d%@x6|gk?T#xQR+m!P?xJWO%SA;ZslG zZ7nuG1MYrX!1TSlo2zd!zii!N|*|bt!QFUp=0o9ds67a>#%!Lge3~P zIE5{rkMp9yo=prnI+MVh;})2iRXvXyHE@j;A@M> z{Hl7bH2&JPw6wcC*=wmp;FpCG*MaLV9qrB)oPUt&siJH=SYH10J|UDT^;GAmkTFfl z#e;mK>&~)wZM*k*Q=UoVsd^({{yV52udcSh+)uO8=BWr9~lfpFMxDc#V={l2rQq*ak+h7eH~4G zqszb953Ugvnkxt+M)F9(3=NbLzu9Ytj;2cm?^zse?-tg*p#-SA9)j#aJn+XYGb^F} zE{Z+$>JmG(xBxSmjl6g-JA}2SJ+j8~6M+KxW@g9zJ(}nk84xBM$Nnbpo#v~S4-#Su zsRUwL$ywW)H7XM3wC56>-;)(~eL`gT{!hT%?iiD{4Z%4p46|=fKW$-Z3J6LOzKb1P zXD|P84h4wR`n$YwEs>%Io_2;9TR5NM&qqSeU$Ed5?$&6IKbkP-_Q2fWGoRA+E3a3O zd)`$G?}K%KtlX@0mOCHm_M`xa=!;3-Zk1vz1T}< zf~$^re24q~x2XsMnu_cZ{9IgAAUeKkg!~Tw9%^&@%vaTVM>^f)P&`aJA1O-+0^$_j z#B#$DL!OM5RO6_?1orS;Ab~bm!GO%#sPjJ)mSQuNm%C#}r{^HD3zr@3KbcKRY)(*h zIAW|6_m=_%_}KL8j*;|Qf%G;*8V^=rlRj*6X4`2*IM0%-S(N&&L}QbM{zJ8#r2a=X z1ADB%RxU;fk^y+M)JVSRA zrSs-FvC-MpO6KD=*pSZ9=leJl;U9SDBc>OhF3?NcM~L@De_T7bfnDFR5$#8WDgW^i;SAnxvM0n!#Y)Li zgtamB18~!uKsg8jlb;BoG7TfQG*}F3OAakYYLf^4nHkr>QA=e<$7R51MUVS@A8`uD zS`%DAOHuEalU4f|INHrOOxTsqnHW9U#&sw)o##Pwvp*qk^zm<PyqKxgo8bfprvsR>8NQc9Va@vhXp6#3`+AeYv{eW2teO^7qW08{)Xau#Io zvAvloq3c4p2Lq1L!TW6DS>fZL^pD zkWUv|w%EbEK53IrQ!%lQOp;& z>ofwa*lv&Xd(zt;d7cwiQYng`<4kecGW*?6ylhy4+$*$C~2+wo22ye9U`q_ zLot!UO?)VhO*?+bu#$XQFTI$X(%Dd|U_ z7gtWg=CYP4@%+5WyLEIEYv8IwhBVw9Y=U4P5kA5KY3#PgA0MHI&3b5?IrS2>6~X$Y(A(k* zg8!+myGHU;&dA}7DW0mVPFD^cyXpn{i16a)xeHQfWwZUIr8Jd|5M05#zCwj^xeZ2tueut2=b$`CcA-LJzr@E1Rwn(Le&z8xok5TU3B zVv%9a$-i zkF6Uo=MZl%kzPuEX00D-TZmd6^rg3$>IIf=h^)N*w9}8ARn@o1rDkYm^X2rPhUB|rRF7i34A|%{ z>;9LU=vh4&htObw(0w_LP=NX?pyES^?VM_()#r(*6hIMe8ACKtV-?ea4y;y_?*4_< z2rZ>yUlsX9I$3g<^Zc-gE@7PY zci($4E4ZNYF*54=fZ%tFAqZFA=pp855rm$bz?C9*wC4FF_lrXIb`?;#^TE)bqYzad z+(vGO4CV|>Tt1FK@`yhG{^>9O2#ecD+BUc}SapI9IIP%d%=9HNWA-SrOdv-eRv&}H ztA@*$c5d9X?#N)SXem@7jXtCbd5OEysQZLb+5LbMQx)hudpW_d7kU1%7u8S0Cf2kk zH>_m10F}@LbFOQ^@gv_f_yHU85eo~2Iy#;JX38*1=mVzug#uSPa+Sp1b}a>Pdg>a-`RFhv>hWisV!RL zfS|e8b=Yya>vv1lDMF^`?;IvrTlm^A(1W=`&9tK*d;U1|<8K0Il#h!ikCfQY4^rMO zj;iNzaJ|VFonS+#4J80J9M>83IqMM1VgR93sdo9Ie3Y|*pca6CedM>qas{x^3C(crzy zAhDLH^{51LJe$XVm;I-Y7+pHb6I_zCXm<{EL+C+4aeJfu!Hvm{IAC&&FZCXy?v0>J zi%-<}P6dRXOqgjs6okEVCqo6aR#Zejbamkx%3}CrPq$|!r2-nq9Pi<%-bb7DD31>w znz*snQM#a~t#4mP_*dv;IF815yl#79Xm_7BQWtjWkcD1}usu2b@p-Lls4KH0nMEd+ zgVBYI&wa!6(bJM6gD7xpCWPA%W_eeOJEyNWbI)ylh4soww|mPeTEN?236t0ZlD$wn zKrC7xMP+m%kNz*6$gD#8d}43$IDRe z8rocqGx^jA70S_=6?e1#Jac8ddgIh0NxH~c(1rH`?nIESL#Uto2iUAD5 z%;Ke!Os`VOmg7+amK-c$8{nWRaRGiH+h~?>Hjei>i>_kBICIXfvPv!iK2EP;{TRF_ z??SdSgV;NYB&CC{Z3rBuo6WDza9E~HI zYGHesv5TB_YJ8*r3Co(=q_bU>)}{_)wo+OtTl#xoyP>>CdL!Ac%#e@?96fonYh-Oa z_>_XeHE34XpMWY#Ho;fxQ1rNQJ`gv{8On6>^~bF{l=1+4p$I?O=IJ2db(Za`(K1s} zqg|dyRJC#SY7(cC)*k3apr2%DA1vcq;4hS$%q}kvI(h9hR2_K6K+UqVfL+Ij`BrR9 zu-3l*1(Ir!L99)d*YG}$ja{!wNiJ3Yb{)%ayNuu=a$taVd#N$8PmJe^6AmxmTo`H@ z&vA0orwUbqOfn$tuP`<1McpS4+XK&eD^omBO}sZ!aqy~kwlq-It39BAl&2*1N@E%m zjNT1`D-3hPd$W*eIW18TG^-+qqthV+TrS0u(R7lef&CV_;LrUHLjD;mj2$E?XN$BR zY<~QV)@UTLtYv%5#F$#flzeeGB+l$v3s=(NRm7W253a}XX$v}oZFbqQ_x0`1HvLxL zvj!ikOoHGY#IqnA9_n!yj+XX(VvZ+kLqg4&ZrFBf;Tq`bu-80$#!=ryRIJha6E`nF z>XSLJq7tw6`BNcR=3GR0A5-NO$VF~{4C)+JaYu(HZAse^+FF?}Es^O=<}c^A{(;bj zOf{GPCqsLWk)Z|G7WFze6l4Gh(0S@9na#JE(S?!lNE?%lWlqu70BMv`l+*ukO&QZQ zL+k#_q5ju|`Jwg0`-PUy**KVpW`eCW{hiSlUx(|LA!_2g)Uo_ELAX8TWTCT{HbPCI zNrEW{IQQpyABPF)ogW=am1H_K6Utf?xHb~#h3B^!UpYZuwOz)5Bc^Mz-6hcwyr}A= z_x-rdfPc`mV7Gztv-iGLo-+Qr{zBZ8ElktbIVwR&tD zL&20O!%oB4Nd8~;BB~O@UPNd&93UyPui&)mwF2;&Mo|9Fk0b&IzZlB z%bc7uP0yipTQc_W)7QAeGG@bw+FPnx9|d zUXu8mJrMkG2*S$E^J;O+b?Z~NPjk)zHo{@NM0qYHcyB&165w|EWaG^}I}40|p|y-f zozjlX&}Skd+Zvo zA6{`z9m`^QjxkY6iE15qi4#1O6-Jhcc7F~QCo>F2`~Ec;QCgli6f;P*e2K&(LY!}E z6p}*+{g4$uhzy4jo@R$1O~?5D&J{GXdjei@_at76}jP|cMLpl z)06JK{9D0i#Jm{QfXkQW_^sbPzZ(QZ$o}vx{Oy*w7o2*OWjq@06<{lOpk!^6K;+V?)0_@~qdpX^Z5#;USj?mhq*^e74 zaGL-+@j1qh%At3tz@;PIAXaS%zoim9-qP!67csB<6ylowj~z*lwkREh#`b*&sO6zY z^-CqLt3|zePrKQT6k-=ulJ+p*1_#=hUi!D>vQrC-bz#20mk)Z`z}zukL;v|ww3dbf z0QAAO8nM5C1_RRglMApMIn;Sq_lp4Etk%eAj=Xo}iv1Zr9P84$3Y&CZispRd+!-2h zZh(VdVFhM+MkJ{aS8?^;41#e!w-(vv2J8|j#UH*)j&-j<@U#NOZK z6VZcK=w<|04jC(p><2^xSL`h4Jg@Cm>0$|Id#uQD0AEOM;fBo1TSf`h!{XUAQvS>Z z8a?!6d4!RDxD!PdnN@js_nF)`V+wwAgmtrgTw7Be@h}q*E%hl%HOHWm+%B5GCy|Ug zF$_uilmR?Zki!;;ICGX(bDg&o^;Fw0AoP*po&Pj52th^sR`3pO_3I_`Ur#xPYopmKHl`5Mm>B`r=|h?)k) z@IY-FZ<8gKH#^RxiGQ3))Dj}-OL~=$RZ?{1yU&xb?vhk$VlyZSdEZo0Y(l&w!3RZf zAfG#+`{YJ9tA4$pLBOEtGl|_|3Ro?Z|BtXY4TN%!|NgI8F!r(U`di^h0osf2(F6WU;g zlip8&=slu&loe<<&!Zvpa#(#U1-XfFP!+)=;6Qh3tc#I+!cER zyPw0m9P^e#*F5b}oVx&=z-UetLlZfIuJY$^Q+e&s_TK+d7!bF{HuJB{@SW`cpBbbO zZ+}V{{~La@wYyuwAvwm9s;uu)E6qtJuD*7FJLPrB^A7ZS(m58!kKt_dU?NHGl8Z`8 zFRauDkR+aM`nueKK$@LHGQMHSn_R@hVXt*RZ3k!EcuZVFo70ub86lPBNHD0|;7%e5 zb=qHTHCf4;`t5NxXF)k)lE5f1`&$%YpPmpmbbX1)h_K*;^b3$UR#1o;!DV_lALDSe+xbhE5 zyaEM#GnnI`aT7HLDQIS+Q)cl+S?j*xEjzt-;%q z3U;RbcA5hB{%Hz8!Y#>F!}HAw0bTZyKe1Oaxt}J^=W_Esnx80+PNUc5hV#_o= z&brmsHKeECNq99lPMhlucZvd)5)(47+UvoyvqbvS7`P2E{W{*qX;}4+J*ur6)Rr|XN*hRXy0KFZekw@e zB!0(e9(qt726qKd3uI80wik88NxsUk9pRl9w6s>Mi*X7z_@)O#F#6!hCz zb`sxn?*FHCdQ>m$O!eEx0L5U5yymR8 zUbtm0(YmORxaS!eRIK^7J5Yo*jtPFpWipz31Q~cMVAlPEx52V_M>v#5|fnfg*&sJ>2E$^i@j(t1CqAxl^MC;Fj#L>ZX*Q3ozMAcR*1SMg9lvi2>k8p<>lD_=9B6kwzquxKNSg<4Wt!ZBn!B^?n+E7!2wfF<~CGibqQ(E z-34L;5pD<8xyCE-iH6ihu8=?)x+;7Wh2eb6vSA234EDZ*$%tw`5|UV-cAb_~Dv%Sh zYnWljbC!0w=o?mAeeWmzXK4&k+TGz~|Db|D81x@DnQXGQbD$%`5){6

2FpI-(@l~6@%J_hx#2ja zdrGvPLCws7gW5Z!tzBpdUMV`OFVl3}1=ZX`1`%h~cY!JfOE75{dV?92v?pI_Q2X(P zDb=I7gODj`5}iF`OgUL*J)OW3Er6V>mjGh7UOfU;&xJJAv(`L%dbwQL+KweOEqlYz zQkn-5XQKsqr$P_Z`s4j}I|q{Bz8dwxR?;P|9|eAYqDy{ranSXWvM4gVdfs_v!Hl1W@)2W}Lw(L;HtfP3mKS@4@!b+tfCP z*_k?=fCjKhssBs?91VK94&QXiG5mDuXKDiM6L7BUH-Lxx7<#hnDv6>e{OlCJ=2nO4 zq3kw;W_l3^)A5EB>ZMzUmV~%w4l8ZOza&CVsy<^BdD}$Aj0*b5`%bs%S2F(%I1r5>b5iY0m49h^SWy!aOSJ-#j7b- zUEa9lYNJ8+;-oL#UEhY}Jz=l*-rLwP`2ba!iGY<8NeH!31>wAR3gRxtL z3S7TYNWmj|PCxh&3ok!r-Y&SmLF~?uJ+bW7)Uh{Oeevut!x;;Mysp~y8z@|O=) zF_#W)y_t*IzEhnMwj3mT1NMx=``k@J7Rk5PAjnYOWT@E0MQ*6}7QDuogA*w%IvXu; z+%WOk-pg%{SNSK0l`Skmty`eRGd)QPPVqRAtikuSBKP2W!$u@{jm#FOVlRIdV0s&V zkncgdT->P1XXE?TTVw&%4mNHqYsHdhV%jM&LVfS@NeKk?XLM_gP0dp+yJri?E8P`x z1a1H5YL}%4Ip4TV`)9L$Mnl!=Kb1G2OY)}Pz>!v*DqL}7yZV`}%(2y^bJ+OH%7AEo zQEGUAq)A}j)q8&Tr}v!-tf01hXzr8!`TV$+Pt5{pic&;ziD^nKO|umJ;wFj=@gYMc zbp@;Nr<2HB? z&>sn?vHu*Npr2;$8PuPOkOJ2MQ$UtDJdHOQ!GB40Nkfgiow|>Ft^`xKnGrbvqI^iY z^#zkDUQsG`cU`rLjO~~AfMK7Fwx8*<6c+WDp9oZ*dFKRrI zyqfr!a#2=jmQH%TA&v!#ZYcWFykFxRqqTa*9WTH0OH}1Fvv1yRYNP{pW70Rrn@!1QVm&vKED6M88Dfu;O3IxS94l5~^VG=2SC;)59b*!)V%n zNfX5RbX_^7Te3V}cqwA?e$&?l0#(Gpr`7C%T87gkE6j);>ZgaeGTIfJZcib~iSh`M zfCkqgf9d^Uh*G^=SI?3~;=T)hNvn%no7)QwhTC)p;K&4f&?9+Bs|KpZ%yXQZe{4y& zzDi$)e!moTGznf?E`SiuE4DU2L?-4Y$QBE&!&$j672oGwl9xz0RzzKobVha|QS~^E z*>!6wLS^8dplHzs*DEGB>N{1D6*9VKnX24L#)++vYrtXQ>F#pW)r}oIJApN8=+Pgu zPiF${!Lt*O1)kG7v&FR6DxWi&4w#W6BHlF|{}{1Ae}F4d5Y#?jfSFygIRKrJ6+a05 zH9q)0ihE)a7%ehuTZ+0OXan-87*l=6Hw(4iY-YvhN*X@Zu3hJp($=Z59cNCbT<}Iv}_H0kqxPA)?lNK z0w3&RyXDz`9M2Fwj5+1Wudh5MbxrT0}}Yfr{?eJ)0vq@Z*g(JW*A4m+o&&uA49)XCfI z?tb&@B(n+0uE&bv{MZRsY1ioK<}Xmw7WO4niK{SdqN%^p)$FfsubvSDdO#0^OiWYz zSk#Cd&kMsW+DM3>ThacOFgRb5l~O){fSY1u40R75Mtat8^SOS!1fqHp^D-s_Lf5D| z<+K!yV0saC60SS3HXnw)Ht>HX^>84>7Y-QYxNHS1Ck@?|aP`K3FA?u=CSA}(0|@Ie z4W6V&1r`XL-4n$ma|`Oao^?=NZ7Kf*&^F5W`Nb+vU9WP`>0>3Q4sW}`SlCiAM^=h9 z``O(At?y@9>v2xfK@g+qtIS_sl5@kfvZeH%HW~&x0*-B0vH|zaQyZ>VFH3^RP#I;4 z-yW4cg{Um$e~>+nE%?V?mKw}g=Ozf8l%12)nXR^bN*HQr7usV}s;3Y3s}cX{S93;$ z8q-ZlT+2T%x7h){cL7h6F1FoW9XvXbD3=dgy3^?7*>1Q{Q;107$PDswV5b(%XLfml zN2z3G>e4?~A+p8e)={{3Q-5ojrQj}IBq!h4Ia!e<=TvwRDEH?UKXx5`gtkIW(Kpy~amyPt3G}8v z5^^%e9{KKoVEd1#^oZZl8$V&_8Ef>wT1V+v3#Z|KM0F7UojvI85vp`Y{XE+IR=N5z zc!UDY&$uV(jEBg5c=&qx0sEw=nc)B&W7tK!;H~$AdV8ApK3ipo)3pe0J|wzg-t0@s zZNf`Ozev1!;T4d0&O(1%j4=2yUF#`sQi0JYj_64%c${wd-bdaWe-y3)$!a;Qu)Z`x zcUtGI5EY1jq_I4C85aX#?W@%wUY~S1K>Rmq6#3XAZ>v#=1!|(ZsrYObdU!*279KuL zJ4CrT;%HYSgJxg=r-U(5Uy{1-n61_^f<*M~agLB)OJMqR;_Le(c~R2AMf(xx{G8$} zo3txgQnC8!zanwAa=%L+K8VVw=l}HEzrb1?DuuF7|x5BNbm@SG5hwGUTc1mTQWLK51U*PrWtCm zY)jAR`gpWo0aWy^aZd70s;FPqn-DJ+)hC_RclyEA6GKBOGwrr&cL1aa48!YRZ&;?! zzuPYvdX%ENNmrT{c7Y+6BJFDgI{f0M4^BG@m~=@oLI-e zz1#0KjxT=&q~sA6oU9suU9W4++%~k16s>zF=AIHj|@Hm9exT}zCFw_ ze%^zKCk_+MYFz!+YmA?%#bRL6=7g?8sYX7dio@PXgE{QPVA@^e=}0;}`@A@Fu%-Qp z(0A9rL4z)_GkI|F=Kfe6$ZmlNnbQNKio7f&_s6GwQPNkYKkUhl+8Wh?*%2VHPE4am zWtZiVXW?U$x_>+LAgz-20jF)(o_}ErgXe+r7iYm+n-Aq}Mv@OdtZV6eh+9)YUv9VR z1amjUBpK!`#j{`DLnIyau!#q9t!q0^N>VXaB&M#XLrFs(=VBOM0mO0Q!#! zTIZJFwFePz#5gVL_#D;EFV~zoYkfz)#*xWrIYKv3LGN|7^920BnR&mLF0xKIXa40I zyuDKB1&Z0Lrq;%r?5#J68S&jDxaVy(NioxTdRFc$9zb%8s?h179x=Jm7>rOHF@N%s ztbp80>QlOoZWCvpKr_dQ`vC}Sn!ZW#a}^Z51B)a+$8uE ztC=i+Zte7e{2iNTQLSarG-K_f;Y z1t{YKx`chF>iy z+zmb>7a#LT==37RI-2bW3I#1U6Nm->g@eTPyx!g@FIx#kUFJ}t)>$( ztUo6)XMoUY)f`{1=({BIC&)My^nhgHs9O|MH1!AQg%hYudTcLOz( znrbgR&j|j34D_6@W=n8PkDQ>+>#&slv<4m=O{`6yb?;`{mWP&MP8?Kj>LbzVvy3#S zw%5IW*Q;u&Kz-ea0{NV%*8EG+0Q2c(i2^&OSWo3J2$R4S9v1H(D@$KVA`;lg2<+zD z%R%IIVTR#hj9V=Ya9ws&?)?h2`u5*|0(i3vB<@DSXuu!ja)MEi2Ot=5M#u#Z0)Kcd z@chXuviuv#L(n6=oR}Ukck_yc7|bDB-o*`nchUuVVw@qr3JqlUs)-%n^R9=;luj2y zXh&qf*Ab(xb927{DLvuCreUkNuYWDhi}IdxZ<^;i``?apQf0Y*-;dLz)DWrNy5~T5 zYJ06mz-!&3ce;O+q+^L$$C9{N(=kEj3S&dL%tx5JAuZo^bj-YSp>(~;B3H`v z;xZD46SCU_*Lo@<2=cSwC|PF^Bj)!mv#Zix4Lv-xF(cKh9}gyFkY8>`R(E&RVBEQ! z2Y@89;{C*L5omFj5ELS#)%22~3gnuv?MbnG?We?|MOO+x@84E%eJdaU2fc|>kEW?I z)8dQ3@#wYd{ft5jLG|tN7?zUAY8*x8lp52??*#gNEoV_A*K3NLv3qtm^5gC+X^F(A z29%P?e6>3modmmF=%)m0b8$K-R9NI2gE!Lp31fjufhy>7=80b=A?px_to6Uh>Xu-u zpuptC^35nR3lV(Brgv9!|0`f)i&AbVTX%NP5|g8aN47zoGj=ic8^>wPB^CnQnMKRM zMc5USG@Te@0{@o%WL(rrK*^WSg$Dt&~@LAbKV`>mUon6Qt3xwvIGjd9NpZQi%3$f|)M0ttfmMHf=3{yA+ zSYOs$Fre(D{eYF-joZyFmM2`;=7NRidffctU@V;JuMWxzf0nj6S5 zTPK}sD5<-HTj%cnK;H1oH&L)D9l3>!rUx+u1^k%;ZGw$?0tm{WUS!8GDLd zsTuuB^8J7F(l8>gAp5lT9SVZr!%<12Ps}Ow|7!%xm{zY?iJlczw$=V{1L>ji*XS-Y_ zX(a6;9phW|9ubXx)3=zSP~dj}vAZ_AxgJwv#tV;C#n46U?c+2E4HaJxvOGuH=50L}>1rKdJ|4Icu;gs6f8p>{jf4fWL62d_{$62brW&ik*> z%A<7MM5x?q0f$eHl1r2=|D#a&qLpVm9vUF(m5SvD%3xI@WJ$Xt%fHE z-k1A2?DBK|)$gSt>AeC{*5kPnb^pwS7OzJ_$J+lr65g`nvehMlL{WbgScN?biG`S% zDPgy&|FC%KA!~9ktmCYzpC*|FcykiC6-ydpCIK0`NlYL&p|sEJ%?9h9qNRk-HKHmR zxvaVF3)Fq{7mO~J%SG<}eS<)|CX(3Q6VP%o_?HSd%gbHURB?ovAl)|Et%I|Nh4Hg~ zzGXdT;*9S_l7ktdWUTa(G z7*1Y_G}!vG_ISE|@q8{Ho<-^&T(=!{eOt-o_JjWq?*`)RokgvP&gQ}=w4?=f!u++B+Y7A$}zi&bNDtt(|7XIzN-&KoPo8sFO3wXNcK zp~P7%f+*p~9;t0z(g4-inl4}y+)#5uE*Ap4hyBMy}#Y!3?E~3z;~+Kk`-mRNH>OY3|sjEl*aD zx|Pl%>Q6}q`t@K)cpV=5Omw7da|W2HF}82$*Cn%v!(YiWlr6Z{Vh2JC5ABIeY5`={ z&Nv3)p%c=p-wQm{J8=Lzh0BNUL^%dv#~}O<@w2|VNPq@W zy|^22@x8PaL0GEm@6<)URBOpUYY8S?V#Ai@i+D(=LGRp-xG$`!7{2@;LgzaoTrFzf zJ)+_^^zn-PM?;kW8>@0D9;-yIu{L@B86I1%)@deRa*o|MNh9hS6G7JSK@`Z{fre+f zqlcqj$s@7lBAAqogcJ-5ZefMW$%Z#_d&|!zaRWH(%6dxk2aC@+Xvtu|o8=CGCwJ6L z1ifZ^oFoRA2Liqq$AH8Ad&y2EQsgZn0h>xW_>UK;%XQavgNAZhMx?}7IFc3N%mthWK)6o! z(8WXW+c90GSh*ow$@fZ+fzRGMeaH8PIci`u09?vGvq7oCKQ2H`G27ps*LQJ7!-#P+ z>;~K8Xck4@eXSSjA>sa@%Dx^6LBIhdDwFGLTkn&gQ*d?!>HmS#$#89cAu1o)AzYTk z5dWwl>@Kxk#mfRX4<^%L<$Y9Qtgr>e#iN5+@&BGo--m1i-v;Z72|V~>(4MxmXgV%$ zFKHZvM4DJBQ{<)>x=afB=yd>!DS80pVZQjm(*yNf61JdRuKy-(w~h}@~E0Q zg?G;aW-S0pU{-emkh!u(j`83XWVZs-=+~=hftDW?Lx#o3siw)5^Tyv2ONePSos*oK zP*R+J7_^yQPV50Owb`gur+YED8G6#;6)x{0Li;HbD0IrB_5;)$Ch#7gBUwVyL|@1# zm8Eyn7Zt>k;BTGrULX9?sa~3kq4j%*cegSVBbnXl2x>)rn?ziz5nSx&F!{ch%RqJ& zv{UYGE|Mj-Mh2QWpePHsoOn&LaI+BVCtuFft{>S0F9@Qx@tc%{US*m@%~V6)ODI4@ z7q#bGvS6T9PTE9*h6Z;8D;n9=bk*<6aeI_!G3K z3L8U!8q`i&)95W-Gi!>aVf!YX+p+ny{igFX?lF|O?V+RfUp51wr(#%*%O1*ke9)X1 z5)r3=BZNw`LRmwAoS_%AjD4G{k~Yfi)EFztEJdrv#Co)EFfETi1QMyvtbjOJLw z4O*S??=}^xjF{E#6{XS8J52_by5D2oQXH0mYn#7BLwfk3BKH*6|HDGR4$jN>ht5-i zushpS`Xd|s&nIxMJf71gL1ZXz9jI;c|FccKW@ybG6W5&@=(&h-b7!5FKJyJrbQSAe|$+4r5vtG77IcDX!@B=d1y>Q0HyQ!#5Q_NM252tvT)omGvl{VCg# zpgZ$4jx;yhWQ_Onruo7&-IQ;cDC}uwb?4c90)xGS-h>1q_Z)AaPtuAl!zrEARfoTMg;<9(AZ;i zPOiUq4qG596)3AoKC&}JG!gbaj-G;oGc=?W3Kd7v8L-^9P<#NU*)FF;1ci=pG<@0} zrC*M1Hz`xWBt=^!JMv$aCkWT>Y6P@ALHNfatI?EZ{dJng_N@7%B zC?@7A2VamZ2tCt)KSZ2~T8Xkp;EgXq5iH_|7@>@qb|nNZt;DSF={RsR>0Fn`_{+mF z0pC|2Os-FWTy#;y=`Qs!=qV$1|L5Z3g2&cgRDJzOfKR+tUx>@Nn|7U2-N8SIesYHO z9nJOh1<~3o!LRR5=isl`aLU`j`YBQf9H?cIOOHZBoCJF_W7l^QCnX!`xY6zUc(-fd zO#!KKpY0y$dmtJo92RnQXkL22%Fb}EZ3LU~sTaY2UY2*@0}X7~&{9euAg89TttK(nj>d$Vb_0&=g^6(V<7Jyp zNdKCZa)74scCiR3Msn(95xok`gC0kXn3xfh+g-7YWz04Qui!A|pNh8#OcUm*R95Wj zkc%b6iLHPZf|-ktjIqX>t=83HLNLXU6sXNv-Js?mz=PPEc%~Ks7aP~qR`fo6j&P57 zX{?r-@hbC$zLV;>nl(5)n`qIg*uY_l(3c|PHy%&`-96vH@i`A~erywmpDQYbJAz)Q z-$+XXR5{R{>?+JIcDIAwR)aP=!(!7wk|oJ&se7x|OCamTFyrXoSp>W%p$E5R;4izD zAxN=|B|!RaAGs=QMFAKRNLRke-D7B?uqi`Q%dQ)SAu+iUX|j$hpUs`#rZBlgzdV&~ zWteR&pAS9jbArRj#(`SI{?OWju7+=Z&ssyc>Q@3@^rXR~OaACF@b@}Hnw|g+tWJk; zk3?vXbBH(M*!zRONXSTSOl?R#5#-Bcy8Tjhiv4@PXpAWssS<@OR6#sl*1LR;kX=er z!(JUw9M{f6)Mu|h_)7Viu%6B;Hjrk~h9U6BwpL)6a=zQlV`EdE(IqN+Em$y9qtOqj z%_@-FVlx~G%?}+9DH$5Tn`|IjQ<>)OF2Ba(Pp!tm>QAFv=_zEoo|orW&)mA?P5>{P z3JqQ2sJEV0Jk?G6P}XpR#!Yf?w4f2k+kl<*!LvxGM=-g4S9VzV`=ezfI6hv zKRdo9V0(p7$T|OzA?O7Dfj*D*X^f ztTV?i|M04LyuMv+!OWq=70p9jg(@6Jzo;e``ae9zIbF@I&`zZRphN~ zz^QQ-mxR<7^!E6L?zMU6R)mQ?Dpago?1~R@z5M4xr&R_Jx%1(ZS#z5vZzTA zRRHr=A&81{Q-P$(>jsLb=6-$E%tCJ(e{({W`mOeI&YdoyR^dYF;k)2qxW#t?UbtS+sJ-cYWXNrav?W_G z0r)-_%Lp?}erZzL047|Iyh>lJ^N^a8U&9G64SaKda*!fmZ_HLdWC#XZM$UCyCBbF& z+OyE6;PAb&897q?;B_<5y%ubZ`>}Oz|J%5v3)VH53{V(>h+(>(84?NAeQuDWZ=_ds zZONQo%{bb3k~(rRw*=r|*nBh*(LQqXtLV?)z#e-L*mF!8nGdFTw4vnf8#Q)!qi_(- zpQ0Py2@=148Ny6Ped08geOUKo3LP!Y)jzK4vLVUKV1`J#1j?ee?xMtxW$2kGMYa*_EUFBz{t+4edMRy4mFmvzb56@lz-G|I(|4o zTQVJdufDHuB5lod_WBLZ(X*P5M8-#my5u@M_X8>@2qA-ekLH38Z8=?=7Nlkm2WmJR zq8C$VuvBv-@H=~To&Si_7Q9cTzJo;$a0UbB4NeUo$eK^RNt0X@L?p2PyVYK7#?lX! z_&tnC`Gr%O1Vpx=RPz;fA)oN-AjH*!gV&s>SJ#GaPp~~`aSU_0`ix3AxA)_j0c4jj ze3B$<6H(&q~VNzy9gC0Vy7rE% zOP=3I_}r%&EswNe!YUU{>cEKLB0&70MCbOz;YXc$u6N{b#=pnqO$onRl(dDXJ4 z!X-L)Cj8zN;Z@C=S*lbOWbZEINB?h$BXWsvUM}`jBJQGL%thL<7Au3N)3h|Gyf(VS z_@MwEKBv{JmL>VB{SX)bwKK*#TBY5BVJMe%OD22ApRVIrAcD(i36e+qn8X5;4$7dyYh!I z*HUI!0l2u{zqzDM3mE;Nr%!GJ!?&+Bbj@=2ROprO1mz;W zyMtA18sDeUpKgQ$<(e401DGwT*Axh%98G^D=9Bj^l~Nr$g$+jTiBg*6rBybJ7Z;pQ zUx*0kND@(@N^NOsCJtgH_A;3u35 zyvQLOX7ldIg+W`DMCRzO#28huI{5vtjvdYdN{@bWT*wyG&Z#2`WD`@!{ z7S(ll9hLT&cr&^`dt$^Nb;NcY(9SMva_@qF*65#A>4Q8u+kJC8C~o^y*}sfp8{~ZV zeVyFC=;=?I?q6KWP(s&_c9xnJv4`tB=URBwlHaeO-6!8joa_bE9D~#LE+qf5)tqIx z*rs?^)l~TYVpLseAoin+#{uw5qWFQr?=`HD*p+OfmRogZD4L z8yql#nIy2!uHG#tF!a52a?=xZS~PeIC5k%Z)#8ywJ4X)~Fen-@>|kc?LCkDZ2{s7i z>)Sf&c?Uz8Cmlva{cwY>m$86RY?W;MQPF$1iPvucoY5`)Jt{H&$L0^oVG1qzOaI?3 z4uxZUkboMR4gz<&%}<|dNILYH7h!tp`8d6>nKF0AV{IIX5%Xx~X=+mKCjJC)7~=|z z!(YB31 zUuA+D$@L6Y*Oz3G4hVr&ZUeG7WAnbF&%Fr}YF?y&3GaU=zJ~C7nPY_fD$d<_z-3C-8vXM}P&b$X%fy zXHv5}w^7%}yc&48$%?{p5-gEG1mt^@;=k&BYLsPGZE)8Zm8*z~fY2N1UfPcK_H`$jcKQo-$E93Y-j9r_BOG zJ1frp1O7YCF)^XNPlFZ$e*n6&0nEzO^`-7PXS$kF9>9nmqK<*9iacF9f_0UnIN#7J zfgR3&_Xwk^sBMkC_(4PT=u-mC9U#kw+hjq=8W3mdKMX5n3{a6&tE(whJO1Egas9?rtb&6V&{azRY@Xz zmMhkKfk1}+pX7G_3%jlKs`-H0CqEi96y;@;Ph_eCFUrSrk5UdS_)OkW-$LV$Zf1lP z_Izak;q@|nVigFHRrCzMI$H)F;%6YOt}tn18NUQb98@+gOZ$Y|M;XOnIHits+%S_A zxv;N4Vf&-u>GLKzCV~B1!{CQ8pBmm;Fc=k0;rSg6+7Jgnnrl1j-TfP_3RG6Ys4j{B zAU>1-pay`DtSWNBzb*>4X5b{kl*A<6Xocg0y@nWm%}^ZfnDRWwR4d8p21jInq%e&Z zBr8|GpExe`@E=%EP+I)YNf2L;XW=8CocH!zSTCyp1XQ09BpE^{Q5jzy1`K0{L>O7+ zY)P7D?Rv$29so9NmCK}w+6ZS_Yw5YvQFkG)EA-gfT zBf`ZwN&L<~ZR7O>aMauI+d9DAdx`Hkb^Wv{ka;8;^gwy8I+?{M84@}Fv-e}z+2I}- zh`YQ6M(d^PIOz{_KyvP-tbL8Mmr~h}==*(BL#YEB3NVSePJ%Hx@3`vhdZrgob?gDR z0k%c4c7xTyh-c3l?bUBarxK4lF;+jBm=x>Vg;FMQ`Od>LAX|MQ0iY1gkeR(yuWvs% zxK3jK4z7cibSO#q?S@6W?U~vZ2x3Y4d6?ORUsS!YB49#&zs!4Ah>j^V3{VYOJ;IW} zc&t@kvIxF0NDfv5ly!&f>PT9cQ3oHF}l4cADROqYX&4 z%Yj8vWultGubQFBkcNB#Q`Qb%p8Pft$1 z2IxOTnguk2wPcAlS4pC@Lq&-;_8{oUW#U3hKY2yxHpsWV5ly6{F@|Kb~K>B${eaEMM{P8%Rtdg;5XZ&jn?l#{v;jWTm z#t)2S4jf(jCjv#I1_5{XsHS?eKAV57G7lW7(YqNa_ODMV@9rM)*)RYXhjws%@ZJXIvK>v|o6P|L z7|+L}VerQ;H0edFeE|+61+sX%;V9snTtd?MPe(v-XQ>N@<9|=78e=sKj#Z2WrqN4I zemvWgZW7Dl*>EL_(c+LK_90%DW+PK#eQ`A%TGX0C3&%S+#=k;5{AC_8eQ5K)w>hiI zi+}tFD=A<+emT_zlKWm1Pt)5v|JB<*+WPfZZ~O0}vCJt!MSV+N!dKHWx=LZyUh%4t z54?6;{-u5@GPD2`xAuFXAiIfImm@^noa*fsBqYoTj?35A?uEPZE)X*iS1H%(oDbYR zaw6h{#D}D}txM?CW;vH9U)GmfAHx|r2(bNDH1#cg(0+~ajRfD605$aI*@F_e?{{I9 zFoqB@F)G5PXc7d(IlKy^J1N9&{-f}W65o0XOlJkmM=|ng7^Ten9*OncvEC{X&n-qx z<(LP5R^RoM>6tBdWc2(DNghaiyir?H2>w4T!Suj?|Hf{>tr|(!j==D)cBz`({K09f zxqG+6kwM2S(-KJw$;V8YyG@yg*Nq{cKeXb|j)!eS@#er}lR%k83s0#tLqX`K&3@D% zUCo(y*UW>hS6^7qx6##FJh@I{yps^Dolk-U$gjOufjro!wReo0D^cgqtl1Q(*$L9 zgV?6MjKNI2px>5=;e^rrwl`ZX3ltw$SDw3}wS>YO8`x_(@&)}`Oie-7YX05X(+*%d zzY}e=Oq6hug`II`z+dXLc9L0^#Y`{@>~ z1^=*ver5Z9VQL*PL2?-743pI^^GH}szU>CV_2JEo77jx^;F#C0>&gayG zw(!}%Wn$&;EQBf)RyD+1rcs7?fPsw*hO}WWt07(GeBpz}pV9LEYI5+7UhmOg?5`FL zw;jYJO^foBEO2tO{IVR-Ffsf?X`9G$;A_$!ZCNX{*p@??K|d_?>QGyMqh{3apj0Yx ze`Z`MWW1ZH&E}+`|M`20ciUTKICryBstLzGmVBpJ2ff*|4v(-ZS%?O|H4}g1p?DAx z^mJ##v748|w1xq7wGU4{dbSv?U;_=V9QaZk7i2ih)+4E0bT#zn0L3Z(aJgFBV%<7H zIK!C9L9_`>J13X;i3U-Kt$}eoio+{qd!1I7=-i0Ou;1b`#%6_ww|GqZK9@fw?(1zv z&$xsy7}Gxy^AsI-{rqW~Izbhq0GA(nX-bK?#E=0=ZsoMrgG>xVRhU(f3Tl%*73$xP#8au97{UM;B{E(;V&!9F~yZ=7yA8>G+~Cr zOhjmlw6{m|TEw6aapFi}0W^3&2TfXLRbH4kL)L_ILJnJqeI*#3$V0C(zZC2FrupPm zYWHMS6D_w7YRkk4?;l{ypm@FSIt^X)Feqj-rEcH6ByWd zchLDO{p<{Q7!~{R<@-IZfABzkJ9wbR`kYe3sP)a0(b29pIsgZ|yN|F+!4oq4tK0P; zA~n1FS6L&9u2>L4&q5E#-WJkHe8YAw^A?+f0h8Tsaw>alh915Q6J=WKsbCuahClh18rIdD>pLJbDgn3sesX`12@^^ z8n8C1p8s{0QBhS8RotUBzd$0x=Gn6Xo%BfTLtO~ZDk~2lfF4_7a1~Dro{2#Ls6Z9~ zCVmOfNx0BM|3KZRJ3j=ygG4#BhRB z!uxl6Y7OZyL_HJ9QUgBr2X=#wSN7%*rSY#25OHI*1VCf-DcCfa8jBr4$~?yNlt{W~ zqvW= zgHSwhMpG5Tl4%T~hn;U9SMlgcy_yJk7M0#6O0sC}@GXfxpI_?F`0`+4hEa3Y$%gsj ziM{DM(L&Y?>=tm1U>IKY=rOzmLl)nJ^|ze)PHby+Uu6D(S60f{^5=#G zqr|Yiv){bgDQBSC$F2V-Ip}}e%W9mRGq`tY@=xoRxF<-)_|X%nDFF*bx`ze-LI-)8 zStc`J}+*}_FT>->OJA(S>EM$^Hsm^-k?U@h_c95$UG4<@WQ z{WcVdSv1-wdqs~cb6Ccn7}g`>FL3DIeLLk>1sC#%W9JIW86`;&zR=~t&ET2G>_={M~&d;Mp-n;v}(e}bP1U6_B@-V#c&E^B-2)}%)X(koX^#t5?+ADyZ`)|?BeGBz3iP;Z1p>Lhf0B(L;diM8y_NUg>b-u!*RtEwpD3({_*(&g> z*Q$M&t2D<5uO>M7ueOlfb&$V_@(q@aNC=S^RmnB^!~3|0!OuzLM-vQ>Lb*Zhicx2E zN+=oZw95Ny(lc5eiMDqyK@S1>bjGg!0g75$xy!Y6H6x>r@9$b!Qsst%IW?G3Rb>Oi z@TEi#=hoUm;N0Nl)5TskjBe%VO**4%5>`TwPHEJ|eMH^uF)-S}#^$uh8!dcQJQ~Oy2IyS$Hs)k@ItPx3 za2T={wO_Dt$Jvm78-PzK@}lV-UcVeLxRrAN>@k-Wpdka)B3FrS%`}& zj1>2h&sGAwH)WS9H_@~+UC6fHzj#u>?VT0X|IB6G-N|LqPo2evNpEUTimjc4j0`;3 zm6)X){C}Lic{r5)|M!2+7|dA5k~RC5EoR3~F2WGi_)zF}{hL=08A$XDvU4Hp+|axWb(M#Li55>4bcx2!i0JwxtoadVMg) zeQQb=NN0Ho@_?pxAElj_Ghm7~SMvGQV))!H$}PSc6&K0U7-SJ2O#pv|!3UTjpJD{D z%Gj`Cu148@kbCWI{8BiH+_ieH~kN*CRP3sz^;X5ysGcVrmmcUmP>< z$507QTfYsJxY&yr*p2rk>#CBsGd=ZbR*QyPnJY==CPDeY{?)rQl1g=0Y$ku#i`gcq zN@b!6IqMtV6v}fO0%N8~#YMyL?&e3!ZE3=_Gj(%h;85!xZw>O{7g)xmzSU)@9qu!> zmltLU7Cx>AnS?K98*$~GG7;)IwE>9IZv{#Qc&1v8H2KJ<`JSNM4VT`4lhEvR*z0wp z+|T-_j9#d|D@bqPgs8AdH=p2mm-wRx9=R2~il*atWVUBxBwHux-phr;yTU!BO>klv zkMXkEIdbDst4A(}s?ZWR;!e67iQ7cz6&G4ol@YincZ^^6U~19R zbM7g*=LSDM*;!BY9biT}?KPQtJn-1zGxDV;l_~5(4PBLEq){7wQ>5htvSyF>yRo0b`OQ?ft%A9=Xe%KYz7<|O@_S$k0lNAIvt$XCwS?g z=>-TlVgbCh>9KtkI4=6~vNRHE<#@{Bt;G3fkJ)?5jvH@(b57 z*oip{SOz&M#1Zb-(bNE^-kg0A7*W821qLXvE5gnVgD0GNjKYo!J#+ex$RzF^n=Sgf zsuK~<_j!(#n*0pu$w!s{Nd^2KJiGfc zj7)a+zdJF!>(Jl{+nYi-u8?|GjP&fsd8z?(=_7d_E@b>rR^Q_GbzTrl6*`fstM3IGEOQLxFtyR`R&%c5gt)0 zfgUUe^|ag^qNU<~Haugr+M6%|$?jK^#-y0$g4=|iw*D)fWv|_S1Uv|6`BbpDJ0uLn zz5h!e_=oF<`_I@c#KP_}8Li?Z()9Gh??T-smH{5FxUO$LyEX!hS?ywYRb$i&&UXb4U^|&tU zLaGQFtyZ+$tbHm$V0*NOy zvx#)@65v5}%Og_vjGJmy)c4YuJ&`g4KTFmfL(&w3wS9xBqqK*Azl=!WHx+(+VfYI} zS}9{nB3e;KQMufb=_Hn8`?l@`e2vX$2+DO>QG}-dG2@$Ai}*q2zI9goaTo#0*Nv!M z4}t~14dotVQs~zRZYr7dLczYVEBS3bym^`Zn(uDKV^!Xej9PxcvFX^R)@V zL8wB0xFJ=A?Xp9nlZMpRuD|++L!&f}IhDa7wg1f_#TC+lWw;?&EA?g^Bx*YM!H-6p zAbwLOGr+GJP=onTPs6A0$z%0Ko@auiw%Lv+vW9IDd}Q)Y&UlYzFVq;T3vx!K|haU1lm1dx}995L`YYl&$Y*uaV6B{+YG;8^7PA5&2 zV^bf!C!l6SHZars1XzJaJRM=I|GOGLBMc!_BST30c)jkJx{BWG-vJ6;vcT8M_rAUi7iv=lJKG9!SRjZ zK>oi0NWuF&3nS)f%f)r7F!=LjXfU^H8(~uVO~G+i)XXtGc!Ig9wv?dLUYE#Sxv7Zg z#Hp*SKi_vN0UkR_iz>+Z6=mu#anBchC7dTYz=qMzC`;j`UT!WsfX{L1a~f$HV=)em zZQm)_nLh7A8nI5De^1(Ebe;JI^O*$u>$+eUt9j3rYA8l6xL7{$$&gJ4sXG2yftz@< za}`8)7ls~rCrFaETJ>lahp7gW*}PUKu;>Lf1mS$?Fn=%6X`(6(f|jx5XbLgg0+O1R zobHR(GZ9V*Yqz;6bY%R-OxRUFj*ttQlk$dOcVkDKb%4IKD@C#P>XM;%f{B!Dwy9+l zJ&MXzdZv4LfkoBt5FRk(tg;94bTWR9GpgoC$>r6hDNmu}-=@OuS!Rx|3*mJdCG*Uq-72=WFy^j&v z$fC3UeMbg{z#;tGBrQGgy5N!QUUhia_n~+*is>owC8D5kgWEVvDBR*A$4WjZ894bg z>hJEyFOm*;S&)|WDEQV%%-c=XV64Sv82A3ER0!8#Zb%+w8%erq#!w|UpIMJpec*Nh zWa&^|ZpB*uQ{#02_XTVezxEaR`e6}v_@GH(G?ZXy=_8SPC zwZ89nwkf(oc_x8?I{0+$%xy(95@%0_zxW~#oPX3Zb)6vSuF3o>2-46;s-<7u? z{1L-nJwPQUuM`xn-#?^kK0s$&f$tvF`m+)P%6G=b1_t|mmw@PRt#qnsAHBVL z;^B@{_Q1KL`^2NgF=3tGMx38&Xh|q6Hd}a`a+Jz3N#lUbi>5-A)gJ@bUzxGQ9KRUi z^zC-sO~Fs7&&CT5?^QVC`5t>n@ZK_2vHjPooMU@o^oys%o->>OhVRDWbf?1Rwk25; z{?zT0iLq>zH3sH@Nl(l`e;5AK!3s_UV;_;m|?cV zsWzWAyht7)?R}i1**O{Z|Jz`-SW+ZkO>BwUkp5X3F%CltdLZ3Vc)>Zfmvl=Amb)1% z6~o(1Bp%F*7TnMMVnQ&S*~hjY$?O0LYK}v>BxH9vVMCL}z3@D~6d-!CS)!b)Unk0S z+&;j~<0yuDlb!Ehb!wGuau$QA1Ne-tx(TKQkC>DzA&tMD^xV={{n%~IRTCwiaUzCk zR$ed5y5aHY_fP1x!+7_Yw>VPf*=lTaf*buy_@)nF*l}J!I<4%LzLqtbAbo!0lfa;0 zWrU&`_A!*w0kd;`W%DYp;OI)-kv(#yPwrf4vVI=XUf^E7G14s^*f4+gy5Rab$b*sK zSF6ourrviwEF_RxDDch$-lhiW!yF>J7TX|v(8GJh*PNpiMzHoURv=Z&*j-a0N23=a zr{*>;t|vk1FHoq>@5t!Z7ZAZ39hD+QqWAZn-8{<0W-PnbcuS|Kc=Qy^`gkrP-38YG zR;te+6JTJaIu4_7mnFpLF4H%SflR|YjhceJr2X-uC3DgO@|%@^KRZ8b~QUPM#dL)o(D23y-#doV0WoxhZ+*k?hKi;-Z3N;DQ8{Wh^C0g}FKNrZ{lu zPG(Db6b3M~T4?PJAD9nP&Z#ETi6;-v;6V6J_7gCTG7>yld1?YNxn!J=v==M;8qqAgw!6jVM>Ql3Mtdk{^^Q;_PL~^&` z8nb(=qy5dCwZaMcHg$eL=9XebxnN&HFx`PXISHqAEnuRSMbbF!lu2l>a(yIh4zL9# z?xWFsc%3sR{s_5jsOWIq$}S-7@EZ=(8Hvm@qq(78#uG@E>ib}0O}e&$o7aWzjuJ&) zYHeK3yy7%qTJG*WCdUoZF$t{U;2h4;Qbqxe^(J$?u0O)}Pwb`X(;#01Cia>S}~ z0DJ2mI-LC~Y*xptei9ZANh*={0N3VPH)WzW_U;tKv+mw&>}2CgK}(&jVylIvEd5>;ioNnhOwzKXf_K!H}N%s<7yqv7knm-CfEXtw>Rko1N(ZY@X&cO zg?}sNBJ(@uVnfGGQ5bQOGQ`7MV7i{#6|h7L$d z<#ju6b&Fht5&!T3%j3oE zE-jIx>Uh9gos#68s5TPpWbHSJnebaVtx({E?V~=tv|Y}J@aBpE^*aFxRnc+GW_bSa z?6dDNm`?zURgGvU&bz93;8g=0dJFM(=O1 z_e*-==*QGUetj7Wz2T$ba?9+-UW@p89@%&|J*5B=|DnX znqXQfr)yRuEa%xq@u-JRmT26fs`5pLnPP)UX>g|5T%`)TgTDtL^9Y<}z&H%Au!dCo z{jha^X(2tAj2CVUZX_cR!=jE7W|p)E12Hz?m{j z5BR$2oq1fpGJ>i?M(4A~NHS$VniQqmQYP`aee<)EG!6NK@W1pM!X+TUj+P7_wvNfy zD0RKM@9kk<=*|%_ZzaXoY#hv~Y6DRZm>uMudAb7ohM`YQD9dcw<78ABxu52MT6|nPxXPF{YhO?v%4u=;{`x znd13$aH19X7aUTriz>pP|I}^Vig6)r2tOogj@%s002GP%D-HU2KiL`1E*9>If?5B%8Vv8PQ}{rS~B6NZ`OyM)WAqfnt+#(lS1>} zx1k5+oz3L<^Zh7X`QP6{16^syox^KNW@KgWB2CFdr&nm=W^A^WyQuGE&7H+*Zuj!R zPw4wH?(a1l3VarD+tH|W_q-w8Y_;csq#wf;C1)SQA;SvHV_L(7Ue_e(x(c;4CUs_Y zbV$+>rs`7WUk&HebLGM(0AIzvv5Y0;++19E6{i^1&X9VXME}xbSVb)Qn2u|lID)&* zXB?PFYr#IaRSY?Lz+*<=!RpQ}n%ge#{n9KKW3kT-AgVo*Z`5iW;_R-je&%Go@Ro3? ze7(&sdS`Ew;l2kGyUgseKr-|4bCK{p-m7Ea9l%-2@7^j1U4tOEHWuKQdJla=Xg3ca za=|B-nR2rUnJG%Zp9?PBh~#HC5-FvtjwS)fdngxCo0}cioiE7emDpCZmsczC?4!_Q zz&OlKC+8kEwFJ@~G-%SYjDEP)bUwZNu$f#BUfA%xZP%|oyE{of_rElqd;X^E&)14A zf7UU&kWnvC8^F-BE*2F@?}?#KBAHgAWp@^-@Uk5IkwV; z#RTTedcr;)f4Ii0J2eO9X4vBr+xUH=<>n%WXAPs(W(PfWT3fLRpYMfx892+Yus?ae zuW0uijj?Ut_xHet20s(!?F~quG5QK6zKLFDB;*NGvjxmYdB6y^VWaksa5B7bmivy- zMc|lIfF)}Niub`DHI@V2^0;{**Ns6A3KU4dWA%_oy!)sy&D;34;tB3w%XZH)RPDm* zn8s68U2<0ch*vXvkuTl`86tBFwny&H^zq&GKmg4&xb*zu+hnz+aHiAm&*G)SDu+a7 zb*W|;Bn0n9g)oP(>DHxpN{0O~QKXSa zTcH?s%gM#8pI61)QxO!0ocfR_B4yrg41w0@sXg^i7}y|R&UhmW<3XgrM)^87s&Jl2 zZa;0+MfI0&Dh~ZM?efylO>CdxCW0q5bYljY;fQ7Y+t@KGq*FhZcVE zt|w9v0wP6Crtkf}2AQIp zsY|4HE0j?L+4HiY`Nr}O8jr$*36GJTMtzV~%c>*FeBw&}F!%7>tw0Pkc8eaA^>Gko zWX6q_S}w+|K_GFJe=h%^kGHlVe-nft^KI3~p4EI4)xn0v2#+gR-Homf$6Z6*%u0~r z39a2+xxcgloyp!2*Hr~i?+2Y(Z?~LTn|WSe(i;U63F^fCep4&tmAC3I&a)ZJzFaB( z#Qs!GV&z)o<~^ec5JL$wv4*%1PQH^VNUeE&f_qYaS{7pnAojI7NSHc(F{x1=L^<$U zT{I`Ja})L}66a_;q4|;1)6^+R0iG+O8-zp^BGmS66x3OW>HU|G6VXjsZIa#9FSzlW zXYm~J*(fPGNqtuxtD|I!UJ>hg(Mu%Pyo_j?gn8h&E-G+Jv!Sjy_i11rVU?W~h;y$5 zls_Ht(d{*VDIdkTSUPlH5sJPgmAy(N-LTvfDbJI`6OA1qxBL0xmeJ;7Q4EgIr198N znRxH~vv& zQGtY3d+eC+KCB>dbNtiDVeIA#apvfcjpk@PkRQgUq2ruPCgZWzf$y5GI+B5?^4!cKvA_+6J<6T{rykIl z#mRiKdwL_ZmxHp&lq&sQw3{ZeA;7GhrDv)CYglKbUcAtYhMW6|TZK#CZH|!n>Ax{T zwop&O2^jmUMUFo3pH0~=*Zo5h0<$h|dX_f!w!?h^ zIh%V0+h^XQrTmarwgW5(M&LXs!eDyf=T;-;`}PtFmq%2XrQ2mKq`{0UP#hI?R?8nw zEh?VC=JWH0QCN1E`q+k~rWM4~aZjkNNNF(yOik=yhfBH^H|$3i1^Hz`Z3rP7)5lku zBuK{#@o{CO)41)R&@T6EGM8+14gCm9l`e#rAJ3~i_%@Oxy^+tCa*j)@C1R(Ko#~Tt zsM6bsq&@G7fdL+b>OS0Y?~kIV)hoa^HXTYb%~M(hEv}G(o8=qQWaN1hDf&3?V$&B` zIfY$WUVNi+nUaorTsv%rP)~)2g&njiq3Iv=Lq+MFau~Ix9;E&JGhzwMZts}3Hp{TI zq6$W01#3qC=qko`bk6utJ==-mYt8~FV`xSQ7nA@ynRl(O-q@{jwaj(Y-)(|J+P0w` zMkx()JdV8-%JxG$EBJYMalJgNbgX+7GX=$h>O4zfIkZ>|WDex@>RHkScFRuAo0P8~ zHosf9s{gEnDPMqzSyiBSi4?cnUJ~-^NJ3LcIF%f>598v z%Z4F{-3%%BWOrdzGwK?g96e`Sj<*KxmYUezJImdF48M0jiu0K3Ak_J^1T9*NS0Xm5 zFOy8QFponj-cWc?XVM0rY3kOJXq&^%payY`6rXjv)S*8b17g^l{$U0+Sbw!@DF)sN zJkI=dH$K>4d&+*Rt^0O=m5AYgbRkb|aH{4HoIOsnH&UTQawydc2OKQ~XKeN%w(D?r zj+}Xoqqs=CQfFHdXqZwxeK(!`?`#U+dJD;J-s_#_IS?7dQFZlIKsKjmv`+B%keQ%T zw>?rgumq{@gc+=lvf)gJpvnVeW%t;nJoXgW>O9^P49fm7*>PiS0Jj-aZ|3fhrx|K# zENw3vbD|sJ*4toso#Y12jJPBPKp_u2`!rz-Z1#XXM;6y-^oAyDO)&?{l0hiz zLq7ThZG4c80vBk+Rf$FAxHxP8b_q|&$eIT@jJkcS!I`xAiWz~ zf8{9w|G0V55iB+CrtkqWwIAA>9vks&l^PGI7-R+G7r-Hr|5rtg9ZCY>Ko>BB4~&}N z;U{bq>@iCQ?lb_&3GF+GXDWz70@6}|CkuY(lPXr#@?)p8sqvj_>(dBe8;lsp2`lAy z>=iBoVyLeEdR<_>@d8+HjH6x`vFgFg(;bQ5w-vOw|8Af?2LwzCLk*S)c{x?&y8ou9 z0&!i9#T!D=w^1nm3CTJ_#86v?BNPu60@LJG#lbDnT=dOHsKSSrFqT9h-g~p#E`txK zhv*}Pgsb*J3_H#5SKrocFk-)GZ%l0nFpRWhm@7F8L#h2yE|9 zUbOE{eJx}7)lHY6)*j8lcMXW==@>lB^a=jgh+ZN40B&A)wkz-yW1x z+`dsC1f5Nf<{MdRV-yx6xlzxQsgU@Z;MNpl=}w2}plLWXUsnrT@B%_a%3h<_POdLi zvPfXB4lZ!-xQKf*texR(O)vm5Z5>N`A$f0onySw6#`qNVN=z&wbF9F$rewPOrSGTn z(fRdOwT5ZySpx@=Nw3rG)9C$e=p4bC?FAC}4*Lc^8|>Tb5?s>KT&Cwu!Q2g`9!y1+ zj1<|CFUJ{y56LV?RxD?Y$H5ME!%+>)^{hiEJssJPu_~{v&YxOH))@}Rs0mM;2yTQ9 z&8YC`Kbm`?O8l@00)ZGIN5~1*LwkA&vg?m94juf2qe?aQ)~!d7S>jp!rJ|*~z@};v zPzu~k6R{nQn8d)W4GL7BtiQ&k-dn45%W$=AZ&}WYD%Osl`Sxg0HR=Ttg>;YPwS!e! z#eHb^p^y-1Skh30rZ)VCJamV>8)hd0xpXaB3F=^e}+#Tyu#FSX0hPTp09KP`!x3JD!776R~DTw(b zWf?(lls<5dulr}22qjY?lg3>zcfsj)|!$Svek9*jw z^Z%$YL_0HA7kwGT+x+!Rd&H28OW%Mb7HJAUjnD!7TAn{oh#|PvOI_r8ec|~;3jj4$ zlP)i0vc>336&tzg>ylYXXu>O2rojNmmKztLM-F@k) zK4Nt7XUoCcbSuehuC_v%wO;DELcnUor{XJ{u#%#z(A(MiO@#|oRxZ)2Ryw0viS3eI zYr?^bLz(ovAJYM#^$JM*Snh~X;|c8P(K96CdG}s68h<`ec& zUm6eJx&|j2YFH#cGCkyi241Rt`FfMSQHk4(A`eAG(r2PThwzy@O_hPs>?e!Z4jq^1 z&^W`Q z6ss_kca`vSX;g1oAltF#3{;oO6G$Q=pxU$hQdjX#uclO{mVuvtU6jALIq3C_AZdKZ zTg(k2@$6*}x1FuhZOkz(1Kd9PI#(D8k`eW|iMmh7)islxn-~Qe4BE|+5fJOeT}+|n zlYNX@>(B+~qwyOA(a7TVJf+1=9OL8>3Ia`qSVxIWri;CK6bJc(FV*`CupTh8D z#w`)54ms-e)q-4v4e}*O-ciF0!EWi|Rm?paSGrqYDQQQE0({3MOgwXnUBbr4iKMT> zC6A#$qZ3$Eg8;MBSx!lKJRP&)9|L0J~`M*LSg z?N-5;j0ER|pPwPrWVW@PBAiXQbD<&hY2X{gyy9-udT0V%lUIC%9GQIr7U=I(NnYQ0=cG6s@+wIiRQ&)U~#W=JZ;nke|`%wpcJ zml0{1%iK`+duZwT5E?`z>rC;-yRF`AjXWkJo$Kz-Pz&_VXgGf}5|t+Arr35y(QScK z1oQclw%>KYQ7o@HL-muWTaTV9Rq3# zzB(tRrwe$os#z8S*9@b*{)E~T{D#`JU&`tn=MiQ>-(TiBUXs!mj3U5|qaqjN|IAPEEHnL{qj)FCi#0FU8PxJ@$FJ!TH^ z>L~yLk|?md(|#QUj$CNW4?T%P>Z?i5%_Rtf>vwu5%O$_Qo^MatY5)hWUDiWA`Sicu zhgiK4WRP1w32d##!TQ%0>aVyOv;t)|-@Nu3%Jc1uGj4w4aIPehmF}grkBH?F)aJ`c zC#pN0(_)iQA2oPlsFu;H1xLV)Nw%|RFd@*EJ)sja7&h*m>TdG5Yxw48pyi;VdG)zJ zBoOh<8j><|d@AOz@@;O-#`~l04%z@LMHGu<-fKBdg(_c)Smxp==Y%fgkUv9@PbI=G z!;cet*z%FugJlysetrII9@DrukE-Mih%S80RQNl72T4O`(=G1gCoU0TiIg(uLW!Rq zEX#MiJ;<-=fg&oWt2$%Uo#J9=oX|$kYc}M+U$FYw%4#B2$Tzuks1`@b*?jb8bbMrc zM~dTq-@q%XQOUVjQI+IJu`^ctdbskd?>xb<1c6ef+j+ucCsV(R)^(w?@4 zaG}vpGCV^>4)f%g`?s#0+9>{L00Y9AGnClVlS{IPdz%s=2YD{#v%_|2oRnJ%Nu+}q zSG0$XNcw4HTxaJE?Nx(9ciGRdJ!}b8YbB@Zf4Q-MToH5nVPo^PKUbQ-`qoNQSC2CW zb$eTiRs2@%qlNwo^YuJp_#fhfXB{`yxG+pdj=eC)noWqwuf{f4FbJ-8RMCfnjfzp2}5B>@9{Hh8dkHy9*!=VD!7wC)=8Dv-RW_wFRy|3S#s|2Ge zP(18gJztMy?B}+S+7p^#X!U6pwc9iyKoi0(q7bRFt~EzV&|5-N4IG4FZ zKjzuFYY#K@^%k|Y|61e+6REd=Mofn&+XnP#k7P?QMO@zWjcwy?R3Ytfk!QY+!(z8I z84|NDZs;VLvR8biFF|#`4UwrEd{KcH8Gn}q;8?lv1Vv`U7yWf$OMpR`kz{^b_A^NG znvHshi1>lp>q)NZAXo-!!Mx*Xn=c^Qw4)pk-dm{CX&pkLk$~G}BmSeVBkp4J=zLjA zi~KXp%$~A*hZaz^ikGGTJcp&;$8sL2sCK1LE@5&1@*HGLFu%40)mI;2E){{dKj@ed znLbzl^Jt9xnn@pWvQgHZmrk8WF-)~Cnb$2YoA zkXH^&zH=PV1Ik_xcZ|L{`6pUN#HBHe)1KNOm(l8X{GtRZvY5Z=H>+Z+s0upn7R1U{|HW~!32-D3R zD3uhJeW`Z#`DF|+N>>PTZ`prA&my8}SYxa{wD04eFqy>91y9pY$7SYWkSj9eEY?1qU!l(ggW?_eJ@f{ ztgdvCWt(HUIXv>}1D)(ee`RmXS&+Pb%$&?ul3@xI$OqfKVD2RxmYt(SH^lG2e~;L# zKwtR|a|Xt*$zk=_Pabu=CbTP)zcf+)GT^^d#&ObuIGxuh{ppJByX)x|jhCHD*;x3u z?wTPBTU)UIr{ao^I?m2is>A|baHPDeWr{KgleHq=cDvJJwAm!I*!Bd^W!MsQug%9! zJo%_fZUF3D)GCg$&fMGtUm0x#j6y3GBkt7~7-^r;AO-#wU5T?n(B6LLSe9>&=3F1K z&~dA|_vS0b!Fk5j#|6kGN1i)!p zfH)c4;fF#8j;azD!uJ8|qJSak=Wm`&0D~tZ{z8BSjM}V3DGcBbTtVQECNrULj*HG< z+6Q#lYEe#Oa+&Y3iAk;=JR+WF-IVjeJ8RCR1kc75`tuHh0OiyTtZ3 zp3OW4E9M^hoOPteA?aPo9S7=|dh5kR#<&egVjOi$AJO}T&#}Jvyd}MQw83+HmM_ps zP*zK0gSe?5%bCvL$%GEAhL;+ZvmSwY45-ap<;`6&ueyOI64Q0R(EHSV#N_{r`f6%5 zc>N3%ut+T#RN4F5I4+T6$H9hGy70sKRqkC+4odIaNB!nSPB$D!`vjG^;U1X9HQB}) zY%M?;aP;Brz}Srq4k?m_CVNCaB+kjE@-w%<7=QEaMu^M2{4RzF>j0hVucL+T_*GlQQyVghTcdx8ALvYxNtJ-tjur6Y(QCS zm3~KTl0&$Kb27VNBl!*GD$34>PD|ybLd?|HZdttoqt*H`+yfvoyf&Ldp2G|af zZDC|A{Oc`MVbPg!D9xNVWdpgK?$6$SYLCrGwRD#}(UCb+`C3(e6lSu!9GKd;)}cVT zM<=D%zxfA$c>5~cxVbpw;=t-p3HwN%sG_|B<<iuDU5HwGnbcs9RYY10h)}Sm_mi z8QC83UBUU=*uzcT4Vd&4q?#bbD5CN;ZHyR_4>I!B{6bdnQEQEi{QuJpVH4!7tm3TwX3!8#^L*miVun1ekziobR~f!k z$V1By-h;hZD`E25wf~f*LbmpLTVvt2EA@k|w#9gzon8dtz|>0ft46r`A83E)Qr_m~ zCsc@10&%)6IN@Q*Avnq|rm90psNZ{Jv9Vd5^sugyOOG|T$Bt#>Eca!^9dhU~%98a$ z)Q^@4(1LX=_XLTtqrZfUcm_GD^Dz)FCBo>BKAF;VP?z@kI6J{M)8z44Ma3@6HHCXL z5eVuFB8sV4H{QJ0hv{~4A27X!B2)Py3kJuO^T7IOk%}zrp^n_5tcnBaz~W=dRcjGE z^1VlY+*jeP=!?8ukv&|X+iJJ>;dDk|GTIEHXwW3dh5r*Jsc$QL$F9V<9_TK?0 zw%59xi!ZYfDoBV5k}1=SBpMml3l+NzPUfkC>0HcEqYKvB(13`%XQ%CdvWT75_R}Y? zQK;a%iDvf|n^{(_h2`sPaqQLKwxr&d9FFiSAmcb}9jiJ5S7)%_faZ_p?euoy$DK-f z3&wsn6#B5;4vPnjAWTbtXl<_Lw+y(uBCN9%e=8jD4jk)0S!@Vdrq_vxbS2CbHykd4 zdR?#&Ii&{2@ya}nyHs>QXE=5~!Az5{vyeA+Vb(}6gK9?MQX*G@j~*`VhQ{d|SOA)JEva`yPIsqy^JpkD0W!lX$Cj*uYmnl)9<3Ux*~ zE8XM4xgbYWOVU*LbIwU}B;UVBM)B=P6T_87@H~C&V1bDUOi1D8#UcMcVlR-HlQpv9 zM!>;)gN?$X>euNVh+2j)>l>-{8sk@rXI62H|eZxF$@1bT%dE*ALn~q+>8>jEpJUk!QYDF>aXV(S)3#;+_GY zb4TP}?p_Em$T!r~AE=j@`rz`9!;t~2g8 z|AqvDU&^*l{$R|7J4W)5fGeQt6V%z-6@_QjS806LxAWEU5zS+-N)5Z#V*E}_Bvl;g zNgpY3!y8gnv!Swum~`liK(?rR#XPo4F#zC-tONaTI0Cr20D zkZGwBP`_>uB+{|?TVrC*F)H(DvDSd0=ulTn)9G(DJdtpP;)?(WDjK)v%<1z*Du%?up zr;z}6nB2=(pz=rJf0Jb`2dtfVw7!AsfB0cF8btz3^^^09{zSfXx0-QIQ75o@UP;<* zOH2G9Jkei2HQ)}`Q}rgiT3G!Zqo2Yah zt^IBfr|4FjLrYuK3ox4rj#|3EvMmXI0P;YMa2{npg%8`YPoyxHkDX<#Zlv%mCDZVc zg*oT5!}3)aE+Z_mUz@c%^XLv0gE3DTIiy4nOGghVtaHP!ML^_$q?EGuR&PP*g z#d7Vn)zBAg)Mi3VmAI&qZBo@-%L>aDF)*zVSQd zvcafi@)QBL@+0i!K5bFOH`Q5m9~IjYj0NG6ZZj)X;ZpGH39Pm=#-@LAE<&ylg$UnK z+nXn!wGl8D#U(XYSRvtlGEl+D8HLZL2DNLeAV&P$>zS+CdyTW~dm&|8SeLQ0xU7LN zX-P?z(t4R{qCVOR9mGubvpsXar#0dHT3F?lJ?n{zq)^;Y6+)b8<@&c#NlPj>0ZgQ8 zbrW|l(1e^Z4KYhq>|I`9#;6nvhseUPC5TApQ+*{Dmk0)eDu7l%lhf-|1y+7FB;!ZD&;BF5^9UF?MGqlF@phQWI9c$P^}j=1WNsv7U4m?B zv+}chBoVB5UakJqbo7=s%X+7_#Lmj7XyyL~b(!E7MU>$As;-*a7dJv&nfTJ*QOy`w zaq~}9#N~Y4^O$mKV}97$mkVoP?Gj`#Uephv7~dTPlQiC%2sw*;*XZ;OR=YhujK(FL z_#xu%zb5J*+nXI?)<-&1IIk!+{XNT2)u=}SsWdj&Fw+#wz+S>1`n)*A4efK}jCMu~ zWRWD-FH;!~Ezb4zfEctH)dZgPlY(_aun=gF(D#3hK$`|!r#2s@uWs>O2;ekS$pLf+ z%xD3!5i$mgm_K%~NNWrAquPh9aap5xn<+@_6K0cx{?8V5*fLU@^mul1jd-)ibN%Qn zr$6PM1M%UGtGVCO5JIJ=r*iaOe7D&&D2%g3xP>gfEUF_c zOaJd;RJ_QxcN^I{TSxQ?oNuN)bm>TVqS%r35q&Kx>dQ!@+NcAsnjuhpH|69 zsvWV1?9joq=hBN65-jhb_%7)XpR2-~U39E%WdqBtR?`x9<-C7-mS;08&o2by9ez4FkxPp6Iw+mntju1Vju03vOso&_{cwAPdC3)w@<$^RI3`Dx@e~MuwX_7RA z$be=}en(m)N-HYMW*ywwl8@0F#8%cSITGl_`CO&Q-Q@~&f-J2XsD#Hev)pR-R>{_w z;hQ-%X|(GkGaahyluRalwo6_m&1uT}2!d5O%xv;^r`NcfkWWQ?xX}s033Uz7vsKV> z%J}>H=Ne-mBb<6#-}UcA4FmJCjS1hvyogkkzR}*1SaNc^WNA-|ug|5)Nbw#R@RPXE z@{^&dO(2-=lcq4E8!l3=PLyWv{FS0{EM)2lUbE)vtLOa*B% z8Dpg;9EGekOW+*tee*Br7Mz+%bLYV$*_5a$yXP}*ea(F-k0y-48Jx_~IU^h6@C;+s zevGLweZ<&b9r2>?-TZ`k!)y?&&_(*0U@KXUJMO&@=q{nU?I_skF><*v&c`5@G>P+HA+M*Bew!0bdUWmYG_E?^?Z2+O*d^-LHu(!p?S|a5~ z?q000>Wm(hXEeu`cI@aRc2N{DeHXu@`5}0oD|v5s{4-mm+iBoCL=Tz`EA2<~uD5~5 z6po}zqe!e##H8c@z`G>qc5Rf@!4r&}<)KD|XwUamjla<@aui9Y2P;ftdw~@E_jT$r z-%tW=D@Mci*$N;9;i@6Qj0_E4r;Ow7Q^UI^Z=(0qN<~SoPYod=Z6DMBoVsDxw^k_o zUe5XEXTZW98UDPduIKMX#N3-HWo>vkP(dU~JYc;&!R*YSw5&d>43&xc!byd`HeBB8 zM4_$ZZ(~{rXZj76$heoz=4W($PVp+G3L_dB)psN)fW$8x5LcZ#Mu4uOwIud{7 zfpW>pC9Ph6mdhsAP~{-vUQDRp+1kD3bbz%`&s23;wXy_de zUb&f{4^)2XzI1YI0jV~n78d@2cXM+cBz!FNzwOf%@qg3$aDkFu1SC0KuOYd=Hsdi* z_4_gwSy<=1vtC|yk9X}|i?$N|QDP#J%>@`J?cvuqWh+h^5qla|>0fWzkg zDhG3Yi;<>(&i!Hz$>|04$_&Uw3R6$Q=_g9)oV=PHc_9f(tyVfxtdf_WhP=SDHK>j8 zwbMZh6aeH;Rq@2PJ~I1w344@t-qw}lH8IRfsiB%qr&;tUvFMqI-Ooo!E0&5iDh@Q~ zy|M1-smNtr@ZrDWFjqw~=v?TC@}+SB`;0ICHSu`UQ0&RhW;!lvch%G)Jo+9BGn??! z9lnwBgHPqVBt>1mA5&-Lwtb%ST#Mc)^RyfOWrwcl11kJy|B5!~dwP&LaZi8S_Cy3Y zVmB|XG}ja67t=%hJ*QU<22s53a_-M8f?95}eDC32oxRYOWr(XI*@WjsJ$3tnq}Nqb zMQRHsuAJIBHWV7EgnkwKUPz?NI>i$-X}~V3iW%SnHyZm}d>Tm{$q($bPY2@#?H{XsX&(7M zto?U5n-BQ@jo*nNF(Y=Z*wl(q)Jp63r598VAb_79TWxvuj%&)4ZO)&xlB*BYZ@JA&fpbYw%9 z^>g2_YlbzKR6hBd!uv*rtSHB|H~aT0z?oc?YsvmL6H8~YJUtuyEbpU8`{k64aS^Cn z@$_mJY`jDS7HG3eqkY4WV%FNnioHRZJ;G?Is*}AZKvoJl$Jnq%5l3}L*u)QAI_Y+8 zd>nsMJ)ii=GoaWVxS)B%u)S=)KK#luHT7HQUc=J)@hhi{soxtvKS`vY)9G!4t7w&? zCb?OZ{%e8R&+7FFVuU-3+IGMUH~4zKf!e1XJtuMu&*-!5Lld=L7*+u3Nf)09h>Xrz zi492o#F_Yh<=65j_=n4=Tw+|!|8ahvV%q!bgIwV zKf0o>aMv4O_?1r8wXr@ET=t4FQ9=r+W4M*<;PY0aUr0ymVSkCl-vF2<7$%`@x73q` ztM}V9Nby7?1Qh9eoq#%>Ke8E&si&0lfEvDKSn5>lIeNR6Y8`lVa;8h#$LAKx%h_Y4G2!jZFJEwR}>=NLZ*lESJ zd70T%{7%$h((~!AbF{HxXNVm=qW`5Hb1jcH0P}*al?&)Tg;0^BG+TH2cl&!t5+!E@I3(YU7;a zPl1EG$6HU1^`ph*oGTOT5G>NJoJW#YTdh9_yK(#s&Ks?1HtKV?lvItdamXTJPIe=O zbn%bGvep7qZDcr(GpD@E&6_yOxdXS#l02p%BOn!j*Gf&lpD8>LY^6Te5*~y{h)uf* zSrS>0SC%2NE~UeQ;1C(1bFFM zv%(89#x#QX=>q{ESVTbgE!O#XvDrgRV^b1mUP);RGeZfbXGzpCl&gVOQ}r@47CeU^ zsQ$#t*Oz@6#gFYyVGIXqWDVT-7X=>$M>oxwl;TrencFF_@CUrctT3kgq2lDu7(w|y z9-WC(j@XIVIIgV?dSFi4eT!R7iFQo;`8&G>uu_NL&C>o#(3Y4s$47011jI{QYyibn;pg?yv0&EG zJQ3f&_`JTwMqyIXRSWXqB+PI5dO}8A!wLwzDL2tY8ZC*D$RJU(z;hdU0}?f<-odHq zvX#yJ659(`5%vjAZ20LR3Y+!m?#m4D#x`gL3nU?INr>CM#T#DBoEC&0oO^Ju!(ZXxyhrX>7{;sR~y7Z`60DkHv}4d6={}(Z!u_oZpZZq zR$IGaoA^r~zR1}`8q3}Mw7;;$uvRkaQkv5@n(ff_=L3JoMP0xTLhqI!`WHnrFG7J< zu?1ypiNIl0+G@4E4kY}+9G_Ypq2$v1nyLs;HlU{EhyXJm!E58SKq<_0i!Z!8LOu$VW- zJIb}*P-@&oH3RMOgTNmXE28Jv9qv-E1^QeW_AOHO>Cxfr9&~~H~MBYH)`Z9orZeI`T#&x9&&*nQz^=R$i zgc7vishz*j5FVlc*x9t&$$Ry0?oBurKE6YOS$+JP0uyfiQ+?czgs^cmToKfXDo;7o zBHQteZ%*n1k@I-rah10qd-Jbltb9M2?ZMNU=T$fIuKs%$`#)YqCWX&czn$*x8fVS^ zmR%+zP)-5?oE1Q(7XhD?_OKVHw6WOT5ZNX4{e7(5#wIG9?B%mj4Wy$vfhq{3waC|@ zd>Ik&KFA|Mex%IC>-v%vvCjzeq7$alcl6@vQmzft}O=$=7a|qW~{iCIIKtTk0hZ=i5R! zVT!pJBe_?Ei!Tb#(Ejq4z)4TxJFYYvaVJlwol8bhxJNoTVSU1GkEaSi79d!1ei%LD z`{e+*Dst>HA8adky+7^S`Fk>pi}JL{%4BXywDL#!(r&hJYF1JQ4d!!GOGe822OGD* z;Rv!cMNqeR=5towPn=Q$3)xEaI!4ZMA8!-X&Yjd`6oH+*t(A-5Ho~{nZZxxeNBL@Z zZ%UfVEXIbUJ-AU59hA?f>3bm|Z!mZPlFqF!h3?tm-(*aTY!+_!cSuE;RiV`w_C#a3HkN>8joEPn0-ycz};~9(uKG?s53WO zPWHK*obT2Ek9BS_%m5r=I}&s3%w??IiI5vi#?5I-#vZYtctd(`-i$P57@CGt^5Yal z!JR2AH6?){<%Wh(-g#gX5B}G|^>q(ZjD(p92+VwR+f(E$p^8CgE4#W(qLs` zF%+vDsl;;Ll#gf6)2Tlko0!T5xWWLtH@8flhsn-69{U=QL4|R_$rLGXPxd(v7Dw<`&N?qvf}Z@- zs*WB(dI^`ciQGtGsSRkAw^HAm4M%F8H!{8qBEjbvglSH~;(wcLbu{_q`E9vsf*s=6 z1#C;uftD{!$+IkFlyd~oPP1#Wuk%bL=xI-ZD^2=h07SR&6VX^BfT#hL;-BQ-NgrRiw%8>7r?iOy z8W0$3pr@L^aSFU0$kt8J*sDzGkj$Apaw$X_Y-}nWYW3K9l8=GECWt=Yrow*=d2)J> z>nS*IRr=UC$_|aQ5fua895Tpqa^02Cj|+a<-onFo!5aeoVv+eA|4`SajAC}#hdN?^ ze0Gko=W|NA$R>Q<*vU63QJUp<(}eNgm7~J%{j1~%voJ!sP%;|%CdinlgIfFpFdOP! zG@*=mQS^{7baBLw;fZyEoKTOndI?Hzc|B0y737A+R9+JF_OffD122cVm87^(@(C`M zx_r5QSptS#?t9v)b(`N9Y}=CJC#a%i6V!n8oH3fZ{>oat!CF#3K9#Nb$}Z?iD1Gl+h~@>f z1MvQ+;#rR_5yv_|{>qikX)PVkY-$7S``r&KDMcnQr{~6Nlag}!f|K`ip&C%jdy$Jw z_jU+j4{FKYlt9QSIU2DT!TUE6K8&ss26cSrwU_awCU1W?+LoORXE9ccrfivRRFAir z&c9iqp=y>QkWa?%#cHok@(42LR}=`>&%iKUH@Zh<&+tVL5md;>&#aNQ`kNH%N2*am z`tr-Ur@v$ty7(I-m{p`U)TG)dofFGS$YgVcD;W&Zy>pKl#7d)t)*qzxMXDC~jm~V; zV^TdqY>gOVfN+n>#w7DvOlG;xqPH&rVZZ*b$)@)t^0kmfC z*ynr4(bF#^LmN4@NBybEcX}HGe7sbg?TopgoO^lGxtt>J12Zz((R$waAEtW{mSE2< z%eX5oOFH`3(D@sDOp9#kfd6CW+<2Gtu*L6oRfNM@j1_KS+=WFHQlbK`yhS1xFLm!bofOK*>))4DR31|*UfI8|XCK%Ad~=-7)H?D$HY8hVi`fKsEMy|D@r@nmP5E&L`fbYoYw(BoV)v(!C>*4=ymQ?otyUw@HfxI z@&s}4@z5~l=$X0H!8reXqPRv|KVW(04dE6g7 z)YFz%*&b~n0$8*d+=xEl=L~*0+(#u zMvP1_5!*y>J%TNT#LXRO5Ah990LHr)VrR?I|b z?Zz!lHCQRAV6bv^~(5((TvKU;~E@t1Jr*O@BJzHCC(mmpUU^DR2wdZbd zBPrf4l#~ifGJ(Lg;Nh}&aC`2a5A}ZLghMrDu(dq7=tFuxf8gyMDYkPTcKrM>0jJ>D z2&JOfq3k*>KECmmCE!OuvhzS4X-2k(b zm%C&nHE|$o6+dhazjaY7)vd8)lgP%l)J%T>aw?+BetrH%uU7H810L@E(N#H?mZnGJ zedC`Le!tmtH!dINO}sx^_{XTdxh*LS6AFGSzVecrhX99_4zWJ=EzMh#7l^0sZgFnw ze!*Kaxn`>HP5!auhr%A!DX(fuld=}x!6D9VVoWjQR(jpI3HCH?vpNXQkLNfNcaJ}q4fxnc+aw;w?bNPOIi`JQ|!gMx$ShP;xlEh)dV|RJswEy zLXItw4|j{dnKF11=RAO_l&o=qD5J9q-E*^(D_ zS1O@cSSi44l_Bab+(3^8q!b2Q(1fcRvdtX5^y1ehRfLQ@G-wJ*JtCJ^pJ(oyrLn7- zx;lWZN*mHCZ!$#RrLUx|Yd z#~+%BQ1DDr=M3qV^f{1LDra%x^qxdld{0bA%bePh=cs zFh*5@@-eGhb#tqg$$4}U!yC2Jg8&$l~1F5T|LE7+P>{11}lOcz3#t?dp4kj-6hJtvHQ_ z_52@7l|+`Q$(AasMXT2tSkJZ_RDO>=b8}$q6BNlC>Uu$I%~p;Rn>s(^${=zp_y^jU z;D#F@k(t+@h+Egg8YS!|)){$Y&=%rQXdf%=yP4+xZ)c2~WD+HD_fkuEMfO=w-ymtC z5cnkyiURh2tbIo9Fn?Db|7PPaO&rm#t%}bB^VS7YxY6wK$#fX5Y9I@Fp-tdcWf94U zN|YEOSk9ftF1*@@N=|SD9X2O6zl}hJpDD~Zx{3`^fQau5k!8u=1K$yqADIgpRiSn|u_vz$X7JM3HzjiKR zJecvVMX3i+zUTGZBJ<-m{2a{{?q+mtQks+c?%&e|$o6JVNKCg)q+8Za-=l3?ImgNB z!(m$Mx;2a~_IZysC#d*_l zsj`FDb9N3S@)jlLYXa2A^_$8hs@bp@&XpJWW}&6={6F|di%cT%b@t`WK68?+0^aODEHC77@N1*S6D+A;cmu?bs^) zdi?O%J|^Z|_Km0c-Y1p86N~V#$C+`*{iM|gx87^pKrN|kkP;Ad-l|JlWfz$&qkWF1 zBixK7q3o4$zxU8T!Ofec6a{P|Ptaw#iMj+_)h5n*V9A@dI-D14fJjGS1U9pS-Zz$~Yqa&N%WC zh~OX%o9f62^;WJfjpc#ng9sX%5QDncd@rxPbx9a!d$|ir-oNv~zdMuOnfXljF2w3V zRM5z+(j0w7g6JG3`mm2nVTuvtp4u^4vJCaZ(Z5vPJ#%u!ud=>99*4;O{$VuJDFT(atGf6z z(cVvIWRO9ukT2kEx$?g;H0S;YhNfl{2Gi4hG0b=Hl zH5^O5PAVS%$76FhOMtb+?WPs>X&43&GCqVf&Rrd~mDA=(s^qr>(_{ z{QJBvt?Ew`T_LY(c?z>0U<0uI)~Fscq*~D>dC93JsK@x1S{gz^)_v&JZJiT)6oqci zFsPSeh5uGaap1?JZX0Rt>OAr_!lE<|#WNXSF4}V7Ti)nP&OJIUK1QU1C}EoHongI+ zhZ!7I^_F|A-I_u><{Bu&iFW!|f$>^RUl3{Dbal?CO-D3pXk%mofA8IY!8LC2?tI)F z+%|7@Z|4%l?()yrzewnN#<>YQUnx43X$c4QU49uqs0QZ~6OSDHDYS^Mz9Rlft41s3 z6zuTn!bk1JM|)??w)FsTS%?Kc))4M(>4Vv&B+EfS3bk{bdHUY#(AkM8-m-7j<9*;fm`CmdGrEP=A&K7?^Ym^NsehL~B(2-L3Sm!MlFD zTgizpoP2b8g{m6AghqfFbN*kAud?ka>Hz+qcBS()FK4aodL;;|V?EUikb{&#bv^sK z;+N>RXFeAkSapNo%*_4mc8I{OJAuo`f85{I%wHiS?fi$^2U4xU7Fec8VzAAtk@7J6 z`f~D)_tywZ8Z}N>4#HFDbZ8oMx-ULHa&wDgu9rqHJqWD`sR0PAo^(Dag3$87gLY)+ zwT9-2|I{g+*Whj5a=P=qNsfWNF!lY26zR~7L>zVnMi&BlSV(tX&!fSH5zSkS6A!uH z&4FbSLJ(b6L=$|`YX&^9pXHDtCu{JteD*$~g*-G%1D7C>|;BNLss#>Ld0kDSrQS{!g0MD z#d?>x990TX*B(f1;b%J5tWsL^Injm}L`0PSajS2&m6nuv6yV?u5?E4}ml2cAsPW0% zI9nM|DTM#nzp)l*By@;5OSh$acap%Vdgh4|o$?pB| zZ0IQ7jQg|OJuW?uo-B`ExVbqp~m_x91*4@n%uF_wNq$cFq@Y^@b z&g&dJ-)@5aOhE)*Jv9gyl$X0IvZo{5xVX7I0{Ao!Rv2Zuf5hZ?zNxu>t@T=@WNGK; z{GVlJ9M@|h1Y^0ELFy{u6K@!SNRR1G;FpEll{*n~%{x?`i+ej22dcwi(x`NaUfPFV zRORHH?QGwN>Bty#P{|pip-T()odO87_6i{2l+B zyOKi1;tjXP!8*?2u>TlgVxCIpf~5kf&{P6{$U!+1ufF!ClFg9wG2W_zGdb>;buhe7 zn%O|D`!DZ&v8ho+zT-u@M{)wD1Lr{jC=?oh&=HO8&hlfwqNgL3Lx-PwS6aKL9iQ0c zwSfs&py(?amgD4_tG^gQc|_K{;))>fhlxCBqC|`X0s6_|n;`q`^i6~)Oys7E_nj+- z5V=b?V<`{du6_a;QQVckVz}husyrgfjoA1w3<-_H$Ec@#_c;bJmVEm`3=6ldZW9FM zZE-HkbSiLe*Uw45zUfm#Y?Fey zj{WlpXXa(cwsk=x4$Rj2!RdN|fVsG*25$|@`Sn~(Ie&ZofR!drBj`ZeQvKuTshOOB zPiczFtQ7eaD+rF0QVqk%uWUw`SKQvDz#C^o#lm6_>o@|Ur`XRO=9^nqf-RU1mAzD9 ze7fAmiQDWiq#Af&2CuPO+TK4o z057I5w0S_7V^VPvILVPD+Pv(t$LZQTmpLCb%l-rR7dmG8IwqeaEO^fn!VcQUx4b$7 zF*j!%4Iq{Gl%@I<6K?j$S+{&$hzhZGJj(@|GEGMkfn#3WvDYLm~t5qn_EEtpE*i=h&016+rp=g=71Cx>K?h1z(^d}P zIYXoR6QAmZ|7#3DB_1~!c55wmQ+kUW2-yx~8juQ#qrowZbU~u6<@#0VfoI9zH1VHl zx6hbTQflVyFHgilP{d!IUwFQXCX~MPPWLP_+x?M@z>di2MSo36zJUftPsjzWNExsyr+(5UazdymCQq~(0f73CtJ1#aw=BQdBHgZTT}-o1Fb zJU(U%hq|(@B~Cmcf2too?W!bztUdJm65h<2q8J+OkGlwmoK%KYQB@TH|AV!LBQ*Jj zz2KG-$)57~(WvKDWF(kNfXBOfkU38YQ*S*Yh}`inJ6qQsAiH_|r<&$`RbqGLPO8fm zjRhim3tUuoOdV_H3YzCjot-0Mrd#&Ewbj~mK0U!srU|}m8=D~PdYqS~43HNlwkw!$ zhWoJcL3nnK;tr=gDVuE=*gceH(vEue@=prHp#Y`T+k7=24G zl6B{ZS^t?|n1xGBO1&_Bt8wWjAThK2omx!;8<&P+C%vTS(RpzE0`K|D0`il+;DPm! z4He#`@^q0s5$sy}q+HSuRxQP)9iyPI?rl9!{Rk+TFZ*C9PA5#q=`L0Nz*FlL(JUW%vG{% zD#_h5f6vCXC`yQta^mjIQ}-_OZ;*Xkok$NRA0sA8|F-9Vml9xGM*Pc?!W``|?no{U zs@{vF(Br?Sm#JkZLZKm9SenWJ*ZgoFPgR}ezD#Bm;D;`{Ka&c%ddEEU_!YqFU-*{C z&Ac6JjAV0suLHXaTzDUd*5o&D-<+)Y#G4bRo4^u!|I82QLtRPQtEK9|^Vqz#1mw3= zA+jBiEl7h~`JbY*k8aNAz)N;HOYWoS3xt+?34did;oaSAGk1l*GakgwKzROum6%A) zR7fcG-7n8lzInOMw)VS=?9?ryrWKAqZ$gs{#3R|t{2`q?aiP5uM(1<}oTQ_|k_dt= zcgN_m5gJ?WlP=JGGF`y7&+AL$h61}Px0lJSi}nfDmtCO2zkl#z;sf{ou#AKHd;N71 z&?*OZ`F3CWnIv$P!Zxm%EjxEqIr7N=Y<?SAGEe+2vChf44+LsW7FC6_4Vx$*4fAg zi)Q`@qti<@4OH`;95(822FR%A@Gp%YAwYlOZR*be=9aSSE9C3I=Mn{}RB%c0CNbl< zAhyS&;%F(s%1&EGfw#IzWj6E57KA<&T7k02gq=rRKUT7bD{NRqZ(^LCK|Zn&cYZ`L z*;D|=Vs|eByJ99TGm8?C4j9mRdq!?4H^KH~O(=x@uyTcqgVnkIHrx5W(A()fqJUC_ zT08iF`}g?|Xx%m?k&1_^>QUjT+#C`umz-F-GBh_Ux}XK@=mL1G47Kahk?Hk=XD0d3 zS9fx?#_62?%xLopqitZo9goRyv3rv$(rUzCa_=~YRGV{%j6_%8BgWJw3en>OwkV0< z?8^kSSTF7{Mf{iK!a@cA{{%kZn?e*{oSY2kFu76)cXyBL?LT)o8`dL}kF2~#h$t8B zoMbRShl#sUzc7JuyAmgmF25A_r(H&1odCY1-?oIM|9_Y+94uw3Ak*ax1tL;9^?au$ zhEb@m+q=f~0wlVqiOptbzbac!U9L~lP0+*ACup$=lnGe$k0WH5@VyDypO&3N)c6=V zSP>RPxe$C#9wBhQs|opK*bJz3M0~h5*V!{4x#P2fap`P@xcDgzrQGZHAmctrCd(x_ z5kUQL6hHDgmTW4r5?M8P=JxE%J$o}cwtACZZvHWx;1kJh?Rzs-vfr$IoL=A(wx93} zkUicTzFZ}I!#b%w!qMk*08-*y=NEBCN*-?x@2Hb~tkoDB{!9%8u}9sld89%IUj>?=1w-Z|j)1GL3G)1Xh#mur_9!z4oS zZ^>2Pg~Sgck}fEA2a?>~PTEW8|87c>jwZuhI{PZT^)xz3A8|`^R?dS$LN}aR&6Bwg zoS@C(VnX9QtUtD!DGp&lip!VB6O#DFMD1H^8yi?5r(49oKEAHtWBB8?A?h!m39c6n zm))-il}$1WU5a(PqdO&TsU&lP{hMJXQfz-)z5E3HfCjf##v zRXmMnbv4hcU{%%8$cpt+i5X>R)9_SR$x?4*IV~IX6KH_P{e=uNvZpZ%Pat$NHbmq_ z$*j8^Oe%6lYVj1w7IrE#oeHDDxd+D-sdu(LCM)1C2rk=9V{~7l`2DuD;#HH;xiS|6 zPdAg82@v!xjF4}|^&NESI{!oT*x^lQr+Izq3*lTFidU`l?|1s3Gg=2b#NEE3dp#S6 zY!puQdNo?T4UMt(gk4!1XwnK_VF?US31@V2G@&^;_*?80e#jIf6#`2} z!`kH<52}(YZ5N`@) zR5G=0*=FauDyjx6`UF^LBu7Cn2E1uT@LtT=lp2o)W2CkP_(?es&hjAj$-7cL z{jBj+ZAgd(5PIpVSK%7|+T_l}&S3m2%>I0M=>Mj(ya(MOX#uQXxW$o&tbd?fR?=p zec#@uXa&i~vu1KMMp4t2SXLwZSVsI)PF(KyAlOF7I4nyJ7)=c7O)T;z&0bfoG~+1& zw);1!g8MQC=}^9hI`fl`kJ{w4p$b9cHL#P2ws2UGZqy zO0jbTu5p9-TbX>v%`CVc^*&n8vp{503bngUj?LG!+4HyV_xR5jXY;oAXRD@YSukJJ ztGTcytVyN{2dl#IycD7$aCVqnM+1EP^;bl36 zm8}OM?Q{O5T-4+E67V?#I@y>Bz+wgsb5sVD z;M81Ua~JxEKqH@f6~8?fC0LUR9oh5kO%d?kZd7oNm)(_MY`sHDJW)O&A}h)WlG#c zre~k$isyWXe`PH!ZMP5sxfZBD`@WL9pd%h_em7C;t>W#v_JrLo`zSUr<7XBymi^B) zQUVT>*(NSj>T{i7&$*B_`!mt7koU0Iqn=GZcNh=|^7BpI%`$&ZQQOnJ=C+%NCUv=w zK~HMz$D%Ynx?s5;v!{jiv4rKio>8-^*UB{euV5+RF{NC)%J^0C0^9WJS+s>ro>E1w zka=9=LbQKAKZaaUq%jSJWrc|TXp&u=e3^bllyM^k+5j`_kuj;tsx@g_NT$e*3?=*+ zkipx3ik0P2CNV7U+Y-8dKiAyfS*;`#((gO+LL+u`D;Y{``5ykBLliv(ZkMC<-jAB!#We7 zNT1!z;RDA>pR&msXG6Ox$>>;QxJ<0SmS0Jid@FXcaxp4!%Kth~{$iKea|}K}TPh)v(ny3 zz1S*kkNyTRu%IN~{kQNT3L)gGU1k<`aw1j0%MEL@@jDO*KZRNVehGghARzR znP3gkL(z9!VC#_94-;}$Azd(~4KpU{DBirWNwp+a+~i~LE{NQhs@~OvAJ#3|EgcKL0YRr9ocN@)4^GZF|0(rVGgUsZtO$<&9ab6xjN8$V^EBFk zn3jhG5l1D0Iio$^vcaGl<~B_+OdYL+E;SK(scU?sh@U(g64AZel$ICBst~b%VOnfU z+f_{~_wI#FT9_*@lG?@##~fc^GLaGb3=LqP?M`DxVOPM3G|q^wi3hoRdq|a2U?Wx0RVIiDvD&rhTzQXq`hz)#=v zvjGSd!ku~(($EtOXpq*MyGiz!O7Vqj2coeUC2;_rlB3O^%&&_lTz#PRa8qg_(&U{6 z9C+MHMz;{iuwk*9WRs9Ew~Ofe)@_m#<}#Nyvc9B%GwqaZ=@W`V^Ud+DR*{s^VLG?_ z{c6*rrnFgX|Qu#xad3o8H;F7L{=w$=aWsw%r9Ox{$rgu0sg!2 zm;0{2Sf*a&iiF;ii7@hVl*+wGe_hx z4CzH;71H&r6-(*~V23Nqfo&&A_V`dRy*mHJ^|HJmIiA|hcSmE0qFlNA8I0uYqLEC0 z*rc#RDfMIC`V^hgH4|4^xZ&}+75`@tkpmy}Z~oA<;Z#*3NYh3<$dE6yu08aT7S!SZ zN6{fVtNd&x$Ip`U9_YrD+OZPk6AEAy)dVO^UY|7@b{A&;QiF~_+%z}pn*KdXVNo;v zXoqrVumUAE21}xsw1bTsuRs{f9IdBot~ysWhB}SWOp|BV$NA2Y!^<2Cn9^;P_01Q5 zv9qh^BwHjl9}|yx`a@pFAFRbQtl*Ah4&{{hD0hYbP!8c9$(fwwb11`qKZPKy+hMWB zx%!JcXY1QPMxhiZE{I-aYl#_!N~z^|q~1E;T&roavD>rmdJT_ctG3fH`Dw1TJL!$u zi^dJTR2Yjgg#_g4WpH9d<%%omR!1%S!vB?4V?dW6hjjWTNkrVG7T?_h`KIB_^~aIL86rbxMzhtW^Azf|I87 zS7Xqg3HpbTaN8!oO6ofcz)Ux1)Z-D~Vj(ZD^|tLg9#J`6B`#N^SCA#%OcnxBhtM6D zo=3+qiVl8}`)Ia}Y!Lu$*SvsDukD=;vgPT@=9X8g{|ni|BN9Ei`^Ozv3!m^C^Cu1WHgm7pcPcC6r)}<Zf)F z6BOIPCuOj-ch*6Agx?25uxS|lX@cITJADn1oY7i8JlJ?!_nKU+(YiPIze&M3iylGU zX;qV`R`q2gKHP^}WG;2~ucziYsNNa5@#jw}bJ>h(DFdD_wZ43Ss zithI2N_?yljlU*E+0G7b3AZG+10h-?_jT#3&B#ZBI!Lmp%JlL3aT|mKc^Q19F{sev zI~g#uzte*|T%5796>hxvDZc3-02(Q%&0+3Fs{ayCB(uhK5Lh+;i7?oZIIs zI=j{jv7n#3rQ&Is@x_l@wW7x_Q;$$f5OS7$&n7x6dd(Nf%D@Ax214BWORxK^>QuN#Q;iyd%axIRY5JCeo3Hw(A&8 zdBs=L*T=ygCq%=p);ij@%7Jx1Dy`C9u2pWF@?23CYkTL*ZmB0Q2p6v0QzRwkm??fu zd~I{N$esIGZ_`=R_|u#ZkR=CJPt~D7dc1W|Z5F<`H~tIwQiAgPHgg-!0+t{Fb(Mjq z&pe&jpR4d|{(H>C6l96hR2hi%rF*(u0NvYIR#hyk#wTzhZ`DhVmxEsXFr`gEdTEWK^A}$VWK*Qq}+h~>(kg&W7at(VGLAfgX$mCoMvqbbL zKyL*|u;Bxnw<^M;@h$a6XU`p%L)^0H*1#!@-6LSza3qs4pf8lIz7UW zGk5Bthk8FRny~(dy1llku@LLZaork+jz7s~ibSWl*tl{g(FNZg8aVNN?wA`hHI0C}Mk64Ik@vjn+|qPJ_IhlU_tA!cmaB7x9IoguHI zCpAjh<*1>#xw$0_3Fw=Vb0tG-4{%!gRt@cOeCMtznZ93Y(pJ2c3)?%8AbDtQz@=zE0=K!zeg$y zSHTB&>EGc&+l`aRRp^yZYen@3Zb3L94lFPjr9Z-cPK+!<*ODFzG=s3OWE?5bmX#0L zPcsO5fS;PbrQv*tE4*+O8yG^BPXJV*=1B=JlTS#_GXRPFMNfXfo+5WQs*-A~FZLvU za4pW5xHwu%vu;7|1q}BegplW}=8g{>hn`Y61$T=fa~NRWM61xXR;E|F_%a2suvjOq zUk&zu`@BKdk-$mc)ObLVkM|+~ZJ8$nHXQl@T(skV{~J1X?*H`$W8+2z|n5Am#j6J^pMx<^wSpfc!=v<6>w6Sb)8nkWwVMJzi(<_FA{$9 z>)Z`F>;~I6iA*&$8bsYnMOplZ2Nw^(j!fW+-?`f}@=E#+lw!Cfl+pV=Y=CDW)#S$r zw^Mcmo9@d%LqkOpPe@7ZIp3C+)226t45dqu$mTr<0rSR0Z{ae$PnUX+->w11dVvHL zD75Qd@L^iL}&FXZ}|0#T-KTH&Mx zTPi1B9_yT+o@)MK@lzG^`R?=mp$;lDz7%@i)iKCUh26JAvPmYSRsbeTjK4|% zLL*)VV}D5jr>FW4P6Ow~nJf)9p!(qcrjMFAj9D1KN=PX|_0xdM{WKk}0X@B->PH|T z4hkIuMAHhxurPSzrvM|Hu!(f(y8IkQ3jlFp5kYX640|+S3D+Vo7N&YJ7-fg~70$4k z@mmc9aM*Bl{MOpD_CUO8L%Lsr3%(9 zs=ywNUu+vz!;%R;4DY*1@AhE4P}(6GgPwPj=srK9Nt=hndv-p%Al7-MUdBdPk$KgQjw}_byySw{r+M zrs`~&{SWP`1JHxVN~AT%aB!Q*MO#ON#I*?TzJ4eH`nH((q34$DPqOm<8|7?16DIu; zMs5ls-?&3|?CW}b^Uw-=eOt@a&ijWX32~>(A&3L+eF*|OQ~}3Wh8J=74`6WwmAW^r zgh%a)II9wZhxI9*3|v3ru(#dIcqP8VdiJvWale%&m3s4xkzX2T$yd*`Y1NLeMw5+; zE6B*Vt_3L+)?hj&K~KD);Cbs(h9q1Z9)T(IN+z4ax*wA{b0cco(Lku4!K+6>Cxza` z(W`(kX}xxT2INIkg3^J#yz1-;1dbTh&kw9azLr}NLj~hJcb_*QX4b^VKs|>NM26bf zH2m%As$_7Ggj9RZq9B*S7*TzK0I~Npxl)blpL--l0pQX3bhhcrWUb`ULy;-o>7RX0 z+#hVbu=gl~vA`R%>6X92h!F9E$i?`N#jH_-@1)$q1rQygyI#4VX3*X(qS?nf3iY4WfbQrYLh&%pcx(q9oo7z8{*l~xtDe$KUI7eJ0P|mOY zoqE4T#d8WjmxKc;kwDZ0I$=L=lsfFKSgPNCutaJSj#g`(Ij_k5G%S^!0!>ftG?8U6Uhv0v z!e!)djt6{QpUYyCV#&$*TphqY-?wS?jSeHESahw~*z(}x2{2_J?5yBZ zDj~upq|V99_n}eX+c?(?GD~_Ff%qzImP-W~_W>AVGKJ3Lgfuj_>S4LwS}Zg{o`96- zuX*jC{1ak$be6NWvKK~H4xnBwT)}%*nrd>3bYZD#1gRUyOZx`r;@cl05PQF?DQ?iw z5K$KuPc}`N)R06-H~K7EOP8yNfLIZuX{a8;ZSbaONBYFy$tVv|%GO)|$P78w9%pUv@a05!%XltBgD_4(SL-MDK1 zVX*c@QWqH@cU;v0kc2EQ3D1zd7N~jGHJR9F{txpU4e$wH6tTlt& zRa8JAV%I^huM@n=x%MfU1YUKCU86W}$W@4zXM=6S(!hM?1klF&{1)Rq8%K)TkE3_2 zHmM6_ztuEJDtF#bf?us>8^RMHV36tTQ$;L4IX_bR1|>ZL;O z-ah%N6_|Q|yH}f-D^_YCm3ZX!+ZoP0NgKpzpW5K2{0LEn2Q=NHx08mK8M zFSo6H0i@qMNb#j@#Fviw$Onjio)M?w=SN&0u4{65Y9?VJEZ#>44~2a}!0s$j-rU)5 zrTJz2-6oyoh#TWNPH8I2ff-5=p^qO!^5j7|+&A z2`W_S9Y!m3ETj74DFX)@ba$a_Rs@X9Ril4Ca770bGDC589*jf@zUp3KFouJ5>n~Fv zvWg2qS{fS_g1Fh|=29B}4{L884rTxUf1k5p#yWN)TlOVHD6;QMh(d|66p~O#wi){# zB3orCX%DGLn6VT>L`B&~mJ%|S7~7opIdom0>-v5__wPQA`@WCE(H|X0{V{WndA(on z=kxKv6c3yJE`r`PuNz;zegtJ4#3MeWj$I?XD+Xf&B|f;AghroHja&EhouhNkbt7oQu;>Jv_P+fSY&o-ds&1(xh+w|a;!zK z)U$e1@IqREtJA`nGvNFxCL_Pj3nV~*rmmBA&&ccf*>xt3ilV$~X1-7ZrR9n;)k0Gd zFiIE@_2|`x=h!|zA=vlCDQe$P53ZM<1uXdpsNrKr?wddJ?bjj0>Q}NPgeoG$5##MK z%zQjb0&;q_K?T%(4>iZZIUDCtK*c*7`XS{%e@CNCsrlCt<{{3aAIMM(C1P@_OXwM z3Pg;ho3H3X9l!_Ser-ML%eCO^L{oh27o+^*H3`uJsv`!oINa5B3y~I}+Ucl9}mm{7=xlzTB2!FR^U zcBv(bj+wtoxiE7I*8}H6d^peSW7F3xvZ_i|xQAOMM>9Lz`fmBL3y<)KWrp1{qSOjg zR}A}6x$zhWZNDL8FVf?uZwCMUevBhzN|q%woRYfLV{fxcL?PA#;32-0I_W3!vZ=={R`Ga8X&vRbGJ`*xYOo8IJJO)ul#(@j!5AMxe z)B(3HeSLqLqhKp70{D_$SlwL=`bX>?vfTQ`c+B&(PyW8a5coNkK%pKEU*Sbdv0Ij% z3|~8DJ#jm|5Kr9JK9Km&|%XnmcG&5nHM1~8RwXMl`y?>4I{`#WmtWJX!2i-%>)kb%P^I|HViBz(q z9?bZ;;7z6d_E^{xEQ}k6X5BWr>hW-$S8(Pw$1%<>D>I4!<840MiwTnh?E-0EE$xr$ z;AVfW5b!La@ZW@^U!6vllgW1>GT-hK>Aq9;_w9u@+tqhcYghA3?lDXy^D03I6X=2 zWybVM860XZ^lCcQk>x@yXQIP^Z!urWI%Z zPNnRng7Z{;0A5mR2*0EL)ew96*3$h<vytzBW9a zT^|s%|NcwCAU+$!rNjqtJfI7AWFJrN{PpI-NmLNioPrzSo}0QpvLHYIlQWS~I-APUIWGLQW0Sn;_ot-n=W|(Niw*ts?1po%a&?8RX&*CyVG!8d>_LlhUO8P8WIbT@{a% zZsp=N`RY&P@&v{3mGuOhip$#pfO>fb5BFj4D?B(h*03$2hL5euR3b0nmFS~|g$4gh z;5$JT6GOwWC>$PXv}C82P4`kyRr=6}&EM(Yr(#mBZj-_>bQ5G=ANSPeEBicdY%2Gq znUw3@kvyz$Vg+`HU~(BjW_>C5%4w)q=Edb<)A@j!Q$3*pnlXIR3JD{qSmXfbYqcrY zneG7F`;~EWlYwyqc?l;b+sD96gD5eUlX$dh*cpN4g-M{WbE#vtXQ^0O@u+iO69Tq} z`7Lb!5}9uBqnqrjRh6$Jon&Nd)LFS%?Z78<3lThd9;X&rpDc*Egi=__-QR8PQ~C6wcb7Rdv0ZhZl7;cN%yG^PXWO_o)~(>IsS&2 z2uG2l7a^#B;jP5hN#4VIO7uhsOeJm9jYd}x$Rp1459v%~KbQ5uFqc^q!*ytLGo~1 zAWLec$dX&1JMaB8iF3v8Ej&8)uHpb2Akh(VxZAPie1w=cOXM93N&tFl&^_4y+^`Rx zhPZ+&$q^WlI=6gvwUbyG8_@8wZsF+T<$2vy;X!XHl|!JG#rv&=^-=a9dAbmPkRr>7 z;P7%9cNdp;S#G?XHi?er#JvM4qT|U@Rr^S1Y4Jl*bN~zj)jbps*=_9Ol}9|6F2~u6 ze*32$LrSmEO!p~+gF8!=;8M!fEVy6dp!Q{mcYlM6B^@ud$aQsKaw$dJ@h0yz*q3+V zM{9DXGp1tGKEOP7sxSq|a?1E#2eKA8kC9|YRukh+hex1Xrb--A1qd(`LOa7{wzsF2 zqw%*yf}eJacW*cHFfVRgnSrDXwA07KmtUzI>g~_uQ~$np?LNe+M=>A^j20R7*;rt05_A0cOiweLUR2;vQ;rQ~SlIUoWVz)(&W55z{f z@?~ZIAURAtsAZq6X0yCd8wM57mTuLrz9(nZOG86`L?P|4Q`X+2aDiUKu*L19oL5d|;$OI%EsEu-Ykb8CRme0YJ3ITF71FvHs)5gl6) zdXzJro>(5W(O}>vNFU9Y;HyLz%J@)eZJZ-=RAd`2nkg0bW$l;S+qK@uH^a$mi3B41 z*om#FyD!=GRFGuM%hBQ~&@;h61giBL=7DP<{wMwJb*$XxPOYEzLeL-&V}oZs0t@Hs z$u_#gS8O}V;w`!hP|}eoL5DTgD@oRXNw}W%9U{F*=JOxr3!F_qg^fE%@qm;Wi%rhb zdy!PwC$a<9WL|dZ3-0XxzJ6f=lu#JUSUat8`lrwTkD5%9qzav#k$C5N>}C+qu)zx) z&LqY8Q{7h-z8H%|T#cF@V*eqM+NpZS<9a-Nc$$$qnqHfEdcYMYo^m1j56-prV zdtyJc%pKdgALjbVj%Hdg@?{gi)x>6V-&fd*_~n|r2!LVEJ!K8#S}ZKPffPATbqWP= z^iY9x_gUL_|GuK4#Uz3M+`>KVF_y zuN+T5Xs5sb*)tvnmw0X7vRk5tBBy+58oTuCR_O1crr%hWqu;9h4!9oq&!{L+@#kjs zsBItVOV5k<TXm_n4;!)Oq zU2m95h4n>f#yT36$Nfw)y?8}tNC2$!5hwZ(i>J4L}8l(ycm zDs3)w3@FcAWcoleWSG&Qth8E8^GxM3q^dI`ZVN;Y(+~3erOEi7v*W4bD*B(bn78j% zn^UZbEcG5DCZn~-W_D{acg2Y{XZujqC&y@V41&=UtSuvyY>a0oTye-FIs#A!N})A( z?_~&-)kv27T~{x@fbW9Bk4$ku52 zE#&7&U0mz_e+rF(?cIyj7o_1sBu;@Ks`fx44@kRN4ea>gTs^jf-PPp{buNxpTX`nr z*wECT@@aO6Bt{9+-mrAyV>iad_)~j{89_S#1)K%ntMu|1q{Se`Cu3C3K)iC37@@%e zJ)S}reeSz>dho}Mc7f1xi)~lB@?L`4+(pQT@u+!n3x2@1fSsx1NOk-bUjFA}PE_j` z2pjh1^CBp+6?5_{L-odJ1P&J=4DPXnsxXOW0QSH`2c6&c`%rbQ@u*V}*tG8`TB78p z#K$Y`Qt$I-YMl(vq&5{JGuT3WkgWVU+NX|2aS+bc?{xiM|G7E6;o#;mx#15%Z8KQl zfy3@M846U18KbODN1k7m10LYxj*S<{E-rMema;=0za~d}{5|{_hbR0FW^Y8MzPc7>9&iRG1(S>4l^Hu(r{nYCuF>ZA@82bmw_v=8$27>Q zHZ2F)FH7C7;{^2iByv@31%xvgb z0L#ya428{@UKO&g2h=M(jn}5i>!0<0VA44NUbJHOXHZ8*x!){d`GWL3Wc)oN7Jv_N zdhzsD)UxbD?<3eEPH>7iw`_`U1^TxCK^g>&>k`v5l zc4{x28t3rHprgJ%SC8$}1ce$2q^k{CpNAnY@j*duTav~RCzT|KTF?PM(zL}$`vdsV z6EHRYp=i8w8YItYFyC_`rT9Njf4;52yNp{|)ltzN`y(&T(V3rfIT+@ZcC4`=3YZ+0 zU_<^d!m1S0D4?I<5^uo&D&qAfNwmaQBn5e^^`39A+0Wa9L%9YBI`iYl!MwLTww~AD zKGRP2F)FT59BSz;yIY3{k;JU<9I%GQsk;gxSph(?B@{ECo;fa>%aFk$rV+0?Hg z-AX`5dJhbv3C)=}+0U_Ljp|ZSXv&N|aXq4UO9zq`Ke;FTdjO(Ar4!{uOC!Q(VLL4s z5R54yU%Rs0yyIW<7`ip_9?ZkIkv*4a+yACP}Q8?pw=yd`IT>-Y?JbY;o%|Gxu!oDHEyw_8^Gyb z4>euLo)6GvazvE~*d%Kpth(lxC>#$;b>W^H#)7qcp*-i4Y4Wv+K^4L%IsS_FBQAkH zRs=xLL#TdRGJBw{AvBe0-G>C`IN_D{sKC9@De-I9CfFrBR6-Xg?F_`P&UNn$js-k$ zCx2R)@Ah|c()oLU{KL$Rw)QK9lzX_IW>u!HJ-1n_UDY<;a)Mnt(18@4xHNWHOq||H z_A4?g0qU#cCEsHsx|SZ=Dmzq(w7LBYJ22E&fnv8J$IQajT!Z08MI$i zsBK}t8@NU-n*w8JUS1^%`LtC+gSw1s!;gGgv1U_=qJLY)&J{)hLR{P5oMwYR^tecc zAGx18;v(^d!I1o~IFIrgo2_^O$c%A#S86VLf?AE9{77~NaWcU#@ zb~EYq zGgZ6jT@-M6Z1{Mnr#hsC4F;lvm363?`;W)iwiDn3dqU}s^Cy=5w%UI;`;%D9x4jHT zoFsE5L!|H1wqU{n_pwRaxl;F=$c-7?#JjI&*)J#Wy~m+-r`?mT@LJT8Vk3LMVh5rN zdV*JWNt?U4RY3^1%I}`uk4uY+_TDD~Q&?LPDf3f{Zhu}mdD69Yzjg51dk(+>Q4XQ~ zZ;Z38Fu`qD1*!@UU2c9(N4k=SyNh_vB63Q&wL|FChpBtS8)2PYMDlbpEs=Eb2=@ogU#wd{45HN!ONlPDvN{3BL^yZ z089xVpdqX|-o&dz&I4{kFn_o{V9E4Drqs@Uv{U|3LQW5vu^xy%_J$>ok;{1LS1dA) zf=2y={0(E=O=S1#F~GGX6(q*%9OfnV{qWapmMOu@alnZ-9&|v`x#d~4nQT{C>qoKd zp0NSvQPD6_o(I_!)8v%zv!^=&Dfd0k_|~dyOVma$zdzNo&}ePpmx0_Ln0aPMdKCER zCY(8_$8KlQtZ7kAr1#in2Xz;IO&zcvr92Gs&4}jw`upwcqZAW3AkR%kNOXISeJ>4L z{-*u&ebxo>O&d?7jdUu#`!J_onD8@IkNOZ9#ZCWMww4T!uiJl=Y6dp+*K+RXh3aSs zIsG6E#UaV*g3^2BM|v(NoRDl=3iB&5ZN4gr+S<2l^Q~j%F52mX?Y6`LDTo@nQt@}% zK4AAWv9lH^tjcC2imi~rs|2*X2rml0=(wU7!xFL-*&B1UlEMqjX^sm^C4IoH-;??% zCjaTeaPgJal7g0Tn`0RAe48h(Cd?YANd0FF&tj7^nnyRTG!*Ij+%tP#1-#vz~- z-^HBDhHhn=sZ0nX6wcJaBV4X$zXc~1@xdaP#JE>N zgIOCtfcusD&P)-@Ph)rZs^r8-Jr8urf@+FudnyU;YV_&l7ND?Xt$ig|MJt>Pfa7X` z!RDp_Kmih3ZSlii>UiF6WKH^` zE`GburKBySL_+TC@8Zg*j_=%Udi96Q5RXc!InJagG^QmiR76NLX-sNHR8_O~f;IS` zRt%EoIrw+|j|hEIpZ{6cpp=vnpe6pWrAn53Yr}$;t|t_^jXm8Hv3^y9bCc24Fh)e zEkBcQmG5+6NPlrv<1mUVn_D~Q)#+V~=Iezz>HFxKv&0hX>`w&L@IYc@T=LpCV>iHC zj#%95U1$Cx@(`&zrcb7=(je|^RSbIp``h2tXW>U{OGwJdCY0n*5uEqukuyOQ(Si{C zudn+cqUuxe12~O}jZm{1;Ci$wgS4qK3q_J7w%HF$h47q8`+ztGVi+p}IqzBL5D@Qg zSQqt+{c?=RNi-8a%jwAv<5*;jM~M5*?V*$CVJDgO2R&GIy zn_8yu{#PgQ;n5Z2Ya(L&$q8E;8a2C`t&q?)fZn9x=-`onjGMKgVLCS;HF27f zi@rO}j+MRdNZ?fNssGrqC_8ci=?A!FC$nVBe(_WiW;EM+6Q45T8X223=&gOo1q5<8 z+?s^gw=bQD{hlPsN;&G?>#V8;5nuBL70^(@on)9NyFPB`58MvYTAM|^ZWXlYIMs~H z{^dqbQxh*Y?wv47hic=N`;N+_^KYrR4R@&&6*rrKuV=q2ZyNnqdJd-~x0Q!9( zmEfbn;?Kvo(T7Pg7sJf3PB0Xs-lPT-iv2P}!et?fnB5V1FWh)rh31f7dMA#GfhZ>R z0oIHRMxltl7b&%3eg}WKN|j~q0c>HR%rPx|8AO)qFl!jcbE^eP=bqOQP1|*V>+NkO zJpbO;Dk{)vE%Pr+yF1gToo$y&0G7>VCN7)ZdT8`UY&~N$v7$T*bF>uu)P~S{~ zya4{NO>N%kv%=sH?zrUxEg72_UQ;D)C*AeHw}pN+QvFyw<6}l*LTT@3VY@lsLAArW z$R~>D3JYG@+mCSQYzXD&2wWy-W<31^XyMwxL$89u&PE2Bj9FrIcSKk+*QXyCkGw8f z^I|%v*vLA}lgyUPij5~gW@3q>UkHCMQenLDm$k8EUyFdM4_ul*#Yg)#PA&jh8>>RW z{~McH#MTt=fKYf??cZ}_oN>lZj~RBY(O7nEVUW&AJ-A17{tXYZa?GwLZp`d{>ESVpLtgn5Fm zAClYs*JtoQVep^sI2wXdNv2seTJL_TgtSY^O7cqCSoS8yttXoCDHe8ZD9+9Gy!Er> z3R6wW3AKFbiR-6(8VY~giXnPa7bW}S&SM^1Wn)4PEW`vOo+)MZ?RS3G zjk2U0h+Mnef_!(A|qa3$ldkf2fFU+Br-XRb{<@ zTXAhk@RdTdt-$oIh}Zfk) z@xniMm$9FH(U`p)_c@%3Bd6A@((fg;GPxVTL|)wW$1Rp|L52=8Gav{LytRJ(dm1Q* zfz($J^QI97bZq8h;-c~Vc+uO4XqM>Oqa3pd!LcyZy0`x`hO~WCvB&dYXX!H|Wzpfv7Wa|kNq3g95L~_Dn6s#|6F`i}C<3=YF(_xr(7ZmrGEc>QtWx{ukj z`(DVfbBZfDuJhaRZ8L;s`$u`swC^_fNRqTV%5^&C zd!wg$n!M3`#n(fBB*ZE_Q0Q1o=1>(27_{e((^%bF0;0nlb)djs%;n9N^9J|u4H`$S9URHq_Z!;T? zI4h4Hu%5<-KAoPQyJ8^Fd2@DqlxbI1&@vVsQy%8wia744(&mF7gq*CQJY`vP!2{$W z^n!bcjtN*aQrx^F&oaXbGUlzqbYa^3J9}LYMz@^RiQmV-$<@^qkr%UZ4fLkc|2S45 zd3P2f>h;992&E`M{z;hEJ8QNfGTqKM&@*&i`{ zss7w01Ij{;foKsoMIchBpoW4zDWVzigV(RnaN<)!o2WJ!d*JoaP1h}Yx**-vW7Igf zPv-Sg6yh-f-fi)ouV)T|;P%wC(6&3N#0%i{<86?{burcempHf1AKGZy!L;7)m>vc` z9QUyfzqk1!cIAq{fKDkNfi-lVDb&QQ(Uk>mYs`eO6&0;S(%(EGer%~`%eDGTwHh1y zS*q4&Yzx3tJg+OSbkW^0Ioo3hDuRmDcxjZUaf8b)khUc?TYx z`$jTq7+NJvEul1m)MVZ^2ZS!($b1?^Z&Xv-xcKZ`BV{vp&locxkeYlh`0>ai2w5Ly z5T#!?d>n6)EdErks#1ro#4N`{ISTZH2vvs`8Hk`4wa2;#4d=_vJZjBx9Cob^=$pKWG>7(+hto z;oGtI2h+zX{GfqJhQY_~3|!vacRx601!x=TdNIb-S~EReB>bDmp%$Vy`fB_%N7pCK zCJFKf_lVIbn+&TczS&0Wd#SaesB}I^RQvPN4ji_9{}p6PlX~|?VC>~7a`cnhs?ayG zEMIvv&0SNX`04Zl8vL|EZYbQA%iLGjZk?}zdtO8cd76&{=$n^Irq^5;Q2h802U$Eu z*_jO(%Y^*bMp0{DsvdX+U7Zzd*SnbMNQMbSeY!H=&lofM!ttgYCdq9Q*$tJo01=0u zFT;rv^C68tRTpN!hioKfi_@B4*Q27iTRX=S(K_DyanVAdVXEvuE@$im$Sa$L^D0GP zT*NZGnOp8c1wLcAp_|RdTDC0wOR+0WS9XL9wCfDGMhK)SDw?h(LqLnQB)BP_BjAK2 z#CEMwhi`4C%5y*Oxj{i!++XWv+hmA1?NeN&Y`)>~JX64`q)5wL@(pe>)iIkT9aV5* z^4`$z4Iiu)!Z6V^KPb*;U-NC>rh z=E@n$!`z$q5oZdzMj56D?ywxAVOlTw64@nHO+r_M)ZQ<>$fJj!J zlLqPXgM0aKD_lP?60a;1eoe9`SGgKQiww=Ke!o{t4d8js*nV+zXww$RF*RgoPONKu z7L|v=ayFMyk*?{_iyj_o7d0m({yYyZq@G+tViYP`!y@~^NTQXXE!_lgYiz=QU7Mc9 zz=Fh6(2XTDA2E`5>8#;=Fr=?-0dD77;Nd^61wbUl3W2^ceouZj_JOuE1ZrH0>gC7h z?&U%fm19JsndygaLAJHq*FhLld&i4G^@u{XC&1b09s`@=axVB4kw?8=hF`vZq+JOZ zaz42yQJk@q1nA$olz|J{z#Hy(fMXS1|Ko`m=N&J+=@bi{WD@_vUHx?p5S-mXG0)d% zmEZX-FTA_t+Xb+m?agv9B5_>4TU;ak*khHw*>H3DY8wLED9HZe1!6|FKe!l_x|ik^ zYb!5;YDeiGlmPTjw{L>mJ}SAWgwTDyld#vC7EU0W#xUJpTqY|d0M=d}LK}z{XY|89 zqKq?+ELK#Hjnh04oq9m4ROQ~CQhzr;+?p7Lks4$Wj#|)3;1T+()^Db32M6>u!^S~U ziwp1}Tktj1!UWgq9IsWv(>?7)Mdid>aJkTFs=s*5v&R@ zO|1N=#XLtD{mGX2KjqVKrg?z>$&Z3TFVRk=6T`kXKQ2ZM9M;myyw=`97tl7;bK$^5XqHn#kW}yms$b{f_Ku2=MckTnZ2?8F?AAh&kWe|G&&IL0o;n+s zPLkFN{69rZlsPVxD9b=+Agg4{J|HUsVzG9pfy2lXKR4$D3oQ50rG*fP5?hs|3>ad7 z5O$v$&{Td#7~NtVi~VyypuqxHX8s&WO6xiTVNgZmjnB9OzC}3?N9!z3pHWIWkq=6} z{32l=Izb<1_Il;?W&D#xg6c)U~-97G{m*lBKcbfDNOxfFv(0NG*f2U(57m1-L!7a6*p|i|dsIFXGEVh`)sB^Mrij4aDOXEo1>Mp0%;QYzgbbyLL zm?e?puvNH8df?MBdNoQ?Yw%hNr{ON96-ylf{N;`?;gz0zDbRrq>?b|3R(a#H{+0iC z2dG&k9+WP#gIT1D8%T|Ibmp@&zVii>lX9koTW1v^kj1k%+4=o)TQXD=zBy ztAa-6dVE2iyAz5{?1TJmQc^8_ihZ^Ra%%nS-FTf_iAGB6;a8uO<>v-u2`fvrD?;A3 zh;s#v$f2(EmFn>c#L7 z4yLIT3`)bQWk`q4Pf6r~?E>TT^gW4o7A?)eo7&bmK>-onES^x9)=hP9rynqZ_g3nS zZiSLJj#@7KHu=ti=Ylgn@B*796GXwJ%; ziO?7fS+Qw+uAQ?I3eWUtNI6GJ^XE0g5p_z-kHe_8Ypk7-jlcGla+sBi?A6#yiJy7T z12{kcuyKJFgMXfuATF0AgS0M^k182&CDeDcLa79;crSeY|FbDL=(BYcTDK32mulyu zSl9i;I|Ec09{z)qXYb`clTQ&TrTgFYK*(ec%i@pMdOLsI83~o8if;10 zFpCl)KKC;TdTtkG!Yypm95x0Wj%aiKy$smIL$3p7cimMt$r=hNF4v{rK%nkTQ)%bh zsx29%EBnKCyZ_cNng9jzE4h2I4>SjvR^k=4IWB-001jzmU`3MiB#W1*bN@$9~L6HOY)#)k4=PT}wpSCE%Z|H9+X<=vfM zQ!GNgHYsTO5I45fcvfN0`&WH-gt+4u>Hg?}mAKZ53rUUxzM4?|pB}it=@ESd?&I`K zH2Sk%Y~(Mp4)yq^)XV(#%=$wdrZD`+>(;mx*_aooy7yciGcTi+dgFOG_9ko%jnAF1 z_EW=rJu-&cnv007keS&ZEncxx%gTtW;rCB(sNA<=|{ z92wp4QGC<%LoZ`KYKn6Tg13gQO>Wwy>M3JeWm$0lBdwxXpH0uKrJUe0o#U<^tUrjjn2a9d`XH=&Ug`Z)_3`ny*Y7XehO%uqt@}hsUf*#V!(QwxxeoP`FA5^- zflHs}C8^VVsrP}0#=-_3kHNKKsV6~nnRpJs2tu`5eFWa)u0Dkf!4F5WG`u&zw+Q8b zc7*i|Ubw}q5~9lRuITfK5LM}M$ih#$UXp*zkyWKez~ob--dcKbZ<>g;c{E_?*6h)= zgKI^9g!*jX17JT-c^VgYT3reB_Kv55c@2HuR`q+U__jJ5Z7#I7wn+~!lCkg;tsmYz zm-_{`^GWnTR+&D%!7UYhe~!7*x8^TB@J4ks+YYVu>&6zpf+hXn3HmAlo^V3;%v7{2 zJjfK2rWq4#_8`KXHxT0#L}6Sa#iau>%xS+lTDGV782nn&w|!Vr&sF6~z|6o*GYab7=nGcvgsJ zDQcjoUz#>t|9Ue@^TR{R^7eP+J+t4N>uk+Bf4*wOp~tRuH!1ZInGv0af$L?SoWmm7 zpBQ&i_*4DhgYq%jK&y3WKwFo2L2uR(2LzTEJ1N`zjY4;F8ON%{E>zaRS9prmg;b?El9?d7hhv8>^T5k775k#Z!eMXO{dY=RgW2*-_Se#8oTk?YGlWzEJt0KTT z?)cMw8a+Me@s064_-u{(%Il4OAc-5J#K`7S51|%k->;8i{${S0bb{X!j?(@<0(|;6 zE|_8mxr(8n=8m7{^@7xp3+Q$zUfV_q!g-6I<)DwLmwH=r$fDvNG^1p_!7_U4R`sB_uA5!gxrBmT9KNPVD{_JK+cq1}ecDn@blVgp>&T zo9mab@O|WG4}}Znx1u9I0b)9IdwaKt^hTvd_EFf;foA_#u@pCKRS45(qM||uwD(H{ z@EllERDj9VPPn?A^$)Yp7zXKZF9gQ4yNVkJI@&6LM{+K> zmBp-g98uzd2#$9^%TTbZpW>VS(IS?&@*ZH>895;Es_|L(p5#bz&jT8wEm6$}r3W69 z7h3`5ymNj(w*!*=;&EWh$bD2j{PQQR^?Eu6z81Q1eV=uSqCHOhQ@BR48_o>%COJfp zV>O+%Vw)K85o2yes;`W)Od;e1My9P4;)c;K4LTxD=?SrKHC;*OogYa015txB8Q&A= zh0g2(rIy{c8k@W=qw;y-;;$Tf7;l8qah853IMQM$n4qI88du+ytqz%8OT}0}&%P{* ztBDq>;RyGO`_L|WvuEacjTMS*JhPj5=6vppFE2pUr`7H4g9u1h4vg(C<91oCQ#m&J z-LB0h5yd`kCFYE}{cP}NES=1LkMJ*Ki-0l?Cuw@!L@eR&{$1 zGQ4l??d?~B;qxMn!U!eaINd`zT`iYa$9`e%*ZECQm2^Ebn|5+1TfF)tdXo#?1t8#2 z_t_YEo`AM<8CQL^jC-uzm8*(iDf@*eQUm*lvL!V*YwV&y{Vz1{aS%c z@y@hpY03j*(Jy^G+jKU!X+i`piRBodUD)9KpJ0Dzt4N5@P z4+Tzq8~qm(>R88!$h9(U$E3)SqWK!=Qfh&NzLGQwoYe}OyPPl!ZPvYfF7RkzQ#=|t zX5Xf+{85t4<|-jIk2x*S=XUwLcmkqrEVP7UW&g~JL_RlXS#MGNe;XM8R+4eAO;hZ) zW13suC@4P<<9g=B8^k&}oPvn(X*>^S)rn_O?>~&kt2p3X=1^<+i*8!g#%a_~AjFFz z%G}=0FZQrIjgup;D#FvMnvAu1ex?xR}X2dZOPtAOm|oiNW!t*n>8wde6000Z}wNiGDr5BXthE>QjAf+@_x{qL3)qw zOUBy5Jr+4xkBC;U8(p_|11b%I$iBaUQs*GvYn}l2d;HAlwDYR)?XDnp`LDM&94;ub*hVGO!BW;Fqi8+=D8Hh>0k2dnU2y$i_#y^x{K)0g zi&@AQ9IaH@7s0WA4y)vr2Ntj&<9f<~S9y{!J3CGO;-@6eHxvKtRL5Vg;DaQzag5OE zAet*U)a2qE8KJz*PI$>uZ+i`N=)yy`V6Nem*CCgi<%oEe7?6mPYquS#kAm8fo6s;x zhd1ZMb~)n<={mO2X_i~!Y^*-Kb z!icH7)f2RI89He<*)j7t((td5(^na8SRG8{W2ajCiF2hK;)+7$epV{t6z-gwVv>xF z-aLUBmy4?9FM+-u;JdqrZ^(^Ro@NV-stA)2=>L;-%A?c^wPWzX^Vy~q z>|MoWbi_KXx%9c-)2g5&m z?b~lzvt0=v=0;5x-EmltyfeUR!LVNY9cRm>lPA*75~T8mYl8~wxG!pJszZn;x@)T_QpqIqy`?y`vJSc9ABgU{Bwig@0BSEFRtbg&Ie?pV&B}M{%sfbw5rFeziS%oD zrtWg2MEmL+wgFw%``Id^(Q!b28~oIdh5Pbus(YuiF6MX|kztCrr_PVz5n~dKmw!|h zOpM_fKy-EL!(+ON0A?^nNg!>S4BrG_&ke1-a#~x*-F2v5hVMpOG{)n)i%C*)%#U!1 zTSaHZS^^Z?n31mq^~%*Nayp7>2lT46l}cu#=c1e&k}N%1OuY3(;gxr7OBIUCxE=26 z>mIgz1hr+1_oUZA>_NGi*hnP-lV!*;*5x&hFe^M|W0C3oKPAFuzv$Lr*k<1c-t_2? zabADWukz8y*|mg}$}>8QqTKg!K;u18QvG*h!MW`f7`5=EabQ!Ns0;&Etl^JE_y;Ob z4Bku!)pKi=0Osgk;2VFZ{GP|%MVn3@GRX#d$4o1|Zn15+>x)-OYDxH*pnco!UW}?9 zx4bR-N(ZDGZS65xZz|~9c2(RUbjDHt{GNjXK>!3Urfr85Y3D;`{DJSueK$GQWYsyD zpal6dSG;7gKB=wiXg)`9!h3zP#j6ps-@4xLK?!WTEF2{i$HMxw%ofuyH8ru9Cr zA`>Bg=m*raX^jy)v}WUl9J;o%8>Z!3azm}zisMeZjqV^{WiDw1U;1MY7J8#2wC#$n z1*dOC?bw5V{jmp+b%XeDq%Z{1e0D_#jdG3qXO;{mx?3#!+a64@C!;m{dWLe2H-!vt zHd{CAwma-w6tQ?y^FHXlgxm`uYkwJM!Rrap{4kn8m}^ZG2Y$7jiV@AK?5AbLd#!u# zgCwyR^AUe7iPe@rmXBk5gzpvoFH4v3O=Jda^Sw{|MYd*P{Pg;3buNmV+qb!Yh=jMq ziFl5w&JyFFK3n-F%~N=KznXXJwsE9y@!w!|U8_pKAf)Je!q1F3;3$DS9ka9&TDr`B z@v2VzqZi-QshCQ&>llrMW1YY^=(CFwZCzN8%)rQBjr(_y{2$VUbT8IhQUeP=OYh{< zmche=_89N({R1 z=^h-7L>mZ1x*?Es$cqu|{240SNpSYbtD{l1rjRqCO;A*lVCEHYPG8@`>4%)_&p$XF7Ze?}FoH68#(9Mf9#7T>K!A)kb4p-wK0a}3hAI`v}J{>}Rr8ITjABbUY%KVQtdgi_CzlN8#jSS1fH z`&Fi(lEQ+O?`T61SUvIkDanc;NDM}t@XI&?Nn_WKED`?Z{y~vLC`Y}k6@CFnNg$Hd z2G52{b0MMb!q&qxuD#ihA#qX1j0D`-+vk+I3oGshl9@#dzZ)kMI#_ z!P)e{1}Wi#b@r$$)O&E-+f>@e(9=@&?+?F_wWb@B05sY_dOY~KY+iOcOF~bc9L0S7KUCQ3|Ah+syuU5}>)-NWDw)DnpP%rm zBN!!bAiq!g$+PIkHd3sh;@L3E`uqD-n)5Sgd*O$^E~T_+`85rv6nCg75XPoRz5$B= zJ}Omzml(gk9}3LnAH*wEv*s%9*oN(@V~%eRjD@ict9lWf~IzyZJQj4U-MMzvQj;E)~7JCpy1=Cm0ZDDldB0pV~T9 zDEr_Z^Y%cw4&n5at z_U34P#W&F{Rnr41>&_D7e=<;^F`jlIL|X|HAvWyoQyx!kxu(q6)h{Q^6suF(e(=N` z0~q1Y*3%geK*EL_xq`!lB$u1xB6I=gpq%;W9<;9XlOh!j7#;cPd96+YRAYEXFI0@@ z9mzD}c6gc35OGry&2dqJW6+DvU7Yji@=oHM@L%IJx~~86H~ay__Cs-+XFJu!^=98A zpbi9w1@Jq<;W-gT@(vtU%}#<0h0Y%UC9YvYyW5<)W~SQ*l9Ud* zmIlu)pa?>2&69Z1zH=7|B1Gl|Z8n8tgrd2`QIZH`@HsH1 zPIlw`_G!p>p71!~$eg`5&nWJ2P2yNYQEtBwYD&)n=7>&;>8ukmxHjA5>U>d5#+i4JOgT2D=?nZ-UF^obE`k_O|n{I@ipY6+H=mEDV7j^6itDXMW_NxJ_2 zO7T>Y8J3L&XjPnvf58nex^GFn^CYx_<@uBNOKY)*@)F%`W~8gKd-_J3zjNOUN4viG z*Flz+D%{DWC;gsN;E`1`-9q7D=uk5Xsa=YwznVL=g}j?@=<4IS`XeCLu~)h?F4wvO zp1X2uDRR)zkzCN?MwX1%@VbmkxL=DL`@dLw^Ju6a_x=AlV=%*D>^oy8gcP!kt?W@+ zNLdq#XtkTMQ?h5xR%oFti5ARQvP2PuQjBcbGRQt=zR%I}>h*qqKA%5+=XXxWUv*B* zbIg5T_jNt4$K9T?+_h5W6GeCykOTb3Vq-O{Pet3Day+Wpq4SUj>|KWPvFQ7c7Llda zZW2*#nrA^QzX){L&^r2EECH}P*qtV7D9 zA-cydo@3RtwlE6iZ%phFa}X2zz4~Kx3g?ccW~}hJ`6M=HPv{`Q0qwrhv~TV2=L9CV zBk`#F`<}XXs~VB&FXHliiHgHd^E)na@gwL6mzQF=XSsC%t!Pon+d%WF#q*3a7?I?`UxSaQR18DJ!d+ExHP z7d!j%{qO?>NRGIL&$9SBBfvn9YS)Eyvf(a~8C=zioN5%8ud%kaw19u-v}D&Oo@4s+ zSKiTIdCX%j#S6CiJ>km*MW?n=sOXsy)VIz}p>x7~ZAxjNk|-UphzC9<`!5PD^gjNKC~Se5)W z+)I~T7A@QyBFk22q^XqmWVIa(fZhg5$;j5Y7IjLi|{^KtSa z!Xo`)`DIj}^34MKt2gY9H!A+4E6%a_w@Llb{I2sHkTgYyo49$!w?8j8mRw zGy?3tM`6k~%)IBtTN@-*sLtsTi3UpLcQb}Hl{0odqST4-UG&T8x~e2TW|iEfY32Et zIt;7uei!X&Vx_Y0)ql8Xgkp-tpHqdWOYV-amNwY?W7=#iKyvC6xy9Y6BIF&oKc^kh zu)p7k>s%XXr00%_g)Ksqdq#XA-x+e;n!t`2q-dsa;6&5P@?c=c+KJ(@iowp*6RlogHwq71NEIrY6-TUm?rFn*X5bk?-d{)^W&7vP1P&al zfA=5%3J1If4K~O6&aaCI`r6YUA;J2-WvVQ5mLN}lg*u_|>(pH76_s_36GasoC#q|= z8=LB-8jjGsH_(ExoZLJO$62-qVS%2&HLD?L5=Zl0;5Nga=x|uff%kVysT{_)kjq!H z)pr4cuUTj31<+vY98*1mA~ydG8)*xsfAV#}HNGY#BD)$#*=(1tD4ECoy$csv7!j+< z$y>LO`*j=Uig!c4qHH)4p65_EmCbm5MR4an;z?{y5i}@rf&%s%Eb1X^#bnt&e8>-CK6)4dbLUN=tfH?=A4^z3Bt;!RrCSSE&v z-L-}>XK`q*Y#hjs^V{@_Z5&Ox0ROb%IwA(ziebB`XyLcQ&ERG=Y5QO8$45~}<0*&) zA#^$Wl28OGa-H$z>Cy+i;5 zKSk0Vhm9CD$otMaO%5zX>m^$_?kJnSJ{lPvxTl1Q+v8U}j;^_cYPMYM@vd+|;<;(g znz2#6Z!#p|lN|o=wTpPS?aY_v7QtRn#+t7D9jr?iaK`b@!WCd|>k7%$CpKQ9yn!!~ z^C#Cu=LIPkhE@o(mJzj>?b~meo_n0ZOPuDNv1YnHt+k2&hu$(Tj>_7vT9Pl*=gUzI zKPSxMI{o|tq_P)~@*K~rKkMa=pE)S0QX4Ej@Mm#M0bg$T&tjaNrej*nKwt&rX>eay zmv$2#Y1qjaz%rSGtlD)R?UDVx8xh(4LDni8!?pBL*TR*A&36m`1#9u&3w9kp@>w?v zwAOTKTR{&VWT56{&I#P)=Jp~Jeau+uUkK%2(H0WwAJWRu#Wh)l=j4K_$O0m zUV9_L)##;u22W{w=G27!zI|(-&opDeEh_P*jXrCkN_jB$DktK|%5Al~_0+#TM8MM> zr4w9;E`hg>4;`ysl4LXwH%=wB%*={#wL`UIt67jdMm+(C<<_!@j08 zzmg&w{0Nrt_u%-m2t86`%mT+f)^})Uwu?J)0wE%2&ZmQ0Px{;-zuVDX8Pn{b1z}ijd&W)I{fp7~V5g3_=B;o+o%P9?PGPGW&%6kA6GQ7e)g! zrOx1!IQ(H5rI?}4f+F_V?EHwrtGnF&jq)8VM=u$a9UD#QekX220!}%i2=)EKnm&6; zMx^C#0Om>+#}4k_96xhx+mZXUz(tb#>Ey?K4eZByezhHo1z4&14nSMea~76Dh)xWJ zYLa3oX?D&lhmo6&5h2^eHtJ}xZt5qCv)X!Q3P~syxuYa(>dGQSm;GuiJgN4{N$;0lL+E;WbRiw zXqjPYtUXm48%cn$!)_N*XszUGaT)fk0+jCNv%CfxG$cESE#IBJBPf_zS zq0fX>pRXSn;D40uJQ}}etyRLG8X0~$OQzSbv4H+Ks*6X~6DC7~{6@V)ss`EPd z?|kr2;r_;OOIyP2fOgZ zf8+oo-8ZX@>NgL}-H2}93RaoE>4vkN^hDhq%nV8H1Bow}`Hs8O!gxDf$MeGgy8ig4 z?qa1*?@qp!!;r4YiNMQnkp3AklYTqIj{r9nk-mJfEkKj!i0jBEdHb|TLqtwEM&*z- z!<>=yeuK-#jX1)|>(`P8h@7Dwlh`(KuFnb6(zCP2&wr8hnfI?_M9@(@-1G zZ$a>_w52OM_$p6_oPP=?BrXs~XYK2USlqkt)hjr!K~d!3E^B3(#UiUwhS@_Ump0-$ z1*F4DJ`0h~eM2b|9I1bRFJRAcHo*RltG|!=o1qrA2ur%2)S zg}E{xmZ(W&iC>z|k{&o`f)6DPKJ|<565cQF1bgvR(4J1kyU~l=oWKeCXWEe$BT1o5n;@yamOkoPd(|Cme1dN`^L;Ns#WixM?2zUybg`@qEhKd9IdU) zy0e=5!~)pkdYNFvy3iCR`ub@BmM$*$zNcnlW2sq#N2uta|E^iNsZmz>XY`U_nQ&JW7!XfBt7f3!rFNii8XvFztC>odY;=5z&(CbrNaXcaj4p_rT#_QWgZ#rA)yGa{Z6z{S5G2x{&s zfU;L7423>3(rCg{N58*^IY7?;ZZ_tPLfo5HK<=$lFWp}5wPgckdR%Le*iFfM?0rMSZ58Aa=vk#oGS~WSd=YL}Z z0uw*Axm+^KGH2u|_5(Hic}z$+W|b1PixQczp|iJwq)4X+ZzM>EOA=8*7e1}iKR&a+ zfW=d%EgHV|DQ$Yl={9@F4%J0S_#F#N2ZjEX$$~De5IKY$n6yzvme1q6+NDTK^J5fM z{S-q+T1T52s?e8CqW0`x6>Ud{InDFcH=E~p;viSLUuTo!ZtwDLw+&v2w6|4Kk-T%V z@987Tjvd=V*R8=Qt;2%46JB-EtAL;5W^rB}`iJQ9;D0dJuO-U1{bI*Ci(3?b5R{Dzhp;Hoo@6tuxk3Bj7S*Mc)(EDH_^BKPgYUUO|@W*ilmS z_uMX;D3*ec)hL@j`IJvESrk}K@M3vmdEoZRpLT2lxM9*HcG~pu55>g^2Y0yvxXARL zA;VmzrQT2$Wro@5Ki_XgoL;52!PLpuGUq%%3yq9T!V~|Fg*i2JZ$iQz5`^Eh=X26S z;NWtqyP_VV-!i)`+vh+*wve<&V;AeUAe*zAI=Q4lJ|7>=3NR+L&X>YDNv^C zG6dU`XtCoFFGkj`XLB@Nty(JoVBjGIuU?d>{%V{S>e#ZieE)Ys_5W%`9s?!zefqPC zL$LtrzMh?+Wnp`^?Ir1qe5*?4zUU@nGUOC%)@QP~&nT5XOcwb1qSfPYusVG_D7N>8 zJ!D8yOq|nxaQC5yrxIj$9aVVBZpVZzr^fo9big+|C2V!TQ0pF8$ZV97yz__;E9z*` z?q5)sZFfZ38ksuE8_dXBffIv6eUt1+c`w#4WGUe)fM{nNHf~ua%otyO9%a&Bity#) z2c0raz(Hg|g&036vP~-e*t)wNA@rRB1h?arX)oPZNhhW?>iBE>qg~c`eu@M=VGu$h zeCwG5;99!5f0IvAjqf2BALINZrETWCy1jG33-F?F^lQcfs~YRBI&03W^P(pyb~+`m z58f7qHA3hr43a`mo;9XG#CL4husOryh9axG_A>ima(|*;u4$v5H>D|jBr+vJMLxcU zLW(kqC$);(fgG~Mmea`BETxs;W19Qg2yyd)W2awgtsCLjIiO)!09`I-d~LB-D)!NN zurK+s>-cH~{2LR>WTL_bS@Zk>nPO@ZyG;eToj&^Q)GkWLbP;K*ClOTIx3%R`%uG+Q zy=4OJG6sxE)iY|*2K2)}=OMm{OvwO5!^ zMZiuOG830`TEiH{>RP*ko`l3bK~Bd3gyWxmkpMblI(B4%Uz`_Z2SB&-q1_SPS%TzR zUz6{B6TiH>K5XCh2H4tN;>vRp{90d#b|#%+c#d3rC2G0ODA5z19)7}!T{KyB9`uI{ z^WkasnDu4VHP=b1GN!^_cjX!V0q;OSY{ahKO_S>j8ZosY~u^rm9$K zSR=1VOJjlET(C=@#;Gq|n)`oDUhJ}Fj;j1P_+8HcAK27vQ??rOUj`X}AI2ByG=oet zAnnn>t^e`xjq^IG1zb0@^HXPV5nP-tP}F)kApiB?S*>m#o1gv|;qF{A@8gB?ti;p- z1xHkqI;&VFRk#4Y3q1KKW%hqIsdGs>f%RrqDqdg4ZkZG|))S%2o?(bfI+cbiJ#-Hx zyVeSv0cquenQh?}`grMxy58MK#FBXlh!EZYd@dleYPx)bz$Z?iqegyw^+C?5G9L%` zI>5)$df6WmLjCexu~?REB!qIyF+Y=w6@VEIX0;)uy{M4=wr=)h%sAPJzquI@wD3Z^ zY%%Ujx+87e-Yc0dUZr1?i+)ub8gB2gD_d?^W!aDtU`xSJK>A^baeWYZ7_z$7_aNVu zR*fuRqYTD0({&R5Z5$s;nygspP9cy8zTpf^dP}< zTSy1Cv43dkj&*Kl*Y00*P_c)04lA0To#!jJv)OeH|=bpI=Gih^S!K zf5*ovb{p_?VmZEV2I+T>V_@HGzIW9`e2EkbOyQG>@M*TCKvU)oF>$AR;bQNKux0sW z&*tukm3-OWun`T$-saC$0%!12@-wSnO3*kC{HUt@X?6>gPa~lTO(L)`_-j5o`1?;- z<5#ux%63ZNhgN&$&KR!Q>`s4R@-QJ|Xkz0;S$++SC>cG-4S@Y)bOsI^eY;*$AS?p@ zV^~YUAU&qWk0F9l&yoydcF!PZHs5E9j;``By?E_M#pp%AU$iY_V!#gx3xB>_nMsu# zJW2s0ybLO5?BFlJ1Hrp+Yv*72$&a8nNu-f+9Fj0AlUgS!78qS{7W_|xXU}XCdS4aM z1kzw|)_^V;T_d825bZ~Kaq37V8cJYwg5B4uB7q|m#Ss3SoFrRZJG1v%hv_Ei1l^kIA%laA-(raS8%|Gt&8LGXAO6R}9u9SAYe_k)Qo8sgX`9-1f)Bl~}NWO5tBnRC&!pAa~F?npy;6uZOPVy5Xv8$*->V03)w*!)KqYUiSP zCMVRuiGgQS{$7KNn<{VZXjwF$FfZg}d_ex39{v8+~V@m29b$2)Tti%k0?%C=5ls~gJ8AQhz9xm#2V!z|^oYR@Uj$z$p zn3{QQW~0NcdU3psAk`59 z;&!O?E@!Et05kHeGoHf13;XdHW!D=*VekNd8ge^2k4k=ICxsD$KEff$2lV&NUiIJg zg=FzsYb0>YwtSK*YKu0+Ar?%6D^Xj6zs22A%h9Um%Zw3VDzfq&cft?z^8Z`hbr~S& zH0XrYPQ4+^M_Iy@p;Cb=S4S{T+-Js&e8{vuUqZp2t9gO z_0mLfAq9lUfd2NSAUh01;4g@b$4$f16+8u^+b~DJdw+pWtb7JlrYO0o%SKnT=UmUJ zm^(x&f3cKy@ovGCR`#o17LYdOX@Beijj!%2_plU1{I}B}t2@&5Xhu8Z(@$$H-S16z z&@qy;n}0t#z_T4GNz3-o;Xx4Btsavs4#NIlF*ieB`S-Fh)Jtwv7;%$`Vb$}FWXQbz zLGraQ`dx|k(V16M57FJD)@g$flI`dgSg|mXZvUa^@mKdP?(Lgaegk;|dfm5uB32yu zS*SY7!g}b_7FHm;d;2W?Gb3$8^O3!l56%=qQj&GkuUUQPXDKAugLtB-P>A9i^jjHx z)UHm_0Oe)tv1Q$FGs#Abg}h(&-VH9F*$R*d`KG@Rs>zrMzR+O!mo|if(k}$wR6xJ_ ziNEQnjj5^S=q(gZn#54e|!muVs=UPIuHu=RCWogYa=jw8sFXJM0fo7V7dQc4aWa+ zztHNDJz;i_e2R*Y&b*;d>k#PACbp7BRXP+OGkQQ9AVBJ5m|jjFi^lkySAp{32qZ3b zwF_>bM_>U^ANZ5h5oU`DRppJGp9;Z|+(W_>V+i4|YOET)c4C4?k=Xz#G7Z$obrCVE zUo$$`dJAm)lwClP7bQ_p48KtbPUEQyO`^;x$3{yF_3T{M7{%o>t_}smPBs^=^}4hx z>{cZvduV7xz}dgYP$!N4rzj+d?6&Y1yBt5tk_YvO_$Z7rI@3!^n0P~^!~U=wN4lTN zlK)Dg;|8qM6R;FVpE{)m zDv9yJkH;{9ZR+=XF+&EG#L`jqINwuuj+ojsuCEK5Z3b6`Hpogffqs|USrcp~6D8;? zDye-Ydg7Vi?o;mCac-V?%a1PHa;0!o1^Uxm>c8a`e9k~cbyEeJ49f%6rbt92gin%$ zxRGr=m-ofwywl-?rE-3SV4kWAq#;jy(N;xlCFoRdcG8ER42O=Sjd%`%=C*vuq@^lZ zjnmOGL>YXj+%J>jFps&H=rO>J<@od@)(TF7w4ND@j5p|JL5A|9W^2TNh^^K~o&3q! z&vpe1tIhpgdhAb<2nTjSjbP}Fv!CU#w8~>;1Wt-XI2KZ&)$7`Y2Tp_ytS!#T(D*P? zWLxYJdNlpjuUeX+i#D-{Z0Vn{McHP#`L@xFde3SFBaZdY`Izs|%zo*>J3%&j&mDP1 z9mApU)l5mSZJ1ZkDWWX|5H#S{KCAd`pA*DCxf`9Cb5Dy638qQxN=e)W1tvMeGC>q- z8DV5N6p|vu=M;4oesT~J^X8KkMf%{>n?yG5{cY>4Cgs3>ma;qAA2^fMY1^=w7;HQ0p$y(jwtoisdw>1nf}_LO?`pd*#UtFk}W$id}swP>Wt8$x8u z7T4>;^_FZ9w&%5Fr??oN0UOn|MLy(+P+-z(v0!SJfx7M>zDFSs^WC}To&*26?;S9w zTK|u3!a_`(VK48o-&l@v>6)7*zhP5&gSyqu>Jx5}fM1Rffo`N~0Q(LR`7iAToS{U9 zCDF|8m_>VtD}!Ea)sd<2`ZMj5`Tl|zGlCC%DmUR25OaINWEB>cGjLet?sj7VQOC|h zdHG0eb4jCC&9~*FU-{gQy*cU3z(~2la3Ty)xKo@Eef<)~o|=!vK_?#9txAS-@-bgk zpZA;mxLh8w4)FLE`EL3~kF3){q_p=u&S7XKi@2@r!DR-7Vl$e60R+TIoCTIXr(`X` z)1SJ%7B3UC#5TFyWK;R$T`qoGrDpS_CZki?#}T11oK)4vQU@frQJhk+vvCP^Mds2v zWQwJw__o)1A$0c)zuz^-`XWSg5Byqu8innS6TQ`kX&z1;D6F{MlK@tdC?PK|Yy`Is-QZ0noWS}B z7c0H;2aWO`P;h4aQMZ99P^MFE*W-dF6LFr}NW|OYY%{X=oxn0p=FHH8J`dA!ltu_g zl2LaKFK!k_1FYjmaGyQxIFh=(mHbKWHm&$f$YHsJk~s!OLd%!%S4s8x5vQI}`D-Wn zO83bWGE&zR!)C=&Zcs{}3+*bWKE%V zm?=Dk?k=}nrk?nvS4L;2N3(9{@p;wQijozqiF|t%pE@-=eUyplzc560(h^|+QmJ*{ z4uk`M-sQy*D3G+@Y409+m!jQ?QV#((t;Il^H)mDbMj;}P{q`~xZBYHqZQ(Cw4VTMU zzUnfTS}`TyN`#`R$7UD&gV=`-FXXoF#-`32K_vAMnIMu``J4WWWka9t^RS6qSjfH= zk&VLGkov@d0#XQZpy;|U!#i@fh?FY#I-Uh~-g7IbCx}dtJIJYe|9WZL{uFf)l95P8 zuHw-kf1QI8^9E`e>tK0~DeKcrdYSYXc0b~y)9orR8{cZ~%@)Omiw8VaF$toepcgZ= zU;r~NT}4QYOHFDDVCOuh*WTB64KOr6vX%4FYQk@638&^F`XCIs!E|RViA;uEZ@qf^ z*z-|p>!)I=Ie{W4Oi;28SFfc#@Q0Stj^QPBBioCuaQp5nkjCv)(3}B=hvuTCuOVo=dd^i-jv!R0?)Tt z=hHkRal+%W&mD-GF3<#~Ry-tl`zA=&NmqzKM^ryL#%{`d-`pVXUNl+MC~E^_DiY34 z?;Df$lG>outXJCt-s?z+-~(~Djs#Ha5aO4ciqgw@1~FT3#ZZa9@A+GHlN!aJ-}?o9 z&tEx(B!M3`lRFZxMxa)zHq#C=)QtIbJYZUXTCJXu=QCGhWF63H+@5I+hAC9LFp1CE zw;9S48P8Qd5CucJFs5jJJdV%D^l9nf=CtHV#D}KB)Kx+qtl~2Q=Pc`sHZdR3cK)!B z>UG!nK4883A;l&?vbQzDAFe*jCsY!{M#M6 zD(v$>ERa@t>X$p{V~gY;chI0l>lUK>-P*e)-GY;}9w;fMpFL30*Stp787uT@bGuA7 zjIS^L~Z4cs>>s9P*ii;^bXg1EQ?l1%RC5UnZ3GDVSJh95277% za*n=1oAMIiG)_Nl-HeF$?KyR+o&sNfBsQ->_U5@iK?nGb$N zcRK*(khr!PviMLX^dPd;YTZq`Ui&2`@}Bv3rw0vko-qx*18w*w9cXEMCe=IAI#v7O zw*>cX=cIPYl-TSg;p}rjI1>=~!+BL!R?a>=}MV;d}k+xxwlXJvx;XO(Vy~qDjzCQT<%E z`ttPnO0qpf-8RlfCT`?ZSGTni^csvO>$rd}?`c&)@k8Rc|Gw6j!F)qsCD;c>5I0dy z4?T*qurjq)VSp&)3{&{%6y~*;`-mZ~82+M*KAa2s@PD%jdBNgwznG-8z~D5%QN3id z=RppO1oeTK#J2Bm&poZwNpeT&{mmlXIqX>NHKDw;w*Ss7=KVv|2Z8t*qA>iNb)&{- zREgD}?&!%E#_>ulx4JX6`9Il5eU)7+%4tpf_8)QSZ`6MUrs1Vw^D8-_!6W|wc24{o zu*3AH(dl8cZIJUJ?swnx&#|J)&V5i?0WBMj*Hq%^gl3w5&%hc&b=iL2`tK?tU+)(pkQFZ>B~|bePb@js`Kz zyFD4^x}PK)$owjRYMSq^bEz7A;WqqU5B=Kr5Y;ErF^bS*>E`I#kum!yJ5ncOJaXx0 zk=d`zYX+5>4o!>&QtaEzCe;hX&R0rFQ8QxB>-sFl^eDny8$GHn182%wyGLGF$ytXs*X_ZM@A#A%Ks`lx_U{^99| z;7WPQ>qL#L4684l4_`a`+GDOq^2!UfVol6xe|E}#-|TK|HyA0oN0NC@e~_dQ(-IY~ zkIP8LFUgkC<6z1RdPtms?NPt?w>ib&?_d@GnJ@Uggpd$~JOwet-4Ij)napu) z?Ipo#*%%RoWzbw$?Rm(O0ysT5=18~l?k3m_1v5E$aX2_H$J3BLE*uO|P=(JtHzxI2 z-;KKbI93YdkK#BKBZ^L%q}!3USVK4jOIGJ zOP!yLCFtDMm^7V9ZX_5bar*9#Cel6CsgQ;!;TnrlZeiC$fycZ-TeiIZ#vM4;_tyy; zA{bLWixki!RGy0y)CCKn?uLps?UsFta)7-3Xj2bZE8n{EhjFrF5t`nS1ouxdiV@5S z4BA`$`Spviq%tDl$+s!UePMg8a~pC7^gG?>gEgv~0B?QTPN;HXKU`3_eP+uiT1Ta< zf{|}eu>rz=2oQ*$#okx-VVR>4%~=`NB}Uwcun_xix{Fn7FRjCZmDyE5gAgCX!6?um zbn@cnePBglQT1MeR!7rwlPLVV?QOKHK*# z=dv-=K91|RuB1)2vM1ckpIpBHSycl>zu%)1*{Ov(QL~^~)OG4}1#mUF(*0>n$Bznk zMijS;UY+y%!i9^<@x;ZHmi$|}P27$mi!K^70iBaloje@v4^waZmgMRl=@!6{{Dkw|ASI1@Bc;bAGBAEJS@qXVpcyyi1Jg zEo8Qf1KFw!-s? zS`-K1+}q~~Y*^g&opDt7*O_A|_@8k!OcyEv_C;aJBO7*t%%ILi!=cd(>$~cMWFBHi zd}`W0H$7=7a7xxCo0NgoQU2_kRcb{KXMFn7k%JQGCH8DvZaelXb$2@EHQ$AyR9RqB z45K2TvM17Kw$^+#NqER$*XjeyQ4y#-t#R~vI9~{aNEr`NYP0Kjlwti!B$5LGlVNZG4zHRS2d>40X-TF7ERSa2|6n^M z(e9fGuS4)Wn0hmc8cRSiabhK(w9-5G@@{X0lIUstp6Fs9hY@_2#8bZ1t9(cC8*yn_ z+$?BQMgp8pM<$2}D|g6GQaI>bus#t)Mx6ZNkE$Jh7^1oX8q8=(U`g%eP4M1L5`ejI zlL_3!U43k!?3S^d?5RWEYVw>Y4zhuJa)a>b^GO;GQrVDw?cH5W^yTyVrZ)9+N$qDK zKr#Dasb5p+M^GL>)t3HPn;K>N>)o*YQxOGGKC&&NnT+!lpDV1LD|0rvN;f&Q#((sJ zpg5?W05Ot>6Q_KkYvDZc`dAPDNHjau{O#%xjCg}|G4hBWfuRM=k>>_4K74U;p*qYd z7)dw<8jg;i6~xz2S+$`Dr$c10=l2%<0_cbA@blGvT|p34WGU%?`1$k`s!J~&t4P0S zJ|!*(#7_s?|3djRbvhUe_lQJbHxq zGMH`fJsiRRgyvI$s7Ib-6)%5z+Oh1B9KN~%x^)vvyzI}t&*v1xja1??G<^ynmxvdvCY1oE&|^j5rhN?4MR5K095B+-r>Ew`d(VZqSpSj_aOwIVY(3_2V1oq>*J1Cku&q zk(fx0-2EgNvns@VNP)!kP)($DZ|}4RKGV2k`-Xm#KkDHmz_0i$jA_dm>vI0RFv+*% zHyA%z$Z9fVaXIv%q+TG{B_))wc~RmuMrK6vwAWzJNWzY%9kf!?JnjEqa6QN3(j+lf zk(Oi(u|nz(vgdG2mfr>rLuuy=32n=(_~azKIDHWag9MF8p9**Z4B!OR zz%;Ion2H{wL_VYEREmXzO{J2%luf$BtBbDXH)|63On(&=F*CMDF0D zs2=lXQtqEc>@)a$%l;H4QfC@qmC%SV5v>D622K3k{DNWztwP@^)-O|ED*7tHQPrnf zH_aKjPtx^z#O?7{B-qSN^TwR6FWqQ_&)`kJj(N3-0}-P{T-e~AGWseEA(<(u*jF2( zh5C@xR)75_bfkNXG{V-fp`$oR8thAQ$4Lpm1Ki$)3uPrjX_lmRa%w#TTlavp*;eVK zo=0Ee^$Q11-wPIVsDlH8N+c-L5|^KkX!L%!>Je<}kTqyWVvm*eRZ_M@f^rfCE14pW z!46`Ht961NXSK1N1Hg+Evm?($Glhlk^*k_8B1;&<8KNyeul4_|ozh40NHYfjVG=zY z{cX4FPM+iPecS?0s|n$e>l<5h?D0y*TgkDv!XnHD=>=gY z>NlGBc%J1aK*Tr4LcI6!|I4K$=3+E+U9=t5E)S$o*nA{4R@l!yP$PD^2GjfSsJ(p;wDEnZ`VJzMvyKUpg?AsV#l-ZoLCoq%u(t3 zYH364zIX)ZjfjvBPd?J%J)N>3@4Nz;(9gbcQq_}xVPq|gOP4=-l&dcTyHF0CZ#27q zha2i@{rWbWpViY;y1010!CNc)pB}e13FaS6k=z-Cy|*W=ejH zNL>5`gclp*mo{#Cw}!{(G4;O$Pq2%VREqT}H9$!%6O|z`#DO^taPz>;!+i3t_Ut&5 zM2-Ld>7_z-9pbb2NP%9ecwM`W?HJ#({)~opvp~pvNWk)-+C{e8LLbD8gsOuXj$M7f zN6xXUtz+RmT*3_nzvz&~J)N7)$2c^?TF;1&SP(6`mdSE={f5YW$IF*R;Q|(~j|gM;VTCWtohfPPcqLxiIX!srZ3A3$GM;feI;y!j3|l0gm~Quvlf8}^Ala^h?^ zyp8f@*^s)*)buoM?1RDlE13(SO?(FiCfBi~9vl1=9Y>vsZ5)V5nhO+KfWPSedsxr< z_+-bEL}Jh?%R59$iu%QL=lYoy{6{xl08;A}wi|{-X&(Dw91-!#JZAA~iC*vGo~!Cx zGPQ30XLtoTB>gK#4JO0AvZYRcF(&7w9xO;oGLjX6$(3L+jo6$0P+onWK2s3j=F~wI zy|>6~aNaWR)znYDnCCzw9V&a3U_uhDo63qolf^KQkHKGZt_LGwVHO3yyIoBPN1TqZ zLWQIzt@dh#F}+_0W2Kz{a>(b_(p^O3E9Mrut66hSkP4{H^2t4X=ra{&@EYdMcVA<= z4$x-z#{*!iI_haywE@9D`b0W(_^;VL_M3@C93p?RnL4M&+cy2qSIh%-Juj%;0wiw4 z+6th-*K+w6$UXmpxK;d=|AF=7#zLEMSiGTdcs5wax^cZf%#7ouQYL19 z=HW#(3O!yg0#jUjm~TPx4@WITPToYY zX;XYi|9gK`dr0ZKM%9ppNtBPYjfKvJivTa zlt0($8SvX4`KcuBL`TJ)oYcOEDBw&fo76(HI>}kwBaq4yb_V7o2bI)dHi2KO6LD#4 zKwRL8tz8{*z0^%MhNpgCY}A$&<|eY4%^hpx^eh)PpWNNsCn^Y`>(+m{@srDr;JxEM zoXC(l+<^36WRIO)h?WRrU@Ez8nz0mgmADQE?4YT+0Rw%u{1rDE*ja@5?kjUVt7^zb zSPc{U`D-vcRjy1GT`%q&G5)0cW$(}hs}iEr8Q4Ci=!)D#+kpzND>#Ab+;kvaz?f=d zaEb}_TOFniC9FT;TE8NsV27*yp?M$H8{rbNQ*T#VD;P(0%-q}|4!0GVH$WBE07gK{4@beE3c|K&9LqYjs|IL|fR*1Fph{$5DTRu5Hm!Eyc!C_H3}isETc-9pk9iWujdl4x>Ay5!&`2b3co^`pxX@GI&al%*g?xAH z(-X$AJ)4;i;ynqx^qi?10hI>;(|&G#3_gk4V3EhW)^?`4Y&8 z3?kelizCiUHN27oaWA02p6eyMBQD$4oh|@GIrS!5(kiRQTnbhiwVI|2E=f_vmfaGKbR*J9(e& zXSaCyc!(%YtEtj0gE^fs1q>j;@ULO89+*QhWfwWe*AJ%}Z#Z|WzLQ&kzPx*EfL8iy zbq(1lG|BJT1$h@P@}UXXkKh5vKrHRjK*yfN~NwFn^CYAdc+lQ^@W%VQ3=3Qm-pPr7syly(Q z(t>AIon{Nw%|Yk#H6EmmFX(Z z*8wY7$8s7~=lKO&s?2;_WFx35h#5eZnpG41sW{fx0TnbGl3Y>gf>R(C5wL(0Ctlsg zh%^PveRY%9|Uh)|S{)}bZ0mrKi7y`4qWdMA+E<~4|mzM|=+T6l4 z;(;SFTN-&U+twm7sKP412`L?^+%i$|NuwPvcH48n%x=*=pj1QM_#q3=yiLt_5vFb}zh{eDSHf zwgG%ueg#>P7p~9tVrY;+Oq=*d`o@747}Xq<5iKT?nBd@opWwO%#jhn;mr)T#W`j@^!quXw4v8YdJL zc_@y~Pa+M8W!y+X0RDbO-TJ+*xYYycwFh3$0_+$+2?3In$*Hw|N-`34ZuX6QW(#J! z`=vBQ&UwabJjuTKhV)IDiMkMK=)>CgGsenybg>rK>max*HB*wM`0mcRdr%J<1RtW2 z8n(52;gWYmgSL-LT9fN@PABMe+_Sax-ZFPAUB7Pe zLmpo#Llj3`?C3WoPRQ_Fm5{NXJKjmlup&`}guR?fzk$tVYcPcEYcDAJx_Y!M;O9IVEz86m8Z${0+nPu z%=&`$C(|`h*AH`+GMdNMbrp(8-wxYM5*vmjR@PHu#2emK0SAVjXsz^|L*&V{#>p zph&@D6shp?_(#@$dWgOJu^=0#4@%`XqS(L!I50=WB|u-oyy?S}HrE|#qX@aghkpBe zxdf(9P|jZPbSVCuKe}LyXB0H&Q0 zWlm~z0$Y+wpGMj&6T%gWXWys7}ERpw9^8!2A=Fcsr;j~g^bsyCm_<>qp za%d{x^5f*H(+%CWtYXfCj&yRD)iF)HoFjnY@JW3_-B41Y6$V=J94`M!$yp^MvTlVb za*1;hEOl3?*R}Wz@QTjjaRqufXcIzFs+1b94?=P>_^;OoD$=>m)O`T=2FFGDp7Z*j z*4EBWq|S=Vb$+iEFioMvW;~nP2DC%RF#~3E zy8n#5>bJXQ^ru6oT*qAyK7ls#fQQy%CZ03t>(-ehMEzU;s}f-*E_>I;I4^99r>y;& zq##H%<~Ry;Ux3Azky4lzUvLH*uEchtFJ$S;zjCP|6KVDHo>uy-n~j%2Ykpa{whC!O z#jBh8wr=BQb99$m2}XyLu>5isG^n6y8TgcXf9@r}6R*zZbAZortMiCTDN|_ip2wzUGs6PEDShd8>-|LwH#& za>Z2g8L_oa2j+NSWDYt{NUbO8uphQ6Yc&YU@_jBJ^e z0_{@HxZNT8a}ujvVW8deYX+#7I!|;lqhC#oeKI!`Wb3VWW^*$kwmDq=h0D49J;NRK z@?Qh*eiMjT0gZGdrDjMFaK8ztGo(X@(q(1}U5h+C+?K%A*p4Vu#4D<&P3cm072ondSwo^A|! zPCoYZyj=JZAzGKK%(mCgieYRQ&)G*e*-@j8YW%-}IqbL2e{s0_SIgR>379$$aAs$a~8$sn&~aUh5FVO zMY??Pdtz)kN!GlVWp5$9Ri1z5=p(`W7Y{9iVA0Nao+aujkLcAp+0zdqkbg~rH!E3r zu@v5>)EC*iNmb?j;SB3XFhHCAV+Yg@-YPeIgo{pUX=bogQ=gXm#rQ>HWy}FJ@tY+S zX8xe*n}B?@qqSmDADm1+vF&M5w$FY6*WT3tM)uxo>9%g_5fM2U-ilg9P^R`DYR;3N z*;SUGaB4dJf*ZMV2!=Bs(bZJCc`ucsSCr9ws~>+9#C)}=-mKyH(CIlJUYz13vqLo6 zFz(QC-cbY9PwUK9=OEfTIICb$Xd6COuXU;&#!}nGF5fv4H%!<^?@9eCO`$+zzn}#* zBL!&xApH;THc8pe9R117SrpJiu0oSx3i5c0?YoQT!{zv4abI;34jVOJge<(P{V~dH zP27Iu%RQ>p;-g7uO7w;-6H>5|LhWJ6rgVI$nL0`D4s%n1zbr3)^jzpk{{bDe-3mD@ z2*sd8?hm3CUQ{_`y_Wd+Jf`On&9z_RIUpQD^DlQ5&6tvTFx^Oy(~+Pgg(uu)8K$l- zD)t&9McVdsL}DGbiVIU9AC!u&c9jt6Y$Ys0&IGP0@qD%L=umm_ma{y6^KB!%OIFgB zm$Mz>1T3mF1O0EWK;#({RWT{Z@?4=4r{wp=C|$HCYPSaPR8_(j6Fh&_U)pE)c4lx3 zQh7;SZoZy(omWUxa%_hkE<`PthQu~CyMUOSM=mbTz$x>{FNpIrEVwLIYO&0muh{y) z2yugM@Eakg1AtaSw(?o|sx?O&L@enusY%~nuM(MqUabub)46WLJ!;`C?M}t|lyNmK zf%><%!GA3A6uw$HRTnu|xqPvIvBvQY#GtYQf6P@~Rc1w1o%&R*l)=lSU}v+K*p`e7 z;8ehFPCCrb!oal?CnGZw4QQ6 z9cuW@s|+e-w>qr|}QeX<&x^V0aU5SrgdWxO;Mi0fM;6)d&DV+tLlD4T; zo_zh;v8$-wkT`1zJR9Vj>4GNd&k}g)oDfNHCp)9$#xhTJ z^t}41TVb6LSalU}o5q@CHqKgo7d$C;wP48TGuhmE3_ECpUmG%r``f5>(_8u5(V zXqP-*(<2ToVF1|h?*mKIz1XXeK}wWjKQSk0XU;5zJ){OX(SPi4oRI`)E^}D%;@dGP z!>U{F12}X9utAZ%?hqCIuohMJW8-=5&7Eskl}>1J734QQ>>i0|Fa98)fysc!_wHxk z?)->?xc6zBQ3=URw#$jUpE2qii{8w@@0Ix|+vMU!8&(TpW059c`dvg;w*=$wO9^&n zQsjZPA52no8P`1-N$FeFB>Q%2a||2*Vb5f-WW(LnAME^xDo~)WmQ|AegC7B=qpT2Z zFfJehekJQEMYf{iGV{s;;vvp_l?+^?$egYix#(z=7Ke(A;C7SpbwcntC|+FY7PXq} zR&<;NC8mVl`$4NjxuA-uFDdV4dA48yEB|Wa_p>uCF??K=xlG#SM-Vhg#aDUa1w~1x zT~w7rKxE!l)LdOVElF_39x}`KSxt1{@A(;yVbW$_rR+X9+`VZG7S=+oh%3k;<|p*7 z3@=^RM~vUN^{w0@VTwC7QkPY;X zutIW=C3h!EFe6TV8)8OP%q&pV!FL!IO_3F&<*ad5j_H`Tq`bWm!W!(V8BJ8I+APY2 zbbc*_)jRPe3i83RmDxbQ1FN6He`=v1h-IM`q$J z5RMUVQBr?62_aiHBC%hG#R7n1+2)RX*jMPNM&$lNZ3;NbJeT*K4p@g8e~yd&@a}Xi zUCw%T4y$nWsyh`XdL%ErbYUIm_wb)4O5Uv76v@k=u$+pLs&JlgsKQGR-R$`juDBic zep-vZidQ4oAMZ5=#I}EODZR3eKarZqN2DT8^;=5{HU2s|N{m@AZ`q-Hv|qw3-$Ehq z+=Hg=A7@M<&Eo!zgeoA3J8QCf;=bIK#2S@Iy;t~PCRJfw<4pB02EAt|mF|#RT%8Nm zzS&4tR*E#Xm4o}+AJ|&{<>9vo^DPR2@`_?IM-M38cqRcS>Q6EFgr8@@f{q=jyd55( zfdzl{^*?J#YpAY$5_`Tsah4my&@k*S*SOYRHt{j%t^HAK0}5yqGSz_g9gM}lsqh`2 zdNICcYm8Z$cj{gSXp!=eOnqHb zJx|cQ1pP!qqfOvD5K%|@G)DA|OuA3$vJ6sxfd;7)8GDd_@ykjtf4!T1DM2n~;izLu zZ5^3jnfp)IKLC81fwDLjc>e#Vkh1BIa;oIVvJ1V@FuFEo`z|)?tCIHKKEe=-hx5_v z_^YWq$}bN;4)4a;?@IUnPZTcU5vmvsAA1S-j*CI{m&ob2ehb2f4293xe>DJ6qYiM( zype!2P}PJ8@Dqr{XV>_X#$8|&_ zE73}3@C&W?b#nFsDbq<#`SHyZgMkbo9E9BhG0`HPeZBwPJ^ufM;b0Yol?n73IVAyE zFSCQ&;|*_2I?y&zI9cC$3PpoVH|r0L z&|;d*V!Ou`EEt;`T#jaPNitgz&lSMUrR9NXjtFqIm-QO zM&?N{D($ig4)J1-3Zk%txoqvbD@8gGDr2ZR!VNhnFLzrPJvOPW*9*3;_@URNopP8x zR<|(Y#pfw2YrvjbsM7z$1dYc(NHN`f3u_KjzG=r_v+_s?`JW0Vo!+YHou!Zuc zjdyJ`DyZ00m11JZ7D#p@pyuSQ=~l`4@K+hn;TS(?uL70t(fOC2{S)xof|2U*&jP4; zo@hfQV*;`;mbj(evu6*KstC$jwFC?%ihy!<%b6>@7025@A&tN8Le@tkjO;d zt14pO6h?6^tL0&eK^|VOeV^=Hcpu?JfA&oxp)|fIuv`7&bE4wc10w90OVH$$miaOt zePFxtTn3nm(=eX56x=CmE5*DG)af6fIu|($9h*+u5HBuvlVZ@{d5AY@X09mO6R;KjUqXW+?X!)G)ZzOV8=X%Yt+EDi3FbJe(tnLqE_$Zm$q@ zkq|XL!*8Jteiei(2d{`?%j&OEwRfkH5E3udM441kI1!{DA-sZXwwkwx>Y`s=g0oo) z7}d>+-{)#1o%`OjVmV>q-Ry|&GHM}(VKhh_w3N&n3$JG7y3V?xNT1A<7l^S>4(e4$ z1;ILrkzJNb9!vAIRG+zfxMAzmPSqWkh|E;BR;OP)9NDE_$PuTgdg0ZH(+FOu>lWBE zmCJ_wQGFqIOqIjpngNT+Mqm0QP*-g~QGtDsgaaa|Svn1cptTeS#Izm34|^KmMMl?0 zJw^+=dWg^0w>{Zp;u!shi38qVJe1%sMIi`I1fY=Y_j1?5)r91G+{?2udOySjE55jX ziKQ=B&Z;w@=ce@59T@(Mkq(O2-Aqc6EQcL*x7Nk zj=}u20#rIb8m@uCr;Id8dOu#qnZkszf0i~Tu@v?IRqBC!7yIcT)67-KNX^YX^MlL91(EMxKv|5I1UQ2{CVea`bWT73)J!tzBMlCA04-o}hTW;1$-2 zSmElR-_0sH0wWCzao&g^Yx^tszj4xr*Rf+me37L?4>VqiIq2V`%lW6c*$MM9=a+9{^@mF?~9k#66b26Q0NHS*w*d*2-ok%iB5ZAdY0ek2>o>TzppFIi?dy_|0$ zorlM40ms3^7lVG5IH!VxgI*}FIoIF4P;f^VcvkU|4dNt!W)V14 z!s0wPY>1@W6=no<_|$`bgS(qs#r%NY1qPpCWhNc64>@ciHVqcScj>G=dZ&mTuge9X?cyhyBQ4SG>aRx*!uM*B{_%B6R^Ml-7*R3ot}eS_jTblfTH_4R;_ zLpI3$VZ}H^R5RsP`0U>UIT>vyX)Z+jA+xM-Q;r8=NHh$4mXnaCt!!q` z*t*=}0Nh?7f0+HzY~!yOLs*ZfV}gUkd?!0-UK98s$uU>`rOoDvbj#D7kS%r}ga8?v zLF%4ZS_HOidw5!ppU%xZr?6_m{P=ZilcfgG=!)gI^MAEZF!kP2>*kWufoPjCIOo|> zD(gte%B#R*8F=L8hGNS=fI0u-#HkUSg@pOyQFQ#q*rqL!Rbf&eh-(|GA za4F3K+C|zv>(5}jJ0DyL;_Q{s%FZ0^2xmMo{>|44GC|5nxya~fL=i-;_)OlCjD<)% zV(fwl9r^u~2F=S5q21Ny3wZ<$FMQ*mA>hA;=ms55!(U_q^j3SzKys~`t0N_)z({5@LKcA)?4_L z&)U6WY6PG5({U9f$C$(FTY%bItZ=rr$9&9Wj0UN@?xW%F;OY*#oSp^5$2@J7oorZN z%+22RaCCtgb^7ZpR7a0r9L1Kh{W3EVQwRg3z-sph{N28RbmN-kDtO}A<~CiKS$uov zS_W?vAz2)d`N9UVBGk*9Ure*J89y$He36Eam`umdMTJ$CxO^+!{Q-hQXVMPVZ<4Jy z)!aOrxk>62Q?8wobk;xb0SjnDl;kFVAq-R;@{<0Ngb}Gt@Tgyj5o9n5o20j7Q z3_Untq~oPx5#mTP+JOQ_5ipzg1{Y)+NgIdeAI%eV8ON6NYB+}NJQ&qpAX>#Ciw|vV z7d3IM%Cpbu?}~b}dFLMMPe)Zd|N2hB&;W$VfZEU5!t}kPAs8qC1Pufc1Rwwca{Bup z@qt&szx)C7e)7Mb@{a_38)OsfyFP&1|IbrsfE5~+_7?Q=j^>0mmPUVS37P1b2$>lf zxfnT_nF%RXEL@!IOl?dIseV1|KR)#rP`ZVk>o+g2(#L>5&-yk>dDA>sPJu8^bd04Pc6Zv?UPFfd zz@&yTqc3U^^+Nv4@uInidkLvcbEb?bkz`7#obeJwA49u47dEU|vEX`*as@t$5hDRB zItC1A(VzqU1*%T}Pg6(78Iho%!o%r&Z><`V6n5aV-vt+SUow}iOd8nZEj8q`d4>O0xj?g zG{6in{W2g`xqyH`mWhszO{V<(ZhPSU0fC9iew)aK(`+tan?y#+1!8l~lL0Kw5E!B8 z-Du!Dt{+lDRDyf2DImpMnf^}`5s_kCE-(=Z8vZi5iiW?7xqq&|tNzOiGLhlAkdTld zkzfGvFKZZp0yIK`=f6t-eG)__3bk0N{H-0}l9OAVGhZ zAff*nXb>+w9cOR7l_P$J$|`I#3a?*8~9Tbta&g%I4StZty%HD+_ zn1Rk?Jeia+!}_u}QKd>>A3h)s@`PEY>PA+BGsKC9lquMleD!fWF;W+=bEkm0QI!yk z*ewB?%Dw=W#Hqj~-os|1j-ff@_Zj>Vr(aPn8Xqa}3h^iRltlVK59Z926|BF#r6Ur* z_V++Ls~%}35jaus6wh=_xBXD14nZ9S{f+b`QncI=u}Op{UH^p05(mCFDThN&YFpvv zJ$L+-N)q%1r(9C`0zF3rvaWxD|KRt~R+se`lfLr>DyZ6yx%O`xt8ATE>G(zutnW!2fy#IV1W4ws7YS(;RekuWe9a zPo6C6+zZ&1`>877M>>DF(k4fqV)bUM)(~Ze1CHhme=okck9}!;BE)2-Nl(6ha8l&p z;O8ar%qAzKP=^y6f*-b`l+cy-y@#5jNwK8*%O8l?XS_c}b?5Tmn>1iYD3AncYPMV) zOYZtC1&K6Q?Q5Cb$iaQOjT?7CSE4P~r}X~mw-o*|U+5-A{L!=(5Pz-e!bF8u>^rFbYHezoA*2>bteg{jIW{LDdCyHYP zyE)`KA!(s+gJk&z$^q28PMRW9rHF-Mg3hoBk%t|Y{92RP`pxkkO|O~3&Wwji(@Shb ziB=cL{WT-%_KNiqeMT2;g%e~3ao zbnw+ZUg7F$sJRCnk5q3c5i7hYOwnWw_7#U}cB||DCO${QWKOURbMjt6Q&;K(%n1qj zXnl$#b8x5cH-zA~n@j64GDgn;RSII6PsZDjCx}LMF6Wp|VMBn1T1)y5l~1Ndr4njw z*^W?%`S|otrsksOuG@xTthVKgL-~}!Dvf}2v8A1;MsFCf(BLC9+1rR-OCD~mYiF-8 zYNZViCLF85LT5u?SDak6`gc7RE%?%e=`YPth-|Cxb}2|@i$fq?BB@m4oP>)ES!+BA z_7=1VknXy1MjH8f#J{ja(&$+HKq61Ee3uWJ7PV2Q^$l!~pfTeO8VX87y1rM}hB&6z zj;5)UMy(69*D$OqK}!h02_I)p)6xy4(6&5HJewkB@?D<&{edcO&6{6US$)r^uHj-n zc!pieup4&9@ZX`v@01nl;kRm+AdMx{t!Y!azt!}v;bLt>yzAS3soa4OB{X55Ws%v* zjlpY)sOjOyCwUitgAqMZfm!^Pb!1sbLzdqHeL-0va;t=kApXJmJtw*ncYDw-);V7t zQGWXb{3PU3fh>L8&JR=5H9M-6i{N$uhQcaf==7s3jji(-FF~uZpsC4Ek7A`;BMJ6d z8p+zBFzqIneIG+?nn!hm?4+_*L4~!?j8N8j8;wP4VbX)}qxDi#HlH?MLaAoNYO33$ z6i$&ZN%cA-i5g1M%o(0Lxa3*_*2~u{Hwn2p5^KwuuScjj~#`%RzCrRBU5He z!^y}bCtY<69-I#j%@aL?Oog`fNn$Vz;zMa+h!n~ok@I0rM{(`h$}KRJ&=l%xp`|FvrEIxCzB!OQjUkTMvjq#WB#E$>0hNeYb37sx7mJ zFvd5J*wB^yqBJ$OdMTpwRSP;BWA|nB!~v z)KqTYyV&gFAA`{X-3E!m{Oq~m?akwC4o_rm=fxi!^V_9q+^I{&&fSw@5>X0Ui5Homrx_Uz%CAbP0}!VxDL#wo6OUmF%;N0Vt<3 z(=4{8Lt>o5--mj?e!J9N#3ML?GYNo8uG0v62pBO;&oF^l)W5EhAXwT_@ysY1xY`Kk%{g>Aj_u5x|cs^aYqQWI4Zx z#$=9O?_m>)WaCmrzYB6?$C|4mF-+kJbp%{VSgOuh!1d|=4Qj)1LjC|(4v6{wat0*`RD z{gDmMDLr2C>1t?TgdfU{@fQvV3X81n+01JSi{YNpoP` z8tCGzXQ)KT!wBC@V%y-9Ng3Tg8eEWan+E&GyO%>1pA~C0>-j&U3)Rkc^|ri$EK)Rx zwp^Z}K|F8)UpN#LrczDf>|D~m^J+>eRYB3}AFSG!Tuy>>T6zQac&8_sq>a8$bcyfi z56S7+u2`&;`y_OBE0oYEP$HMF;ByD5Zy=>+`AYM#^ z`$XkDfnvJPpNXklH$$saNDyzA$itGW(DZ(9opi`sYpmu7W?CUn{o>m1Hgva5>A@Lg zzwtIyD_EM*RW~8aq7cCwpDTD(sYtV&CW&fTq#cZFwj0Gv&kl=Fw?91uI?d2Nu8_x(8>UHhBJEk;1qF@q+iiu~ zb|H1g#c^WM{dVy3sJ%Giy@HBC;ej^PwMVJ=i`Cm;YKNy;23V$8k!yQ7{y21tAUXa? zL{Jh~=}Y|}{mEFBBC?xjCTe?qA4q}Zh;E25ad4ClBQ>nl9$F@Owh%aZHh%_ht!Ta~ zQNHp-S=%t0w~WnUA6T*cb5Jmt#k0>8Gq1`wqb>MJPSdLjJwFl(Z?huSmyd%4mkXMx zcdqoXf{~p18h~+l8}-0jA@ML`>=Fr3;?~y&fz&sp&EJCX!r*&^$>0*1gS$uMR99HN zSzDPlK+@wn7{#+M<9RQ!=f;`)R>;}D3(vSLG2z_|+MJWASu=(MBa@0Z6I*$KL_Bd; z!rR-N-VD-v5x1>F$<3ZE;(<_!Y)R$>wu6z51F}w;g1iu}FD`_6p`YrE_S$sJmW{+a z&9G@m4BOBKF*HO2#=7*j9i-lG8VL12ZrxMGB`Wl5{>T+IP&siY8Dp`zoSUkZI6=D5 z^qfwYa=WpNLlPOHTb7Ari5p&B6-1UYDK2s`ag9h=E{WUOg)WF>4N$4*S-{#*jcHVb z7LrU96@(qNwlJ;z-#h7BOYfhA2_)Sx9rkgfLZc~RIEdwD@ceKgoLk-vO@S}LU4p&}dQ zz{JEj*i#y$erc8W`O~sSvf=Yf^z-M1eEuzCHU+=-dND*A?8@0r>HAq492`_(R1_lf zvuGHVK9Rli=vF~BB7^fn)*OaMERy(~7eTiYETP->*_6aDM{r7noA|E85TB3~V)u?f z97&$n#6(P>G0>n1!ruD|(2yEEeSS~d@iFWN#bulzEO_>#yUtsPV9O*MWozS#!K`|6 z%M-7r#E_2ul5`mpmlfv`T$5y)^iB|WU1^@v;sqh)NkfMo6zea8vz+c zGPu--kYh^VXpX6naubq7O7)sbQ6eEmlzIDk!@)C|Ukbw&gz~19HtdE&>+zlk4vgW@-&+~rs5b-;Y0Qq*5|eX%@WTNc z_TxbxS!&2dcQ?SnnBk}gT_F3u&(njYqSketsG>Gqjqw1xBo(p1o{|ous11`DX~|Yq zca3BD;Cx8GHdo%ul3!Fpr?}IU$z@!%(=QdT!1Z}ZM_;94f(KSh8$*f$Pe5MxNF*U0 zLqwYFyGQbj9BRFxVYhDnFh;jc--QjGvY9Kt)67qtXww4i?`i|G_5IdS2j1$X;-_oN`W@xjzn-#aZMK7F8@Esc)px8vVNj;Sps z4#Ac#)_ePPa)%GszCoa?>dWZy)KrD9X)5YS>Wf8bNv)mDV&#M40cRNq2%&+&2fFWO zCTjwJ242Qjcp!jzVkXO7K+7vUe)jKNH?Ffz#sOm#ACjFNPYph`)Nq^?#7+IMN`ZoA zYV_IDMXn3poM;18;}T~Zq4S8D^|m|qH_j12BK&cy{^-f$u0rt9-Ap!YXE=o{plg!j z<8n$+RCl;{!?GQd78;~4js)eIN*4v!E()nc9I^Bng9>VF^&?oZ=Z;EO96kj>_p|oP zj3G#(BNu3cg<`Uj<*iT4VWlYoqO*H{YU-!V))wpBLrK1STWdarKdb~^v4RBVMMH*0 z0pUPa5)S+zYJ49yvT*M_xjl~Fts(m2B})&Hrt01>Yzwt}dl@2qVYJ_^T$hXfptEw- z0RDB6GIF=8(ZcF5ekE#M+RccJ{!_^T+{Vjs`&oz435En0<<+UUoxSrPkP5FrLILy4*6JvLkw2~n z>H7up?N!8H!MT@#{VjqbXQ5ILL+@p5wCm#vf2Op9CM{xh= z?-R`1Nq4yd<)wQvHX}v!qw%Cv-yN{rhQGa&_t^%)Kl!nU==4@z=jB^9ult8^o~*1( zhsag3ICEO!$Ut-@$7vbwo69x+-RI|fU&daVvMa}Vkbv$*3Rkl5i9b9IUh#wm<~<{f z!~vPFx|l!3RGXJ~ZubUXzfH<0Oi@O-l91`qstj6caiZs&!!61m!-!E_wQ9SV8@!Nb z&WWLFz09}$3G=F|?Kt!;0XU0dnVA=WLR>u2zG35Ai{Wgh=t#9L#Ikv=uLr#D*c#8;%zX;B1KWwnrtwW4pqvJe#s$LFO z+QE@7PNyHEH!-=2Ar}HS`&Un)YGyIU^Zf6nTR2P@Z8%ig!}Yejik-p8Liw!v*0=f5 zA;+u=3NAWorGLEW_X-RwFduPXJr79w2bdq$-10hx+gv_U@OxuGN1WS0gMZ zR3@KvcfgnWQ&D~-z><#EaHnZDw+gpY{!s1@ilAuPZdGFFN5JFIt*p$jvNcgixOon? z9EAi!z<8>tW=bq<{%M3t9eKq^W8=wDs#VWnH%m-Kw_wTv^K%w?B96nzHFfhs3|CD> zpeU&)#OUAchmWrS!vXUZsFgwg1k5m8*j;y(fiHaMN`AzY8WjQ{Y}PhOznnH3lGUs= z&FU(%!U!744Vtc`O~Iy%Z26gsy4PCU&jWr#hy3LFv&Y2tncX`^SK=;|G|&1>Tu?I+ z%EQQVt(EN3OY^%Ewg_6S+9>ZaH+JzUeF@fWy?BWu-i-16~ifq6pufA>&8Aktc%S zFZ8pF2rN7X`;aVi&Uhe=9&j1yA~eJ}%_mYY5Yk~z`@&i#>a*ejH#Rm`-SW3oMKN6L z;ED|m-?X$s2qaw6h7?;Uwa^z0{r&)|dIjhWFwd6{PYB2X0#a8#1yA<+*@58r2>tFP zuI^sX$eW=%KK^={N5A#`#Y@M4Hz!{kJZB_KX~aiLP`LAVlu&K@>)qBbU6!k?F=VO6 zagA0XcWR=nLBdu$M?cSRr(^e~IxY}-yQ%xsP*E1`x)V0?j!03mq^*xp=wv&pSqsz; zSS|n^7b&fnC*Q;4H#cR-){K2>mkA)5u)J(Qg~u&rDc9NW6>a`Hv*Q(Z1Yn-fMq>|P z^V*rA^P%rTv)E2?vy!R29HBQ*AiuAV{#^fvqn11yDWcNd{KB!RRdPPBMXXij5tcOK z+R8KW4sPOGjtvej{a7)PmJ`1lD$jX4zWuXn#$~?88d1A!g*Ow3`jYK#uVvcbUO4dz z2O=;Z?*?}KS6BxAUlNu+RqGSPzWFc{i%?q?Hq&n%{Z#z16?xtX&CKDRj)iqZhv=N( z4L~jI&(Zs$Pb3&{=y;FVqINmmO_NTevYaQCA=2VO3d=b6MK<|>7$*rDAs|`rFWF(; zjulD8#X`^c)Y)Y`e5w!)9L}cop;c5hVBPH7@P&!_(yB@|UQ)gZ8L7-8n9Jr{9r4i> zyRboH;DF6vA{6ik@RlC5 zD%f*$Y|^l$K{%LB8;VWQwe_vuf8&iYy!{`vWO*usaBWY+G} zjIcscw;c8Vm6{|L2}dDS#Z`#+MNt$*&zYco@I@*3dgDVRmEr3m-4$g#`7Q%Bc3V`7 z2sQRnxFf79{t0svlU_OU9fqPSy1_SmVku-AQNw^9k^mS3Ch{V*3k`$13k{T;+2VP+ zlsS~}ifRaBa!e+K-9RK(P@z7Fi)U(OzWcr)ur!f?7VqS-!7t)C^%GCvobLeWB6iC zBuRyjZ@;HumF+3u>C}A*1b0*+*k?c|f!4>ouQ^Y8^0yMfB^m1xs0BsPB|a_9EqkfT z5qK2#ya#BKU>?)Bn}G+3OE62E|A-eU=m?ZH)H2mZTUt1DG_R0M^US6vBdTIrwX+{dLhAc4_?{~Z3rRITILeN9 zmPdXHZUAZAe93Els5Qb9Co$6zTd2RCY_dpM4Mr7|u4E`iiCY}Mes3YaYd04-8EjQ;ev_$ziX;Q-OhcXvYH%o8Me>`F#pvAy zZStripS|g?(Wb}Ynzq?J@v_Gmu1#ZwE~qReB^46e@i(?>yR318B+XjjC`ObD{_1Tn ze}|`ySHlw$F#l6)K@Sl1YMAu1C(LlZ8FGi~+~$%ZyY{$u!GDNv^!75DWFvD*f=(>R zQ&%S2-76S2MAy@{)R-r{c7C6#6Yb&M^>*$(67l)PD0{qs6o~o|s|TONBlVku1VGi5 zC&3C9qrV}a0$4Mo9r(-3o(jR#^9YB!gWEb<6I3N{434{6hF$J0BAYPvpQ*^{E1bx{ zd^_|zn145ipFi~LIGwlYlY(gOF#$zs}hvF{6e7=`-P*Z!%KFD{hp22q$E`{;@Yn8dc=;1JDcsW zE!sa%kJMRV6I?4jG3{puA2}bMmQO%S=Fi*rF#}2B7dzybR^yiq+(87bf&To(O(}cp z5p*)%U(B+BJ@Sq}Ye7Jb_@jW})u}SSThBKWB@~iF^P?1}JM$ywxJ)U^&K-k+2mI08 zWupG;h?#V4dD!n8>F>?1mFrHZ1aZ-enk`AT>@fw2L_d13KDFu*nK7z-fJg&Z9<$L} zD5WAVWt4|_FlA?aOX#ro{%^NJdc_(Q$eJgf))e6Ls$2O}NPyxt7Z!bHy~Oj07gd#K z_cb^#8|3PhboL`7F0~$*td)(pOT*CGu`?Qk15d%BNDOhA|Fr!fDN^R3twKurP3Z%j zY$Q6;`@9GjZv=dpB%XN;s!tB<2wdBdp?jBY$~@>#s3Y%<`jL-eU(_N8tN$V+e1!}R zh%6zw@%Fbe|F`vzAMfifzRGnc+#M%=YcVUY7--z{QMd3hClODGxJ?L5@uR!%mk#4J z_|mRR5W}vPVr;G|p*gX=IF|hRjS5YMObCG%H4dYl&E$1J7s*L_y3H4hpLH(-=kg6R z$rE@t4D1FvH7072ATaEw&nlWq7AFlM>J5P%J>pB3Ie&UP<13KpK#(?vw&;M)KkoaZ z%q1@ls*ZWH-z;wM4Qy3B5JY>PjH~4Lp5(WV?vf@JNNaYlJ{|7nU>ttJ^KG;-`dP#^ za?E7k=j_!|y$qGQ+rPk_ynpVmsroSAU5)wZGHsz)x%)HKN~}M}$VYcM{ju61I|mdY z(Tp{0y)`2U7cPWk@vhK$t%XZ zsYwDNqI-Owxn9aZ99o>HolR8msTg9ei@#R>At&&P90rga-$)%7>c@|p zn;$rH5iaX-O-%QyxgXfOVDp&{h@(UrwDl?B{Rryd{b|^=EPOlm)f^ojG~G2*DBBH3 zskK0Fj8I^m>uT5YqUD&?9$g$)7$5B)QGG>8>Q(00n`;uMhY* z)5@k5McI7W9h=ek15x1>L`)z=Sb~=>&=+JNMxN0}09iKAsm$X3k@{Ef@*u?A?-Wyy z{B)#BPYy#C{GlJO-%~a5#uN!8Hs?$Bi+M8WIAk@sx^AA~>hODbnSi$c?C*mI-G#my zN&xtGAgQkm)@X+Mt6%P}PRp3%0%$*Vs^fP+SM5NV*TV0ZqU;xithL>D+A)gw3~z7` zsY$C^8{S_bYw(%)ID%YdP2fI+#B!ND+r~f6%G$fE55^>@wO#4r)RjPV>_4ONV_xz` z^6{;wIH-tM4xi}RU9hT)#f&xz-(?5BTNsnWi;Lm2fjDG))s|y z{O08TX>%4~*X^t|5FoiQ)|jf@yvSP6@yQeZji{cHUf)49B) zfZ)IFN&agYNpf)>fx_~Vd({hy%{g}^14Qy7Q}iNI^ise~TaAnf1$Kvf#(Or_{vk8= zYzw#aVU%@+b%#BVz1YBe69e-beoJ6UU`Nn5K2<<~%<%3#Td(@?m_ZFbJk0C! zEhtDzu$SFS%;ak`SE$%XR;01XJ0ed5+Fn^dL>A?q#Hw7+i%XOe-tnDhO+*gsraMI5)je=T#t;k&9`b1pIHZ-5i*s z3`tX0agr!L%Fb z`IvY!PHNkg#ek97N@V2TCVFU7-DGC&Xahw)1f13+Ks^GkE2Tp*j3qATF+y*5bv0`H zyYZu+D$&<&6juM41PwpRSXoBp5m!CkEB=QHbz$!DqLca9xhohr^6^Kq0rNPU-xWR^ zoI1?}e^;@ZN0UaQV9v||Epi2qN3h|OTuwTk1*Iu45t5_ zxB@A>|DI?=#8A>F@-%`*vnyUql~^>AmVj7PUW*1Eg9sN%8W3KWZU9U2uZnaIdip?( z6uV22t%0!Iq-&RGWx@#3PeNl5-?vxn!(43$Th3!_mt9xtiGcq%VSxuN9))*%ZI|c` z^E*(v`wzbT_?YS+Sw76s3iRcI)dK8{&_Ml%wK)agw8JZW{lGfn_KLfqP(^UI?fGjL zrzt@Ie8>DGp zZEuc@nb=MpbdDI<$n{TCCRry(=QIhmf{?z?*bE_WRF~*|t6gD3(^CQNRvtKQu_2&a z#yWB<%^gj0P&t|?ht>2L%Wb?h6&oANQ9m0BuPLdc+0vW+?>9Wd5k7b7F6u(lhK)$G z*Nz|Cm&ItP!uS)&v=7n_)+ic5D#J(xH3UHkb#Qi)7PB?MZ=o0nc2$;l`kR3ULeaP- zP1=ITqtmD+QT9lf5l7HR&^GBxF0B`aRtzoG@%)sp%adv{nkAm4ZNW~nB(1H;vHtL% zE8B?>LBo-+f>mrOAg(m2^|nIP=N;^H#dgJN?rWaGqBabcqN27u$nUFKZ2irq>zt1% z(lMs24UwUar^{PCwVG-Xhim{h#!JONRwbQh+--G>PP$X@s3iqOxQCNs=-_&U|4zoR@hYNO8Gf`)SQKm~#zF?t(MUvBBlSg6k_zH8 zS@TaA9?ndIae?m|Eczg{lSa*7fr}^%f;$GKYZT>g{Q?B~bB}bN(zv(0=DPxLq7GT;0=QT?0GaWp{EqX{rqS_Ra6M&H1Z2L$BlUsAO z?Oj?Kw2R+_S5+MW(o#b%0Lf<55sg^jPnN;iJIVqM>GUpA41GzfdU{RQe`K2CTgf~7 zUQ6ML>vzFvXjOl=y{caE#sl&;NWgIhc)XhS{L*0PI&#y~ll$CHq>YncBTlM{hmcIf zKR~1`ThUWnVd&6Xc~258q!$VZ(>V7?2>EVH=buG9V$2HDYLACeP$4&_nzD z^5>AJL*ODU6qjhib1$qqCeJuaBQ7UBCf#k>R*w>0km1=as^J^_ z;V|)v0|AhOaT~7=;OHM5#tR?hH9LQ1$em;fDdKspJ}r#3R9tgnSbprkZ^VE;orE@8 zMj4f*DKRO#;>iZaGj6LLDZzuZ-Zj53Ed>QGWW~4pCs0M&{ndFHYrVlEv=Lia91^j@;)~yNf<^h^e+h$U`4dcpj367iQ#kD^K&xJ_A~(<*?S2_1rP5mJuUvd_f_gS?Ux&>-^}bih{qe)bD?bnd{c!ekk@=rHY$4&} z@>=Gf*-o=w_+Ch8oy20LsVCD47cwP9)xSlnn&q=;Mi75Pu_I(TqPw<~rpBS8s!I*G z?Sf4U65-I}K&0Zh7LA8}&*e0?;Pi1iNLR%n?IRIZJCSVc&rod>J)evR8(ztTVApzb zC;%!VRxAg*Yzzud;(;^Q>HU*6b(rqzx6)5v&R5j`06u*Mmj_)pKZGYLOW&`er=FF)bI%lH^R;!oK{Wph|n7s$G@{uxW!NxR8pExk&b(p^bQ z&sO!@$XDk^OFHNw5zW*Nj0Y>aB`BKS%sTY)#fWGI8pth-;kdYOPTa8!YUn{|5M|Ie zJ{2^VUP%4tVLPj~y6Do>bb_vkVN_h3ASNy@`1vQNf*~m;=Z`t2tm?ov-@&TP2{r2gH=Es-VW~=yzH$Q`b)MSx%tBHkdtrj zk++XH4raR5?rm3Xx8E+(5sNM2b^0*kHmzy7xp3*OU?#p4NiX-By)~10W)8bym?0z-G0bk>rD8^=daJG5d(dWgj)p;hyl7BEmOV&Mf0K^ ze6B6wusi&4->HuPW`nEOEOY(sn+`?k9z~%xqe*1a{2Y(VOoY}bd^e>!2yIsV1&6i; z86NtMnoH%Jr{0~N>qEMybTb#%5x|bxWyIV9R*Ft-{bgXl_d!jR%gHwx1@AdnvO>{# zvJCH%NS-$aE|yh5=;gWj8>Ldd;Eh6MeqmylkarXv9&bw@s;1dRVenx@}@4jd@R z>wk1yo$*1*xrcsi<%QxzNq@OP+~}sNN#RQNgXbB>bKZN)vgggI?1QDwhY)>m6oB?g zvzPXY8@ePWt)AuBvO&kj85$HE#S=bLj1c{8EhfWkAo6euy);B{eJ0hl z_cmh6vTef_Iwg`SOzw<4v3=aH?G5PLGT7bsr_|UHq5W&f-<^Ig`iBXh1=cl?#P!$H z?Ky>)V;@#F$BvQ9 zW)gj?U*KDkwE{VUvSTQM`jmxDLM>$6;{#(N?}@Xrsx8=7M3Zan`epGpA+O>o4x3&K zZw+2S?5b!2No-x<4++LsB*=gy@+0e|0i=IP{0e3AGoLC&th-9*g)A*?SEbf(CgTSq z$3m0=`E$R(tNY1;_oEuE;Qwy#e_INi8WW!{ncm={IM3c;yHH-$XT1|h{n8R8>VaQ) zgcn%l3aT_DXm+9*Wy5doD2eNKJDWIzON-MMdk@zuJu#MJ6H{dtAltS;4DHg^@AAYM<|U#r3l<+$Y9wi?|`?+ zQOl8$1Qsm`%lKAb;joHmVZg#idUZ6lY0XG*{6L0D2Di3lR=>6?`|f$ST(FN&a;%vZ zygQaUQVgc;`Rgi$S5zs0RF9aY{QoWmeEmOI3Q+dzs}XjxhM+8+7lb#7s8^NRo8n~> z)45N6lq=#dy$3`YS@!zSIldqbx~&XK z2efRR7+YkaW{;(ke@e|xtk7^b*k{HzE@aj1J_W-qg+sCr)R&c_@;0tXqb7+wjJwh$ zQFUFZa(CK^y@KYTz&-VvK`CO-)cQ0ezrvI_A+?!*8YtSj93|Rs7?ZSUOj0}tfx5BT z+N^-1u-R`EitU#i*Bvu5L)X{2xb)`sEiUD8-24zu~){cjclT105n zD!C++)D`X#xda07Y`)A`p%wcoeDy&p=+99pQY`k;poj=3SHrY~k}gX7A4fK0Eb!=$ z>Z_G+YL*{1QOF8~>yIyieJ4n}l0M8y5#9&jczCszIG;v$j zz(pNiGS$7w!2bij9TrlFGEPvq%;+~tbTP#bc@%JJ*XEPNCnAyOtz?tJ>)VK7}XC&g@(J+N+uIJJ;+W=#kFZBb|#GD4=9A`w%m!i#)d&4n($RyoQ z9)*%PpAS-kvHJ5oIVlJRBI<-F2vp~gBRnXI<2)Gl`%9JMA6~GMKp95WLNStw)qV#y zLj-igOLe1ECI$Xo05H(k>BjapsBBfGOj|}$V>Wa`IDTE3o}AFi(=^ zAh3+p*iEhv>tKg;+y#OyV^OnGG(+Z1a~g1R`74Gwhsl3{1m8a42l7^I1w|-oR3xjv zb_QvxWZJc6#0KsZh(A3j{C_L)p@opDUpSv5Oia<3<~%GEHPE)QelCheRq!qTsQ7Fa zw?edAb5q2gcy=;POcfuoV! zJ%Hf)zd#<)*2+onU;i_D`FX8tJYpjn^6<8z}H?$ZeTYhvv+r;a`dS zby!wlZ~^;YgP5HKmaVP}8(`f06gCyL;g%E?wdH!W zZFms6*^#t=#W8zI_o%4icULu9@-8$a-~j9KiVS6K=%=rL%<1o6lU0F_x0S|ZUl*Ux zas>+@A8|QM6=W}YqED2nUEp>pavp#>_awwBg(XY(3`oPkv2=58yBqzM_Q82ZBS${l ziadSYIM%e+$;@frtHL>cMKhahYMG(^ie+}vnk)Fw+PoZ(EwOV|Au(c92TMAlkgNH3 z2sd~&u2BNVwXLh3p5ODBUz5vUQ#OkFqwLS+Ki=783CDi`cJnRy(UnStkad=9&_56mC9=Z)bv}$H6Fba=Dd9MzQbEP;tg~-lPA3CWBm# zF$}GC-!npd;Sy~vKpwZVJQ=3$wxXx~GY_$UMdH`bCrmH$cm58^{#OzW=knRIp_Y4Y zyrCSn4IH-7V0U>iZ;&FG00G%DXH{kMwpa54IJHWdj7A9B$>zF-dy1gP^BkMC!h}#b zaop*JaxEmWtEpb`halExA4w_>@Fv2#4aIt2;1cWCQ=2wrLyYCQTIl{x7W`h}p$6hn z5QAI%y+!&OPl_Fbj6yN`(T06BUL8?EPZj^2<7)k*g;e+7mjCz)pV1q=)D6~S<2`;pb| z`G7EVWG-Lvn=ei(1c ziFtDqX@?vVZC7`feCu6x0F&Pxt_?u)?#E}=!o)KtsiyOW1;0OiBj*)OS|H8$V0Np3 zfWPYLcL#5{xcjbhwHNIL#hMuJeQpo&xc-DBdX3u2g#jm{($!SX?aVu2jt+|=iZ?AH zn*J%o_(^BDieBtEt}mPQayr+pru!+_kd=3-f{u{mY=7o1JgTD5bUiVzv~bING@TXk zgHQ8QNypc#DiGk-8pMfCAd)57#vgQ5uh7u}(aDp4NBA8DLCzr8j*) zj#tGv@vT#VQT!s|git<`AX~i>M|QR!=yw6V7CV#JCgLwr8vNne@roxskf-lgwG@EcKU(2*!}CDN z{T%ZEcd23ZDeId^hp|}GR7y1Zd60-G;6YjGT0HLSI?nw$wq+@`jmIVEPxwRM-oXp6 z5>5SvDwrve&no2Gs^-2E?(u2jSMRUKb`kTg4_4!C_>x*aE#bsQH_OLu^=*w+;Qsvp zOuWLx0K{|=TaXIq`X{FGa$|3bl98*?^~@NG1kG~-jB_d)WM6 zR$S#;nvo0DDY8x-2$`lHL&f!H#vk&Z0D=A=56w;uw(|2qJo=mt$PWX?RnXyEa7~H>V0p@y zsz#|>Znmv;Vdbav9pdnh^b&*0zV>haXHOSVD3p;REs@H6kyY(8!rjo00!X+xGz zx7~#l&qNh8cB^Ue`@FSkjWk(rNDz2Qz^ z&VXgir^ye99q^9Dw1Qo4yxAx}U&Rbr6vr@BiqASnt1dfs?u;k%V^Ee>VcT!n^9S{- z|4^l}xZ=p5A?9?Xm1AKGBj`nAeScIPH)9PNermtEQv9aaeydtIT0mN2v){}LW6R*^ z7{_iB2P%~HY+f}B;XlSR1J9(yjL7%l4<(R5xe^e&qn1O3R8hxRekT{A$l8Xe6!4s= zXBLJ^g+yc)F4W+2PyAmVla-w!(yDhDk|}Koop2ul$8ss2p;jqVXcj)qbUd%VeQ=AQ z(}yMB{~w1k_ckERU#QQPajIE!pTJC7R16>LD;3XEbEi1hKO^_TspY!DN7guvqIHhv z_cOM7TYaKat1&T%PJMkQ7MxlI7{?ru!1CQ+=YO<)yw)ZXjyhF~6`XmG(){~eR`CT3 zIC_uA(UJ}_QvS<-8pK?B2;KV*bq08{_D>MA`OHSKn!uy0Mx7cKtq>oVzl$}`ba?Pz>=@r}eRO{Vc5G_}Rfqp}vO4XS1b7u<%}#Su`2hptcJ56In(+4qD5Wssp{>N4##{ ziMI05n`pmdt1F-43F4j8yWE}1dbeaEg3KK0I!%njj8+}}sjfUJlIy5nG>12y zk`(2?6NkUzmA`Y2bE=_EJ1axP<(G;Q!G=}Y2;)Tw(?DdX#S5c|Gp8DhqMk|crW(D3 zKj)4_zdVyu+;)x(WbdzUssxq!6{ll;H!?Cz2v?1cetv$AzLQF>_VpF%>3Km>&8Xfu zXLQ$?b*+TepDX5ESV+VAe`tHlsJgbS2^4pC2=1=Io#5{7?!h$)?gV!W5Foe&3zFat z!3iFm;K3!x+XU`y?(Occd-Qwn{2^mx98S%(_hGHtvu0IFEIi!cFu)#vyaRO0=;)5@ zVYNQ^7~%#O%n}sBxBiF9%t41fB}_C1)7YMK%*5-7U{E0XU0`wcgYa+=$eo-m*_d%G zZ^r7Ad@Ol2+IjR?LHw(Vnafzq!tHEb8`!4u2A{`FDtO|aM;AA7D4DOU9+KJE zV0~nQqu!9il9J|lqE^mBC12KhrZu?+OtYpG4-3{hsjDllsg-n?L%e3aBd@0H6D3vT zD^^n00Gfaac=HAuER;x?#P1>NFbmN%7!Uu})@7_M3bc||9-4z=&}P&h3**s1(9YA& zIjb$h`bc)*J@qeUS<^kEb)+A}$}C`#!jMZ)t=taK#trG}6Qt##&+POz?6f%Y|Iya9 ztK8*9m=?Zgf|aL^6>bc9-5r%fAy(7o9hJMJKMm^TKMt9?xZKrBBqjV7E%SSZW)=XF zWzV-1GLZ@LJieK1?aJiIVKJhke)NiXD~YA_I*8TJhAL+%d~v70AKB3{W5^%9t;HMQ zuZfkdBEP$5e#YkP?CeGOQ?*4*ZVLzGQ3l!*Zx`BY;PMm|a||9gOX4Sc&~so9dY-n@ z4VrwvSpvsSa2(*tuZ@1+@dbfuqec7*74jDe8O-n8KIjf=g`tw8DJSUSv@95+kYPOD z(Bf2ZWG)Lw*3xS5v-&rAV!C;;o!K@V>kKRPMcvoy(rsPl>G=&)nZtlnUV|f(l2M_2 zc1R9WiR%H~_xE4>T>95g-UiLY`*U<8X<^yU$zN1{CRcH)Szk!;>zNSwVA21p5tQQUgOd} zPbS!3a;e~#Bb3ltXTtYDoM_kNRHQSs9*!@bZt%6T3)h6wq~a;T#0j{}Gwe-*AH+~Uki2IF zlHGT7Onum`9bt|Ru2W?3Y7g|D)r-XF!bP_xm-q7lvO+$-Thw7peTIp>H5fws%iMxs z3h}oYI=wVk`%Vsvy*-4w6~{7QhLwI!qE|Tc_qsx5i_K$312&d-++PbFkJ$)0i9Z$O z?b@fC~qz`01kyYNdWe2;WU9Id5@4n7aQB|)B0ErwCo1_50XG7Cb_RYS6O zPY0CBYHP3#ebNx7e=F=_c+Ap`^Cz_$U+!T?<&H@5K+e2*%E%pqU?yNG>5 z{N*iBeTD>MOsmkeJx@@`=}eBf?<$(zEDOD|+5qoaCSNtvYn_@|r4-n@l3y)jTjMZ& zxMvNYl*R>=W_)sk2rBuw_z&C@U_Dz0Jx#!DK;44IG@9B$MI9#q+Yr$HzkbGWsRn;Y$-qvU z6EB7eKNRnweOGs~UZ2EEJ?SIo!A$CJ8<1ik{xGX%fgsF+NB%O%Cl^M7>m5;Zo6{<~ zKY4g4u`_UoOY`fOxBYXXcMeO*UI~1^)KusH)v^5{3R*)2g*VIJ-j(cp>l%_D`=GiK zTCOw>Q4-9fETo}*%n=;DD&SfCbx)st+rZ!;C1tvyno*wznu?)OO6&20FfuRMN1RZx z=iJaQXd*vPdGCJd9qgn$BV+HHB@-=SeppH0CspzQRjxVhPk^TWrOJCYL!^If06NsU zQ+Kig!(Xk_QtkRY(Ua##Si$`API*XXdLK!igG*s;oD#hdxV^LgDBDH@>8El(Uu;lR z%@{;!qC7KW&<5+*qk)#kL#3NxdT9d166gdj&QOce=Bfrq{Vl-1T0$uG7dgfBf#nJORxMfJPWNUHS*{mkkR{x^GmOL1~Nup`77zb0ks-X^$75s$kjTh=rDDWMn-`ZvCqZGqJG#5go= z)53O57ou%u6PL(z)RZ*1En7eG>>LI4j}^(xW-We*1nJ{Mp>H-~893Ipx7avYJ}hMR z6HI&nCQxeK>OY&w54R++km}WWr;Qg#R)Y9a#5*6T*FNmLaV!3KmrylTJa{4i8}gbP zT-_9xBcXIZHpvlI`fQ2W{xr`IntvC05qVC>VJE0ZZw*ZEsPN5UAjI7{8(5MBESdrf zSNSMLa+ZOY^ycg5YS$4}k&%76B(Q}X>Jl&>0lOh|Oh0t+&*tb_ACOi)LCOyx)%1`) z1Eu`iCBJ{Dx5M=c>Z-W7`1Or-UcdM{IfxC!!*6JP@*4zz-@pV#vHx(>{PCBC<47U7 zbL$}CBm}x6-CJA4+@ydLRfxh^zGf>Ro=})5cS>JYBb7oVNy$`ILj*FODE{sD9;9HU zZH=Y)K2?T8|MstJ5-HIg-AO4}bP6z7es9g<4#vj>UY>{3V2wCleio&Qf=fZC3-ejH zbEhU=zV?HXsAeA28*;RSrH$Xv&v)lO$n@>*`qi>|yz~Hi!X?ga>cP=P#uApCl64mB9&vxZEO`PbS&u|1iR+LU3`k*Fj zMs;Y)YDqDV$4bLc;_ONwgC=*Fc zVfk|a_U+scsr}dZ32QPx*@{0I%MJ{6K)`1p@o4k(UCOcyV{?$)O%$&vIx9)hrf)DtwYqXDS zS)yU6arG3)q$d*J|E=hF3a$;yNCP`M&_E#Kie+1M?aN&^g*?321uocw?idR$R?}FW z#3U={oC#t#Lxw>SUqx;k3m8xvNA`+i8dl^e)=_Uf+v`6(m0t9=REr0#-jo~0yDi3k%~V{ z_MLrqg(^geku5G9XXEpPe>kD>XhhbjW4c`!5oC&G>D%BF6>=>jEO=hn!9h`TbFt{l z%bpVzGJu;_j}eE{f%UxnzpRzQ4(gf~oA*a}0?n#7I1xVX5GpOKK?Mez9v z*hg`uS@omgeRWX6AO}G~1oR7P5+P;>byF>vz#8eKi(AM!YZgHfFxC^Cs> zp4)P)!7kWRy@Q`ts!7?f#KhD+Zz?X?!+N1vNojwkpq>m|#|@@aV5;Ux#k8-`)G=0K zwi?$e+Bo{8bf$2r=gz^?uM-PP(8Rd;OTi@;_a_*Wv!RM%i(#pl;!z00r7JJ<&p4eW zNR54x&QX=}F9-gqIMHC$F!V3lmG5YWb#ytZWpzb%abZ1*=*%+H$Le|VAHr_?+THlrySsSV!UXTN$8)!K!MmCT zL%Zfq^dhpIO(NDC1}6UHD^qh$eevk`kM z32Rtp#K#EsA<AbWzeqK zHoVo|^wDt%luTFWxB$IFTle6c6E%T~N_(wn z!P%ZOXh?b*S}<>Ml%l!0?xeOh8T%_PUq(_fY~P54hr0mf38ohSCUN~Re9%2$P5+$z z#XXItlJ`bd`OxYVCR(RR&hmc1H*X5jnBt4I;22cpG6K$#_3J1d=B|iVS}>+O`4TIo z*X=tk8qn0s0b zyXF$KU?^dDB7&&s@V-^c51Dm23VxXmZ`<^L*KDlCnF}n`b@cTH!ph}wN>fa%PfsaEIeD}vd8;e=m`k% z`}$q_XFFCeyTc#(MlN)FgCS*TQO-Zou(@ScyQqA3_m?yt`bbvQSJ9I9LLOW+lC zmIgXDe$km$mSsw>9fN>*CRq{uAvyuNdB++FFD<&C%RwvmEh`cc8AqpwFxD*ck0W{t zQqh<@Q1}|z8ri@KZ-)o+Cien zU~S9uD}EeHP<&E=1W*96HMb9F*3$xh+cF(D1GY?OM?018h96$-W**yz+fB#EDPlewIFvR)1IOjIF)BAS}e&E1M~1Nmt+*!Fl7 z+tgE~W-zIR_~Gkp_yoBmfLw?)jsw)@DRQcT`U-)pVUqJ5g?)5B#IESEGVq)_6inRW zA#v+!3}IxW5M=vjBNa{(tNkIzQ6KX3_p$`u@ZHc0^;U`+)BCb?Rb_1d_!{2hh~omc z7%M7hu|}-idckZ<5ej>E75V_f;Ry^W0EQpdbRy_`K=}}megP%}%-cc=g1MWE9Dk_e z2s?a`J>-3^yJ+C}zIo>td*|@_4UQw4iW({k3Iz6smm-o^Q=@fgx8_^`{UqW>MlPa2 zQQq@NzgLX)WV~wL2f6e}%bRhF7CrsSCHY(hUknCzxQC&A-@4Rl>lwEd@sR%tLE{aA zoKaz^4SjbPmYH7=H=YL~@a1MhwvRLj1(%G{yd2|Hpiutqaij5l0$&<{FJ^+p2>R+T zt7xIiy~}qP-|FPk_o1(s%}+8uMDF;V6j`*`i8!>X1_O%<#Cl_`Qrqg}?fD^E#L@2LPz-;1 zw?&PM-lYZt@B6Tz5tCJtj!|}KOZv=*#CL)*PC!%(flKn|( z=WQD<;oOO@BbIUoyT*A0!9`{NZces4kP`tA%GO)Hou{e z-PrAI6Z%XsIa-b^(A$h_9&yu;t+D$@ZhcO<7{$ z9mAD5xM~dF|BBBUzJ4Tr!NpmN)mk)q z@^56-2evnYv{{iZGWS4K9;owrNDMhv*n}X^i(EhAqd|hw z44YXVG7qE}W=dBkJnspG)4c(um{J!k*&zjnk~SjPaQz{z%&_|kMp4hXYBO~=Kl)4? z*R7~pE-Kemn$CUlTpIE_GIDHPgm)kz5g$#$ChiUKyZVq>tOY)XW0mU{+ad+lZ{v~?R9 zs*fz^Q}SGbdlE*2mAV_fDv75-ifuty&VobTCe{KSd@YPE7OqW=Qki^k>T5z6nlUp= z)WdUY`KMZ0!8DzyNQ<#oV=bxC*R}WVO<$#{P14Sl;ix?$#2LLOyY1@8Utt;Le&l#I zDjRDSs7ZglVNS}%MhYBqR%+|!Y+?fxZlezV-5{*!`JCQ?zPs$tQ0%d8J4%Lnj?YyU z7To9QB6Mk_iFA$}P+XWMWfLMOab~EBBGuZnIJ-G8CMcEg7t+XvCusmFrAbXq4gNI& zCbaNRgRpM-u8fGN+T01l`x%3LA^))(%0Ad69i-iLbAt{T0n3dnMH>Fazlpi8gObFk zfFc<8xle3=XXm_J>>}Lve{O2D<)DTm%%Cd(g(_(BeNI8pvP`Z-m9$}!)8)1%!vn8MXZuffS`1*;t2ho_f4mFQt1@dQ82{&pp|7g+{=Ey zx+m7NG6+n;MxXuG%)afSi=brUt@?*%b|TFTJ{LYOPC_;DzFGQU{p-_LDlbGw?T-2n z*{qthXet6Dso&aKu5^Ho-({p!K#(;<<;On%Ik+jIxTeV(G)dJmb=CK%Bq`z4jnp60 ziN_LhB1~q6{}_TrGc2hVD-B=Lj%c#CMYgK1Tx}|fq*wb~tbWAQER7_T8o-+ z9?AjraS5r*8A2_B%{{f&xG?*PRCf2iL7J7BcWgW>yUS)Y?S>yc_d&~J{|vfTY5aDQ zQ2Xs~N$kg2sG|_$Moif`s|P=)wCPy#xI@7i>J0WSI&(*=ic(vSLAyJS_NlIL%f)UB z(o^2Sw`Suti7D;Fs9C(a7AokO8|J@Br~d8dA@V56g~k1NP>~>Zwuc=o`^gR_3+!MM zgU|t>u}^kZUx(+bMc<;`1A3jB={8PJJjsWZq!&&PlcnAisTaayVnseH*g`iRATo6_YT@w68c?@}Z&j|=CDB#eX; z+=9v7<%JrwK=P^XorYT1D*u2XgK5+=J0JOsl7@-G9q8E)^~H~esmdo{}vkzpxa04BmWK~FEGb_Bt#x(731bXt*iqw)G#Jym8>_b_$ z4Cmq}rcNu{+2=g&Zx-1c?5a3fHX(46WaZpuSlHuD^XqMzyJ$YY7(MN?8x}Q9nd5}M z9zWcWGCqy{p278x%5!($dhsvfN~iGZ3h45A1!UcD9p~!PlVJWM}F|Z zi@SV@e+xmiI#0SOG>hq@*vv%@cc(+7EZ^tyU6c0iD zfAD@kswvdcExrQ~H~e?QHTf6gH3!!G&Admq634vaSS#PUe&GxXn=jUD3U^uz552(*p5# zsb_KKdOxI)ew<7!W|w0fq}KYdT0ftlQv%S@1-5(yt$6a4^rIRst^kDH;FUXc;&r?8 z*u!eQoiSOI$c>1<==<#UzZzQ9bEy%b9BoxwR*$$sky7e}G<*nONhiy_A{8Lk*;o+} zLsl{J8WCUjy&_H9)b^3s(ZB{@LM{^q%X5c?d#xJ4b3j^CO`nd3+1QEZ8)sxXonq0w z_KI80;H#ec((~K1+m=AgFtLFo?l|gMJQLRR)|9Po=kW?8U&^=0*0;3%j~5;U62SlX zQU-n=5MI9gi&LB*)wi%=sV#!nH&@zsahd0boY;vImbbyv!Une|=KK)iv>#D~$rsY7 zcn0g25!2R9l#e>2!S`f`{B@(|0+g#v8@^hZ4DZZHf%;A4pFt&*=6I#y1tWLSGsVGF zVS+5fu&zF{n|Itx*p|tcNmN$$@vHwEqx*-*kBqNltQdP5W+M}v;IUUN(MVx~E3DbJM$+6TS|nSeUSMPJj8s=X8Q z2MV#tfaU_om1TFH;frwidQ=SJ0F;;UJW{3Wf(I{OWJ7meBj%f-1&{$5`3twM%SzFFhtmpNxe-)Gs}2bM?GlX2&>Y3x3f^Ps9eeSvKy`lq8! z!tz&$n{i7nsU3n!n>lM*+q9Ym@5^u09Q1|!HV)Dz|bp`^QPwKk?Xy&{eCERv*J}^^{$CnO?BStqq6Ok&t2~F?Mo%rQ*1~fP;jtw zT1InoxwQvy%um3n0pRkfKFx!YJo!HTc8kA2b`NQ_E-v<2^wM2pD9{9Xc(c%xH>(40 zzNj-Ed3f^hFT9+{AHAFmD?3q%3)XFdVdLwOWDrd=FoS>6GKmb*nO^smJ59`>)b)2Y|vKul9Q*x0sIczvO>VQQe zM-C+)eGa(&rUJ8H3cmFsST`$4OYk_D z#~@8;5HRQeHJ;}GYOD4ck(6AUW%K&#yMLEfU1sv;9*afgtmpzk66g4IG_KB~eWv+8 zh;MnmqgX&yr zH56Wn9w}LbgDy%x&{wskYZINpeHWKH^3%jYch&+Wu6wy&LDVDkgREIU)2GXP+@2K@ZZ_|hS@LrC)pDbe? z19=^T=#4+267g0(3Xhd&KtJ`t^Rck!8h+b+)>!2l**-yvrKb*6_5s306Pje&Zl`b^ zSDC^bJR^$zYG(4xZb`QWj1<<15J^=>wmj&-lkaJ+y7tm`1Y)7W;%T1;Tj46uGMDNp zPZ$^>-}t&%@@a`HQu1T=$9r@kO@Te`PG(LjC@u`G6#$3tTuIO9T&=`w!{u1X524 z?Ci?iVC~rP!&SASiMhBHB~mine;ZaKP^k`64fm<}73t-PlJ+W`6s~F*7JcQbFigBh zc`ha?Y+ZY37vB^P1K(7{cV+qy6WMY`|Hnk9PgxCaO4L?sSsgdTUCfBURMZ5r=fN9D zyV^@({?W6$C=|%aK!pEHVC7I=#^9~s$@Ky4v#XqRAAyeJmKHgPH;8P;zZx2lY5l^3o$r5A(REY6GNY<5*-OVx;&v6YMArV;d{Z5EqsEU2leSc03I;63g)RT;*liJcqJ z3RnzTX|w891nq=2OkU1b3WR&Cq%f&sO;)k|XWzWPWsdWaLY{a}CP%Zf%(0=Tjm3yL zhKc-FjF!4l577$>N`D0MVnv01k3(~F|p}FDsFNn8~P5bn3s7jCsi_EcG#lHo;v^N=vr(-larpFd?F%3`^L)U28DO>OV5pq-XydPT> zTdFfed8vH2Q65DLH6_W;;@#|Byk?|0yOFw~#5mKD46AK|nsO}V3;57{5gifm97B9V zdRjz#aIVf26o)c#2*@NuYG$YUFg+Zdzm1F1d_+XnNeX!#Bu!ot%%IGmL_?u>@B6e> zHrrIU(R!Bdjl|oS(%z*rn*uet_d&ca-|_`<{a-zwx_;F%*I{P42Qxo0GR8WCjIf&3 zyC=PJww$#Q_fE!LGAVD6iG7+>-+yqW7$05Fo9OzTZ!=)YIG`a}^xMQZWwx%oD2_bt z1&okf$&lCJ&+msE!#~b|V4Ls9wwxbrBk`(?eYHMESF#8ByQjR@vKt*u>4ZU??X-#d zhC9)2_u)oP&RT-}B`3Lek{C*kNZz~0V~gRFEm9NMA_Xe5?LcRMlfe_0C%V4T79y%{ zpv$zGcxC^ZOz(VWyD*52_2aLd^Nu?OT>X%udN_o;JPb;giqMi~^4(QyDAfTl1+vP^ zzPB1~W&ZCw{2dqY)L)8fmR6CptwLc24R4FA*XR3+)+u2|>vE<*vdh96CO~tZ?cfq_ zms0x8zx!UHCUT+H#4eFdPQV8(_r4JsDum`;6dS^R={7^aycX21G<*8H|hOOC|{GQ}1?84eX(dd>>9U4o`~K0*Y>d zI86GRnXR;$1|~Z{N!!nzlNBEpq{C4)i88#8q(4fkw8C4G!WZIs^NVTcUKl|VVDcdG zmkMwdm3^XZ9zTx!lJ|=gEOz-ee~M9zh_fEvt|r_OR_VwN1d=sA|EE1jYDfFtxPjU5 zJHJ%K8*^sm^(vn#jYLyatsXfY#U=Hsl|O7Ye4l{S20+f(`_%lk;X`#F9HR3fX6;sr zJfl171JApvs_)51g2}UrXg%RvPU>ESZ@tHOSiuuUH<;RH+IFOEA=BLKI)6qkD;iKQ z5D;K?^)wW=3LKo9hlVCH%%Mo9V_&Dfb5+v-{XrOly}KJl9N-Be#fkSBRvw&D*RPS= zp@)rqaFyVf6<}6uAHF2ODXJhvkiVf?NkcK1Qru0s7;~X%k>? zk3LTd6z?D$zRxz74G6%GFo#Pz_7DYs8qo+2l|ef}N9Z1ak#Wo%j#zw4lv=O^r6Rdt_8TaozZ?wD7BOi1PO(tYSq%_Z9=Qu%U{vmT~R3A4C;u2yw_}ogaZXdLo zTG>zwo<@J1G0TicoW96&!~FAE*P2E&@oF^pHv(I`!2vg%t#LIPHIHMY9v-j}#gWek z^DQ0p^;oYT56#(6)<73n1Fmyo-@jeGZ^5a--p~QP-m{k}(k5xoQSRNHn&VAtCwnG? zIYt=T-b|-~`@Mj|`+$v72DS@h3-3wOMu#Oy)4cLA+B~In+~@hBRo}&S6eo?gSDZjU z#_O+8frFEoL`h71JB3OYrKDTQ6WZbRVwhy#TjnzCHR@ci|#nY+}+ zLB;b$0*&XOYB@NxkCOY!C&={xe>PH)zGZgB8}(@_fF<#GIWfrFDw_W^us2-_$4%C#SV^>B9v~n&`-o zsdjR&p(x=`QW(V=i^cgH{9ff_dl><7!-QusYn`k=O8VTj&hg#0H6275vzy$s*3%>2 zt&Se0*&*ba+eZf?DpaTP-hJW}<#lec7k5Q$5`1^mn>+2|QHi}oSfO_DS}6O)aDZ{M z`||tkc8!E-A)}}pP=CWil!q@{>yyi+4_vMm5?`d>PcPB7A4d5piI=+AyC{uV1pu@hDipYNBLWlej>|h^Uo6NA?1j!CLl9fl(b#Qub-AmLTDzy z`Jhp9JAl*P2X$#ca=B&2c2bj7>ejv@YOtEX%ZP8=T`v|wgr8r03dv!c@~f*DekY?I zyl5b)=!s!LY9x-MY^(+lZT+O^mm4_RqV+@`iMYFHV=9sVQ;RX~*XY@tp1&J^0%#i*`O(Z(L#? zs#Ktjh`UwL_^!WX;(lnP1%%1%%a(t1i?0$s@&*$X6E%T*Ow z2t0=EAk~e7$A)VT{Vhl-XtYNg- za+Bmd{;>nO&uV*o83R9o+@dkip1=IT|E*Iwxa63hMTb{Fu}hTCE(X z=i@7$ zx{EuQiuF*Z6~8?UG}gFj{5hpF>Rs(uv)S}|qK5DGm+6jZu63s0J%;uq83(7j((&jY zOGJ56q6tvq0LX3ZACD5q|6laESF^i6@~BEyHW`nR=Gq6QM359#Po=W(zmxpgh3mYn zbI6l%Tk->nCF}#{Mb)^&`Vn_GtO<3nh&%G}CyiK-{r~Y73#kQWzG4#_e%h~6l zSkior|1VV9=WD@I^jTkb6v^FyY5x$O9nj@cxc6xuVKJep!rumC&vUFzgOOQ*o_CgK z5&>U7-xT_KE zX?m@hPio=Fpj%3`E^xJ8mrd8DMDxiMKSFfHhS2e`5_rUm`i&lO*dESsrPz zasMD;UypkY7}y<2tjahd*R4h6`}m#_cHMvB-^;Z7bj4DXl{4Cz5)2lil^;@XAq>*W zkQnIyY=2K$X&P5a8fV!cU}f2W=wIytGVQbC|6|toF3S6O)i;IyoESF#FTuB>-EIhY z-+m$N!=`_!GKOM@AxMFDM#;uN(w=Dt(VmyHx$eujIG#v328YoEkw__q$D7I)yVE5= zlQK{xxc7**ush)4UPPjn@BZ5`Fw)>Ae{}EhUfK%qAOTfDDslv;b+emqnQDxzhe%ri zi3%6XIjkP_?s;HbJo|3%Pb4c4QyG6b*8il`7Cg|=$X(dK^)0;s5?IQtR}?+`k(Uen<4#bD~oU?6-$h?;aMF<+&C2LJetR+I!r8uh%w2u>;k| zo5rO6GYr@M=(mqlD=DWKvlbpto-#^d1XL%>bSG=2lsagQgE1zAf-QACx+@nHq2zxI zI-1%)R6d%bNb$)v@hNh}0OE2jPHi12N&XRq3;h^{Yt&}uRPV?QNVa!Sh1c2sRSa%% zP6Ooic0iJ$u!vyHbHGZ)H^TrQ9wMb>r#2^5AotQroLH`#ssnR29&Sain zMu>jVDjX>tfTfg_Q9xu|m$NfvOd<_m>f|_SMU(iOuUM4%Ik8jm|8R`uB*skvR+8`%}Bq?YATSR7}A=^2Yz`S~BMatTsW)A{HQ5!Gj<5cX2s z`PA&6S_Xl*TpGso>I6TCzOQvre~ZhVmeQKYxfgB+rkCJ!YMUv(vl2~o=qeT~mQA70 zC?GGi)`eYPsONyLnVWW8nCQl$U7Tp;sIUXq^rO>(ny5BXXJe&9IdZ6Ynu=6~LQteX zG1bO|UHBvvDTSi4EDwlBG8qa49x&`O%qnm&Vn>JAZ`smi-;gMC3=}5J&rCn=@ z_kOq26VDF6j4J^Bbm`gGUl{FVVDBT6Zu<(zlTN9_C{|2visA!fu+2iAp+b`mRnD>a z!Vgu}+Hp|2F|)+NccC}Ge=l!hXXdY|qANEm_vOC3j;|8bZmxQ7I_20FySTskc{wji za?tKORcnq&;xzZ!!x@SA$^K~y?4O7g?-W2Y9*zi)ed{ajuN{4d3;aiJG#~q@42JfS ztzI0}hRVT@T+q9kCgb%)61 zlndt%GX{%bdRsRZ$~$5_CnhP24#=bVOtmCqAkD`Q(Q)}RV&BAp$aT4cQ_GENVJT&b zib$#N^}2^60aERv#EjB+M zfC)VTW)1*zb0<&zv)^>@;^{{vLGbCz>#(+i=&8>q(Vg>}*M%e8=|&j*xS{v{!Nh3V z;vXti1-H8iP7n@1ZvaMDr?8dFnxWU8sZ>n+EU~)0GBNr>Odr?2G$OE9w5F%6=f{8Y zj-w2YDh>;ZTJMqj#CX=Pl6`i`=4932N>$fwa@pv1r6i_Wx!#|Z&K{K=)Hz|G&tZf^{$rS zUBd|M%=0MLJ|G0sCTS}l68(h=_^)Ip?gaz*>0gL5pU*et)=YiH`DA#y)s?~oeCXTX zKVz8XkvIo@#%Uxe_!8RUW^dHHq6${pNK8U_Xe6WkTa=ovHMt0rk(%(cBIB`2Vba4>vgHWBKy$l{ARv5|gDBX1=KPpCfkNVyE3RA&iP$5!cm2O9VExciWi$?Ab5 zEg;gs1%|0xiXYP9w@&nzkF6-Q|8PhZv?a^4Rm!sr+0j(f{F!ZmPXd%OTe;>;g zFlF%0zp5sfKzoHhHFA2d^QmRoN_-1ad!ebGr|k!pdEdSK4_9pQRH4E{?DXPxmD zHzn{e;q9i}4$1JbSkp;0?eHK^_8&kFUL|g@k#XP}g17P#jE_)5y z@dO*7-B0||F@%@}e(-e;y{{G*Il>boHl@Y4f1G~W2nro$&_n0bRkKYcI}1;YKgb*g z#4#1v)m#N7mDFJqDf7su!-#LRooszE#4pv2Z<_MmzivwavkYc6)4dU|Toc<@o78NW zZ^JPBgx66(neUXAzxt+$CSLQ&X}+?#<)4{Q2j&)PK7ab2s&F{yX)oYi*~8E8+^JN2 zV{52Jm?jp^pKf+6#wth z1gkAxJD*7rViJXFS9YKCyA!{{r4lyV{`kiDQEl1rU9K8{_FWhB>1Fb0U~THGexX|vU@IVK#k{j|gTNQ5 zm*%bdCR2E=2=;uJ>_q{{ZeQX>=UW{w7+};=FSzOZryrCgkl!~N-*;ah3dOuIVZ*9{ zw<~hT(rF+SeSPE{J1!y(H3>T4^1Z3yXQ=e#RKCHp>tXvxgdimoUA zeR^Q1PvM z64LyydsnGKXE{Qz>b5Q+SnsND>HhIG3P#&sf1%gdO}~31X&Tq_F|W66p$e5RYzn+X z6I0^(Avy^vtN%A*{y#^Bsj|#c{=cQ6f9kG@ba#?RN(luP7L z5Vp67MSvRPf1{sk_kYm=8_E>oTz)q@CUQ~qyMH?${14)(+aM2fq9yiD&3{=7^Ke>Z zRMW5uW~ow7Jwa)MW}~vrYNHbJp!`4BOZ}a4))o?uc(~Y_e?j;N`X9+AK}w95@Q-je z6bEI&?I8k(^5eoNmkn>6zhw~dvSpkJk`33{gh|FylF}FOFmr!>+Mnj`oD0266H!Q0 zgYv#(25I50a*!$`_5PKC_MdvxH#^oRI-kE&F+qmQ-hHJ5Oc)z*nzf>{HY+$Swgw~q zU2v|->UjlEN*J*!;6hb5KL@x_oeS$8N#>gu#^ccb+kxPJ5KJ~UHs(Woiwrv0t$&^c zmaas6AAl0aoiKn$w|1>Ue54m~OLY~(%6WH@@@^HH4M@iJ2~tKY2g|iJ2@4AgmZwm! zcMnhg(~8RetL9J7f1UykflTaQ=-fQwOiZI(v9{9$3;kE_#M_1T!ah9N>nSKs(*`lj zU`KvZoDTn*R!R}-v4R54aLA`UYU^S0_nyubbtr%@mDcv)H?45lCnm*T%TqC5&)!Gr z`Z|46feX@Je{ac%Qr-$nh#U6B`Mx!sWj0N){SjI2y&tIifVyRY9^9~o-D6Wa*V1_P zkWNRlHr7K)nnrijEFet0`=7|96wI;~!Jjr&e5z_v?BTU3PPCKD|4b(p`82bo41&)@ z0(2s-yUE+ywCI}A!nN@>Fl5(>XmJ?#t(e!ErC?X6B7byz(RNCsN<-|cCD zK)!?xjnk(ToXv`gN%E~)N%Y^tvJ0Mx1ktw(O1JXMd>hh$QmGYAKYEsK==ubClAzh#%KDd14h z$4oohs1$|0{HjC#l@8-ODS=KFD1jA`bM7yNUe{{IOZ|%tSUy=lH+-Zsy#ZE_MH9;P zq=mz={2~FqWluf2=9fsfC8N(Nst~lq9@8OyK0)aSprl-T-UD`bpO^?pC_(lB+9LzR zUoIY=osj$#2nl^B^K&aPw)duouJmld!JR;g1W%raZN_6c^0b?EuVsM{-;*bXUn!iK z6c*~6DcW_jo@!&@+BaxuVI~sC5oG)7HKR=HI%^cet9^SZDQ--K=o11hmMZ_z+af))%xzEtb`oDpK z3T}@Wb`>3ar|@{90f7bb{;k|`mKs$8H(0@Oe|(s;Q=@v!{Q?KIV@B@sSCue7M8Zhvj^z8eq*yFT;v-Z z?2K!)j#A8fM;3Kg^Xht9@A*Sn#81j{0m|yFGnE1rds>zQ|H=94!c|D!?w3}7xSP|% zKwpki=3*ql;xLC`Ej_akWka>ymt?p}{V%3E)Wuud=5`T7b&;sS(|KV15~!IKXzEwjmX9(0+iiFRYZ%gpx98 zI{?zRe5+C2=q+KMNP62mVYDD0kxjC?PVFu1&UH6iGR~N`jMS_5qLv9u50wf%sniXq z^pH3q__vYXKM2BD%*5#qm$yRLT$x~`KaAP=_(90+7pJV(&x&Gi7eele0qM_aSb37} z!O~9rn_I_$1KP650cVFF1x7825u)+wn(ho&G%x+la!@s8!xFGLMQ_y6_vXbXvG(_=lM zqf%1GJ`XvK)&f5ykdv*+0mh83bg{tVxH#GPU9Yb4tnzEwLmJ;|ye<_Gs3R0Mio=kV zbKTKMr3Ji$yd&4KNJOEfN6$O}}X-{EMZCRfp>l&?b3!+I;RhLVz z)Y7lG_1#YW*yb{=I?Puy|3l;w)A<=?eo;?9m^UcJrItM!#PtV)HgtCbcqf#luQ>&m}c(vh?DG(Srw*# zVOVltL|~U^L>1=7hV)pNc=JB;heBhX zAoT{2QkWS8Kl04p|D9(Jxk+W4Xc1qF5{2`$_-RzF@MF2WAa}BO%)pW5LjP#}#n%KU z%~3ysfD^L()EP0BR2t182l))OciKeze@epLDvBW!MEE6V+J%G1uSZs#Tu)D^duehb zYuDFIxND0!7G)gx}cXv0^-QCh6Asx~!B_Lgbl<-}M z-g~+4eZTv8pYgqG495EFS{(B_7o6w3=A6F+s; z;1m15n(rNkV}nIBE3U{3>5%d_R2E75d$H5;D<<_MqrFf9Wb17(-Ne~v&tcM^jm`>9`l-)Y%ccaNwP)7B zbhExHcK(L;wc#R2BaKGg4|9%tGgN15Y&~gd${o(wXG79f2f$IKYcW$8Zm#-5FS<19 z+YkdLI1wzgA0dhc7`}ld&ZMW zub@Y!1Z_0i*{N&n>0hxiks%T`<^iXPGfE;7+^?w^l==+y`n6QiOs1L>^BwQquO%`@@1tCZ}gNu)x8drKzm3weW?-x$@Q?Xf8&h5$HzcfZ{~E1X0BXATuV3Tre0O06&7M|rjB`bUR*pNLxRrc!u# zwto_+Vm`vn4&rO&B_CuJ)TYw1_tl1kN03N|()Y@UN&KcyNg1ej%H@eg^4DeH$+FOW zc`nEnN6q?bgv8kaZJqo73_8|JGhQQ)vjAH9d&~s@LmcIwhBzV$YM9)+{RF0||Cnl~ zS?^=!DUplvmXcB_XShl9ot%j0sOSHa+wDh|5B%UHs6$z$I{uLgB&P9LFJ{qGW~jv% zh0tgW|7M7T_PQMc#h+PTq)_UfJf-p&4lo05-WVvqZqK9zaZYVddX)P9*f;E5BChuIMgTEtXO5~ey%tIi4h z&|91;ZQx*K1%g42?a3@*J-4puVk^6R`WJ92*4p|5=4tRz7rL?~Zm5dTcAYg5!)8vM zMXvZ&X{{ml#Th@{7cCDA51<%$pKB^Ogk^Jq_}sD+fsgwpeZgzoh`|XX(JSRU21d>Q zfJ~8Cjf({cHGj~m)s#247GMrxvd&MG&V!{YD-il4t8q=&)^1f1uu(|)~@9Cu@s_X~Nwo*-%ci?JMQR*>h=j6`dReX(* z)mp=)W~i!PS{~0=nwje)hOK}lRx;heKe(CL$-M`lq-FzOGB$4WS-6LZP-rVJga zWzNV1&P5r_p={1tav1A>M<{f@oz}>C!TOl)^}DzvG5iYFVjnJT4WlO-DJheY5^gQ& z?@UQ!S#b_7`Jv%^+<$H6Ss;6yJFv%1U7tJ$xBX)?{|VMOME3r2P)nQZLo>5sHnT_7 z90K3(yHUUsG8p#ix~}(I(-_I2z$}K&@mq_QjnCfMhTOfj^UEZJJy;o7rQ(M4PDkRJ z7qLBFJ2V!H=0;my%uXs$=vhQMI*y&WUs8W_ajQVocmQgGF{04HI{-C*Wx9A5?y@Ou zh0(42knxfpyC-`lxhgE2TdV8KU0vx!!SC1SRMDVN*CEIkQr{2??^`&LSYLoV5S5FKW;hBJ`Q^@oOr zTAEFVvUloY6R{!_Z&RPM{>rRAfCT3W1SijvI|J_UaH}7Rz<3wm&bIoG9(R1Rv#Gk2G*m#luC+a7cMp$Fv41LCU@>X7y|BKYQgS_*G4&; zqBDd!xP zI&8Ywj>JcK(vQx_KWFGAA;W36dhMfKA7s7ISjJ&-J4RA6H9`7ofsQ~l z`v98lFQ1Ep>;0iw6eZ7Y-1WKN>i!bhc^?WA`8ZK5JXlF()p`lir6+UW`*nJIW{mh< z%z!!LN^lR==B&Ajm++W29rgK=5i(YI#fg^7BYZ<0bG?zoHU?M+=1k1*ezih_!2-YX z*UJ}p7eFj12haZFw@(YTGxC`OPL~;`=K5~}ZagWh!leewd1r#@oJ}@7gJpHs-t%mi zjU8Z7)qF0(DjByLxY4(M6Dj3ylhQkPWBFNs(j`l1Rjmo~+jrw5y>v~NR-mQc0L3TT z$7wI%ra$Az#VAgW9cFs}<=iS+Um+^Eghf*4_j5brBCO&q z<*^YM6cSnY$foWE0oo-OdS~>qGz<@p`5|NsByLvz5+y{F$&@!Mo^|}5m({Puc7bO- zBmTqU-b!UvBW1eS4HA6K=IIr%-pb6ZxQ%2t=np zpi}7^oEo^@A2(Udojskhu(r=*eBR`&(>SCtat%T}C-~LGx*w9e|5!H)p|1uuR=D>|+%_$fp6JUS! z=#dzjbZXy&GIXjKT*cn|`Uwj-Wc-+=Yf_;%wF z%}gi}z3{|2Pw5Y3VsmX4d&y{}#@BSxyY>-N1yUBz3g#$j=ek}o?J8vi#iX9K4mXif zAA@L*UB==+nc<*u*}UagtaEhaSjyo*THrJIk@olQ*`PU3r+KpQX9<)kE?IkRq$Ue$ z$cQ>G@g};Z{iV6V&7%qaGE|KlW$8E?{9kp?Zu+M{J*ropQ50Fp?_?<fu;}NOJ9gBL=;23GlRQ<8*$l}D1q)jU3snO?J3aszObSQPzxPrF#v8at&^$=^Y|iqI)@)*oNuGk| zUFLhS-XR*<#W4K0Mp)_|PZD*G9?utaMzyD*(+idrFOUSTc;Ek%eJaKl9#h)x$L>Z-Q`duI|l`!@n>7o))mxPBU`%g$H^6MjF z*ym^>8_W!81q4F>t=V-tw;uP$TOpd?MM-pfF4F%{l4SB)?giXZaR-LcZI~4BH~!Y? zTFS)8NTUvJEYt$nsvy$UOwQ6n~Kt&$fP(9 zlkQXu$Lp_8Uew0eT-1`Tudn|o)97oZDyr$=UJ4)T+Y|GFYI<#)Ht7u`39l!C?+QYI zGJhG*+=LM!4SQvHD`6xP8^dWz+UfJ<=p#oz*KgZYDTeg_2!Cn_4KoZLE~zWgeX1C* zKmOY_wYZFCN+qQ)4lCziAr*4oa*yj^NB=SA8#5hT)fU)79s18x<)se=$WiDuM4z%h za>I&Kj)SZjv;#rn8}jfME_&*SKTcaF{7)RXPWL5I?{merq_u<29cs7FSdQTl5Zg2^9W4l3lvVTQX}NPqJe^^(?-) zjFY>TE$BO$O!LB1!%TgoJ(M^j%-WrWGF}NDCl_z2rDeZ-0E66XGhr*7sp7J+-1zRT zv6i?b?kt(lDuy2`SEC<`*KvZQ2SbIIFMykA(OKaF-avRbt=GQ?Okoq zkk?k@PV3S$r>;!!@i@kExGOL!bT@kH-NI$V9(Z{=b4@05?)t_|Gru;MzvX3cbY0Jh}r1atSm_r2@qkL#>EKqIUmi2G)3Y13Iz6t zR8UCE7>uTEF0B+lb#(c9Zm*wPMHCkEnb~N|@Gj|yg4?DQsJe((X8cM7yg`Br1%isp zCUys(1cLf2FTTe`b$ht9@xOoOn)>6*aa6OX>G#Upwr=U6nR`r>`Q72&PN=5>cdf{d znYGg!HI{g3)ijvgDj(#aqzfTCIBsuucy41xO_x)33unhZF)uEa%&a*u9e&798cb4h zGAVHA9abS#aj!Cm-~ZU=ofXJ@DQ7lC#@@$QmsxN?9leFaYD!ToI(DmuCd46bGfTp8 zz^NpV>a2W}y>La;5()Jz5Vw*9vX^9T-Lmz`fc0{oq}7lU15F8?p9;o{&qm01@ezH} zst;erXpnfrfOs*HmOFo^%0KI&K9pLJT_K2aa)QoC?Gp4Jd}G6oJI(1YsEq{^oLKan z-}gV^e>OUfPiaHBVJLEfcp2Wk_JLZ{P)C`V%I%>HDuNKwb2B1D0xDF*~38iw^~)NeD7d${zg7A;1Q zRD3C8iq z+BTFvN8wGBvKRR%jX)d(`{;XsSryxKgijvip-wG}&p^Ke|EnOR+%MB#nd#Pf=sbdy zEPWb%G=?iT#t7-o1D;;NF1A7DDQR3f87zlIPqcowK0r{uGV(Tz z=bdj~`wf)(01{Xv5Lh18DaoJ3M~aYTSTVFk|3HtB2DqdF#CBTUvDIKssiI(AN8{f!b4R|CKg`Vcg6ng=ufbeX3_=no^#3CeG>$$xiw1!YW2$- zj317LloJN};aq}^$pvqrMqWwvpy0{(>DwhdUQ11XW|uk8{ym1Gg$AdBNs^#}4#CPym$TG>N(1MJ>R% zs|;{(of@aKwT7k~@t~9yeKH2^yssP|AWa(fI3gGljst7(^^NsH!tEq` zS|d)YX34A1g3enJY%};&)-*A-n{VEJ+P`7dsY86X4rAn;;=2)DsSu)?w*CIGq>K5A zZC5aK>$!2OW)evlU(#k?|CW&L7Qu0Z@s|h)U-d!3W+p8wZ5SG#=E*nYiBm}7lqk** z`cXji#{v5Lz@H!al$0OI^F&Kc_TVsJdnxxfT{vt>Ifh*l*eShOhIC-ACC@4wVI! z=?jb!6`?!5bacn2klzrHvNgHA>8jNvsuDabBWQ{{IS&icwtF z`r(f+&YtcBwY@fJc;)S^zFDudQ`T&#TVCag2;Q}G&_Bwi1j8SN*K<(1BE^SHO(!I_ zO14vh9mfLL@jx8#EiyMo7bkQk_R&Q+XDR&;&{0^nuL_k6OXx&Gb;=g7)uibTKP602 ziJU|-3h9a>)RX3|_mnCWHIR4bh`eC^uNf>=xlI6Bc!@|DmKwiEXvPCIiYSy~T$cz5 zYWo2jh5e*8)I+j6rSl(WJ=svaZcxNBU{3gj&Q6}f%#Y3c96mb)7*g$20?qu($DLr_ zl|)8|WokYV!Z1bT5^0O6>JJmVX0-f}; z@tFSvJ;oRWyMPK7WAQEbMdKD77u-a@DsmZ{uj5r7%t@k)z*nS(RTlNr!`{=wQ6p>j zgd&F3gQRMi3t4--LcCP^#r(;Q+!>O=o4aFXfgU6yz{~j#K95`rT4c5tz#Su`$(Zpf zw9gr!6`P|zeL7Um2+x_hJV=Z7Hy56uhh+DvzO#t^$B)dJTLjd8d9SQi<#1y6*E@p) zFO!}mCeV4;W-TS5$ifEC*C~hV@6966ycYQPq0ag+4$-adkVmIv7@c(k@2Kmmr@xG9 z#13_$iiOXPJ=f7M>VIKcs*i8`10~4fEhrpHUv7$_3{S^Gw!_HwKa@i?OY@9LX&uS~ z3~7Z3evNh7DKUXyp^A@y<`3nV=pC}&r69lCa zPM;MkoNrc>j~#;0tsvT}tV#F6@@2jf?5DFP6UP?#U+uRARi!UA031|#mbsIY<*?5_ z$2p#p19L!VLp>8>>5{)v71p8I^i(#2?=mmSE27z_gWkND_eMOJo>En9B|8De>06CJ z8T33}S!JRcV^9~~(ucinpJCjk+LGcN73?&1J^9&pyRWG#96}a7Aa##~y8YZcq5DpMjzfg|-BV49zK*dpZ8$+(+`&5j6Uvx^5dJFZoVJ@D~gc@}e2 z`UNGL2W|iH#U(!zmpcqOL!4I~{}1(GC01I7oHk@7lUHn-cR@GTqsi3JM9qfWR!E}R z^1CL6~?hd&px<;$-U_q2~S!EoMy`&`_Tle9}?(a5I0-w5@$U`%LEc_ z0uZf97XKS?*FTa33DnTF=St&v1b&qh5;vcCd&w7q=nZz>+QX?DwWunPuNxr=qs2b& zY}I!hkSgRVc$q0`Obl;1zh;$&vdY1E1j98TO`0Ir2wk5EZTONj$!4rIP%ML9jXttR zoBHGBupH)%{u_~5VpmI!-)@b9AgbO1s&@9Wmcc9jP_=E&cO?}R{bfzbATI8`Tl-EM zX04C8S-b#Dr{=43019rc=dgVbPNdzJ}w_-2^ zpZOz_(Soa>Jm+VpF|#!((sv#xs!sEyhd-Vz=tV@oB~w&Sc}^p%8Ghg{lgiycr_e()8;Yk?PK;xTHtQ=~II==%i=6!7*7NaZ?V2Z zv|bxqTQ$GIC&lMo^E43r(Jpdm^Ga~#JJDK0FK(;s1#=)k=Z2BWCH)F-;QZrou@`@gZpMhn{s;;(|*$&-&GHABtea=7X zsdU;c@SO1tU8n9+WHvd)@-X49%K>~xzKYcOkwb!G5Ru7%$VtZpIf%Ra zXGGxljHkG-o?uUo$ekS>MV$z8*9D90D8XHEhvf3k@d@D>W6_@F*!W+vjzv#=Y_DmX zn2PFR&@_6_TbiqJ9_?Eod~&Y;!I77j*|&9zp4Nf+GDqH8XERNmS_4A7)5K~u&ef`e z@yMfQ_ZwTv+kPV$CzElrvJCqc+A}f+tEM>W*Cu#5#DvbY_Bn;ggsWoD9w${ia;+My zy)9>@XY-tJ=v)_j?$GnzNETAD4ih(iFtS+-!_S@&d-p|y?O0eg4u70uCA%2`qQrUQ znfV|Wlq;DK$_DbaQ-~3l_2l%#I@j=J7uBj)>LB5rBKU^M8nl=01_zbPmzn(r>?Gux zd{{ZHsE>R!gvS(7N#fCS9}d{ATfI({)|;IV6RFSFO$Z2VedeoYVrVVOwt8Mqao?dk zAu>8#vez|)`fxhOylOKquQ$UkEd0Jz358e7%#~f;grAAAV3Xz)4@(hw(6fOm>?=tN zO?Z24>y}zw5F$`{&9ZOA(Y{Amo&34)<%!BWM7{>-m4Ro&C~a)jZ|I3@iZ|k?xpfA~ z!7$%K#~smhbyS%i?(JXB4KFEObJVJ$ct0$vH^`!<0E@aMZu1S?5?E6b2LUh@Aa%^- z7unl2azoaP`(Q7(&GVkQHxwo|WQ!zji$83OBCIbu&#^>OzlgdUd0*8uLjdKIV=0Z7 zd+o+D!@ioMkgrxPbfXK)S^7R4zp+ORla_>6!iJyx+N3N zLJGRCDZoE~{M7>wQopS^AQN-D!%W649}so~Dr{7wZ9R2A9DRJ)g{T|j6Cw3cO?N#8sn}#r6J@h1kH@l$JF!t-9wGvpIPHEsKc*s?%kO9Nu_H-F#w7s2Ya z{*eNbte-j$)X3$JYz1R_gsdf> z)^F;qb%INul+F|R5@+*i?9PYhFB$O(9N7!#RClgLp-_BbUI`ZC>XfumAm;CLLF-OB z=lE>vuj7RHn10>Zj8Ts`5`r?aOMM?0$r`Pyifd0pTj~TkpOMv28TN|cTHlKLQ8fnh zRL=W5cWPB93m!Uiw0X_;^AsLlhu;9FDv+qsfv6hwb#uT;KvxXtgSn?aT_6IZvI6_I za@1eH~9c^bp~*CPow7m_#nvDKx0W`?(XFF*{E0ivKZyTU5g9TiDt*?1h_2! zp65pwf`Y=u8g8}WrX&q*=yh}~0Ca0EmX9l>MSB~&L6!7LaU{gIX7*SJwYK$;qSoP~ zJ?7_jIJRd>;*YLU=dFUaanzRJAj1^0KT$M$oSO5<7rC)Zz|y!l^X#v=fn`wh86dK| z)DC6pKYq4od5nK?Y3z=6QF&Ni8JYGSM`TX*lJ$;n?7K_MEoah=mUOBL&yXX0xr4P( zGja2{3_bpK*G!f!lW$H68(*UqW|AN2mt!Rduq6px0!``Jn>&bAT=JhA-ENg z^#5l9RP%fB5B+?GD1Bmg=^qCrj~A;*brX4mY{AcY*uyeE+LO&9&Jfz+iX5fg+V`_{ z58dRObq&G@MNi-}=Nu4vV{gc-`T0M+G8e{0O%RVukk&6zCqcE6YwGX;IV!J-hMmaS5^ zK-f=GCEQ$maDUFelQ<*95b6ncIJ6c75@)*y*FNv z;npO<{DPm{1AWfxlUGpcgXuyqsFFrH{8H|uNK=NF)v6(%`XdcNHwDYX!_Zr-g3()1 z)Zgk6K)3Q*=F^{EbYfZm3k1aqM^;&aR5mt)jH*KG*2z826=hfP%`Q5nSCyK=t%$m8 zb70t(ZcWG0s5+d5hu^3shD1EnRockA2Zkuz1+-~83OLh>#|(&3Qz#m>saJpx6DOl> zMux|I_WbV#No}h$PMBz?0U;HXTZCiM;W>dkqcZTc5NUQZsSMQ#{|tm0F&DByqcNH- zbTDuXL$4EYlNg}S#;8|l&bOlY&Sp`CY?hAt75MC96z2IK@STYT4gc%FtEWv zd;^UlS;)ZBhr4-$DFsCm2lekGyII@`u)5aDsMO<~AvbjTed9#2t_GS!Sp9$+F&&frE2L7iC4Vke3>Xr{80OmPNbyY59qZ# z-N$QpDz6mVs~AcjMU#%?8$n@^UP21>5gu9S)yj$soMXTe2EXwVq$Sh)k^hG7wu6ZX zHPzP(`kn`ssPXDaO&P6psa~okzLoS@F{^Uw0n2bR<2#^ge#UAV-hWUlt){b1R;{(z zpGPh!M~(`soI??wMkgcnoV1*hW`-VD$U49gOrpc~7og>! zI21gjj*h9m6*`}f$}<#PG5c!rLsY@*FK-RzsLEns&J55c6CUk?ah^5F67Z=|5N2m4u0555oLY)Vjq%S60N_9AeiQI1+C8pARG-Y-Mkv`SGJwllD zhAuDGnB~ZiczHiG%Ph~9yzvpLSIH2COUvUB*qnyWRG%JVH~O=)O#<{kNFB|~#l zAOEVR7o^@3rlE$7KTrLf;A{F-5nqj%zb;kn{r_s2H773%Ut(O~Mnh&w3%BMPe;qL7Fop)4f%4m&{ce zi@Ya6A=r3m$T}rWDE)lAK<3oav=A7}#oSp3n>Qq%EtuM)_i%<<0oh2ifQ{6gdqD=g z6*w=5*&RXaZ+U`6eJF~nF5R8MzCe=gjuj``y?h_r>zfYA@+v6z)wjqrpHfEyys?@Y z755TlT?kKMGgq4sBG?ynm4 zPgWFuVcF{0`L%)3HBQj?t%uhaw5O=F*K>q>ukkkFtSU=7v+3t{E2@t^u)A-d7$F@S z)M{^%*zBLGu|4H5F?PnYS7=H<<{V>eA8mJHkH6${#w6sZT;O6tvD~eLs*{IVt+04~ z+8|IYu}SbbscA0&Y!RVNIb__qSn|Zv;}*X4>X&3NctGc`R}S#r<)t$S?*DLf`_(IO zvcEeTw|4Hfepa|i7}8jM^)kzjqmxS6h$4K-h$_&hcn^i(ZK0L3ix_MvUnYg;QN}?7 zUOvxbPmX??VWI|p4Gk?kH8hUzfik#_ogxB}jI9-+r0E$rP~5{~UGzAVP%eYiuNLC- zUa2x+eRRBrszHVn-l`UR_^P0Q=*tE41;Q4k0KE)=X=m{-(@t(rD5Rm!XX>x>Hz~)j zkR&ARYL0DHEbqMT64Jcd26t~5NN8vWQtBP__VA!?*Y2)y+wHP2Yw84=m` zY*^fg@S4utt5}?{Xc>)McPohhkYaU->|<9ax{kHRmqGQAc1`_9Oqj?gr8E1~`4sWv zGYRjA9)cnQ2`Uc=YO7U=`w!1$pCDr`sRt`hS9!q7Q^`+Uv+s`c4%%OhoLLEJtu-C_ zdFXZp@3JdamJFgE(%sZh%j`td=DW|{(+s_ZQ?f zU}1Qq$$|HUH{7su_Xh#n;}|O}RwVPR{`GdhfZs^Azj?@0E4}3v|JbPu<+!VqDE!nIgwwr|she-A_H^j4O?EQ$n5!@U@o< zruf{Hd6J)$cU{qQkYX#c)THUF(zm8~72`XEJ4S`;tRy2t>0_5}mR!jzE-bWN8oXLt zl8hD*V!Vyz4JPDKqjODd9u4{S5UU_atOY=<`0q=_z^#78`ZI@v=?$5QB6ga3H`sdi zjVvH|Me1<%4F%+R?e<-8p<|L zYjh#HDm&b(MCw33vbln7YtLtHtn-zfE1`L6j5%N+k7sLViwrfD97H z6dz8lo#Wj)s>K2G2j3Ia)xs|1%2`GO!F1WeC4w}ga=&uhWZC$)VJm#VUazH2?K?Ry z4pzT8G~MdB*ujQp;O{kmQ=MjSZxB?NHa+8RHwFEip^jB=Gj#%eDnLKxaICghRVfrr zqLGC|=q=ewdunc-gSEI(C(3-bdaz;<6A4Jyzs^m&x2_%VU;)zV;+;aKof-%4|9dw zuF>v$HW_uXhzeAQ3%Vps3!OrXBr*~&8x>WgxbiBoDcoXh$g1ImpXuh}rG}MQ63H53 zvw$!4`T!@6z^{oEYY>gafX4I{uf#t}+dh;H>;NN5He&)ve0j<Oe>}`yb{1N(sF| zE-wKt|B6%?_50uFuP&W!v-1q+8Nid5x@KlwcA~A(dF3$l5*gt*(Hh!oVaf&uwY3*R zzU$FQq69eBXkJ@WinY;5zqKsUz&!6Usbl!%h6XK}TbG!$-Ch@zfcTF%*EYY?=Mk>E zoLodS7%vSVV3WCM@mnt#PM^hXMN}a~>>8_3#tA+wK{SZIQb6CJ+w{n<()H~BtBe&C z6ICJS{}ujXQWRDg!B_Vxg0~n}zlrEY7lRYh7sx$(^CtqKUnQz=EBH4#LRPtNwqs30 zk}oBvg5Dze5f||2i!KU)F%M)_!@#nCn~vmZ?r{>vED??CmX8#1_tz-9AKyLJ3oQjN zMB;?Jkakc^P<$JuvPutX2*0P}5W_O1>B<3lr&Wt@m<~jD{44jff^pOoEVs*}6 zb<2@BcppteD-83A^odAk)%PL0Vikz%oDy|xirWvujIul&c@LpCcF--ODLrlt^^SIUbq5v^X*S4!=Y10Rm1CNGyxZtLwP->a7| zzhXZB%C`Z5z%yxvN%OKuEBkDu$wlqTqgC_?V*t9nb`cluigiNDFhpa`SB3J);4^6b z%zTCv2PcvC1X) z_(lIU!23S2e-z1_LWVTZ0R&VW(5cEL&wYy?gE4fGrTRZ8T|Y5sk*p2XF4~m9(H;xW z$-6II_W`V^5KJ*bCLt}kisAgtK40U1wCKGoFcK$<0PKnDUaN}^POgoL#;c#H(O^ak z;QP}*nDj!$bmvrqq^73?@AJ_$_27G?8T9an9}$^A1%$_J-6$J-m~-iCAYa_VV6TXx zxcg*XB0}z4n!(f|;fz(sT(BM?vpP-F3HD?|)`DB44I5>8;4PUSj zzo6?9HL&2!NhTSDtx~^q>#8`QA>Vq8t|d1@s~AcH0*pfVM_`otun7Z+s1){GnB{O| zZL?dg2{KuzMvgxFKlNpI(?P(OHxVx*TJ6LP7#SJq-iqO@{zqKYL+&Yo$Hu|l8FGo6}T7zTo$xzAI5m!nuUZ#bw`xH{D~jdTU+}PQ5$3Et2jF}6xr>JB9(CN zvg>Tc!iypj7l^oF)5KeogWSJ_+^P;7#mMDmi8>(QTQpsiMz@ z3jGad4cc#BR3gM4)~remlpI>izdIM{k~xHOL>0v6qqgXZmWs_QkZUoU#h4|%oKQ#g z@5-h7`#i5A7}mRdHt7AqVUiAY!07I* zBSHCCp()?&yEr$v&+S&}hQ3C%2S2TQwV%e@=?+FFkol7%HH27l3KwhU*A;8tkMUAs z)!6nsONz(7qEw5(C+2#S*9>%TJDDs1m1~lY%~?$fbNyS9l%e|+GnEu$e(*|^rMrY} zT*m9($f%1t$+YdKlhH#H_ew9%7OkM~y`xbZ#)pSJFAHSPD+BgCw{NXmKf$>7S=d7b z+x-?ssSM-9U4Hd@?=I$8|3Sp;51LOrxVk7Yxol=6;qp%(6?Cy3mNLPqS1LWf1fE4u zb*VR3i)Yeb4)o`jvMo`V;M#p4COwdOGVg%E%hkSD>2BBPocv@eV3Eazd3`hS-4cyP zP;L-R3)_=>#B(8h$7Qbi)FZiySi!VgHO(YUEc z?_S#%sbWApTfStfk}ODt^$XqQ%^|L zu08Ucj`WTd;yK&+hvdNl=@0T+fzNS$FN%voP!?sc z$t9xY`cY;b4m|D~AvezcYK8m&a<3}x4_7xGdf+a9oFDH8v!7YLhm5U}K9B{2yk#JH zj5ZY00UN8RzATeM9!XAL8!GV$O@mbp18-{8ipRZn&3EaYmJ3$RUJV-ZBiFFysVONm zZ12HOGxHaB)4421Y1WSp2IEr`6Z<%}12^4Liw*bNEE`Qo!=bcI* z0`CX?_y;bO-7~wU?wlrO@29cVPfpM!RzG$Jq9-#|w&pdIV{qc3tniJJ_Yac?{6L>9 zpe>y|ZEyUbSHrWb>68b{QZ~1*CfS40J^lF6ARTmoF>6+%meT+#$tq!{NT}ckmPcY+ zJCIW&-fpbQA@CI>&hYE7cZBDC_C=Qia!;arw_XdldvZt7UoM{Se>^x?JQg^2`RrOg zcAlcoM__%|^hV$g@yFSDJGtsMv`4Ol85b=rk2;OlMu;BCuS@{!F%a3WR}Jva5Iel| zXID1mc=Xu*v+R2}Ypc4OHCW=rWw{K(E0+O>y(O792ZXnQl?PJqtJ%i~gT=H`&!o~Z zZflGR=H!P7Xur4jtneRC5`8DS%~>}qx!#^DYgE`eUBIwbb?z<@mUOGPuPm!>uw}3C^OxM(Bp?O#r6cEX^faDJ!d)vWH zK-R^FQYCW8*UZ(`J!rX{GkJZ;{-wgJZ=k307jp>0-Jv>6IojqN7 zvsEdWWL=5tiA3=jlNvg42Z+$DHCdksM@6ubl*zx)Q0Pq5U(NG6y zh@ijC{@l2@40U;lx&Y<#sqc*~;8mQ5>JY(nSYsnAUT-vQx>TByPBKPg{T9Gs&O4!9 z?GrdqnG?JqIFMh)Z{B2asB)h?%_Twq=nDO4d2Q%fsHTqJC944SOqGb6!=kOe`me+OJ|2Xkxi2ecY+M=Px4 zj|TRpYk>j%w`(WOX4udC(>gqOAeYrYu#g{kz2Z=zpIue!MSnGQG34Qi3ZbH9;cxWlg~rL*%*j zAnn3194$8J-f?_UnT0(I;wR&>tJs^kw= z!z7L{QMlBtyDu^K(=hi=3D?%98)jID<_$;sOXm2@kJ0^EiAw`cEe8JYi7gvY)fnyp)P4dNts2B+H6> zkj9q>H@eFevtpxmtmHLy4851%AxKk^ZIpgw8Ro;?kqA)I6+^rz;vhmYTR zlKEaJVVYXAc+!(0?0;O~EGDZMJOe*=0?L~kgbq;KMGCZ+*MgpYKzTC?C~tZNI}|C_ zKB5Jg*L|S^R5zRdjr*i)?c15ONX_;?oz`9NcTl4{o+8L?f$BU6H~#pT_Zztr1K@4* zD(pzIZ^Q+Sfkov@_Lo<|*Z-J0-l1#<&`2^0XFuuvS7}qp_xjkBM1vLqix>|@g7n_s z<}rfOu&(dKu+HP<*TrYPANkATWh{efahRHdo!GE_ve2+t#4?W+($C6PBTNKH1yK}Q zQV?S@zaY*#-J9js@`=`n#7y=Q57!H2=^U>AET%zunkuSA zHtHry5Nk+bK6fK>v_t+utzQ(u?$wTvC^ECj$5GeD;dk9pzC&y(FS=Z*W9h2GpfeNQ zqnJM$x2mPcjR@o<Z1&FsIimVo^(UBoZ{P&EqLqVBZF?5>D z4*C1dn=^am~YVMb% zP4!t=l)_nEDOL?5JQe)5R++Ya8gp_oe((`dBJJMky}qQ9Q9hL! z*6Jq{$*7ple~tZyLyA#NF2Jr}0bVxH*4X7mzpQL%8LITwiPHW9BuX1YJ!PD4ZtL3^ z4XpBfBBUn6tML$?pZMYYIm`G6s@MYMMl6|T+;{(Oh`S>^G=E>aR5Rj5wRr_*fy@B5 zr^;$J@BebedtV!RU+^8Ai-%x0_Fo;)Sal{Gm~{yl=ZUFs3QD@HKo_(l);s*tL%_(! zoVsWt-VIHA9Y#!!USXpQS~kDg@TWhn;8#Ps%}tPI#x#VIgKnxA zO{%-US~`u=Y}n|6&XIMm3rH}Zr0VJ=r$=348OR(~ z`U0Rup+@{nFeAS^S@x6q5Nkl$I?I=_^Zz>M>45Bzjld3>opEXUz^R>l;MDq1{!B`Y z0b0~;9Bo{%F<3NZbm|sgtT9p8*YGlD1`Yk9_CLuWrJT*-7;vtbYI6w{rJPfQ^T^>A(g&PfM%HW*FnM>L`oAN<$4Kj z_NT+dU*$$T0|ECeTtJ^nLEx5&v}k){%8!Kb9#uOgaOKQ};r{_c z=+w=!2jj%s-@r8+HtjU&2za>VEqLk#wc-$RxvtWVh*0F}Rd*xlbxO^9QjgrY2!Ytc z2&pJX(HI=rylDx!Adn*ZhLsgf6*1Igs3-db7O& z4DWh7vGcPV$H5`8WT^|<3-fiMS30Z1`0p_%wea9Jj~u>|+3s^yd}$!XMS&n^@S{6y z5|P;1A)wkbgy|3^D=AB$#r({Q%tEk zNmH9(1m!_hG>EDeK-J8JClB~2$m#E%7?sgAxqXCJAt7BM4K+|!CVC^<1+R=#tWKN~ z|8^uE#&>-}kOJBny;J3?yAr?i$A!YVmTs&nqN=$a$89vxp;X|jDgWvxZfbP6bXA1V zc3tT_t2S0HjUr**ULv7FI$%e<_Ry#TG!^zT$?@Z4IJJ#E85GB#Nf|BfiBajFG}e1x zKc&?Ih*3|e4M*kJo9>N08or1=v2dnmizK8x|I8BT<>g^K@ggn8L9zw=tZ!2%P!S=? z)2zS7b@naguTjJ-kWgEJP^0DrM*hZ&azj=soSEGpzsP1gj-h27$>bCGcI>ZO>%hr? zq=l|PHH|ydqcHK7@F@~oFMk?gqxMwXbk6p6z6z!*&9WcNe9!XBr#6#BAu-nqHtmSK z?1_-*=j*!}$07XU@8M7{k(i22O<`)N)B#bv=%I zxqRWly>H4sq^Gg84n5|GkTu5Y9nQ097ZrN3+JC@KTguOeL-+)=&9qq@{aA z)#ZlAOWlHzj3bj@XXpd)%w^YB~Mb zi}*4%=kc?*S5Ec~+%qDyuVOxf$+s)RBE+*j7wS*ui#)C%ckDBBykJ4An}+4MPbIu%+K%xB3^6;s1|S7Y@I7E zo)kp9`>Y?X^roeuVae~Q^}~((1fsefQ2m}&L-*g?)_)>x-C^eUJ?2(vSCVlk(z>C1 zzj*O;Mg*nLsRgCdT4~HtX^PI!cUdg_`A(T(p)v(4O$)w&hT5|L9Q19D9E!YVU!lMnIH)Kp;No z^Q}c8{@$X%4{oQ2dN{Q6200M$C|q)qlW$ixUR2!hU&4R<=@GvN;Tsm0?d#z=Tq{Az z`*x_==%(w#v^o*i;3u`xWypHQLBX5AA1uqrbB^sq#z^z4ymfuS5$Ut%FFqK+_1g15 zMUY14kI>;nkCD)eV@{DgT5@U&bX~9x%vK=Jdj6>4>y3R_Cpwi|CyGnl;p^A(^~ra_ z!4Ltp_pc`4Z`cnuw!hdAM*WG?E7D z=OmPD)}I(RCYEZ&4Y%La47YkhgFrM~u9Zija(d)r_R}~*oKsySCNi$3ffc;uY8fa; zZIuazqt%jRRrdDwF4c@QV0e%3G@(4u)C_16Ev_fOA6VA^U-h3OxaW{^M_OFCM3*-C zarzYU6k)_tFRX^2%4qc=t_A!Tu{O}(0>z7S;u46ULOlfZKJ)F6A{)x~{0$G4R<7_l z9GJ|pDFJw>+JA$G3Jw2duSGDKAhm;wV{+-G0ee0jR5ykGIn@za*>3D}nrVA|nM4nr zjU!!H-2n2|QDB;hCeLqMZSjiAJ3zmu+7J)X5i%qHSHntYIIdyu@%i^UQKNNll&o=} zP|lG#1w4_;alEA>4WCf4HrHUjvk7qrhlKs#@uB|GbFP&sFCQ1?C>li)($`Gf==2k$ zM!b3!ZY%4M8pC;Hzrt=K(e-OqDG_>Ju7W5T>rkcXZbx8>r9o7b`POSmH1-V@hS+}) ztJ)s6QKYt*%PVdR=RJ+p=YJcldY^3Lk1Ds=MU`5H166PKkEr2m;vsm&h&SFs&w@p} zBW`DvFT7QseUu2xyLZwGk_Dy@FZ>>-dZnRoj`}~CXqVoD!?RlnmM~ws*UH{*vYi;I zzZu@VWpb`U{`)p_u@n_X&KnyIYR;Qg5Fib&glfPudTr?h6(~smlz*xAJu+@dt)-#$ zg+JCdBP)8kMEGO(04ufIC?7w{f7M~$4l4Vu6_`0u=je1(eK-qkh*CeslxeSi)zF*N z7H`zUp(WM&ir$H-D(cbK{Y^Y(p>&2$hH@1nM>$d>0MGSE+_`k;o^M5g|lB`h`)>BKKEANlGO`@Yls^2W;_Ueo6>syI_jG+a+}N7S>^qz$}| z*_#Dz*8sd8zw5wj3<;?!c)#Kx3JMBrj>uP4G&J5cFVtJFu7EAJmr^N>SdGg%N)uJo zuIkB)I@<5GwMFPSVw5~RMPvH3f0ZLU9Z4=S(DoFv6+S8s`EY?IWkt`3)wib#CU zJLIK<6X!QD;1SNeEY=e#+4Yw;GJirN-?Y-{vl>k1K!aPYq#AFk`D-?VNtWQ;TDBK~ z!Fd`kbRDOsr#D7-{bXx@fihi@tlb0Da89?Xys{)Ip~4^Gs4KQ4=RiV2N4lY=_|UV1 z=S;>CnmC+dnPcK$CGJbh6_Tycl~2wBBt5;~jUa01qK!Q*%2$Al9IWt=gpbVaiqIxw zek}S#6jQG(n9bpeC4)*;UzKmrkLDL~xb|sDXl4g$fTZZZ7*AsAo#cOEW=myC+=p%$ z(EyDV==~^%{n7}Us6nXv{sluW=#MO$e4IzW29x1;Nj5&l09Y#czKOIe;>`_8I>|m5 z0S{)wt6Eo(z=umn87uHss0{OY7UtJ3k2b11#OwE~ag-C6ki}hyOvA{T71YD;#gzLi0pJ|Fk-5?r6`)X%x>Q-$P?XJkg-+Gq@fkzsit! z+LF5_TiQyq*2YeF(q|s!WFl2$yvUw9#{H?pCSbV*c5~y4xYO6XdGW|JlG;Z14SUOK zS%@Tfq4=Ibv+2u7!BJbd8nKRxTDEp~|NF%)!-FDPfg&~-FXBL%e_CJv%J{J2b*@NH zD`v>YW&Z*{&^|1Yr4l!@I^x$YltvbXcJyL%cVb<9+`{tM_2!zN`cK5n4n zd74Rp-n6MoBC3ZE0CFEi&-Cve9{3{J>{15ppJKb+OnnqyrRHCl;kEi%Ew0fX&v)LP zm{NMjD7rSmp*$La1?7y=I}Xag!>3qlC{ zYcAtgC+Dwx5Ig5NH(N2Cm)FX^++p(1Bddr`P*ac)8Tu}7Hn6^}U7740b@YxgxVy~- z!K`K>BAOEfwRK?gI~<7z7iwZ!5is=Cxkt7~2zY>j^QnchrWTim z;s6SgxL=vr5MGqzM_M)7#VfdB){YN3yb&}vNW!`?8gC$+p7!NWKYjaCSv>sY#m+1m z-N1QPY|yLw-dXd3whlm>;;a|tZyCV%Zn+Vzi?hs2Rj}mf7-7Pq@=#9Ic-ijvStT!6mq{<0?VVtL*v;p zQ-2~afN3Z6ok#wx1=W$8P$NE^m7NBilTBnU>@2;QJbg-eaYf5AzSY()d`^2tr?+iA z5$R>+2hIx>?ai{>vc0=wYW_fXC!l)}%kMF$RY`S0H zlUgy2RLU6I>=v%&F3k1y6RM*&S4q6w2waLC@f#j1fTPDj7gfqjPL(Xu(N?W^u9Xx| zP~>8{u_Ew3nD2}0+wWhnm#4e2IBvo_`rDb(8hUIDdX%`P9H_+e;Ir?laeGir*Xn0pwA5&Hg8*y&lJnBG590tZ%6_`OXGhSS#Gfd_B)_c} z9dVd`9E$@9AChSFtZH~f5#muO=}fTd_WEf#vk!O5l~dUd_az#nP9Mt>KWmNo`a+jd z+r>iUq=}jnTE)Dm+>xIa>((&QJ%QC=AC^IVj^ZQADQnMGvJ+8#NbAG#De@iT*4To= zG8gyFX<#L;pRGAy==+|}^w_j2f6RDRhs^FGquQXkkN*A#&b9vTs8u*XT;(_`BBG}- zx-6nVrw8-AcOd5MJy+-nB~B5W4~moiebz z)3y;vOQ@7}{|k`(;P~|b$IqCKMF(Vkd-#ASl)ng4>vNw!o39p~OsFb4>_JyL~foEdW++c_ior=hpq%5E$1^ z?T#Lv!uHKIDVZ~{)XDXCoM^qPBw{>5s)2elWvY+XrckD{JKgYPq!m<9JVrN&;ewMv zCNP^moal{@J_1?GwM`wwHk{R-c-aS~L7{_??t6{wSPu2fuT<;>)${3=r-$WUn^A#U z)hFJD@EvX~^Ti%VVUg|oRb(P>Pmc>~5Li)|u1Ga)xa_oJC*RfH|3H2pAivhcF8jB6 zD(3%HKO5F0ta92dU$xnFD?-mJbnV!nPC)6V%SFerW>3M+p5Zrh)^d@ zwfa&;NXBj2;wNL799-Y3bhxy1Uzc(oPmwkDBgP>d`uS5(kP?(HhhSmai!DRFELf1P zW(ancT&-{OM0hFY?Y7aYo3`hyvK(+>?dao`2)J)JL}QY3Dw*{VS@NxYgPt}Q{WCu5 zzO99)ba6}?pUJ`9+LIjyi>}3YsG{Z;IU&f~E#?-R4t9MX8l$>#A|9`;Z!)W&ZZ%B# z2l-f>jw@E1?++htFVBC+Jsv+I+f;a>@0}9#>dn4`QvZAOI~y*YfYEEZ<3u5F6e6Zi3*LYa(8!}x9@X#Hq=N~J-W-1z0<%M=TIIsQlOx1!; zP$bOeukEc0{9B^aX<4D{yk~?EAfwX_=3hwT-c)PG>30!xBTBPl!6oJIz%AP)PIk`6&n7sW zxrCoII`D8z+m6K}Lio~wUAu`%q$BS>?pDbN4-#0;2cD|rw~W*`fV{vY7D-F99WG^1 ztO2BytMw_dT{BmyxW*u@Z{h)y*Vem#?s?&8`B*$9!swDWFwNP?fQgaBpOI1~80O); z+vp!8{n@H4J1z)E6kmHcsQqsStS~{l7djj*`VcKEPqRK@_Q{ygvINZ|vqpdAEXxYE zjeQI$ojP6CQ7S$1##-*NT-sP(okJ3SMNi90S-PgbkUwmMyJCLJ7}lIpP~{6)A;}0) zLHO@R?{!MNhy#Qgo`4l4nJX2+<&Uk3Q`Jb|rSK}!rj;99s6~r1sNry>E1+b5f^K0P zYhfxsU|~? z(@jybz@@O`IY^E4$u_Nn{s~mhlb8Fvvc~@cG8N7uJwd%&TA0oT%@q)#7gxbJ`fLE! zw)5TJXRG(1sq=(Lqo}~-Dxq31B8TW+^JX-FGNm0*n{P}@tq!~YM{k^|-?YL>dS~4o zJ8x}Yau^~ch;VXp_@<(a$M_DUT7%Kmx;%oerzft>154g@!E?-M1P|X!#uW`^_s*KA zgp`qPqL074XG`>`Esv(tolv^IldiMmh1>gOoOmrf@GeF2G9oTaP#ZXGSn|licpF*6 zZ#^CJKlrDMJgUhn~W~ESgo{8&^a$QT_`Vu2?&oGo4Y$1V2=QW_pd?VFE^Qh z!(Y1nb+fYLHUi=B>ZP#f8qe*P&x2P?$#|M8r7aQ3EDk;u8}TBqs-&e68C=#>hv;4q z_*#CjBB(%qs{a`BUEM)o|F@tZpW_X2GUZ5lr$fC!3~wF3d9|PJkh_ylpq($uYf!Dm z38)lawq9^^a}%;vG0_=Jpn&5>NkIhbx#S=5r*$)QmptRMKV)WtwitnBTC9{ra(q*k zeSN?9M0rrb5KsZ!N4@4hZEFO~cA3rDA9|6Adnv?}$PzcNM13R3)ERV-uNsG3)(xKtj)0*jB(}gFdrHvYO1# zu+zfpvN^uEua)RQt;0aA1Cr8aps)uEZFdU4J~?~+bbFqU^{i=~L58ie2VZ929K0f( zsr_s|RH+43MK9v}zD6E9q&l1f>vDvB=@S|Hj3NX_+Ss8CsvT^#KqrK*@PMNVv6Qu4 zdQ2>*-P_*!3Qasg%3cNc1uR+Y3Rz`o$y&CltQSerCyG`ws|6qSr_P2m2C58o)PhcR z@}nZu?!O2O57hnu)b2w+hX%h%0OXRHUW3`nrJRDzHiR*k(AHSb9Kml&z?~%I1Jg4{ zBnPqsaq)CXYJ#ZPmC382?aGVF3wpjldv;A?sxO5f&OWWLe6kc!w{aXbS6lG z4)*IU{XypMB)F?Kd?6jHQ%oF&&8y~{Kf>;q`F4z@d`;2rJULtD zQJEu94)TC*{(h|hFpG%fIKI1-xA{v%*9J%yJqip1T;3eri~LzmpSTVS&McEm*_yHw zHrqoIq?q}muVS!;<}-HcpBA2Wu^lixjrU>Y<*(;8#gcbK;1{+GgySLrfKxkj->dr5 zL=7*?hGb|6oVQoB%VT3>cM({yKX2AvpuZN z9|Au1`w-d{QpE9aW=~Cc3?+w1)v*?tc(&&}+AfrZ0ax&&uQdR-IxY$W1G9uvFWu8v z@})b8@((1A0um?vFLXf_w-WEOr0valKk!tq5D4v^A{S66zI?X6C9=2nV`p+ea@Y1%0Y9ynU!@K%e<<8Or4uqcvSS0;NXjC^D+^kebqG;nHfKf+BwOO^|tGD)Q8hFiC-GuA9T$J6^#KExxUri1eHGc zYP(s52PNU3Asi$3sm(?1*W*MO^(`r6m3&)JUP<6gyQ=VBf%Jkg95JP)bRs7Kqiy20 zCbXz{dFXFa&TcB}WQS+8g5_RTf*Nom>R1OIR(+;{oVADn2ENV?GjO?%mMELd)G;`k zFZ zb9?ai3E=I>82G)v7?r;}unF_6~7vyxc zL4*+eS=jlnUf8rQE-EGpw~-EF0_(J+Q7wrBk*@Z1!v-H4-gbt`~gWLLmd4 zJ?deQ_0mx~g|miY8&_!9y*2zR@>g)V)gS8X;-$(ll+m8DF>{D>3N~3Rnz7bDz9m^< z>sL^WbB>p^&qd{Nm_U_JS=Tl^igb-$ao`bfdAHK{%7vb8wcf_7s(CK&-3u6#)ot2m zV$kd3yDVI0@^@Er$b)JpfokEQbv*7z;`9IgBZObnDI(l*6H7yZ3XQlO7@IOB&#>yF zV8j>Ed>P?LkXvzpBfAZ7WG}SKG)H%0Js}VHjOb`T|0QlzjpEdJ%raO(?bP{&Slzvh8JYD}) zbkdkL*?|W>{p;kcZ`qzSS-%+6jLnhffkKhU8&86p&|{8nE!p*Ya0?3(k=~J7gX=4` z^5*Of^R%pSP!{j{(_ZB~-hglCmwL?t8T$cwRdjfp72yf>$EElTr1pNI)qWyp$O(l~ zwGo=XF{eHO%&A_glD8CF35TK#R%`n`rn3s?T3xd06nR{KN>HNb(`|~;Ad}MXLxFXtq6RZ#dOwgb{@sqP?whE}7!A3vEjsI`@W!zoB}10KCSzWVaV@bIpgfS|qxiLN zutK5;qNw_OYWI3O5Uh|z{_~oV2J&rOKGIV_ldj>Pre?#RV5uA z{>MOGBf$#+SZJ$PQ=YeRN@|H91XYiYLJz-ybq1riTg+7yrsu7`Si?lNnooO#+~hfp z^kG3p7OaJbjGs&@W}dLza0vCn9%2aUs1M`cXfXLvjNfvm^zwIMS0xsBdus=Jh2AfI zi3sN%Mjx?yr&o<>!N7p3Kye3{lDY*<@xMRxN|Ff1b2i}NNYK5TpOa}5ph~BI|B%;e zj${BP5Df}*?3-YEA&fU#6Y@g1N1f4XrhwU`m~^i65k_dyjKA(DI+8~HIpKgS56pYE zR4%}ldV0r}f{o{Ax%j7m-q-$TXh+|RWgXQj1{CB|x6_wb`u+Dk{s*#@EovSAaDG~Z zMBF>5&VjD_(7glQoK-a^2qCKr8yrzA1WVnO5y z)xPn&PU#7}xu&2zZS3htTAQ6$^!nnK9gnr3t*sUAr?f(&r2a=RuP7QCj_VhlYyQ!{ zr!V<*4-mUjO_rXmCY+xzn?(xqAdb1bm+y>HVjM- z90%P$9H`AVdZnlw7@}QmHJM-)x*4`P;C#p4Q;TeBGsCgA&m-Mvr zYy@rrQW&=YDgWHpJ-)1y>;5^vKNkRxRP~cLEqYu{wq6ch32}%O4g*h)$rM-&+3&sTa*=sZ?}ps8+6GWQmYkPezvH_M8Qe&+qxG>e@x9wpo;R-v$M+T9-yO` zi@p~AO6LU#Rw`>JWN3URxxez5YU{G1$9R8bGSOZra^Gh3P9whj<-Hz4m1ROD58LO< zL=|`)J0D`nQv}S;&Dfd-7+H%iLPd6Q>rC>>O4OwH(QF@6{+gQKJZaLy%*-q&4db4k z`e{BWPNv7U6TT#$*Kl|9OMYF)bNcLWT=pC=Prn<} zB1i73wA>_LbHd~**$frg>G7nTyLv4wro>pj3eQfeUw{gP_fFF9vy* zGMN^>9nE$K4B?PcdRnlaWMmB{wGY~-O1o%l%ek<1w*VUikI%}KiiCht1z7^|*o>L_ z)uO9OIA6q!itPuIB%Yogn9z?R*h!D(XzSk0CBz=vN*f7gvgBrc=5o6$rszR2(?Bs! zR!81{O1gA2yG`WW>yBrj?{3g_M-p@{# z2L#jFmu&BKIi@yj*kwP8SX>mH(HBA2qnK>q_YbVjC%-7x=aW+3Z8R6-3?X&oHDZ=i z%q(%8NWMR|4G-kZ0CK_^w@N_%4;Gc~l--que2GbL?VE3}`Oz$N4!+2*n0U#jX))%q zq6-e&pgt0;GnB_7{+6#1?R3H6grfSim=HUN8p6f(i65o#OmHk)*bFF5S$+=Kb~$mKy_r`*-g;JeN$ZOf zsIQ`g=joPo!EXrApRRB6-`=dg1p6E=u^+`Y*UerTCofy!!?Kdj^>QOlSfWFv+L2I) zYlUUbjFb!lx1}`iohBuWhcbp|VAK{TANX6&Enwsd_yvU(akT+0n$u?~Ufea4z?5KH`R!>ha*ENS^ispA57SHs+c!sdX&h&8&O z|2d%Z<8J|-a#HB-oJi*O9_G6;+-XJ?BCSYVf^7#L3V}6;-w5pkOOsPm0xuiPnl9HIjdfz z0XB)3Nrar;uAFctrIbE4(^*#Dg&=bZf**J=7XdKEKbF<}$G>tS)J&gn9nisoL!$LT zf7<;4%kS(z5p=Mb!f|~YL@i_?W%=0+GDd*M>3Y(_OOYyr5K5!vkTJ#_aH)mxQusA& zq8+wTz4d=5aUD(qId@(Oonml^)tKJp@Hhg$GU9VPYEVrZw=mIsw?k}9*jQxaOA$-& zT*=oh#at@`_m@8y5>VRxYXSJH|1<65pN>B;mptZL#;3))pr?rUMMGgy5-M?>*gJb1WA>ATSr-U`=pvp+0e zohB_6q}f7yEp@;(bygQ2JMZ>xg=;rkFFMIg)gz-UMOG#n)ZJ%)p*&Ew2q;4jM6vse zMP-EXTlmz1J(4)bk}`$TJMCxl73IQtScXND(kn=@d_rHs&NIBb90d1iGCq!UGgs}S z;0jdTlqXFOFjx!>xbag?ByVMOo|!5EEU0Y40P3%wZdp(vW5+fhKD*!MxS5lOCr5h_ zp04xz*c7VN>+7|C2`x5A5kS(A1npSYaHrD=#(U!Ht?;N=f1-mN}!?EpMVqo;w!( zbhO+^Ea1;Cc01$(=SNmy<%ywbY$v+=E-*Y0y9|i6T#Ne(dPqigr<7#=h*oyY<%qAO zr1&#knw_^H0H^!z-2xBZy#l;D`xEUH$mdT#v3H?qd=TMhGEwz7wx74V+F@K&)?D5i zSGv*9w$u7>80|D$`e1RHiy&V-6_`RK_m>}&32H-RAl|06e#|scO1u1uwRjsF;%b5r zjm#xJ`%AnkkNgqks9JR+h=!&FjD2^=gW#3QGgJLiIb4$^oq>{Szj`(HJB9KO6s`ga zFJW2|?z>C3|C{cTU)5~wG5>(qn%SPXdi@m&nT`cI@rt|oLEzl57vogOf59`hab~^z zChzviKz)=7R4Ji9M6Y5#=d5|K+D-TgT}ky3heZ`(lg^i;+=#Ld@x2(Kc^`s2UnJ%SDL3}3wh_b&IKIT_|I$9Z{!!e zzbMoqhyLNXHp_8lST>>%gH70&_hWv>j)+2EzA_)!+TLTHN$9ntWd0xHp(-L-+N=g1 z``%8YZ;i*OG{MXO7)t!#fuXL%l09Ha5Kso}_dZ2awHVF*mz$Bu+H(M4LYXV@Z+s`j8Fkbv{?R3wxB+j(SyHO;i6aIJjv5W<3n@sT z0_-%c&H^4r7Af2k=_Ro~dL^+GuJCUHtIqf*;5k=0R4GA5(-KrED^IbicU7<}#zObh zeEd7c%tV<)qaJIP?h&`SG$NoK`VXi27l=K>)LE_Gxf-^Z1?Q=ySJL{jUU2YDlaQr;XFL)-*S0@fwG&fAi2IV z;H*BaC(?x45(_i!LHJ8FuLRR$Ae)!yF;Sj<_JgFNaAs0HVL0Mn(5GmGyg~Rx+XvVu z13_4!*eJ_eUv)B`BqJ~UZ?0+#$6wRql9DZ?d+L*&O}>$#U!yf`Z+hTeGVj9TKE3)x zYu=|Oe>1#Kbf{5ndb+lx4IUbWrG1JXWC?0GoImpJd%}|(n|DZLg#S*1L(G;Ts zgeNLgmHDqB5ja!GJ=)TER1vDTjHhIgPO0sG*%S^&q_P`RmA|iclpx1ns~pb^0Iva2v4P_e{9F? zz-$IGd6AW8YcU7)wYZGAVKs00P6MLlI2~*2H-^FVI|s&`7K7 zzfyVE96_V-n0hXn*^hJy+MI@chCD-@ZpA4rUM_9`Nd*J z*2=R5Q`j+4cvi6m9Tq(z@8BN1m^{*nd5subaGvdh_YEzHu~Y(6(`pQQ$Bf92l14dX zX<24rOYJ1>N8p(4?U|RM zTdo|JUzibtF=?iE55LM86$m9b_&rza(_l!63mNC(kJhV zSe1+SvND9op?0NCDZ~2x*P~Y*)aN^vqm&+W_5Fz;LhCLiN+2H9d@$gUarsG9Wl2DM{EN)Vz~!6 zsi2_SQwxk}?qV*F&p#zLui3@&z>r(ccZa*ds7y=fTv2Z3S!bIwWd^W@j<`>Lsure@ z=gqPX;D|A2M7-TdZB-iHt-<9opeho&rKPHvNQUr~GX7gsh>rQsc-HmDF8kEry1nOL zL~}C&N%!MK@T&eLMD3@~HzhS9o7uoc4cl)Lj@(Rq`4A!ToCN9M#1mnaTi>ze!g} zdwx>L7;uph38p|yR-YwtBzvD8+-A|c8NEGB65MKkWm2*D==ugCR#+OTx+nd1b52Cx z1$#3L?n3dnk=n%#yDbdoP|K+AQbF#g#|*UPOHkts`IXhI0Xq0o-nIohJE!*MbjI=S zo5mh(SSRNbw$V(+YCC08_r#~<2SsfGMP&|<9fQR0*QIv^+;53>7q#0pg+)Y#^MwJa zumJCA>osaSr{`%pBJq5KF88pa4w;i$hmF_9_?*(2spshTBk+=KbXBmsGhFoGBesE$ zz<-nm^_!97?zrg>hW2UgSe~z1`HNc0Q*EYwziCT&6%xIl_U>|QwBA{2Rf@sN+Nhy= zfrCj>t8C78D(2kzL_<>pr7!WaT25S~=@Q7H&a+a3O3bFgb`n0@lQ3Ip{F-tZ>OcxkO;G8sj}42cHE$^(--!Z}0Bb zoiqT~+>M~=a?^_G%X2n^6tp^Y3(8!_KXNIBskR6tPj7qB#WXyqZwIJPn4=%%w{5<^ znb{xT)_02RHQ50&mUckM#{^fmgjRN8(&y)n_RsP&Vyrdro`9{tMI5*K|V{g zL7{7`AVlkv^6{_LB^E?h!uZ00?n^h2N2EIQ;oaF}OY)#++y3gecdLGNF1y^W7nk`5 zLpxui?h$@_4+_`^3h?A;t_G3+ses$v0LKY;{3o6+I^M5eo8vFc`|r;I7&7p#`_}>R zH-!0f1}O6OKe!)HJ5ct`S^xC;ARInRNT){5I5CA`Nb;Bx*J7wWZkxhg&7)Z;8g-MZ zD!16}6*vl+cyxP>y7^jhLSlvsEU$F5DlQeHRgc)sg(AF>FDQA(5X?s)LQ5tU$LxxP z8ncDo2!YdsgR=A(tl(znCN0e+53hQH%_E>(d((&BgR~hAj z;6p&LKKxMUZ!TuI|Ia3oOHraQ0p7I;ZVlCtGI0H~^CiyeAP=LM#(AW)Y!-j+IVfP! zp!EZt^%Q39k6tE$P%O!&n4vLoQmsIv|H8y9t}>*-In$(d=mwc)ZH8zO9vF+^^;Fce zJBiLUC$O4h0b(UNl09BlJ*G=;p-Z!0QT2WOcs;Kl0a1tUb`%p=pymrcB;49aP&pEw zEtN$!oVGX;Gs5>}&q}_=dI(Z)0zB2v35tI+FneEB4<<|UV;FIV$F8o>W!*14p{jkKx^lllHvb|Cn=iYh$!7?kdoS+gP@1|cd=~mC zf~`SL%gPnp`k(iUpZpYyvJQ90Z1M*5AKU&0h5D6w^9u@<$ImNP(<1G|QnOMu; zA&)^F`1j1&Hc6EvNm+`bq6H%$Mx%v04pE>V4gs6A?=-vje8jx1jBvltu07aeUWAYc zE@_Dcxje5!fY=B{4P);GW5iaF;FTNV^zkPY#%zJDhF3A(V9Ayvy(r)#3r25O?7Dd@ z&|8QY7`zi6uh4k3m1kqm>$yWMCIV46K+??%ymdVB>Lc?e{l6HPw|cEu+m*-rdPd%n zh=j^X2Hdnl(>-h}?X4^E#~`pJnZjAO7VI5R=kn3z94`E&sC43fD!@}Yd=jH~{LyAo zLFR<1m0H4vJ0KnU&P$c<=BtV2Sl01}H|9k&(wB?p)S&>6SZ)2WsHW=bSJD8ze`+o< z?P;Aidt(|gUy_S*e<3YXgm<*1B<=1b3HyOH@IRoTmSm-KJvk@#~5 zd%17aTS|YCq3Bz&(QvW_05>2GQARaF*Khu%a5LT;wDF_CF> zEI|JPIQ)v$qm*o1Aej3MhOWWG%a!OoCk50SCL)2qc$kl--y#rY{{tDyFiPPI;$*7U zBlqB!Y%v`hKaw&Z^q&ff%|E~c5||~su5>MapGv-_#`|XFgB6$denMGrz0915eu}gE zn?6-OF4bMO4cP*R_TpOFrXfYK5y@Wa*V5aWqz^MQX)ysL>auga$ z5-XIeDFlf4Xj7%`ixx$e8c%TB{TfZu`(!lwk6WHZNDfwM{~-B+J%Wak<41!NP10E@ zY&$hZFl46HZub&P^^4<6u!*l_kAk3ou%VO}nLNiS-ee+q(`x623-NnGu1@)*TR@b3 zje9ghcE0yERd#-s_R|vp4~0==!cEWwbgBB<6Vk>{jk%F$D`iW5JdRphU(V&Jq50sN zd2+k2SJH4~-QlaBvC1uWxZN;Hb#R_4!3M;e!>Sv0!t;v^H4S3-+E!I9;2+l=Gl>DP z!zOI{IzK6z_5m=|Kz{N0$Qz(VwH-9sXc5ORV9s&BepY}+SI)|sgBLopvpwBO8a@hO zhvncgR*nOD?rxGq4{nl2z)g~!dqL_qU)=qAaP%V#uq@z%2y-hIP1DXFHG(nD;F&cUkw|SZqQEMF){b=N?6Zl9?`e*&M59II zI6Sl|;z%?i$DkQZciEZx3sEza8m%gmh9t!a-c99#RKe_>_z2;5_BIfGJwXC@5*Z#y zJO(7Trol%3a*;il>%2uP<)y4`p5shk{-#z`J$K!>k1s!3@DUcsDE;*#3Ir`eB zXJVoqtBo_-t{!+zb@V?kHPj}%Ur7o)DCYzy$0|;87UXod5W9OkfOoccy2O)2o7KEn z-Z62Dh$64{{K#T^s-k9N9NAS78NB??e@1?at#8T%Rehf}*YPVx3}d+^;v?Fy zMt*)6uu7S6`!|c-$1f4O^mLMzzmIcxyqWwGap=A{OjZvw!@g)RRgaRj2SH2jh8t=D?6qMWvL1`Hbm zIK=nMSuDsX+$PAAt?kK!V0%NtY{1(#-*E#FI1|<{agl*_$88E6;hU zkNpV4VjPlM60auCe3gy&sm2!-)r$;DAJr|TmUkFah8eLzQyFxddIk@Xi}IE|u@cj=^wES8HODL7q-;DB%`|l=yO89(-+uU;iVdhvBetqF z6R)a^(yRrk4NrWqAW+=45TjNKu2q~*Y^=R+bac{yk?VW%-AB7U_~>)sqnCGItb=0z z^wA@<&OnCL9$r$Papc)hS&GW>H|~XN@k91^N0R^+R|MU~$fgBP^h|BO2@!WO?Him7 zx1alz;i%n^`%ybBS|X4kfd~t(I6iCPm9Pr-vF&A7B&NOXluGhddB{0f^?@4vhr` zJP>_rZMbWSHf?jai^6nY`nrXgkH5rvb6D>6RiIps@n!Zl)kXpMUn`xv4r3&oiPH*B`*Jy${GKdLZTs5c7fQ+5wbx zFXncmGlbg_WtWEvS@H+DH2|;w#0rAm`eNlbA6UNQzp=xx}OP zEcM#86;#RX;Q5W*1_Pe0g-(zn&`0c!zc$>S7KFJvlIjZ4JL$8-9+E^P^hEBja$H(LJ1fJ*& zO#0?_U+s6Jo2{(dXUfPNx5ikv;s-rxPcl?~8!gb2b`bEiGQuJkkNd%7H3j&#&YjR+ zsihT=RH5s@jkV)zq{r?gXO_m(vUZgExsNBTRBcRhp2YzVr*8pLHop=H!mPZK9xn#x zQ+`AX_{3}awA~i0?H%QJ+OxCEbUmw3dbrF#n_=@-23Euy_2WoLHT~`YQoYSH71hG% z*Llx-OTp9odTC#o08uv_H)}f&oUp@I@ly6b4MI^wdbcN~Kk<%SjDBYHpvwp_Zq3lm zO5GmPxZX}dkID{}imZxOtbwh|VhstK4V_xP{DIyD3YwUP#TTU9qb) zbx;LGONWsKKuA|$WGWTQD>JQ|yq+V>b2kVk5*ia(#&#ql2}n8rBVits6xf zdk2w{l8OBK51THfw zj5zTTzO4yHvNW&O_J!uq{r&yDTPSf`x^^e$bU;s2FgTp$w?1A&6Fhf(UlK`tMaU9p z?T&1KNvx=3K0=F;5u;;CjROSSbX^PR$%Oe+kdl0lq3}v};Pm)|Af@+)nJBT5<_D4F zYufi@Avx-KIbtNjjOZ_{Ul@}cPqGC~Hvs^t782(SRO?@xW5w*7v@uAJLn)q;+Qlp0 zHJr93Pyup=nz$+zo>TfhO@)RNrObw;&;Uc~;3OH}e{rHB1smu!XY_vfr+SKeiyA-0 zz$n{#J7HWhW{dw(Yu%VF97wjoMLxm*ND6F_eLcWkS$-F8gCXS*tkvQw)fw#21h=ROrmKj$3IJ)D7EbYlx7dgbd6cT!<{y%0Ig6G+(K*=LmXc@ndS4@(dt0bAmMhqT0J3ew!K)eyBpiwgBu$d z2#6lwg(UyevvarT@Swy?2QXlV-}9ClPXLB-Ao*HsR=05WEj9(_>fve$I)Bs$)_RRX5ZSm}hAAci(Yy{N>A~1lpve9;uazOQUvuZ;&PF_R{y5Igzj~9rt?^p zEYcwX5@Yf3bj%ZsJtd@0(3g1XntiD+n^n9Bl1yd1C4LXV8a9U|IzlAVOe$C+c(`vcXvvsG|~;yA>AR}jdX)_ zN=ZvdiAr}PAl)U>-8>7yy>ajTkLNw!hi~_NxQ^=_lgTyLm}89JDJ&?gQ(=Wd8wvDHi%RgyPEnf(XANMpM>v2$F6R#f4O{{i~&-7O95)2%@VX7u`huf=A zG_89jReAj&lxXBJ6XHFm#w_MeHdH)w zs@@tN`AlFv=v6Wr^Y`8i4Z0B8=3?K67zCfh00qSGhKzym@5R2KC-&y!BSQLY=~R_* zwrfLMgCU@7LK-2XmmlR8xYOmzMin_v92dv+(XK0rwBA|aE$hl6kBF6MRgt}|y#e=+ zJU!*wV_}!lmjV6d1=ubZp5maQ8>VAKP5(~xDZ)W!XBU{XG!m0zl)Wai(F&7 zC44z~A=|R%^a6^tobM#lhQQr(6}@_|s}oAJ(kdW<5*$1VWp5qYE5*lBhEc-W!H~m1 z2_zE-lCW#3UXFGa9_5SspsFGqiP=oFcZF6&a#o8)Z{?N75&b?n)(aw8iv`a*?Q!;H`yKe2yU^~vwWQyrfk74;G1q37KOaop5J<4UNQtK33VziU zIqNx*w`~(|r)yM1sh*XLjf)c+>QTU{oBEf#mfn*^g8>%JOd$>%)Z%`J{-X+Ms;g+n z=RTVWo_49Q)6>rCD}mSAbCfB06eBt&^fJ@9<9GhXnBhzyDxRya$b;PPQ$3HCmIJNZ6&77lo}(aCw`p^gfGu6{Q$K&3mLukr;nt>wfs9S-4~ zQu$OUV6I=N@`{t|yrThJK-PwxL$t|Z#C@N0rG5?!gdg-2#!B4^H{;hN#k56?T!1OC z2w01Od%Y`TO}*c>WI&dXXxPw@TnHMz2L@kfM&WBKTr-=){wZ7Vs)su?UHlTt24@a0 zfk{^H><40hKUWB8|zO8WmSFcV5c8OLXLIP~LOibKqEov zdsd(x9at2H&D;H)_sa`Yg1L|yUjv@3lte-s z)X4e<;F>>8OAnEe{XnU#5yG~ZA&3QiEkgRWvh$OqaCd~77r@_^PMBeIBnd~_#b(=8TIS})4^Io zS>Xa5lQ~9gRpKj_QB@fki;R$ncx=KPc7Ol9E9*G5$YB(tkiIBF4cUifv5&8c>L}WC zL_{_YXyJ!kmeGs5&Qwg$4GBZH7t?)gr~#9QC$&^`HLlh;F%?qLaC#zAQTfLXTv$BW zycrNht`Dhg5QLTp@C!O0#fG%F>zbdJ@HQ@6e3w~PG-U{-LZm(9N zA30E9PiVk&?82-F2W()R7oeT4@Ml&Brrycko4i964~mr=Ey ztkbUtOaPPCw+UIe(n{pv)XdpsP^+<2>pg^Y>E!4C80`FIXTwtg#Y#g-qfLGff>I-m z0P1mEkp&gjH?+4V)gDcUTRz?*eYu+u85#OM zG!(h;v6Nb(t&DqnJM=3O3g!--Xp<2y_AO)hjfR`lZJJ4is!%7zc|S~9X6OvrSF z{B&%DR~l$w($Ezg1Vqpo&_gE1IIVg(^z-vKOd*X*tSnS=JZ|E=r;WU%7AdeQLDnNo zL2WCAJ!0l1h6HaOaZpv#82z(7c@$Fe6cjQf)aaip9I)}wDl`lq`gxzGxK54{tHw4p z6(3PQp)6M+$>#cjIxjZ3^slkoxtfJg0VLENb10K-XvR0{=YW-zAZ~L8JVdU3oe^^SvwQ> zr{Oo^;B7mtIhX0gFneR;m+6A$(=?A~JT)=&1`mZ+!WCW)3;+y;kQBlJom2yu@DKvz zp;_tje4MxI-;m0*Kt$O_dM`hqHNHp2j-}u{@1d)o$sZMIm#NrYaGz?7iOvR=R`41<(l)i+NiKfn%$<>6UrXY-dggt=u;%<*Ihos z;8EUG7&MT2SIDn(T2~x}NOe!eHWf%GAR{@VYVAgd1E|50_x(!;S*T!9mNt0bJNmK2 ztaamSNqX=}adt-s4T_)kWx=Sd2}~A>8Q3D$gwHRF8pphJDsJ|=8PqMCJjMbm*K`(m_fclem zLAGaa)N+OE73h4v@Pb$g?JB>no*Gt(b)rh;B#Azex1lzO%l{V&Fa zuXF1RdFbE+zUFlYnf}N((Zr$1GEv#sDF4|5!E>DqwHeN_9O7wo3^BdW+A@6UZlnSo zVo~?USHAg)#AkrSPx{%mpe4ZXLfl~=(s08YB)YjUzOrmWchO_gR`O(26*;%5SAxbFJR! z&KrCsfv-1Pm^CCK)ZhGQ>M^<5s2nhKl)~nGT3Xg!fAX-UhM$Ci1cWgud^88T@N`Qt z_7z;oYqacTM0doYGeKx_f7trQcz)#%V|Q^eNIe3puk24J!(u;`F^H7_DtjrpQ!&+! zu-Pg9rScRZCZ%y^qbAs>p)S|G8m=J+7u|C1xMg$py~d~apYSEX*UvsQQl8!Da-KQ3 zz~gNC9>_^aQXcJ39oZ1%n6tXyxTv_p4l}wd%f^A{F%sf3H@gsUGV$MC+`$iY3WU=j z&3Kf3QEsf`j?qm?^}aF_Ss7D{uwN`K=ZrGpar0oM&@>OEEx}mnQjdW5b{h^cQu}(I z*iQVo$rhi4jtqpZD);;nH1lcbR6l}Jg51To2(J?Z)05Y?-|Z0>pZ)lfSU6e-XD>eE zsGm^J0I3O|3#D1mc(de6t$oQh$xdW;-gMemwV{izLC{pY2Mf!FhtS#21(T`#4z|cw z#ruO!4^gokSw4c%X{YSZEV@~Yp!=J;)5f@?^%H@KOO zq`xGHlE&Am#?GO23*AUaXd`*@pw%(cYUNA(@DWh9NMeEG<}_j#KAqp9FWONN{+ zTK`J82o$bp(8;wP1jT@x(D!~`{V1l{STh}(6`m`vqR!03Tlc%8?GQ{_r#ln7d)!Zw z!H|nHLU6O5%+S=N<4o=s$%4ha9 zX~-~z>=tb<&2AU-d<$^{QVEF4#SOjUO1iK)8o@g%t$i z(e4yQ_Bnn7Jtk(S@;PqS>^G_#n-}?fwJUgtAaECKg+l7o=)tf+6==CZ@;tyTLu@`9 z22WrO`3(BGYsA-dH<#EUg;~FIZ_9F%Ubl}Vu_?(7BDzT)o<6v}l4{DiQ(Yzy8lUa@ zrIF)69>OGk5+*tj<^;w*^uzscr#HyQ%5$nab!_%yiK6^MkHPE&A&kb`_ZEXk;zM~6(Z#IM zb(9_HB8Ux{zXSiNzpGQTax{MRQY>pq#B^y+d21sKeHR0l&f4Z%zh3+qNkP9edk5yY zY@@Dp!}wE%3fYtrR_8a8n9adgpKk1EiXH=CdJ+Hz5P)3o*GSN()3m;(Pry$uwc7ff z5bE=YbPwSRK6x4wc={vQ)pO9+zrM46zX3R&Kl9-FaHn|1Ss4ez>t86B1JuhIQw6j< zzOvZ*^K>U$?3dYg^2IOxxW8{@5^olX;(~6C{a$TBS-oZ#8R&>PFw;nFW2?uQo3d#U z>GH*HY`!n0U^A^sGj^sUaF<_AF#cSn{N$@92HR0z%WM~DLkIc6>l#+`2CL*gzLr_* z_>5$DmjATDtmX4wYM7exoCecx;f&IhBqK96xZ zw!ZM1c*OfO2CaFUdAaews9lGy|8R4GHsf5>=24t+Z(?of5QO!p{E_A#|4H5uiDPD) zm&~U9WMiG2f|mvc+0_!Pa6OaMh?HCZM}O?ulj60$o>8VH=oYU9X1Q9n z&s(O_6WdCg0HLC>7&1-g6S%g^NFk0F!wS91qH;{miMP586cz~(iIs;|m#D_A;r1FR zLRksqDJqx&LJy#)iQXHr_fo+p@LfxAGVYL4PVfuW5C@9nQmwtjKOK*B3c2tWZ4*)l z!0M|u70bp#P9P1l@)=UWWKDuEMx1zLg*$rnFDQS$d|&iRDJ#@7fG%3Fy7a&0Jc+3T zPDnouU6f-~df%<(Sb`VdcUgC|f$b{R>noWjw2BmnXZ{Blr2kOCu0PZ;B-g-s5xDiG z2e-S^ZT0?kVD_^^cdR>O3mqBvszig$p{%i373^|HV-srjmosk?sZt*&RsBcU)9G>; za%g8;ZwrT_RHr**E8}KY(W|(tJM087#sSq}%p_seur|mLaY+Bw!+xnY)bhA{*b{I= z0QUM);`=WM50(F>q76fPI<+h5s}YvH3WN8%*LnyfuvExMt!1{I4;Y&IY3iT>aH9X? z{Xo>gDn3(7D<;Tet2K%{+~Q`O^=0e*X|JUe0i38oBurgV&dxhd#K?y!zZ z9k8T9B@g+K*J*~JXAjf$^mZT}31wT7hV}Izov(w05v(mmTrSREGrXz}W=8<;X#fSK zLgbP6q+hY1QR41_^rBxW>nM7&Kuqx^foVZvf}b4suYn}>{_i`Psne?F1g(UYjEaMQ z{E~P8za$~FjJ?;+)PhBEIT_=z)AUkUjgo^vsXLA>PG}*XjW36T%SNC)N(MOuPQV&G)Rs@b$3IBqv#c$B`SCD)h*|xpN=RF z+6~T)7BE8#$K<9y?pzM1`@^x+%1RbNMj}umq`%xr)D$q{Efs}MC@`oW){8z6y7fP3 z_=Al8`K7Mq+h_w=!eEP^2?RRX#T5v?AJ{KxHWuQ$Nd;nZ&ZcaPIA-tBxc@NPV|f zDJF+gkY5}-kuIvamTSgf3t*sXJZ-_akR!_hV6=j4wtwRy2p#e9G#4_Ko=z$q#3V?^ z;rK%doF-*Ix&DMmg-E?7)>To_j4r%XgZ1q@pq0QCSvuj=?U$}S)2x$%I2kL3VR1FF z34K^t=~0KMT0+>D?f{*N2$g$hULRss${taDZsG)}U!Zt#(>VD;WgWMMsCr8x3oNnw z(q<+n|8f<;@cg+k+Kv~Sls^UvL(o zM|^XCMW8Aphn(txF$b4#JxAYa1vFptwoO6AM;6@|#VZoAYVfFn3j<=S;~(%))02sK zM2Ajqn7w%VlJ6oL`^@R>2ds>lEVQNRINP=P3us!GSRX3m5_=A_XF+jXOS6Gy$nt)| znMlnKr>EYN(-RvwJz-4LX@7gP02wJb_QirP***>Vwj~b|RhQ!-etei!oMg3$RxXn8 zo1r{5#+O~7Oirta6v!U8NK;ePH-b^@T!Yjr?9qPbJZiuV?-zZ+VO;2X+EfT0Td`aP z>K+9lkX{&cZnpz#>VU6M&+EjimwQD*p(DQ2pwcQwe()Tn%2mFeoYP+l}b4XzkA<-56wTie(X07Hj0>oPbjOdrdBm=TI;Rs?~Hu`mj zwCkZ8Nn#M^qf_CsIUs(_+falYKq^xmgriOf3<BZN3H zwn$K~-`NCpdzcJeCG$-@%v8mzW5rPnN~8LpQfrC>WT7k?a;* z9g|$Jch#rw8_!;Vvht^$&tXFkXne$&mI9k@<1Y&7mw#U3Q1?Qb!s%IF&BUsauhkng z`QTec@pu^p%oX}S^b0Pq+c&rHFcne;1q8h+g;%rn8;5O$=P}+j^3wvJQwlYwO=TNn*}T|R z@iV~8s_5YQ35i=QbONEr3+b>;XL7iHFQSd9?-{7Tc7UR`o=+X8{ogFpa& zf@FlMSs95R{_rZENFxBGiCZZW|2^mXju%NO+I*D}$#)H{>2whDXInk}Gs2}*SdQ(Q%7Us!l|2}%iu;8i<_-Y%aeX|pLE3%2Y-7t%FRWffBnmf z_PgTkcC^$X2B>0W4StvP8kJpuj?)iTqtnAJAw$4LQ0hWgP1X$;^Gg(ZjKf`P_o=Sn zLwwCo;v)p&Yb|nT1$B9{^uIAt2fH^f$7^*yG`%NBO=`;b)JMH5y=DykZiha8%r;+T zN<>+zubqOmz1+BMZxhS#Ie!ulz!KMoL=FrKi3iF$J826bp_y$|`p~SxDVV5q(o!-kw}#quj)2#~bB?Z@&jd?;YFT5>&TNSDEWGEv90_ib2j zyU%ckS=cA009Xe5PLU`^F=Pgn*F6|%-M2di-PoRclIyhFN}*Hk4X3v$U{FpbxGz8N zrPq9w)vNgY9VMWs9E)HEuxRdd|20Ay&|0W~gW*Fh^s3}-D4hnci~;$pl`aT&Reatx zT9KQE=!GA+bO-%4MBG0&OR~>gto%gQ1p{!L(7wx9h^NGTr^X0L`45U&ab{8StAxYkZ$`Bl4Bs*<_t{c($dev6 zk6dh2VP=6PwD5wIT>SLRAfaQ5t2hf!4jFs&4gWL*gM$C0KASg4NX_`;cj5jMi6nr; zz@qS`f5~I3omzJI{MuI8Ra9QhAI4cf_uXh;f7ntWsQDRY@~)-y7;xkN5g6kou>ROjtp5n#v}T{fN%EUQgP+5K%2<5L?i$e-?^P z=7MJhQq7Np(6E;u?IvF!WXr0}{>mV+CowEsjYAho04i zUMTqm+5k<}Tki*L$WOG90oqE-DQ+Hnr@Q~Zm#F`TB=i^J4H(rWQwHKK%rCWD)Mm9# z1Dfc5f4y1sH&A&bQLBD<2o1A5F^Ccrf4db821lU&7j8u_)kf%B{7E>;q}@4y(G~wc<-&pg2wNpNi84 zZZ-2dEz=xxIh+dXsqF66|8)k+bXmlTMqs=xQe6ri^vD?|OT_#K4+=B$H33V@QGf1$ z9-nxm@ObYr(tZ#|W;y2bVKep@aS)br^Y7Jt6bmW4G~sZhLW(+{jV|=9wU;Sn$4&6d zW(mvGE80ktQnMcB#na{tn~@w7+WSEfSg^w-(2g-ETyAK8DfQx?kE3qzq)yBEUzep3 zrBdHrORwT+yF+FePom|FXeCX2%U3K{c4GKxdGj(1vq)+i2g_(9m8E4Uw@VuDbDn>> zYL(F_m+8Gjk!!u4PA?|{tt`tm6=`1g>VaS}OZZn5F3q}X{!lD?a@~X}hPPjDMbl@L zFwpr$AtQ`X8c-QUyW;wANV|K+7**CKCd62WNdDP8&D-AsX-C+|k(5S??z60nmAThW zqY}Ma+)v%fhc?y1bvvsljKVePrcT*Qqdp{h{>OiJt3sQO*q#UGu_6s0-^WZ{de4MH zV)tY8BDYLFIr+ayHX8~Fhq+9}IxQFbhzU*hO4Z?U-#+VyYzR?+gMMz+3xJ^vYHm$< zx?*hGpb3&=UI=Xt@W60a0az#k(#FBq!6Po27oBJg|H2byHeuE>EU4B5-W!>bX$^D1 z(>rbBmwD|@^7fbQVohv$#VhYyr+;2IgI%w8G$%?KQlK*rcoadR^LFH7@of!S6B>D9 zy5*2^z{Ea`@osbA{bGM3ufL%Y_UhJ7^PQqfcgOOO=NX?{BR_+Y79abk(ovqbyc4f; z)2Cl`HOhqeQ@Yqp8~Ic5%zxQd@KfsKFc_^;rQfKY!}LFt$cv?7&&~g@E6yqmmCS<{dXMU#)fg(V&%^1M-N^(o%G7Z z!~Z&uA6yAc( z@ZF=bQ}@BtRk^54*pql_ZB5iq2He8GrR3^Y%$dSz)?){|L7De`?HM8i!Z z4i72n7oSGzFE;;pdVJ$J^>UMSSrS?$H(HUg56{D>#Kquze}+`;3QB+Az$v^8vOV)fvkDQjbX7r1x)XLT!k{4qAsN(zvoBM(CyE6OCj1Y{zeK@ zUfetIdP_>}G5$*nwVk;ob(ZDNd>Uy^D@JP~bCC?Xpyx`@c~KRuWHl{GpHJ8vS)_qa zTW@piP6$?p?#O^!oDMr8IF}WS?`Wx-Sc~XE2*NNTTOl!80A9R&B^D_D{B!Hp8rQUR z`eygTy0_nr6MyrgG&t}ix3%QwzgG+ZuDo_vj=vc8iW%)6ZFo=NEU_w99gFBFsmhiS z!*&CeYIhSfAG)ZSPG7c)X^?-B&CkuF$f&dy>sd}HAJGFksOPN%YpQvGY|)ZgWRJlZ zPjOyr=J~7C$v(_)iK-4E^6(D;W}x_@w`@<*ZLmxGbMy-+{v*KNNia1cg9XQwi&#Q5Vv{EbK!jB5PIdp&o;ha;KkiChXm zuBrmbGT0ppp!c3Gbw4L24bY`jyzp0cj6M#_8F(>fpC`oXU>x9=9?dwl%sRcWU2-7B z=K)y>_DSXCe{nY~;up@sZ6z4LWB_*zgT~aSJ_kA#u^mxxwceFgiJ-9P7sAnokjNxBZ3R6glrc#V~}aYEd<=6u#i^-QJiuz@3QZC_+? zM`*qsLgPDE8v%A7c9l+)tGT;)*rk%!CnJrHngu|wqXfg zIwt)a_&eFN(nf5W->9h-0su9oApO&b&xwHn93`Zq?x6g=VQ}&yD09EzWa4o|L)n7e zeF_B`gOIPDmGpeg^yR~7cCcNEI3a#BdeRIq8H7OyLR^e#$36Hkm@VaUu)Zcu1$PpB zU8K;=BN6R(Yk2E4L!di>IWl5*0#=*<^<73MqSFuU-c0NxR#x7)&ldgfr|=OGTDa>s zA0pCw5)m~Jk;N*5EU3ianbYyv%G}~1VM+1Ti)(+l+ZX4f#8E$(PqB!;AxBUh;^V-z z8QDvpdUX|ncIMXDU&fndbD&N1C_xG3K75Allh2?5J_CX;ha0r(>1UY!_M<-Fb7*MK zX<+upwP(dTB$LwbXb(aORiyfoU!9Ma&MNi=hFTE8yOL@%cZ6@Y>-%2S3TW7ryqcx= zOC4)+CkXv|})<1?8R+10g$4+-v<}w?WEo`rME{k(_*uo2ui1NZDeD0F9 zy^dxk;wsxBDGFCw_*I=bY1=DVA42qf5+W@S;-`RSm_OfEe|p{tqRoFf?GvHZ&QynF z$IozlxfXvVDPHIvH8rxoT~+qNfg0VqXG6$)*#?;#a$?V?C2eo#`#M>n;6B%lXxG=` z-T{8xzCa@T?=xYp!Z$0Z$uY46##xo4#^iQL>DEYI$>VOucDBwe;~mUq@hheULTCCl z$p;+UqaxpUo(HR_yV4WMWIxD_c_Nn%ko)Xe9`9fIvLBToDK9s~*wG7q0{f~3_NZeA zouco)uWbgL^LmTmPwmoESaHKOmm4*>vR)dvHlS2P*}VZ_4ITGT=hw$7)}o~>E{*-1 zwrTgmrRUXGl`0|vb>w5?AhM$CciyF~frLTX-stuE%UG`-voaKoWy4jUi~- zlTG4BH9@B_>i(NKbtprDur$bFy^B{PhOsh{@#}6{;tC?9xc`_}J@{Am2mEdpv&sO5 zV((`jDQQFRLI)K;zj%R{#OuLD@^XRE3~-(XC#QI`KzSE+Gd%}>QYau6vQk}LdD6fs zL-4bTvKx`>C08?;up&KHjjrq*Zwt%z&m*^F970DpS1!)X&^gRTsr`qQtau{(IUswN zixQyy{U!SWG{q0DqN2h}QycSmzBNC2kO6oQ_3%YMsK;Lq{xH=PJO)lTfytqMLm-vW zQH>5G(?|BpWo9!eVHV*Kl`~zLBJ@p2m6~}Dhe^mHKcZJZq>dhXxR74dVUX6L;oF!A zDsdHeCEx8b%$Tqj-wN#>PW9s+>;&6u8`mW3)k@aM_p(|Qp@)YDf4QDSYl6OTqV?8FHM8wWbD9N<2jH%KaEdxP4b{QckXS*_X%n~eg-*(>h2(i$1<&&D- zVq*GhZ+r{PPH}LcwrOOW+ZK*i9p;OAX84g4lFBTzqtT{Oob9V_rdOD6T=FA9YRX-t zyn+z7xtRMy==#gWwP0Nq5%=F7xNJwnFN_2I;{I22xhe@<9TQ_vilY1^FE9|?6zcf0 zhnt2HR#Q|eU;F>=cs2~CJHZX4B^qNSdP~FO2$x`i^_jSLiB_X<%$p&+1{&P+8EUmg zwi>1m9Q)^3!t7FqU9RU6l^3$8|V&Z5}PP=Wnd8XdAW0is+tX?_{SN`oEVk zf701295UY1q98XK58zY`uZpYTn4?8bZS!*Wfonq_Brq~K>0{j|ZZ)=ALmhdrW~EH( zZ*AM~Rl)DQYJ}T<&*N^Eit<;80j#LvxBtnkCd1Om8_gMg$Q}a5Gsy3>CS?)1CWJoh zoI1G|G`5?l0u(N^v^DtqqlL%7d*Hp7=L%!V5t>&Z;+JO9E<151E5OfJet$$H=y&Lw$3$aVSsij5Fzm1LA^6tJc7 zV7-Z5mG-as_cYRLYCWuv9yw6bBX<3r+k}CC*FPap??v^LH$IZP6r^YrVI{EWgcbm)e813g42D_mXA@n$$F^V0V(h2vIoU zR%_)HbBlx)C}`m6p=qvBOX`q6ajp%mL@>m?K@K#O05@~Yhmfksu^lVLM1`hQZ(8;# zO2NCkmXSXQNQo5~X=*KkRRh&sxc})UZOV00R9Y4&GZ1IG^Xa@(psN%U>Fl(459&kx z2R5uTT3K1i0Xnp|w}OjWq{w}pYcp;@O3hm?_71W$0Kz8>=@=`ryA`YBU7k?aQ6;9H zkgz}uF?ibD8yu7vfo*DJRJ?^@xE^$aMF|l%C>c~y2r_6$TO-WJ0o>Z4ewFn4JfJUm zY@mSU#jbfWS08z$_CUX?No0TIXVz2OD#Id&Rr7~T5k5f<>Iav8Xfa1*z7b)XI5#J1 zwWwaEhFI)LbR#FBZF2o3_2sn6z1xh18kTyMEihRw>g%s9whYu2SysaO{gSI_X=~Ji zXpcw{RF?j<8Iu>{$WRDVvd{fSIDPH7CphKg)MkWV$zB0OVR#dcdydnmZC46WD}hOCs!D4fwE+D| zXABO45BlcY0zg^ujpdo4hYEqfj^ga}?zlkh5l~Q6!A+4CPpZ`EkUDHl)ScKR3`%PAVqgq#El2V+Hm4>i{*?=HmO! zU`gl;B(;Ua_blV{d2enAybl3D_^7DlXpPoLZECmzoa8&T7q{(X{1`I>t(S-#RXfp0 z1B)k4SXnk(Tcwj6EK_zgr+BxlhUV!@UtnE4zvRtuyLm<~=?|)eP?5R$?9^3FjHaE$ zJRG6>PlPc8!g5+FRzS<22=le&g|#eQn5qx>FzKG=LdY#vmJbnxW45l^$kAcr^2=`mgBqhJSzPJ|sUWbF94j|&U z)^*rw2cM#I^4m8o{qGZmDCsKO!*njt>)zLr`rLN{wXdIN35g-Y9dsnrkRMu@XAuD8 zrj1Ok{{Ft2ArF=SS@LM?INiHD5!OFmI3Q^MyaQ(eB3VwLM*ZtG(br++dm!Mxv3Pbc zL$QM@lYfnZwg00t?n_HsDvu{!VLdn2dcUv?+;`_4u5YV#WO&H>AzLj@`n{xD6atEq zz>wIeb2r_{%cf58h@Abx#V^tCVCy@!c}**v_RUVm>f1t=$|d>SpF7(8VZ$Ilk;Do} zg4e~={#`!&Gt&!jn}D*)7Ss^v&<5u6dG}kI-qHxsJI<(7Wt<{SveX1rYl2^5oUDb& zi@Za$FH@xvJP5GkQ|Gz)0$9(!I*|bqcJ73J+TKcTtCfQ%-!+C8_uAsStqTk7>rwBhkY}jRBBo^v zuZS8GdQH7M_q|Phb|ZNXX67sd7_27Ut9{QWYv(_HAGu|x`_iFh==-qgnVzU;2h<}S;Z`H`uOF(7 zHb>Y-1J^d`q&YfDCRTDz>}&GYXd8x~EHxsk=3VduuPb?x->auSuAAVKPv!tV8Ddub z6KM8d>vqqoo%4jII+P_}cif>?xp^~q-4t^@FuDJ6^f+|TX$0=ahYDM8+H7qWlYM4m zZ|00&`2D#RcM+Pd5lmzNGcp2hCCbE0IR-b*#{A>Q;ft&FQ@Y(VV+__JmV8W!Vl*`sd9F@f&Ou;kKa7MCdc(YR$74q7oal@Xm}RQm%D z*O{P{`SDgp+QlAf;BHZ^GCvM2&8Y%= zV=!|t|%GggO<|W+diOBC+ z4j6?MZVqeF9bvSkQ0ZK=NK4G);uiTlRJenvR>h`f97|I?*hN_Ssg}kOQMu~q@&Q3d zUCB1j@Lk{NbOqRTY%F!Yw=%Njxc8Hpr8MigdWv4ss{QrJL3;dRW3mvICU{)(wORXD zGP9XSMsR;uOCP+pFX8X8)&bt`|10j&|B&D5Pvj~TDU}JYLDjnm_m@{86ASu*fw`%S z|Ccs0?5RY*@;`25h3kT-3Bep?D|~vhu|VGIr8!u&4Lf31*7r+Sx$p-qzm8MQZA&(v zD0S^`Pf{@lz>_o}{Z(megJw^>61jJoN*k)lYX(*pScA|4-M6cvp|7b?#S~p~sNhvk zO-D#~MZymoDgN22+HntzB-dsM%w&6goL&}T8Y?__1FH@EKZ#gnJ7L&sH&Jxe0Kw{= zYbpPux${8U%A0YGKjNi5crpxvu{X zR~j(k$EnySciUoW=`taImIcQ`>&nM|TRO6&4d3aywMIVV1j(L0rBRxPA^sihcP$Vb zyNmsAno_mUqKz;Csn>luFzZ~Re}hyTz4dRVZ~8QE_c{HMsBt2UaNgJMBPrfr%t8j< z4@JP+_#6DemsZCUqtz0-$VVFPQ4Z$vgeSFP5G1B#NsXWViIpoOlRuTdJ00}k9{Mtk zoPhD~-wu{Sl99=tYkiSp`o`-4lGocoaZVew2O3C_dgd9YR5LkwA$h)rMe3v%*+DqbN@XE(Mj{L%=!s-;>icZ;& z!m%tnPB`D9Djz!(q20s;M)wze3{|Cepp3PqHxP_!~w5$UUb4?eLd@r&BBH()%drCk&S>-*7r2RGL*+* z@-84jMpMV%WV#p%Z+uJ;#x8feg2&_B$Wm~7Kdo2})_?e%^Kd9uJQ2$Wh^2HF3HuA( z1l&Ob4FscXPxw>H@K#j2in@Wz&yqck(_mzk(#$G@efj*khV?z}v2#N1_=~_tboR z7jAwM06!1_4>Ifm==fjn7^9{4#3Q~B?N{+W5t%&aWxI8b7q8r24~+e|Te!VDzRHPO z3@+Tsz)o)U;A|`w9<<$Mtsk0;YAwi_NBD}{^_HV>&0zAN#VT_5+_PX;>lh(sSD3V7 zs})7JtJb&w?K8X_E1R*aBAElbv+Or|N#hzzbk*9gHk}lMOO|R0voU7w9rK^aYxw7etJ6;XGdxJHq0=^d3vesA$HPaHty<4#1=d$RCLB!nx9~ud7y9utFTOa_u(+gn zOJYva5msWZU)t-tX`|NgYPwrHm{dB@4>J<#;$$MSRR&v?f5T+So06<)S*Va$ORnz(>>+JPm+?q zZbN0+QELp!@9{59CvaI0y+j57HA%RZca7x_K8@7p!Nw;f=*);#hD->#lY!U}^-Nqo zrO%Bb_9Y%>8>u@Ao;)A+49AZLo%>I83IRH|$t7R^ZpHqSM+1!2f{zMEpD&QAKK-)k zTG8e0k5HA|_w~0U+EokZzNqi((^|LRY5WjRX;Q(tiY`)%K)9Ys7iJYrjgERq{RVC% z7ALDuP9yGEm~~wnMIE+Ft9A(s#d_9PHdRRHKXW^k1Eb8HMDckk_~) zmFO~qfk@X~){d|V@FNDBpr{Pl+;uHmL`9K}L33ufy*6mVch}I4!FlU?27#OAzsio@ zvSJiM(Q8(e0I}6uX%&3-S}G899}@Nr8}BdT~>FxFHOz( zBrh)=%nbUkiZK(z4%XpuDX=Ou8tE-^IeH46o=^N@#e4?cop+Wy!K6dvqr_!MnJ5fF zM*{W*roAL1rMH)2#HG!K@3O^)W%c5^ln$C0on1=;k<~^k?5bE=?yLx4?-{C}g@!jD8_`tkLjh+y~A2a+r+-!38!UHQ@<7kV=3v!%pxaP~O-Humt#@(v$zFFeF$g<~xw%;bK9mMuWnrT)z{Rb>k3uTxZv0lfYxEqJ z`SXaNFLZF*lFq^jl!%b;9E4(RO`k<58aCo4d}9JJ_Nk>9cs41QG-ri?Sa2zb+eI(37+KM0|p_g&(|?Qv3i*HZ}OpF|_bb0>s{IdSyV?(b(cv z9i^f#qpbmC%wHuutHY6e67dI-1D?o!`lf3Od3*nLzC~Lfv?q>krye++gP%!+U>)WM zC(E9CL-P!|1TsRD!W*+W?lWf1aOfm{_1n8;iqsDT;5~+6W;2129|_3&ZI$N{ru_R$ z49LmCZMTv8bP`!OFcx#HBKp}|M!<3VOD7y(dL(jW06QoYfDP-~9Z9i94e}?WEco5D z36P;7z2h1>PeNI^ZA(WV6eozhwq1b`gFg2hB6$t%{{=%{EY(4ZY}1{dsF#}m27)(7 z=(`l#XbAK>buYG@NQ_1IXxzY(giWF)1Uf!#dadkX3ny}ziHxtp6}PzxvQeMVSrSlQ zMd(-y8l%5jMtiT&l>qNBjR=2z@mexL3uE)49~G0BJu1rzC>d}$M1z}4UTsSYN-in?WKd4Qmsj}Txwlgr(3?AkI&Goi1YR|$zK zIsTiJw8Bc9NS$hI#~7oYdLUTv-*lwX+-H)cOYi6pa?bMBtPFX>FkLpKw%$?T=Y|if zE53X#@$)>kWX$4uj~#U^O2og@d}*k^z@n1twl#;e#@%2op{v&aJ06Lt3&Xd4TDAfb zm06xW2!=ljFqtVS_L3K3{~zjyh=;h)(<9S+GW!Z3SKlwvd#&~ znsTUG(m*O6w@*~XlFE>mo{u7uN>l}un{kqd3UEjqXfIK`*f%}As1<4W@hQ0oE%s-6KU?e>A#FQhNg&&@GM8nu0xrou8cQpD%zk+&JIugOc zX{TL8r!B9X!L)1Tf18DRU?fGeFwd~2446y2hgIs&|DV&)@I1d>w97&@af|P#MMTc3g}Y?~p9uW^(A&sc z3<;@vxZB@9LKruA#bHS(H4xc`T?ua2v#UALu_kS+l!krEJT>5^`c?(Xhxq`Mmd z>6BEuJET)eKuYP3I|;vUxxc;7x%b?A(f|0Z#Tf6LYrXH7&-0AYUyO+wx_+|X`={4Y z8KQ@W2i9<`NZ`=sB*x>Wri$}FOnm>+qbVpTRfcmRI@?q56dM019!dyyesdLyu%P1+ zqZBLDPFBG)Lr5rOu@Xk`?~;xR8I|v3T|Iw}I89Y%6(_9yIXR(d;924`+XqJ@5t93v zMQSK*lwez{_Hw|YNQ*{?irQO>Q z?CMHh)t=yAQjYCNE>fE6?e09g?#Dzkyk|@@s4`Qd1OiM6 z$_EsxC^S)Ye`oqqx39^?70ehLE4KEycH^|-#9N{^TO5f#H zevchoh)MeaXLX{p&scf!=A8!M6?;*-9c>lBw$^}1eu_lg9u|aSisYYgVf?|@gNWc! zTNk7;86{?G@~*pIodLfB#&AvZGN7NFH1UMu5@Wc8dRwYHK5%Y|BYGm9Ri#j)224Kl zZj1M3PFNaFVPOWshy-Ah#jK*Hua#EN4A6$C+@WpW&(t_-O%7QSnie=!!^s9*IDxM* z`RyZw`Ou9mepid8SoF*3_$ZAq`epAM*!_NO3Bpkr;27*1v;iLQ2S<_Y$>$@^f|C9k zIq^e~1Gtms9GgBtO2fozLH%m}bvv5k+dsx^7;pyIQ2K@irM$&3t=<(n_0r;SmWfT5 zXX(NzNe;6X~traqrFrF(?IoZJ$V0<$-2*h)9x*9zv9-hs15WH zw9a^?rnc@{N98?6PY{eE07iP%4&J|#7w%#Z{|X_z+!rQGeJ*4F+}x(=^>+{Y=v8?< zqi^*bxY9oGILv#5OFc?ITyq5lxJRTPOHc`QuACogza0O(_Rj5Q<%YI|+Y8*?YYzgO zozuk}X3Y2z5?eRnfG@N`5l_kI84T5G5=FrO}D@qHKWvmJBDMWx!5CteOW*oDFAOEq;w+^#g%h?Xz+4m8)|Su{5zdI)Vb;KQ|y?rifZH=>J+ zvbn&p`V~mka;H#oK%onk3~mNUM|sc{BIF`-e|O=7iGat)dxjm?M~LhNM=ucrZyH=s z^bwy=!efb8sF2T3?0Dl%MbZFEYB0;MUk3ac1mz)$J} zkYFzU#Pi$Wlu9;g?In_l1@>h5qXt2JA4IrNkFZ!=6@n3_rJP)dpi=AFOQy!$(nJaU z=Y0pOVV8(2WX;^V9uA5bAS)sUtcWPGEcBl@p8uqOG5RrSBlN<^&}E=O36qnWe8{*! zD_m(no(XmNNPA424E|YHn@AM!N)NJF za*_rM1L>N^*7KYOxdp?Sk7G;Knsdps)B9EDZRgafOa3wh>DLhDrK$rTdWuSWJ@2nt z83;yk0Anm(2@b@KG;rC7tkOO4;sNU{dJWHgiED^K--8SVWp0g+KP+fDJh&Tpbkbt-?aJk9MBFBSb3J!w zQS)X)08QL{Dcae*h1&B}v`(-kruu@8MNHsva0Gm|sCZbd+WI7WHD&{h;9;xf$}ESG z62htFz8Yf5E?6q1DuS0x1r)W;ui*Xa4Awh)EqZLcZjyYU1z&I<@U$d>6?pW3A{qm1g=htmo z*0S{b*`z$O1kO`cF#m4!qGIy#8-t|J8>{8zxbLM1Q@>hi2iuwLepAa0oa$FAnH*~2 zQ+yv$|5ew#KQ>lRb6Q*gmc7jVkyxB$HG)s!$+$I2Zs|?Y%)mL#{bDzREVcx&*p!a% z?ZBOZwMI`_XvPRnJtbq@PEB=S1Dd@7liMf{5m6^*UrQKot9*8wZbGZ>`oQ-E%5QUo zyBu;NY@rw0EpZycSjdUq(~Fa0Hp;j3Vx zC=hcSNNSO|_E_Qkkd~tf1}JNJ#A#ckr%ob+(!NQ8lRoa+t?tzB*Xq(lf(6zGB(+i3ag)~1c3Uz*jXD{RpVJk# zUJCZurA=*efN}eT|ERJCMu6oXnHkO5jYQwN72#w~=CHyhdES`ScDQB;HWOyGYDFf- z0H@ywxbQ|fT*?Uw+qUKFGr1Q_M8ab1MsA%1mA=MXJ|@-TmPeEHh9@bX=;={~-|_Z; zNXt$Ve!Al2o|*75zU!eFxd_5f3gD;Z+?5DkfBVIh&joh-+$=qD?-Y-dZ6ECF?S6v= zOirC$a5kbI_Z-$3o6mVWb1 z&6d2~I&$3rYa+P`Ht36I#EVb-rlgRO$kOUReM}pz&RS%w=A^~jMx?n?*jruT5k)YA z92YPJbT0Jh)&DhMPk3S_X=w|U{$D^Iow!yl`! zK#HB&j0mW5pudq`uDoeVxcDqf6aF0@ETCF?!gjHX2&<1e-UvOT7)s2YH$AV5Pm~q~ zZd)zS9D<Cz zaxB0d_Cc&$|KHVqr#r|CCVAj>gR1029ui{XE*}zNwT(L5frMDrMxo{&c0J^7fyFcj z45z1IdjGS^uS5n?gC2vd;L}OU%`XB4JD)Z8*ZT-Ib<8E0J11N0&2HuNB%G_vb0=jbNPeU&wAsMvQ^YX?H-|rbi?ru!l){Xh zk0o&JwcQ_Vi?$oW*X=wHCmu-;uuIYrz_Wn=Wn4rrNe6yFMFk)IzdJTcU7bM}^l}e& zIL``hyf92gPi~CUXHbf;3sGT{5l)sXPn`=!MrWAfU7q??0$ETXkvzJbzi4jKe>E~X zDXKBVh1m#J;*C;VX5W<5Sgh1qp)_eJk>suC!AV1aJmCECXjn9J!Q1g5h$_D4wy!s3 z?wnn79Zgj3Wgp+TzuZGtueTyP;2q-|C}y_Do%Y`<^Yv0`BEG|-&btB8)zLJ*;ID45 zD%e9r{C(1Bea3W)p?y%n|FkATk5PvTM5QP}!OG2a4t$z<9pW6z^15j+P>SdZ@Fj{P zy7wi5r|p8LrGyvhcz&A!%X4Uj@iqa+O|u+BCa}2tkq+roTEsOUWCjS{PN9Qq3cF%l zYoy!iuf8MHEA1yljfiXXWttOBqjP9)+_ak&#|Z5;U-k2PO0k&e>sJt9U-q{l!6>!h zYv)m!D0@AoYOgma4P^C) zdk-bRMd~QNqN9hO4Ngi9EVyUMzLJQa-#$BG^Q4{-MJwf<}b2 zGXmw&g#*8&Kq8U+mz})5Om8kO&flz3D7S}cUEhRWe;ktrntjv9%iEW(Yya8GyPBB3 z@U`hHS1;3!JdsbYzN#UO;AzGUkK-7F6^SS+FdeeZ;W-NXkaVU|-nXf&FRWGG(#zt^ zX{^zbA`*Iy5*B5{kV=>)KI0+w6B*YNp+&_G={if7rrpcG4t%;2a5L zRe)DrMh>qkzH8=iV`*sS`fve@*QOlRqwai=n<-sYY)KF$HMSVNYiRi5zko3TAT zPCfx@!cVV&Vz7Se6D<{CX_dz#$EcZ2W!tZ{D$_bDhaTUKeoC|fBcDc7?+n*Y0F@&7<6Mwc!GVgd_dTTgm-0Q1_*7)b3RnGA|iy-Aq$wJ5P7ZMh&30ovJaJ z6t`{YsYzE?!se!NvXu1d1--o;Hwjr}jk377noj!lR@FJS20Kq~%}uw}Kp8Vagv1iG^1j7p z2{z)x`$0RN@v#UKkag_3(r3dpmm{QfE*14{>Diu`N01IgkBP;H3o2@R5 z^9rP#?&6~*0XqbB;QKZwm>DK}SY}%_cEzIXmrQ27H;O!;D3pJ-O_=N8l3P_{e%gJO zSAOL5aMa@lfhP~Z8x+9y1CRIv-o9kKg&J8!#R7wS)m-+`tt$`%_1Y9aq8xTXKMzz< z&u|m1?G=*UXpD_|jahbg_hMZ16ls4Eb1pCO)9fos2JZ!;k*$nIFjS`FwcxFcF(PE~ z8!Z=6Q_0u5;u00ftMtCD9j0PYf^A-XFCXp1R3Vuz9lW7t-BA0+rEvLq1`qAw_$38` zRRO@NP+e{YUU`c(WvCfb>7WUWY*A{q3DV`OTMytCJ95dA{juk>BTLW?*QIaB54Uc} zUKsXZ*n+4s!zQ*-AZ)P>JhlAr8^p(ge%^#?@Z2v@jCq0Y#f_>zm(@`AZfU5Ihs#6n zt4h8M*}_(I#w>bqieSoQk1M!Fp|?crEpwgm<-|tcIr*>*E~_!0X`YsnFrv(ple@a zPoPeMKRUR*i#s9{nA_7VOTfpi$YcEuflz`nJQcAq^UQk~!;gP~FVjS{=(bAb@_27; zZDAH3BXQI9@N$DT%DoJdxzgJkWeUN8K0{ginJ-!~7~;z7I?it!uQ++mz(7_hUe>Ru6< zk9H&BL@CQ`DV1gShS6rACX55qZ1R<>qkYj&GaGag5wJ2AYU@Qid}E9S@O+?A0b}|g!+R_gSIaa!%-P} zHB1(V!q3)>ZWP9ycqd$pdDn&6a(1%!FQhmyG@wV!DP8QE3x~EK&3L?zDg zIluL4u$C^1r)w34lZ~4vyM7Y&X?x^h_$p+u+u7i7yKIpA9&7{%SQP;5uTz52`z!R< zcg((I(F=viq-Pv94tzR+REd2N=g6VX1MhJzQ#OL2<(Ql8Fqy$UzbK?pV{Z{}t_JuCnf@&E%7Jo7DtQXGY+seo)rTL5?!`_n zHw+&6YnfAP&=YPjAC*shkJ;57pF_wox=EVnASRXZhJVdqCnhUlf6R+lV0(N|>zH66(rd*ecGh&<@{|Qo=K{b-&e&p^7#C;{oOq4>@_Nj;4 zG6RIPDnJ@ygkBWf7xdFp4Ul#|#?RPVWT|nhZrUW++0vMEDcu)>C3rhF=)daWaI@WT zXKYzT>w`{Fy5LEYv2 z_yUoc^0Vh>%xNl|I+%$}Ne)lVsIEoy1%&nNop(I$FG?8*J~aSe=LvrbIN2Zgb_WOW zaV17aXBXd$10F-OTXIabmSD4cCs@dt&e0#W($Z69N=x8gkPZj|Ry0 zlV5q*?oiM6SPY()Mw|{kb>CH6ZHRZboE~>rho>>`UUZ}9Vfe)gW2awU+gH|VJa?An z{cOSj-Dy>s(Dp0jH)J%VW8U=*A`8jcP@e%r&f}qy3R?zQIo-zy;lpdR?Daz*XNInl z&T10Z1i!1W((2rhBHjZX1_7!80Hst5)q2p3B>%59<6oV^O)YpP(Mzll^>0vk@lBs0 zk$*!FdW+}&KN<(!WA)@biuo#ytD#z2uz^!pz3S7KPUTJ|EvLz_)Vb&Z8&)7wAoF$8 zf?1x=axFnk-vpT}h}H#v*(|DeP`>yx zd@USLL!|gS0|#^GOTUfi8yQzclSa0&-nrR!>hn;+$>xVIv7l>~}to z5jP8<#HRTi;J|?8m4S*$Cz!tXuGnxT!U+L#$J`jY5)pVjPT<1@cJLoX;hkTQseY<2 z{0701e$X#xmQie-!kB1|G4u%=J^fFSpObD4f>88de)Sq!qkqU(z3m8=^-@V9KKtlF zf81^*1#eq zfR`wawgNLYs@%Xl;YUrH6I8{&ndYpL4$(&TjS?nN5qt?W1HY%mp&!KPC(8kiQ4NJR zIpoE(QWi!GM2qReAx{s|#TWVyp0Z7MKQX2jCntv%y|Puo7w4p;WTz?e)?GfdKE0iV zRhBZ>cR{LmEx~>CTuoUXnI4h#MPJ{by)zy`7x<^{LsY)>@{EtnPOkVnKQ-$q&rBoA z$VLQAggm>fma?7-`pndpp=l^!7K=CG63sYa^vGKDAucs&U^nZw7g!3BFjq^eP_@$R z(cq)racaOHR;A*z!{D8>57e9piJi3A7mRfm{rl0)frQ#ik%@wiqTtpVngL8j5`JKG zQ_u^lHVP)nO4rT+DB5H4^UD{^#m2_4pvNxd|2Fd>ff9j^Rm{GAHVyaSkm*VOTp!cxLyzfF$H|OqVHtAaciHA5^woR`!V~>V3n=3XbSaq9? zidXRFPUF??DVi$SQpBz?#8T7UiM%wl62Q)fOUDNie^*gWny4cAIor^0gq!MSBBQ!$h$iL- zXY&w3z6i2`XaXAuCvs{Tc*5_^@|f$<B)8bzpw_N9RI){m#cn zS>lT6L+C$-v);PtO1^an>352J9A~u-KQQMwQ-|=9_^2s^0GZ^F}EJ>KhO=eWPd z$UN7U?TL4Uy-q#aM^Dz2#6#cS1Y&*_)Q=Sjc}p|`P6)FS{Ky1$$&L-Nj-ho9how|q zDdw8yl6Ana0%_@-{`o!%(J5abav;v3P&Snn0kpl^$_GR24hmF=3KTSg0H2$io4G#0 zb$Z%o&rq$In6$wHVpK1M@m44yNULfYg^AO$_=U9tgiSZz4Xh8m`9`HwPTr@oI=6L@;`0frBDRB7bk8UM7Fy|<6(&)+v zXkU{UiDAj5H1vK&kk7!#UW1(l+b~%$dpeIrC%EN*EISU;*_uJq@X9UTNpY+zpKZHEnifT+|Lq zCi?wya)U6_2beMFPtM+d(fuxHGVM!#bmqjrt0E0d?TmU<3U~~^eLa}Y&UJVY3)rL% z#x^;6%=RBe4M}EK+55_G=r)cYP<dWh!yE)Xqim*)k5>Z}z%r@eZ^fk>k3glGoeRwNLJA+wc><5S9Qn#QMay!T6w#7k^$o9e+ zt;v%o7&C?~pYVP!lSyF}T$~4=8RW`qOTi2ExEk?QSs{%N3^D~pCYS%PQ!faQG2Nn@`Ton|;_?uJie6Nu_8c<&xm zuoOuD`YCoIRGEM%rEe%LWe0@ge-27L%?8?k`GV^+{pj_wkysz`VK4Ci~ad?%o zPplriE7Cpagi1}PAp7CFdceg$5>l6h`4@qAC=qF4(o%RD?yJEWd``O=^S$w=lSJYP z|7oSyZz&l{B##vvps1Z@0*~y5%g>oQXLN`nS@>@wQnyqlX5jk;ZHMJ&aeZ#O4GBz? z(!if6dUuz4Ptb*Qe@B`E8(2^*!(@cPOL$^~oPmz0Je^q7)j`U$*QxwkM?Bq^3hYI{ z+@nwvDWc;wuSY9sMPJutpUc~SJGA+jE(lL1Xf@s|oVE#P!t$v?Nw^2qfap_;9H|U( z|Ck!k5e>wi+Y%%lT@cn5 z2N6tW8HLSc6#EL(khmEoL)a1$V|?B^Q_S8k6~IpjZNbcKYj7hC1>#&cFPEbz?5m86 zJt=g2l#bp%oM=r{?)-#Am&iGMMod)raWj_~dY`;7g)oUhA@mjcH{HN>>akKO zY$#4mC4;S>oE*_o(F&dk%uf)#fR3fD_535)w0qhfCRRxk-?Bc*{;scT^em*-<$=tVHVb@0wMxh%_%cFi29}sY zzK}vXAfjJDA1FzqPaAttPt|IxTR6q^F;wFq zzAT_2P@QlJUwsU+Tph0q_X)j=)GKdwY9C~+KP!}&;AK0v!6liQ4S!2k7&EpfDoCZX zxsv3^BxMev_eQik@2;3CZcT=8`#K~=SyWJ`N`A;u+P;$M!%w9BjUAcSiOQQ*sCClXHK>J-^@8GC+1UQ(#x)VK+VhSF0gBmJJRAB+u_@ zfogag`&ApqxJt^Z3JiOw@P~>ec!+Yc;#9H|oc#j$hR*TgT8Z}XF%0qASf2aQ^cdC- zeaF=mCMJfvWm~>KNs|`pI>75<8tUhIWIo6ZzB}jsjO&yDwg+y5gyi4mOCrg@hXr>J ztPBL0+3gAAb5;p>F>u28J;irxHRJgOQv0n!7Gd(W*+j>-!i9e?`= zcCX#%bK(!;6se6Z<%0>e_QT1~0m~BxKAr~J1S-DzuX!1Mr%^%V#g9D;(wv=}ZpOCE zs^@eZ6?Y+KEc8jMN+*CCY9tZ2a!c1*`8SuF!HY3ys%PBPvu$rxbD|+?RN!8I_IP)z zLrl;I02NZ-ZyGf5*xM?|q4IOu3E9J0rx}EZIY49^pD6mS3-B)@Hql|}xc(7eE>3si zD}|}IPN_XuPsi5~alg(k38pzROH2@wJ~EFtI@GXMiCcN4{Ww6IwamP1mEaRe%_`tE z)Y!uSbs;fL_YrZI^s!rxto1&fym%EZbUpjA(_~A|%%VEpG7EyWh{;6QoNC7X@(zQb zvH(!E9(Q;CF;08eP1ZKHvBUD+TUa#_DcC)eUZzqMgOUP|d=6VDWBAD;tBgoh{VQIQ zcmgxxo9hc|8eMPxpdAx;E^jCpvViEBve;149iZM)oxsIllFZXFrAzEF}t_fM*UzTWgFKJV#eM+aA3t%c99+SbvT0Uti&c7Hj$s43CuFxhqB z;IJ}xc3uy(w=v({tW*Qf3B`BhV3;M>zrMb>#(90c8GGn=JjwYY(HncY$KSZ;lWE#u zdpX;~Wmp6uYzYuPsWyH3kMKTMH;Hr&okq!h-=UXK{r!W1{Lc6}THW)ZQ^5cB~ zR?`HKmg6=sQ1M9B-B>@Jr2dL;o+yv1o11=dE&cY`gyi8!4EFTzM<3R}Uxn${M!KtM z|Gu?>aRQ#gEkFYx3U@FmH7}h1JebzVM5WOhb1N5AW6HXOn$wYml^J+XRoY2sJOi`B z=)e7;JcmOW3Wnn`$w{s2+RJ$rU2jY(HT4fr5Xgk4FF49BXHAC)b7u`X(k@s4C$M+Q zynNn1Kf*5^uKA@a`UQMvx?xEIDd85k;Z<<+Qx%-~sQO!ANgNyoW9=O?m#@G&ItDsM z4XZ=oZ7a;?41&~GWFM;<-mfAu2p=1O4>M-F&>tP#o)-79NBGw@#^$q6(8xWbEEhDm z8?Is++#tq@Ph~gRnwLu$S)<#{hhhi#+)bKY>;~Z~MD{hMyGY&S1|Qe6<5(=ZS8^iN zVVp?i*@+DX6EE|YbesKP*QV-vA83&LqQ)sxL{9x(_BUr3Hx`b8`3BGA?Hp8Li7@1Q zjD#QD8^7p zU9jU06vuK}gboaR+D2{Xw?@5+OiMPN?NuMAPLNSWf4o(mZtR<@g;VvC7ViALu!S=*%&4&z6LB8C@C{r9WM4MM>lpb(=0Aq;Nw$7)XcbKC_R zNs6Fevp`wCgmko6yZJ$_Ohk+^bfw0MS3-eK9Lkohg_)JJp{TDG@A%_~Mme`LB<_U` zLU2@2LndlKvMh%Ti(+$I{Y%w@>2O%wWtZMOmp+A2ntdC7t z`tV1y@i;u{nd*RHgCAuBP2T*gft6}U(9oJG@iz9vGBJy6_frN`!_?M5i|`Ctx%q5S z7ehnZfHZk5oIVhGLLtD^g8RZulbz8^)!b;?VI-uF&Mnz498+=59D|eTa?I1B)Ez3SO4k@ zlK3SS6fwB}o&MEdT-l;|gzR3O@ zVhMfxxBq4NGO|Q(O2kk3A-+U>c+n4)y~wyu;nC}@FY-)Gq|Gc>S65=9@G@Mz`xSh1 zV(01U*?Lp)T4)nz0BSkLNLHRXp!hUgT__Ww0H8Y<36Q_hH%mGy{BEN`5Q zV)E599vd&~s={~|m13FY+W}IO;Migly8yUzB=Iay@s79lu$hUr-`-Ul5hz|%Snchd zXRU1K)m|z^?(J>2cGpu-bMR9JQ=z5)9v@}s#U558j-oAX{{-~1<`s-9F$T5EYlU`a z8~;Nw67E|IQ~j%6ymdQ*CKOhq1PLs`PV`33d#5`R^QvtABdTo)*5~%;#4QT?Nxj-T z{QsOB{n4XPWu}x^g%Y#5_qcigI0G+e_b2nBQgZ!3AqJm6T+oy<1*OqcQ{_S(Vq00+ zt*4Pa+E=#QV9OjwCOm&Fgj}s;;5X|FH4^8Q2fzM#nvT%gGA$GBumJZ*HB9X0OfsQiGp8hWXZMKsS7z`m9=e{00MpKHaeO z*4$`Jtn+?MRDGvz?p71tC6u&FH3)0)}Olv#E~^oL6C zgxKdroYCB#7GyrVr5y`D0`r~~2z$6g@~qKk8oG1){OAn{Mg9;NUjrQE=IHUqXVr4k zz7gYef6c^dPA~pAFp_Z((-H)x69AJ`eOBqO^T+)Z<*ldD+5v}KHB?qPP4SC2g>YXx z>hp3Hl1rv+0R5tK6v)L5UD|{(68>og(MW6j#`J4$i0yF^iT+ZWS`j8f+-S>g4w)$t zzdmGBCjWCe?w^jAQu;K%=KKW$&Uz(!gS#87+H7=GyMiXT3)9lz^OTV7{cifKsTiW4t-JIpV+B&_>1oP<~<9%3zMXytfy8 zfPLYYGJ^;^(tsjc8)6i%5(h_riQz?EPd^ep zbF#f+&U&2GC*6b0@MF#Ov+brhK+6?nw(GQ)Z6 zFiI3dlF37DULh*dj${NZCUm|#YFfQYbG}0Qoi8DDeR`yBpg|=LWpiE1)i+LhUNf0k zy%%TUBbWM8ou|P+$6lX-wICa69vIUksf4Nxqjb$JzfftUXjv zYP5!gR9eljW!SZ@;i~wRunF%=Y_N2ZZ5vF#d?Y#!SBYMC4xjbT4emhrBdTgRNgsMe)Whwai1g#GD;@e^9Op|HSI4nuZZsg zWCRFsW>Z;#Zuk`Rscb7fuX84o>YScUOtls=vu4W^2Nx#t)6b}K((qg)pLJEfex=x& zPx)q8j4tn+><}}Gt-LJOHe=}P>%vVRqQK87gXduP9GgKnx&s{f&-p08V?pnKz}*PR zonxrX)mh-^QyRN_tf5EF6pySvMTnSY6&Vy~u8cM(Aa;Y#&wA2eN*02r$p@K+#ppPOf)6k#XlM z@IL+_g(#Tfbfefk`?89su95izl~%%x8pFyJo98{?VGzI`0AR`Ln zHxD(xYfPTf3M}DUukl{&F0AFZW%6|e$SzAEHn5N(KV$APklk4~!k%!{H=rc<`)oKH z?p~%65S?Bo?;;?j@^-%Pem?PB+I-7w^tOX@@Z??auyg0 zDY}DP3qb|RjI`e3Nv%vCpKrq5IS;Ng{U%6Sz{tS}H8nLIUipaZy7u?H=Dvry3j)&% zfa$E4&J0chax(&ke)fx}NY5Qz9~Ttl?)2>J?D)R?=ri0&c>e}qSbskc@dn;tvyWaI zJmvNc9(X$1M2CL}cjxeF`OdW|(Aeu_kp61kxlrBR?~w+cs}`@PElU1@=8oP|mbT=| z8$Ckw>LaH&nmsmybMW8ZAmJpVVs~n`_Mz@)BgB=qBSa=fwb~Otg9NMeg5)_md1vN< z37G;V%=S~zG5C-iT6AWr@6Gg=AwL3KQ3$z(uZ~doFU{v21#^n(=EhlGedC9+%(%ym z41(JSzeurF(InKf#?AdPEqOh+SAl!Xg<7Ho%@77F&JKDblXm zF8hC~JsT4O_4B*H>72$HtXexK!%*~@Da@%pw~14#5#2c)_5S*|DYT8KL}85NaYQK`0s?zAs{4XurbE8VYt1(#!(V#ctojV82@MG&2;^& z*JIGT6$8dKR z`ib7iv&UWX-wsj!Q-rF?6iN3oH$3t~ryC1P565W`$efGE4@AKl`bXksYgBM^BoV)A zthZ@v$!h|bMmKc%3P0kI0={5OMNYn;v`Tp_Dqd!-FowX&WK;5xyU5L~fZWm8nDZFe zqW`wO>Fse_-xM^4u0LslsGhmZxc+hBE{Kne@g08tC>UHv%4^!Qh87N-d$l+*sozyb zmjG8U^BBtXQXJVLviW-GXF9i!_j^12aMllS%VhOG)}2=1|4Vf$thASn!xyOsEmg?# znOOL&%(3JlgY(#s9ii_))aq-Kn637I8ee9kqo0Ro!^BZaW0y<%Zv(x6*&QQ*DKo zG!n_%pKWU-Q-h|d1p$T23qR5-{g+5BG{~%n) zODGU0PmVqQ?6&2bPsC0fF>Mxv;xkhu+Y##I9PoN1a|YUW8|x|fK^1AJE#id*C$SJE zsP9pn0G-%{bclV-4^vJiV>;<1-O)IJS_`*pLF z$JM@>z0-6NZ}7*P>Bb~`feVDGgv1)YO?Y(x+N%2~v8-r6-0&CtKZ~9XUfMJEVb!;} zn_|1BY>2JTB-&imTW{qoRokxR!S!(gtH(@MZ;1ARDJvx(%6Il5m4=XHq9i?JtI$L3iYkig5(2DnslAMb;Nj1 zW@pdLtp`%v0gk@iUA{_W^(<|+wea&A+kUBhV#$5S`@N13WUuoD_Bz^cE7agKAe%f; zv*2FP+Jr{Z>Cw1KA3*Z3UNhfJKlG!gtGHM{YrE0FZYVr7&)KP{?!6I~efcPN^)eC$5Q#4|PO`w5ggoVH-p`g5h}az)jU+3Rr&V^Z*uzxLSLPs+ za;Sd^<*l{qA7hrb=Kf%NT2)|yC6axFCyNToH-x=P$dtq}pdloU5rT{@k4Wo$X+cm@cI%6e~2H5-Hy2zzBR@Y|@w?B~wDU zXH5gb+7DojZ^HldPKEugb@+Lfx^2@U7EkTYg*bKBq!wBeD#2jc7qR6Y%2>>%#63?|>GspguhzGx3utvVERtw79K@jL|76+v z?xoJ@X#itg8+Gbd-(U(gSE!!AiiD_H+V4hWZV+Ve0c4oH)OP)wZTb+t?f^j!%qXoG!zYsGc4KHN5!tm4$w`1~CY=SC?I3jP2ErjBAw z@J-NL3W&Nm_b*!9$K7_K-VN|@**ma1vAcA*(b)c=Mklm#P@XM@fE!y&(3Mb=2h-9*)V=LVBU<1k*J$#7hA|RNtcV zZI29|uQ2#xXWigE@}w-8>!&Sy zc@ZcTs5?03l^2BdnO9VZzyyuiJc2>C=?MN6GDyHa#T6Ycie*?D8D7z_jg>czjUf|? zBI6lc-~T+{oqI6OZtWnQ!9Mvxu4;m;LIAJ|ajf6H?s^$-Z!ry>U1{R;-IJ9mwqHj2 z5@L2=^Slce)c4=z7mmhVJ()6d&W9FS3PH<~+~CHh(wgMR$tZ2S@e=6!w61}REh=PX z&#Y_=3#s34+E!4|l;)Xwi7L$(BVC>F(m(1P<~xEDN38Pui{LNCzJlE2>_JS`h~GZma=@)Ndp;l=#=Q1J2cTmaIKNT|0l932bQ zc(Gfrv4f8ux5^^M?yl5Ol0d+*f;}(BgF^6+$?s5gB+8@6Zi~JqVEV4rNjz*p?wU0? z|j})=i>`#KcW|{L=;aEUfZ3i@9{a2s{~oRM*F<6ado!! zUX&KP+|hmz#wx~|I3*!d^K4q?Eb=ef?T*D z;KF4$tJvPKW)b{jZsvLVDr8*GJZcT;Ee_djW=>q4#J_JT?qnlObzpgrC*eI@IuQ4+J- zqgnQy>@-yJmw&K3qOT?Xtd$?R)XQ`8`k?kb#255{Yp4*#1_@o+W+CUAoc$3tI|{)b zRLy<>pSB-zYWDtX{Pv8ugUlRTCHli0UGmc?VcJ9lMhMrl-)R%_^1RXHU5-*5{I4O} zJ_bk=-d~#x5RxGPNpRv%sNl6A--+)Hx^g4-zP}#hdaef}V$!7gD>j^lFOK^?;J`HU zM(Z&g@(JQGzajr8RttfV?hbC>H{rFjq(it$HOt=z4A$$yV3p6|s~yCD#2Ae7SJH#G zFU0m_9e5pMpW?px95c5S;`W8mC1Y)YaPae}wU(RcZcBu+M03-~W>91WSE zFRTh~UvDbvdLt21ppI}z-3(oS2>wnOCDQ3+^9HX4T#fq)Ab@bjnYFv-Y=cjYUZecz z#VF28+%KOVCdV9@{X(jss_?eGirDhZrR&yy5qQp9WZpw)C7B!^J4}4NHet7lKOp^1 zlD$#V0&R+w8U3*2WloM6sVIx@(J}vrxTWPIGc-JXBQ%Q|BJS_j_T^|*1Z8iQa~E%PU&uGkd_YV4rxKU8>G9t zyOr*c4k;;Vl#s4>A*lH5-}CH!_IVG(KO93B%(>S3a^Lfw*Zf?p63Oqd7VjSY@PkCd zfJ7H$G-vNm6PEukP7?s1RolF9ZJHp_AQ%oL9ctf<^y(!!0$ z^Z~i3r{!aoUk^wjdUeSJ@Gtz%2JGZtv&a0eMr)6%jnLkH0?`Qr`ShsZ#V(#{+|Ey8 z^35wOYpV{(!55ToSdxD_t)^1E4{a4mhlKftmk&y&;me_>@9k$+4)Vut^|xTU6o!jP zBfLG;C=c5~SOkXCs_>ABIuDfAp5xF`&OTrVaO0sLq%|xm>m>*{nl}Lt?bhG0`Ba9R z@XKyB{>4Kg6C9@Y*g)q0Igv?UU-Y#9a4>r7%2z?bi1f~GwK)1bgg+W#3q7n2CGH1I z)E0WP0rYZ)XtYnX_UPu?|8U;cGFw}E{R@5{Wkh9BBbe&>k)qqx|frsSHLZ^u1(EI_4!B zx*W$A7YrawiNs8!_ZXVtdeH5Tu{vJnU3(v)Pii{RX^F7*9vs?I(%?T(o17*mHfo)k z-o3Vq%NqK`n-PyG1ZS6$0AZ|*vXYYVS(w_u`1qgH(Pyq#tPeH=eBpW+JaEzQfqzw8)4l+Nqz&}8oB8navEp|{srA*7R zBioUH`i1ZOC-wAKwMMr5*qCynIJf2%w>;FJ5T~f?;!xt$um5nk5XIa#-?4rW(pV$} z8D~Sogh6yEx=7NcSi&Y$-f1q%Af_YDZWK>D}x z*RaH5_bjJ^SpK7&-=3_4h7qzK>c^-F%1)0Mje|caelUdnHQzh1wJBQoZ6rntjWl~V zIJ7G1*SSJwJN-|`pBF5iFgqZqcaA?as+B@U(=b%A+;?Cn=Xa#uo!xooS&~0-%9#p- z=*kVqk@s*XR0$Jyt4?rh#wU}U!j-?Qf0zS5^aSqu>`FkL>$~AIlJ-(y`v)-aK7p38 zD0|9EQU%XQ^4ql)hr)I~Da#p|jQC$IfHI*;&9>@<17!GfVg>AUF(igljR7k;Um7bY zi5yrmid*N_@C5###=!zJ1moJWl|~h?j#b@Iwnf6uG7?j*nHV$5^MP0$Y^n!lKpu!< z%H~vBu|eDa(kZWNeePpU0sx?J+vF8++si)sjyj=@abW?i@{c)Y&&?RZFKjpSh0X5} z%O>Z{KmCB7N3UcPFdb9X<*T|h(JCVAtvvI%AdQQ#dSCr>7?`p812N5UCYL}cV>#)U z;{h|!wQ2K49c42^C;!*4HOB&~O0n#hRVq{@pV_zSIt#ULbiFmII>5?d`~N$rwxy z*VKVVVZ51^M|uZ8cwliHtp>>lPOk7OYlV4BU%**KP*oXT8rakA+70h{VGP&W!t{k) zI&T~87hmx>^1?&O!Zax$r!KdB!0)UH%N0>}z!(5v>V}LkbQicd-%v|>G|yjlvVJ`Y zV(@`mu}p2{&SRumP_;8$C2??DpbKoSC3p>O_D zg}WOL-z9~tG_#c)AXQ==Z z@kV(d$|FyefFtpiyS)Vn=ARBr1Q3`aVXx|63QZ5P{+i06+{`|!^QrD@=~tGz2Zb_g z=H4>Faw_b}+eMFCUObIlr+)hdLAU^pF$FhQh?zDTl|9=UdQ+G3@>O z7!e=D7zxDKKMs2Ed!zS97D@gsI9fUcAU*k&h`&q>-gP~OzHz&;OLF_ze{qRW5W;M- zH8{rxeUo{d-gv^ht7~|3HUUEXJi4IXbojvLD|i$0xo4Hk?*HQ ztdI_or)dA|5+SO{zSZCgoZ%Yp$Rh7?AQ zS2i_;8jG5%$#=&JbFY`Ztj<9oDiPF&J=QUxS!FjEqeU1G3nW5&Gn*-IG|C58@w5Bg z!@z%#XcUm>^PA0spLDR_he`nO_+C6I#&ia-ZR^1t5CHL{=aY>xt7YORosJwhMpS`5 z&_uFb<3dQ!<9v0m)cYHTmLD;lW^d;998eFzQ9U1G{%*KwEb}E9DMT!=q9#81QZBHd z>mrfa^W&E(Ho;m)w&x3$GJGK5u;=Q&mOREJi+ADCJqRxv2+#IS2PA0YgAMmjvtlO% z8(@HdqWS2he(Y+0nqYF&dUGiKY=5&4P7UHwWX?Qi5)~KY=t`4#*;mir2vIL3=EhoV z=TJc7j%cjYc%CAC_1V$;LqkP9!mVZT8xFY?>^2an)L9F9Rgf3*`pY(P{oa8748(yV z(#McJ&ta@&}!L7yG=*FyR`Toq!k0C1@40N;rBej?KulPWK-^I?)f9LSj_JmVj2!n7Z*xh zDBw2WvGWO46;AW1LgKdVHDF9^T;^__Y;TdtUG2KDP5Z$E%%DF!&VQGhHMH9(VsUsj zK|nSBkqC;F5$nu_afJ~Y&2ZyHJo8<);g*)fTdktSjhx+{<(ss-sAL{Q6$?a#MLzNf zwDZBu298y!QrbURaXW`kXE+{b5*(DP>Zil8BE;<%T8#!#mSJm#@yILWkjWuBAjepi z(QzKtycB?2;%l)?qph`AJZwt|4UT&q*L~jCpYK^Oj|%5t9GLlStF3&fYDU$ZsIXAa zb+VOoO=KAgFTL4N3qFx+*k+6v6<>hsS=tGk2xytbiVo=-yM2qJ#@8GP$vVUqaF~6A zd=FoPFa^x-lY9J{yj&`X0)CY+=x6@GQX$cM!YODJX(n@*pw@!~;B-{1mIev=_C%&z`w5DEaH^rGCS!29(#Y#X1jl5^3&bWzVkyaS`QD3` zwLB}x&5;IQFnO7tC%xRQONckTA4--T=z_kdz`{ijk%R;#-@o_oA4Hi5MCm#-T6SMn zdi}pDD<`qe!KHs_b6{OQoh-d1aUXipA>)_$xP1bvH6Kd1v?at>{Toit<1C~i^=qnh z(iV%li?|sw?{$GLXi`$cuT+Y-%AAXR*Nh;TYDut6IuLc$oQ1DziorgewZO?PVz$_c za%b+^;DrAK{05;YC_iDds>5s3E&NdsRrN0M6M8fbCmOm+N(aJnAm)0Fa?cjChu|sO z8!kuR#iefFqd5mwY$YGurzJg0LsjO@ME>)wMiW~@kfM7XhIA!eJU9FoZF?AK@~?Dp3vdwqYo~t5dFh zkv6_1`m~tyosagFa9Sdc5xG7kVJ=3)jC&t>ZU-5EdUQ0=3hfY!QsFVCfD# zV#`k@7?BM7R`Ks&f;CZ70P1K|QnF4k<^Oi-9< zv&QZ6&&IB`-P~vUEfQ!>?;*xknGmY0^KggRbj%Ez;4U8x{8I;7V!b;ht2+*3r^90u zR+nkV2`v0Z(P*#aFw5pc@czTOS_7Mu?p4Q|1g`+ma8g3*P7XTu%dUsLX0{6}yhBm3 zL-A|3Ll9W@a!bkoWU%vHO(|pk+u5e$q)z0mE}FbxRcGIT_af!Pd@4G_^OS@cMPr;c zTvJ-vPv#UW3pG70-W2;6Q^^v7?8ZM-8sDS*ex{}M{)?F~ql z+(Mr!LZ)#j?|RGV&s8!kH$qt4XqoG0@Q#OUct`Ax<-orYOygD31f`ei3zx0(s z(VlzU`@wd=w9o!s1Zu3AtFV-kqN0{n$t#YPyBRmz1KMaSPc@+4+u>Gs`lFY2l9-k{ zx~=_0$djLS-$9@Xw=dvD#Pdc!zh*BbDFz&N6jR>>De-+~k)qGTt1wPMijH{Me$2?J zHnK%>W5U=;1^v0^rbbr_fu-Gi_K_ME=Nvy3Es7NRjK$n6((?*kDQdT68a!cS`n$p} zw$b9`wy{j|NzntmM<(~j-6ERyV0lUcmZ$ofmFvGX(}qJuaIMm!mKWPcxkfFl%NDSg zdBcr~+9)uL!WkwVp9R{eNC^OcS1Ey6Fj?pA7puChIvy3VX5$^rSiB^M!$pfaXlrY>z3R4X z;S4#u8R$KbO)H>XU(*z5@LQXDd8Ng^FK~w_dT!h1j1bjK8G9~zVAc4_r@X4nA3iu0uMO05W=aDgey=ujTSmvWef9HU7uEt@$C&M^zs~qdM zG{4~u%Fw02!Zsghb1|DPG_V@L$okR9EZXL~~knb>61xXGk> zcC?DVUEe#P?>*Ozq2+Zs+7jO<=>z&GcJl{)JvyR=?dItE(9oKClY#C4NBZZu{d$N) zv3yR<^l?_Ix1T8~-b=T%#6BJ{-hF&HFUyqIR9bO*_hefh+_DtlmdzX#34y--YkLH^ z+i!APNQ3rjP}Gt=l5<{{vppGcK^j^QFqNqil4N&2G4?-i-v{ZqZdJiF>hEF>^QjF( zNN{FbGK;|1R`Ch?x;Z+U#hoGKq;q&2pUiHiApe<_#gyWU(B&s;5I(TSk0GuoGuI5> z-0#?iAB2<&gcNSeKzKKJ`AcYM$?Xc!x`)ee#RbWh;IeHFmD8tQJ(i>=oqW;`N}K(4 z?tF2P9wS)Ijl_ZFa2}i}Mi;l`Gc=}+T2s671|q(4IMy!i!69p`NL;9Ty|pqm=R_9U z37sO(ta&ZQ{-UQp8O|EeGzuq_j?oG1Cxgkmi3WiQUP2i9p_JU;l#8LJptG`taHRi= zg2VK2!*+?jNEjm{W8cJ>gprs$+qtNMvrr+0H8YL--7Q{xkWU(rk9>FLAn2_tji~u0 z=&h39(q?_*jFV&k+veVphDp%QdJhtTX1gYa;M0XebbeSIdvH}eDKYNlF7zRfMs_^3 zpp!9`1#7$E##I|ft;oq`l zy&~@8FgkR*wim*D&GbB(+}g&{1eC1Xm()!?;mG+^6IygpJ0dLjF$K<1S9QT?GoM#o zx3o!{vdKKMy2?ze)@Nn7u(?kab?TS7!02-eUiwD3D5ATAJEYZ3YB5ZSu#|gtyl7-k zdq)QktXuH1o0&Hy!*_PEnfc@O%=j?%^QGlb-L99kC)`{qx+y6ir>=Q#I9<_=7ZR`? z=GcxD+y*ahPP(qIZ)VmH8nSiXzMTsdXZIZMO*Ts;!I_RByRTkAp8YvD$pCWRjxezM z%XAZHJ|%~_ANwJ=pC(&>`5*)yXty&j>9%`wB`ZA;t@2`mWgS7Isleh5x50U~6?}yl zUrPGhk2mPT)-<0lt8m&7#?|45bQ^!LZ{=N79d~M#LP!xIgA#J5;_O*lN5Jnb6JF5w z`Uvja?6&SGM(>r-dA%0dHbQi%U7KyK`W~NF8U{r{oMM1<|BMhH#G47k%hUf<1=RV$ zGx8vlrKKTe=KAD*G)ZxFc>3*agLMEct3jh2@xF^Ejb%N3@M>plhGQ|AQRFJ^f`smK z!Z^vs$#+$vnwTyocn-`@tFS2H^Tk2W#}pnle(!Cggx|22v7ghbd!v_~bY`=yi`ke) zt3RNV;dypsmtGlFu262-u8RNae|aJ2hTSQ^9mY zeTV0UrT~O<@v$@WAZ(#FjN%R-?d^Hy_L+WY`E;dOjx=}x!`$@Y+Mx#URJjA+sqH_+ z9?dnU&<_j=rr}EEee9)KW*Q4+3z zf`S6?X6&3F{{2JYdvIya?L%>HA_n#Q`_kMGjALWpLyrfdx|vJ}-K!(42ynPC%eT!* zTVhet_vt3s>U=0|=<`w2bJ7b{*@Lxb>lXXt*7VtG(e~VI)gZFZedDZFC%_IxDH;7k zw?L90s}Gls>rH-)uD?>jPRXD#@-(C9<<2jU*5Q3?5G%W8^*wi9Gj3%3E<2eAA?5-h zzG%|IzAq93|Mx|r-A(Y7)}`Q4AV;%@Qu#7Bnymn_wc#iiy|DUujD%FKp2<0A@Un5| zJHP}6t+7AJ$b*nB(g%ukv5g%I&h&q0)!OAAT*SD`9EqZ3bYvS^@OrMy(dKK|5q&Kg zHlOo2QqG}qUk*d$6+;{oI@&V@0`|+!09^bY6PkWZ9N{wZRLCdmVRUoYYZN=)P}(Y6OFHw9y!Kq52&?^E9(dOOMJ6Ow!pl zc|@L(iWoW*=<5MmtiU`T&PHJwT;Lyh2Wi^Ycg>W^7C84=*~=%h@Q_R9KM}-KC!u2I z2#hT8r5I~&76R@on5+~8l(xL^a5%*yQ%&HisQX0 z$2aIPnGB`FWA{^E(+S$z7c_xx{&sotwUGLs+1G;C)<;$#IVsMfhp-y4xOGKWam>6p1TB9!2sAwc%kky#%s2s7_Q)#i_%g)Et54($kOsHZEk<42IZV3NzkXB3HKSr`VHT-k% z)V0+WN?sqiZqX0_|A=EkS;yuSGDhi@m2y(S&1nap~7F$1Zq_<*@@Njd?={|`luH5<2DTiiX z$ypa$k5r+vp;JbBd4Q@ebJ2B-BOA@!o5SSDi~eCSy-R)iNeJj4&L{+_p!*122~COp z;xB=?LyE(&0sJLfVLiCca9M?dhA9R@%Dqf5o_Nh3xZVm;m|azT)W_SP*4qk?Ythew z#k~CSZ5K2^`$Ss*fx9Fm*kLfCsz4Wl)C!X*w^ZZuYn;{;rdr_^z103+(Mw_bomgdP zBfF~85V}f}x`K734}ig3vD!`wyOL%|`?eTf|I#n4bb^@?51eL64r4*e2sUGhoUVyq z1Q5dBVLKGXe%cqun`6RQGkKdgCZY4ZW2Qf$!NYE}IzQ1%)0@T=`jgX{x9labxCk4a zLB(4!@)~k^eYKn4tgzbk=a8L5!uT4rm_akQmj0f^TjYK39@> zs(?4q$N8TUWFq&J!AfH5ZX4kKAb|oP0luC#-M>mUcbk>5kX0_9v8DZ)EOR8mG=EO0 z4PXMZ+7!B5PW$r2fDEvP5XKqO3ByyyPQNc@tk*)POUQpq$1K7nC30r??QV2Af!SdB%5PMf6$Q! zo2NfjhY0a|B~tw?9onT@O1SZ&;X&~rLvgeMHUczv379=%Je8FnB3fU@SQb5*R?$b#Dt?^G zqNwP!8enGO2wln}LX54T7=G5G)}D8$Y|Sw1W3DlMg_-YtvS|;JEdr8VeB2LrHwXu4 zf$t`>M?V6vrIhX+`^{^a1jnA}*e|>(c;}9NKe#0hVkdWaZ=MxiknUI(4I|B^yJCWJ zp1iJSa8NFqG#;kd23<_@`SPagTbkC$IKHvFV#bP&?6-4!QyQ4A7PM9cOC^Vn3NUd0 z`Q@8j(G5h0Y&>{uwQj3*w6q!rv^g_EC|)%-uWt)qX3bQx!c6NG%ErFlzxZVj;w}c_ zerp*n0IL1qA$gDqA!b=|N=tjS*je|Q7eJ7csDc;pkr$+Lek5p?GEUo{SkN_7Q=x0X zQj#Sb*!nm@q%+wqPf!^8+*mH1K+T7Wx@M;vSJ$yo$2BiW1;Jt!0$ut3rnNly;U&Ni ze^v2X;;&ELFPf6m>a~+z3Vd=dOmp$sJRpaUZ=@w&ZpvELtZw}XPmulm^Oc7SF&HMk zZY)Q*|o>&Q<;U*M9lC8qArKt z-@V}n36uf}a9_mB{e1-X3!j9%ZGXL69v>XKfbbeF^W|bw(l8j(lBGua^&1vD)bLON zL#xgRpJsL?Fpd*AmZ^rp@5J-$3ALppkl0PC@hww+$(IPBLtdFDt(pQ2C7Tm(s`g`a-;fHUiHRd|@x-LiI(To1irC$#+0EkXl_TDL5*HtYSq6kD`1UnDsQJT( zd^>Xtm_}tTb-z@p?p?JYs&fw{_pQt4u{hAK!dBN13r^P#B(le6n6yQF^bs_|{HY$l z#d^IZC{*lI!(k5e2@%f|TD@m(t(N?>#P7-AnGJVmHp$=N7*s@A9H9AF+~2Rg2Z59W zfxMy5JORzS4PFiT$#p_vT%|^FW$Tne{>p3u<4!ngT zYzXfOF=cR2h?y^;j}}UI@Y#Vs7R3tl2*SFrWEV|BG3q}%7Emfi)kL|D#IgFEpgnTM zb@X+{d`Tr!({GP0>jui0l!a$Kv#OyXP&lVN%&3_+r%i>xbdKfjXIrM<4no4|=p0Gk zB<$qsK);b*?F`5OvPMgO0hB5(f1ISJly|>g1sIlq+%IW{fLkoEKSXBUr}Szi$07G6Tt1RP*Ar-?qMQ zk2DA4W6*NWM8(H1hNpwuMl?_ZY<>e#e0NV2@j(!kKoEFX?@#WlK8gR^s!#7Ikl78a zV5Q?7^@gwL>QI)0PH_EsyBlA?bugKL!$N3vrNn9<_$YY3;LZ_jei3_m^3(sF?WYk` zUpvp33cc{-FeTBg?A?CISRUm|<&1(BL2&4&zb#yLu}6=NRg#Yb zh!6@Q2f0Q9PRgsK%5b0E3rv^3*MmOraCxyFuXU=QVhXy&Wr9|sl;-A5S9D}qZsGMJ zfBZd>s{Ij6`+3L<7LH+=K6xQ2db?`SC|PNL5py8{KKIFjge}n|lsaJrL9zA?uCHKl z9OEXalnQz3X;bhUD$$d-gm`>DY08F@aqK61Y~q6k9_lK#x(gMq?#GNh<}e zY^yI1_e~dJHVClgYo~a%A?2PJYP51ZN3C};-HLwpRiwY9rg{1YWL`E}|LXj26mLap zJkliO9W}}HkDZGJxQ|3LbdNIXvWK8P`a43)>Nf^1NHnXW%~TZ{&`y^@>@``G9 z!v7g4fiAJ*4JyY1MDwC2#~yF^0Yd5fVV=p!`X9J`mfhx6?Vr{x&O6=9^Z0gJ)Z%*_`J;nj~q~s< z+X4=|ftoVUKlUya1Sp^eU4d8#q1AQyIRt@=IjkAKm93d&0en=53$f*SSAm57u0-Ro0r zD^>tpU#P@szO&?)apx?whwkdZB8P{v-C)Z$f|}z_?5Zgmm<#H2FF*14y35Cjx-@6i z9kD}e0+_y(%Zpm(75ijl)FcO8NL~QuF0ib(4lnJaf7rPQjR?m$emqwVw&V79Go-cU zy3^Ji3L-B+2eNLdNKOjR31uU1HJ%bjrqe%hxovjHktR1N#qogA3u}d0pux1otoRIb zc?@POa;E*-XOo+_4J3ey)Yn^Mg^rMy+VGQ=E9O-5-R7AHaRgOG6_f$Lk1^BD{W^pH zV4bM~)|u(=6z~5M%G`31a!Vqoxo`!dax@J~(|LG}mD)8iiDj9HT#Kmb?EUHLlOJWG zNr7;GTY413zF0ET!Pss7k}+=)k{|*@o%n=IS^#x=w zPIj-5gC9mg7XLR?-E})TNCWZRr=Ny6t>hK!g%qeh)Zm9C-K~an52CCFqQt48r2N-2 z>R(u-tc-G^nJ=6TLuP&Rou7sd5m#8CO&qwiw!Uob3|vBWs^#5MKH*U?^?d%7jAgpdxO9fdb~*a{*^UPn9?vx%NHc;IDe@Q1RHs`hpyey5Cp_ z+u*8F=nqMAHoyb))^ZtQfRK1B;?-6)v+lG>@CIv&;yL-60Ukm!bs~xFT?Tv)GN=JE z$S)%S|LLIdtNsMK6(5}tWZ0af!fvWhD?Y)FIwDv$!w_0LeL+J`(9azuq8WX{dwc`M z?VZQR_Q>mo_uQBD(zPq0gOV>F^c(0B+cxLG_(yoZCJsf1$5@p~xz_O8oW&7|_2$D2 zmeb=ds9u4{z9sXhI^i9E*V7MrK8sF#BoVd46Ijggby~Zo8_WGJGnogO)dHC<|}gs^7#QNl{1fgJbvzSxShuG5zG$* z&MD8o%;kd+orAE<)u+|9!j=RKqltBQSXT0P#?gxuJAj0^PfO5Qx}9UvP^)32`W}!t zW<`}j#N9=t^&p};Afn+4x*X7&zcz4_Ppfvg_AAR)ze(m2!qLTtyQK#-2J+yCcUNo( zq7YOL|1geu;=R4bgr=i{X1hm;UMak!$ODHKuV*&CC;K!^9 zHKGnt&&l2y&0Y*Jt$QH|Qw=p5-b9CvJ+YaM3ES3|{H$-mv3Hk|<%5jsfs77TXcs^$ z|H^16pJ2w(t7C_!f2_C>FU0vcr zM4>jR%J(^H{Oj>06ct=)^4%Si1QG`-5~EfOItIJ^cR_ku>xwnQ>z2#+#ff-h;<06OUy>rGvFS47Fz0zlyj>Ckg$PAAv~L8$6AW z1k9qvDMpCb7`(*QYT$!JItV0S7<4r1?zC2ln$(^4g6Nd;`7dK-1KMy6tfoV=X@uN) z#4KYH`{UE zXzR21crrhE&O}^R{BKrb(?e-Hsly}xM>?%xOC z{t<_|&)gkeJ)k97*-XFtgaGf#{7p_jSj-Mw)Eb&j zQ%vwA1SGRV`x0o>Dd>~u@mks{7EWI{)QpW~8m+&~RH}}Pz-71_>1&mhqaP$xr=}}VfyCvff-h4>;b zbJe3ag2R*a6ov{-1yq&yYn(pmnZqEs(VTuZ=DY!kD5lh&O9C%uq$fPWmaG#TvN?7} z_j02U!9ZOdb)qMrv7iL;lf_i%kBqz`m1k66 zq<%b57B#uSG=g75Pri)GltL1zOd(%FHow9L?afpbc+RYgTB`s5V-b0MvqF-Piw)kZ z8)!D`6HxjE2u#67z0|02B%l$$q$}Boh&+Bp>GmcQ(MN z*rxw)ib;oROxHAAG{<7a^Fo?vWz!;DFFr>Xjel($is`@*CvE*2R4lJULS?LzJA()) zMS)%+ZyZ7PDRg4o2!Bf`bfyup@$$>6%3w8ttibZ^pd!jwbQ3!?)r=0&9N58fAMc;D zigMo4LH%1bQ!jUoX zvKEaz)C)uXgybv|%2Smx2p$D>n?^Est=(CPHY{NM^MsV zSK!$dqIc}~7HuVL|f7?NvC`N^Rdv%pM^$hOmH97C_YgQsCO|+L( zw3I5KhA$fF@ROcCt=39y3=ehzMs{AV|J6cNX+B9sB1VnJ|1*o&PxzD%&CDph>~xDk z-fT>xm%u)X{*L*vzl}9@Eu+-YW>|Fj-qIR~yUoEQ3in5J}I`wc9ML-e* z-!vFF)96Mpg%!Dct~)(F;vq^33Zp;QT^S7v3uCRmZ7iC-*0AR+kB^gGd_jW`1!9|) z8A{9%3-MNeEFI$BiF8|e!UyB&kG^X@1IY+JC6f`5Y<@NVN9kJFT7>e?<}}ynN#XH5 z#vE<^WwgG&K`NmO9Tp>yt5%T<7WCC&WCSOqBqd@g7|r)KdN*Ii`CYmyLn^u*oz45X zwqilmsAXkw#h}H+zXE&lRsvbIo@dTf5rq4`d>}y$Bbk0Zp{=rp(Uwtz78p2VPrJ+d z4UnEvFSISRq>NSBmCZ=&%outB^j$!c>A0B-~+P}viA3g9pv>jRZx{y1qAcbz zuXVr;X6P!AZ?V0k`?=rlz`ZP=Lx>{8o-~rRq^m|q+5GA;Ek0PsT7Y#79(;k~ruWo{r6z!KB+GW$fx=*=%^$t~iVd*BQ}&AlhU#r7>AWtWGSqc7WBw#xIa!41cxPIPaG zztL%Jt3Z55blh)LX=CSogFmLHP&0c?LE{Kn?d_DLhAN+2^BoIMWRgYf#EIJ2{%&uw z_aNz3AnAd_w>F^e4|W(HWU9x@03qTc-_jf>u*BDOE@o9AC&{>6e$6&MbeUmA0_4&*VrlPNkLzp3~)x8l_K&mgIoU z=ID}0!#MSAeSm&wUyEB`Ep|I@lBSn$JJ^wh?JhPD>_4aDZ9r@+r4bq6fI%lAAJ3;b zvPGnWzV%bQqrQHu&{XtQ3gl_2$JgNC8nU2Fr`~=d%F)VXdyDWxMF&r~-F{P|Y5 ze|towfa6fzS4w5{1zc7qG!x(duYU(cih#DgF~9CVYrjgJCQj&+2$ZT(l<=CEKvRLz z5c`^(dHH#8WDkqm6}5Og&7Q`Mue{lip^^8wOnOi$jNEo-90L8bSAFO>pfZZy>e`iY zv}%3?kFpKQy0043C{HIomxMNjC@%WT^}%`I>0$aHnE5a$&PF&kEqwpr?^;}xZ;R$$ zT4ztJUUbB<|Dn!@<6wXn7}SM}hnS0h3OVHdDmSLcGeU|_>T6jAYzi9ePP8|uIZ|gf zzWastkr+GmIR6<36YkT)kMgmi?kb?|o9DTlvN&O%&Rmi^B=A5SRQ6!ZBcyx%pPY0& zrDvJ*I(0uy3@Z=|XGUz2;+JL8cK`$`Ual}>P6Pbx8GAKx;H-5&I1~W(a_;{BAq>^*9pEWc?LPE%%`ONRV z_50r4fa6LrqLhGEW z`-f&2PfiB&%gX(1*YO;x{cDNmry@J*tn7&Wa>DBujg*jHO!3l1w)Vz=(nPml`uYds zSCB6D);_sD^s`~~+*GDiQlghTWz`@5@S*495kl$yPTmu*^3b~ZvDC3%X=+9WiG1-A zdB-@LyaOZYno3`<3V5#m<@3H??yBr>+%bKlR*{KTj!q;+cfW1$AKb5w+xrzDM+92H z$Fuec`V_1Qjro+c>_ECCU~^lD2eORK*^l){5bv!_bE8!_1WmTgGjCAQgi$um6BchA zp8#}WuxsX}>`U-5Fz_%2 znw%Er;^c$nYbv}JqJRW|@(Z#A^|TyAFOiy|Ng07fJeutsd*#Og`J)vR9?Z8mlrM4S zS&O1WjjPisM6!LJ-4|nY53=Y4vUvFpi4pAPJ0H*Z)5cTK&(1{+7vC2-cDor3^_;r% zPKT+=wFFj?XU9%c`kdR|B@3QQ>p*JnN+XG_j)&Pqh;2EdTk;le)y8}-b&Q+*kPk(v zr+d+U?fhlVf)gh>95aB=jxcbwc&y>I7!R7Mg8E#PT_K5pwIz}CWorP^!M=`B^!9AyvF*kc0a;IM@NjYVGLEl)H8PY-cK>3FXxr^(i+pL)2?>w1Q7J zDcVjFf-PML-Tb}uVK&iys{zwk|eCaz#% z)2B1^u8m?WX_X3fzUyq)+I7!-C=u~17wP_j;DZb0wDH34fsyK(os`mIL8r9H96da zKi2cTgW#@$pe3Y@u|{*NTuoYCI~;OW6&lSji9#rNyU$hC8~xUVGG8*0Or=t#-UYQe zVUTjj9s&ehUS1v!VKnVpZ^8X8VwndKcLNb)Po{VRbV(lHAddUrSTAkuPhINw06T5& zPts(_em&O4#Hr$f7HTIMF|vjdNhgq|wYHlW!B%kgWNVIWtA4R|l+Y3WMjmBGtigZ_ze`8N<^5R!Ji9VQTWG4lxx!0NTx<@ z9T&N7(4$|)`ls@c`ttI^HCHha3!pSDo;+`WQr2}(j4t5y6`k>j%NmnpItr=NTYY@6 zis5g?=G(XuD$SOQY8PBY-;U|Fk+7N?T1S-T__)O^Gl@)d(0MiqPyY3CO2wrej~&;f zFXn`Mk<|5q*Vm}6Y4$}no`K08j>eBZD!vDAEng9Tc7vF`h+oi9i~6DyRv9~cAZAY$ zM!W}~OQ(PHm5r&igzsjGyr?lURwrfXzDr>F;0gBvPq?lqJ{Ob~*kq%`RRUO(z7qZxVG4`8H)4BOK%i$Dvx+D=Q7o-;ybGw8PX8J z7YHUUmU=zs#->=Cmd}bdA8NTKb+tijrqES(o^PhO7%Qmil?~l5WA7iN*AJve6UWhV zf2O$pzduuS0w`#f`O6t3OcERg;5b$*?=Vgzgd%yumjW5q$18N~IEj>o;S7`xD#n*5hpgo*s%tgCiRNpSmTyijbK;dLF!_89x-549=P@Ywd` zZz@!+UZdEvSFq%%p*{+OsG2ZA_ZzE^gsi zik z%Y(V@puU2SV0k~M)+-Exeg$Ac7#*GP_}1}4gQCL1cV0z z2}fW#X}QDrE@0qL;HGTi7A?ulFeGlgMhN}}ALY(BNJgYvxz9S$Uj7uT^g{v$Ujq?M zQja5J0*c^&+D5a&Nq8!&Q`GnKmDPzxefoj|L-b!x7t^qeM^|W#@_c zzXdCx65I~4e;oq=Xd|vD)WPfFgkSTbtowrNh^$))zjx%(a)0rc%f*|Q+moW-Ncn^k z^%^_?i6X~96hA~bU9L(~Md%9SNZeY}Z3QV!=&WFPd9)+_m(`aXTSi$&ksL;DLOVq6 zNXM&f7}}zzyYhd-(BgV=-8!YJD|kJ+*wX^>0hxQmGsu}qLwEj3{0geY3|-F0PfV{u zf1%JoRDQA5lOzpz5ci&M1EYquLn}}!t++aQ)TXK)sYmVP5#|YLfb$nFp`ZD84)z6x z5`c%6(5*y4>Xb)OwAMGMPZAH*HU4L}reA~RSs#{=EjxtNWQF5<91eB1i=$1hmR=RsKl~L-Cubp1%>V?aNN!cqw;43lX9Yhe z-6`N}Wuf@RqJ&<+44Rr`VssF|JTdQ8JX34PvJUe8$w4DyE|K$ohWJjVCom(9Is`|K z0!m)U>wa`W2D{Iju3j7}B@u?W<8ur7-RMG|4UyYTK)^Mf4FlOZ>!|_(*5??vc5Uir>XGFu5Qr*wK}`HN9+kLk=80>d;KIzC54!J^J3TAb3MQTUPk=#aD)# zR!??HgdgbPa<}ea3R;4xp$AqWgi%Kd4#sFH zhJu*Z+6N!Yf2{V~NZOz>@f*Wn18t4WG{&^Vj4s2wNdqyhuPS;mREcp#83Zsvh4 z)u88qyD&6IsCy6#&A)}P_vWp1mC1bwDpy>tBS%Jexw^W4hy)@E`8TsWVz54Ui zkw7*ebCjbKOJs~c21?#Xk>0;*5Sr=s=n+kjKwC+iIL|~KZfyR~^!tGxET#e5N+^ix zOmyJwR6{&!@RBmXOoxoEwkz9F@^h$L3Go@s&6?lg6rUzpKKV1)@Hqr<3sZhooNY#B zOi86RW6vcdbW2#D-!=XXTNihNl>`nW=_GP$ytD`EHWi)^ACX%jCcL$hD^GmYW|n04 z$VBy^mpDm}5|%jDZ^ts23~cA-Xms%~lp1T6z7aA}+rWFFo1XMw|J4|&HmhLtO6Zr- zq1ThTX6eE+`KZFBn@ybRJi&W)u2oa22?^uCkV9f1GZJ$GQ28wcD%~Ar%t-a0*IbaagqKs5TJ^Egme5@ z`NPvw>1@#~3omCcb(-OpA$r(Yf(^75LTHz)#ibEv@a;-1d?Qb$+(hXQNlCNo8Ps?ki)W9hL`l0|i8@jedlNhh z%ri_ANfwdO+V8M{i*$gZ@BlAqfwmr3;JKbMeOM}K2T?czC_I(L{gc@Spwa5f1+qrT z`nDB53R2vW(S+{EXoW-fsjxN33i`gMBPubE5^2SEVG|Y;>s=h|K5A$m)?}!eLw_Kv zY2fmWt8bC^h@_GVIehwr9(`yb3!nY<1ipzhg~1@6?tEfy5o*a=*n!TxPGsAf?fqpi z1|n<}5Qdnb8Uo(&@SyiM4^8(+WY?x!*pD_88QG+ii1<36Z?{XPB>VoC*OLvI&()Jm z)zz50+7)iU-EMsOnF*G|OC5KN8A7dD%)a&mv-C}v-x5}!sKwfj_u_2p{PFM-J}G(( z#%Q>N8s?&){`4fLc1zyR1B@S7ABE}GW%aEsiR60f!758{@<~Z1O`++yNM3NSICC3q z?4_{T9t6&2;L58zS7UlcH3%S?Nk~So@&TY*b2$cNc(?lT2k_JxpO_9bt`kbQ6^(p06#cZ%F-Gt+kA{F%{r2?<=zKV;FnYvzl9qT zZHHu&5hXZAaoCpZ+F6lKBI=SgPQWfJ<9GYP(c>~Rwa70)(B~8&p{1in9h(fNHIufL z*=QZvHkX`$A*6ysLPAo7QMNohj2?if`~;}n^keP^Z~5z48`!V^m27mHC1QV$qDs12 zwSstAdS#5kEXiI|_JX_L1&&2P68s8ypAfO8I=)2X6mR*Iz6&PnzZrrNsgK*YISth)1F2(@1=~`$#w+ zIxq7oM8a6xZ^Lb~>G*q0MpmMj$VEIgFjSjC~=pPQwUX*_Yslql^ZkW&%(%7+qrz-VSnDX@>;UvB52^K z^+`&=>8jo8zM{@5q{rt9R%kD3jli4=GWu3AJ{@c9yS=a-Yc0JiOQ-1*vTksO{OHn)M$NO9e$PPuN!L+FMn@v!A20lu$8w zPMjiqOxInvO>;Nno_kAPD1!T3hq5)_$;Y&*s69O-wy(-zo@Teg_c&84yT!FrYoVQE zj`ui!x#D~PZuKp3_n<|FVs zv(aB(L0?k{dOohqcWJY$cjU95Tm$Z@G&p_})%TZ>5Xk4JfzMZ>u&w@Me6(rJqrhjm z$Ss&5&9L-N`s-+s=gB;1b$c4JZ&;XvXVtDOPc6i zaRyFlB|mpU?~IyANQqNi-r(|6YL~ss0R^6TSXP)^v>5vbSw??S)BZL z?V~2ObikBH%MpzRDzd&R;Y9Z_*}=1%+J01bTuvOAJLDPoF(b+Uv+glOD@r6^rWP?# zpz$+HhsLE>E2WbCIkip1f0GIA1Cj|{h|K{l;0Fm1ScE7vJ5`*aHfq$?PRfg(TP6|7 zHfh}|E(g6=ZiW%RGo@5GY#c@oFsv?GYCdKa`>u{8o#xhHXpGUhBsZc39RiTgUa$+$ zV)ZJyU+UuE~+ zZ9DkSggc`-82e16^YMwhWQsY|Rh6Cbf#z>%ruVY;$E1}2kuT^t%9%4nG{^Xz3NeIU z=KSfXkoLrP3m+7T(aN6VZP{1t5SQyc!)kB0WN4kz&y*2p-6ABIzfEP#@%5iG9*e(B zh7)<$YPQ`R9^=|!Xc>0VV`(m~mWLa`f4p#3Z`v~i61(*^V@{>7)jG}(PBVP$g;;np zyE&V=CIgPcZ1ivr-%)2+q$-0QCkz)>h<0Hh8RbXvoFJ3hTBS%sv>=$e)%TvIUzC64 zL-R@Ee@ECu<5B$$Kw~68>ka0(Bt!6Be@+(kk zG*s!XwKdw>at#fA!stgddW~R{qSP%G^RF$EqN2hoP<(uRbY7AB#C;sbwBrbqx#6OX zY&+18mI0EYSD#0cd1|U^Jn5hJ8V^|d$NUwx>w+A6f-}Jyf`@07$ z{U$RgodZ0dBiumF0J>A5NwBxQ+VeO0JIQs(jwidS`(8=3DSu9o?0tZ7K?3znR1jvyFLQM*HQ(0$DAcZAc4_;cYnZM zM8%2gzU5yI6tp>&8Bv4RaQeR*zxo*mW*${pM}8TiS7)4|2zv0q$5-f~>~i z{vdZ_Kbp^B(+KXO0ZV<`lAi`opW+D0)Sv{E}RJ2E&gjJ^t zOVp7W!Vrn43nNnKne3UlcuaKZ{<(YP&aV# z!28UnBYb%&DGEi1%!K88Xnfx4!Vph#pjg@;-5ce=r;0@2z>8F8r#c-b+_g3Sbn6E;rApk+sgsqUKP0*4p14 z(B&~y#qgt&k1DnG(76`#@z%$Zx;3vyCC1d4CFlx2J99`#9fZeQS#J-y$oFGUNm_)0 zXS~E)z?Iwk8-m6cKT_yy!nx4EkS+&!l5+`?ns<_@U-0FyGT<9cl=Dwv%0z5ky51i+ zUyuVg2OPNis(KS})4S99pO)l-Yl?bFN)(;PBjQg{+-OGlaX)e0JdK``mU=$ShUJxF zY19oJwCh>))`9WDW$;5TPoQ9!fo8KLLVJ_aTe0-(prFx~SGXs4#3MH|R%fk;D=QX6 z!aN|M$kNf|k3gAU7UVfM#I8kd$_V#~S$TVOPW2TeNNZri!-VKbNV{y8abbrLR-q=e zR2fs}3*%Vnq5Z*naK{l?KukOrt)I+haGF#me&HG^$^4>`5eFyZ83LcFvOa3cyfx6m zKqJS((;lo~?pNM5Fk)c>d|!*@!A#G2Y^@+~`(NRH{Au^4ohc%yS;_9zPyVWehLt<; znS|dyv5ASHv<^q_6FTa6rI}Qwio}tJ>oEtUrUjs;IA1;oaM6dqmWTEw>q5cBt6udK z3j50GFi@Cq)WxoeD#jvIBebi9)R=ctiILKC7`~D@Y%(KLd;Ybrn$Eky*!#0q0rKO& z06+d{NkQtD9qjK%ULmB7j8=7j8p6Xh9H3 z1>51ZWUiQ#6eKBRJ+!xXO{oc1Pg=290H@d?@om^L`)R*)K--A&d1<+243X#cjtTAh zQ;#Ql;hGNfb;pE1j_PT|bd_qVf;Qjk1dOUm&iCCsJ-g06+akr3$Mye7H{9L5ltg6pa|{(Ey(Q$E7+Rc1}ET*M*((I%V&pXa7JOd@rzd&US)z zyy2dH+k87(DsW^|hcFDzwBY&pCkl5=u+o4%oW}_uB#vuu5G&oGco@q z;R)6yo#k%KrGEiAHO2)wd!L;EioD{Y0HGlPn>A6)S!`?OXHVMvlvN5(2-J#^R~YN& zyl6A@#crwmsof7zR%0NlzX7VNEII$l7*u>3rk|c=XuiR-#?dlJw35C%66e;;`qV=F z`I5IT(&|7eVbwKr_N7%MdAx2i74*7uH8MePgb+>zci&bn*bF#CMNA2HvKxJT{>?`T z{)JSS@dcZ&gijRTzhX<2|0=l0C|mbxVK)6!`~B6k2qI|_kYqr-A_!jkaBI)gv{OA| zgt9$4iM8;PS%$_f^yIzAgBS42&4J8|^KNPT<%X{aLv`Ns7jJTDq4o!1g<+9Vm*uSs6>(#`@7Sodi7OT+={TzSR;9voen!v z*hcnvW!PT9&V~>`mrufX#VK1pM||R+&d%JU0pFeV*~e#-=Oe&9Q`=v-F+M$LER2=P zc(c$S6%o|Zu}9qb`$VCENL&FVelB<-{m>;2|KD|q23BjV)$s2r%uuNO+0*ePk$G+& z;+8B7+B1`YxFvQVZfT=(qNz;<(pV~CC5Uap)_^c7n4<)4=H-seFYMJgKq0T7pzNLZzv8--EcI*wzQKdij7bdyvX5M@lFz@-k z)R!e2Y=JWc_suV^o~Yi?*-jBccgJac@$D|=jP1yFjf3^4oj&k~L8J6=jr*v6(llh3 z2DaprL%x1b!iw#6sh?ww6&0**>29$^|H?i4?+1-qvCaH)sP=Pb5g*F}gmUkrmO>a# z9tF{pOtO#!((yXpMJ;825Kfw@lo^)DJ9N}33A`)vrg#Y)EV*GyGI#}Yn=ikdI-FmJ6rf0i5m@5#U)JZ^*nWUApY-6H+J&lG9t>BE%6rzss! z&#qpbF!x|$65ti8pPlrgGCV5#bD%iXovQ#OE2)NtcC6W>kg{CiQN-um3cF$7Ei-7#7Qti7vZWLat&dg(~?OC_%}R8{ClcM zZ;f>}Ss7(U2o-pLasCn1l6KX}b{X+>nhJQXYEmq`E^O{xJ&ZSwEk zg%k}oJ63rmVc7q-@AvS;eSU9a@KxHAwxxc zH%46l!uj`Zz1w5x$Z8;-8DcEoQXl&@LSyRKdN(K?jYMby5lobYlMKxAA0tHVycy2K zI_#Px?3xyFak&r!o8MVV?`ncOhXidh`3l0>32-`Adq3RoGa#lSL}w~dR@c8qdD$mZ z^!&|@Zg<`5h9X@V%%}LA@;ttB@zUIt>!koE4NlM~a3=mB^F2rQK8o|J0w7gM*E%TP zYPxTaDkVHCjk9RN$N9T;ZW@PTHno; zsPr8yZ8f2Okj*FQ%Of1<{xR2=ls3sH)vvm7ap5JHn%cQzRyx`e2qb2)5YIU%%J3!B zHSf?U0YA~sM;>)%cS`Oo2gaQrh0~V8_Jdb^5Zyt%n~#Dr6*51ez*D(!%&clhB^ zM+l^jb)b%M$qP?#C!mhI5vTgh6&AaIAmqC~Z;|~z$1UEU;1v~Z*UP@iN7;48 z4^b558^8urMf>i^`#yW$Xt%>%SYn=mO=_EUh=(6{rFG34$)6|OAEE%cu{G4n9+X+S z6wZYr=R&4c)hj1>+H?9c2P~(GRO^Jr_x=e~5k$~;K#;|ey(Rbp=z%o_<|zr2>#iv7 zlu5W$633%No9=ayo}Z(=UQdlAT5Vl~gR?Tk#`5fwH)+w6r1lK?dHF5;F1b) zh?y{rDR(8yIX;5?*f4?5)JA2@BvG)Cf)R$D8oDY~^nL%d?kp+; z2}fir=3K6s<9yGAHkUI`@+qM4dSNZbb`6N;8q-{rT7YFP=eD-$bBs`!cK@nVY5zoI zv=FOp+A=WZV#N8oji@hGn_nn1doALL>b}_QhzfL3yUWfwComY#B0tov4^sCAP`3a+ z8x(jdNZoh%15YoZrIXX2#<#T3etiC^FncDrDif;?j9W})zWuzt%)LEQDdne&d0ws>#6nIP+&`N{_JV$*7fY$QskJ};`*uWlAQZ}w)Xd)9Uyb2N4y_}dF5!O%&nu);U5FE~tSU}n_k>rys z$7Psl+O?rF9TzCZfpRe_i`r&p)uOeY`tLp63wrmuV?lIp1Gn|MAr`{dAu1!%g1mO#^d-x=;m; z9cpHtskpF&aqJtR2cJU%WcC-`q92h6dSaigG7xDGWV-bGm-Sm3{Os9gtJ7R{-tDtU ze4i$tB0&wgWgX%2$|T)`FU5}aUS|%7&K*D}Yv=;;@4@PQ^C#)aC7&=myUMj`{p2%A zSVQzO1XOOQ&7*{USYgp^R>BuA2Ii5J2r8W2N21L1wOidX8tb6nlk1Gy>pM~AcWeG& zkhv^8(A`k$e{x8QR-Zy1ByVIfYB!FJ#24$7v_^~bfhbx3UQGpvnq5Fm(1j%icph-n z)Kw0k?m%fM_E&Ip85@IQ=U;)yg0A@Z)A{A=d7qRU3CYcllMRDzY2@d%?LugJap&#) zTQ{c!dN-IFbLNfTceB3)nQQ}qZf34W7Gt>wbjEg1PgjloUUyfohorNa5L(q6a0?hy z(NVF)&s{W^8Wz}a7@A96ODxfAxN)evK9;v)CPr(Y!8$s|^sb)AWAlv^-~(&qo&cNz zwAT+K#&!_-dw_g|P+NX*E6|fpbC;8Lhe%60HTSfAB4*=8CC`8REs{Vj`DE~!SU}@# z@psXf!YZX7D4LV@5j7~RJI&1XWZ%8aczc5?u#?AQ2q(N__B)Ph$s&%f#pRNwKf0XA zIxg?P;gwc~(LQ{yjDhIb2XvUMVR1h+injkljpFYBCDJRW(sWa5Me2Am86}5FCOLyq zq>ae`w_PG=fYRQSjKh{Cmvq(S$e5Xe@s8nJonZ4nSZTlgsBY(W-{Y6kgK9+{XldEi zf7(%X@?P7-m~bI=_NiA5@J&2_MwIf_n!pl#sRSV}-8IWt07XM<73^YdILI$xXky5B zGZ{53(X9lw@UT#;QP=MVt+RTnv!@9e=ADv$l==K51L_tB)XcVU0G(I`LZVK5mi@jGvf5z=$GgS1Dk|%-0I~h-|wTl%``$D&z+N1$Fekcvran z8)RU~v>A3!ib#~rTggHO!fQImF$~KmB%fvVMg?&`fR*{9PYE+rT?={Y^g~&4OMVf4 zAf~B;5YuvJJzrNj4CCtqXl(rWd`rlZG!Amft*JXM_WDv-7BEjV0{X*6d6E8dECi$f zr3rOPgYj^R_+2wp=U${~4g?p!BZ7&CzIlTH&$KI-lGz)VNdK9^LJ*i~b7<``du9(sP+awMri!vF`3$j6z#6rGSsU-M<2q zfQb_)bvyU<^>td9SoZ3xU;MPX5Lbp<7`W9!V1Zp+suQ;-$wG`!5gdQyMoiNWmO0K< zRdEW$LyGfON1=O#(y>WD&ez=PH~l)bs7B?RavHK<^tOXsJ!>!9bfpUQKf1lU>7k5g z;cWZ^M=g-~IWfULcNdbJ&3Mxno9_=4?4kn8{p7h`#-HVE1{p6zWF1)I3>b5)CS_DbCGY9t$R3Y9w=_5kD206lnKqJ?$P zP?g{6TAk8ef^Pc&hW;`f5w}wSE+#4P*1uF4DrvmVUm78)_+z3QS!(1^2i$XZZ99d{ zd}xUoqj5RfgnZkcI5_o}b;?h)`V(*xb^g;g3jIdrwDdhYXD)k(L4?H&vF_A#SEVk| z@=7#`PDUz_o1{@p%k^BX^OKUce9v{k&@Y21aYs%5Jx|T0_Fbhldk63zggIbl2uu=J zy}$6d$zi?B;tzSelK;F|@#p9iL;r^I9Z9VaYL>;YO4`-C55AIWV-vn3;`~NgL-mnUDHYBA%&fg213~OEajbs1%qJ%6_T$=wA(`jQWz4 zBTIvT{n_xQ{r;A|2y!nv0PaQP7&QIAAZ33w8<2kQNbb4~AtLWm^(OaA%y0H|7}3XX zo~5)@Q#iVKyLeH;I)kyoTY^=rX8Jrqb**2|AGvxtSXz+IA?!aTRd+l$K%ChYMvWA> zG~?ebELvpnq&2vxzwW&yDXA1Px!%yi0R9FdevB7&Z3g=DSN7A$CX(4_%&)wNl5Qe~ zEx}L@^2}fzB@1A5z8=ZHG;dzi4C_|~GsDez*zG<5so)T(pzAy>1^n$FclBS>6_`=* z(YdPVnSL)?-O{Z-oF}=N?^%?al7PuqMU+NR*LeFUiFl|k9IW@`ay^Xw5G=@Y0IHjoy@K&4T?>E~= zfc|)%FzbJ~)y7)^#y8s10g20n!eK&R#LaEGYmAdeij%m!Ad+{F$5R!(+nC#8hMx(% zmoUV2t5)6^MBpN%QF|Y8-MPGDyH3$VwAk0w_%_k2D@tfxm@cWH1q)H$%7U|p@;w#v zSKpTrm;vKN`KD?bT~8&N5`MlJ9S30!_R0U*+{+7R-l*7>)P>9M$OnZOe529f%l6+V z7(!8#nK1*bzhfHF(KSE5LM(2k=2BekO)@Lrj)r|lw0K_|8c1!&Ky8gy35npgf1Dd> z`8D~8iOB;Z@AO7`m+H&C{v%}vSsrMNFw>%`ni*L%r56w;5eO8XPAmj`>AidH4UE@b z)~o!K^ytW1w!{pn_-PHDh#~gr@T_e_iLl5U37f&`E1qRqNR~GPY4&4~)D8DqNI|sx z0JL~&Yk&L4TZ>-?Gc#g0!Nl3Y?E<><1zGQVgIQNqoG;_e^mZ_pssEl8pU!*2SI}8`)!R%W?U**0YR4a?VgFW?XRCXQV6jZA)>(sb(5|Hu0kE6~8<-$%* zp3T`4EHOP2p^<(sixouH2_Wl7ZOr05eE2t_d$jnj69J#`N?OrA6~sH#N?nvL91xAi_#S^87Nzsr>8A)9OOFm zHWFFQmwx#ogIH)F)WAD-VrRMN#s8)?oT7y1zvEKFo12-5fwvJO<8-fs9-y4?#{=; zmMIdR1;;QnZcW$q|IF8Sm72W0U>mpi{Na7xNscmdbe#t7^37fJ8c8SjdV>na&y?3K z!xmi_xw@A$7uf-@Mo@#Z>{so+-mqcmw~X+KjbW(>uw6*moRh^Y;hD5P4C}}2#0n@~ zjR6EU!uE6|DnlV<+K*P#P>14?1gQPbvYjN7qWJF5tUkygI|mNg^e5-GU#?8vhpW@$ zoxii)MA-JU?Kw)64tXVOmoL14!+?O@#)nXZK6(p>Qpv9?aUlykK6wyD!6R}{7M_f} zc6(zR=7MzNY-mGDIO`nYc|!8aMO_t!EV==!(r0Xn$MiMZU^6v!#oF3h-8^`p*5J*y z$hNf^6Ld~A-?zGn2Un&oh_(wr+ZTJuWN>njFPFc})CcFts+Yx>KNUoh9Z@xX?9vaLwLiwHz77e|*+ds$j^{q(ih+Y4e;%xUpGom~L+3UrEnY{((|{s&+}Mvk z0_9ZkD6B2d5+>M9{ry``&1J`J!m7*X<|m&;ogvG2EEN)>u|EcIH;`f|+O(kEJpWME zKF2A~mgYi(3I$srIQt@GxUUaW+P)fJeW(AKc>x!?TiH`?5vy&0$1umWUAxloeq@xK zKD_@Y4OZcK#7gaaP&{qi-Zb~ZeIc66U{WqpOt(>G;?;HW< zRS1rZyuF-EKCQ?$MN~w->Gxi$DbGqdrcs4+_&$`~Mf7TL|8VUYp;se(TM3OJ{j0TH zUSX#!z=dO^OX^JN7of$F_@_;EETyf#`nAPB2amiJGJ8AseWjBOMzm7T1|#j84S(aW%iyut0u4gZX%EcNlNROQP6;8pLo zxPgB+MKIoS;A^?JokCbrJ$%!6q?cUbUf%B}bL0&E^s7=bg7%nWR*|=)HWMwuzRA2A4*dE0g) zSI{$1F;j{7H0sb27frT<@_-v!BDIU==2f$Z2=JEJ87KvWU4Z{zGR3D`LX8jOs1DnT#`yf z08niWj{vhmQ$NWvIVz{Iy;0FExq0L+&iDOWQwrv7ZS^oMxI<0Yf=}(#%hH7cGv{W6MCtJc!-wgl91YTCTIrX+Ev_YgM(EL8D}E-} zZ{V{HM)yG?o7fy6ycV+1DmUe@?9v%ZsLFm-p{%U!l|3nOFMOK)UbR)5efB zPL|f<=qY0mD1=w?sZdbK-l$<~PsFsZh&;RPI|=idt(qP0E(LIb=aO$C$P5 zq0rZ<>%!xm;L**B``(p+x_@4}A+}l@zb9He1xv2jDQZ5m{+S9)*pUH)Mt;Os@}(1I z+X>cOtzSTJsj_*KC(+UnQV#sz*s(Vm1fng^@9%**Aosv4;2yY0|0M4ZQ{vsE2Gtzk ztr-mruHMq#9Df0q7ufOE^!|8iQ_yyEd$_MROD9g+hQQy1_{lCTgY}7)>*xZt#`^Kw z7A+PCMviOwIY{SE7s0qjg~D7c$3z+Y(lI_0)!Hvg_`mj{->O5qM9OlBsT3EHyf|;G z9BzetJi_J(mgz@}@b}F%7Jt;%X6w2$m1=2{)YKj| znfEpGINeV@B1Rq_sw+Thx&~_MNV#bI$3wOJ9ZzkXP(ZYNT+aseiGxnN$7Ch|>VkBB zU+;u{r0{f({Ch~z&r6C?YB#&5Pq79)pBGkdVZIhVP_?>|D_x+TYGrx6Cxi8d<|wUl zgq!^+eUx4#j&nA!Kpe*XMR2(`Q&L)E*=ys1cVLMu2Oq0ZrF^KqZBabg`K1=Y0%qTtOdF1Qy>AIhI2%crF;N4zu$- z<;AON!+T3++EK#fF*`G71?k)*>>cFm!ZvV)2s_7R>$A#bOPcQQ2|sUDTEtbi046yj zBbM~T90Sd)8x`Njiv!^uWxdv`$B_E~|Bg%c((JY%d#H=CufBehskK^xW>&v0jPzdj z7>Mp$KzE`YaTxeFkf%qWXDRrpAa&q|V#iA$4=-kP*0%8STx&lk201pFQklEbE&&2V z1i!T-3I6prbO9LlybYPwl9@F>vR6xA$HS@;)+fGFj#9b%P2ziS`+%1w(M%;9+c6|; zp0bNU(LwoGQ+sv@LD0*2>%|mqDi6q-wm<|HtYXKw$yYC0qjDYhkoV{cv}FbmB>S`) zYl)k*$;n5i_Yo@1TD=cKB(FMDS1Ut6BP~JX>ZrOPSrtd@S>5Hs>9pn@eR9;_-&CWL zgwUEr*zCLJAJg~f`!I)I&8FwWm9+>`Iv50i#1ODl1&@6w{m$-6dGTX{&pqSkoLJWc zzoP}|8^`P7Ah8T7Nd*);r@HvmvHYHC)c|Bg0&8v&p5|Q+Xs^8+PKVt$4rQM@S8eP3 zm99^IvM!nk$=})#2Vttqng_mQtuOQS&Rjj6;1jquX2RZ(tvhp|Y0IMCm~50+EV1{Y zvI{W$W*Ln13T&u?up)^==HW5@07NS|pq0E^13=o`&78<>Zor)NGS9(A+oRdre2e!o zpSD6Yjl*5DFaX=DS?xbajz6tNhl|B4^E0t~)!o_(vIO7m=|yKp>qURtxqaa?clq>K z?>2?0TKDJsW&+z!C0ebSkk6r9QTj}crH!Bzi{Y&_oUxhtaIFZ(S(Df6Z3kMP>Zb^K zQhnZVVm~#KsA<=?r#jILpj(PyIE>QB-_9svsX^5BJ)5_PoBlli^c(-Ou$9mp#nM>$ zHazlr!wa(wn}*Lr16^wV^}P^VOLk3A#QjeXzrlD>Fh+{AJHaMC<`S?G&I#9ye7(X}bw!&KNi0q)>k6Bcm*ZD)l&Y*;H*ZbN>&dV9JlxmX1usGT zu z-H+}c2?%h*tj6+$J7VSccA+0VF_S*3`Y|Dgv;Tb`J3kGtmubfB%l!Px*-I_ns=CzR zbW!j=EwcgW0LJ$Wj0AKmev!8jC43cD#C0gE(lcj`p!>4tOodcfhX>@&uL4*%h^n;wH^U!BAZu znHT!f?r;z1X#Z=r17XD>@NH1D_+1eg1Pi!DxgK` zilICTMTPK}nO$!4+;u}fgCXRnbuYalng81)5w*MyVZhV}MG$0UZHQ9j3%PV4JDhkU zVWQM_dsy#eM7Wbha`pMeM~J+x7-JI?%J_nOMWqu;!ij7D2pR&G_~?e0_g`wHAO%4I z1vR*18vNSy|I29}Y)V7KjndVxSLm%gVuz{I^xcilXxInY^CeonOElr9Q8XonAtZCy zMw87TLZSfkMeM_{R~kQ~s;sV-hy5HSGPk45seZ_sKDJlN=GeARCt=8bH+F$^^`_$G zQ_7!?-i`x0SJO@3<%Ty`m$Ia{V~E#r@Do_OSUJCqPg8uMdAv2)Y&y=XzUpg>N-X0* zdU2b$0;e?Laxj9b%upN^v%8zyLc4fh3oA%1&_FG($Px$tu~0gV{$XO;Y8O~1RTV6^ zhe`BCe8!3T4D9~%LLi@q0X`2FH}?d55ai_EhgWEJ&Dkql3odK-C^&h_eNj@0X(p-D z(L7e~i3u$iot%k$?Y)0Xd~y{ZtBe@kqh}sT)k`gEB}q499~STU4!KDVYGArxeNtYH zDdt7cu6^5!`VE$`AAOI}vHe6Hl!Lk)6{cS&7kJIkzL})F@lq|rr%&9_Z7$ z>WO#ZOs}8VWk15>?ml3&Vtx57z1}C)F@+Co_WALvZ(GlgHRPGvU_44jt7l|Yxu|eA zRyrQBax}bk-+Z`+6+y~`1e*xQZ54hz#em`|zTOJ8XorNh6#@5A?&epDTn7;$7QC<2*Il^^!C9Pnj%}5l!*;am_II1><(hU;j`$9zPQGgS zQB=;l6CRhq7F5tjn=iY?p3|g7Ykq!XVH^xBr?RkSK8E<;Pg(}hMu}*aDQ0y0#iSpL z?qj!X*M6rg2T}7wX%qYar)8v2!ROTk?JmE9$53|PT; zJF2jsdb2M73z|`E<-On78jKYG>(^BbQ6X7StFZ^l;&j`Lv4iHl*%*>x2F-# zymbpDvfv0>wLf2vqQ-PB1k2^pC1w1FLY``gv69`^?~=T|s$Zk=*ahz5LK1>!T-m9!6O8B`cR!MY7i_PI{$@-^t$qv(W z2F3~zY*Nw4YkwTUKLJL(-q(qSe-Mn^qkmhDB^Xu}COCVzca5DRFh`veGUr7J?&(F# zqNS4}Xz?%66-BC*=J0yi;6$3?bxF3=K7C}yeD*7K`HOub>6pJ_f7E}3b&*4yG++=AStW}-w9sRch!#k#`SG!BB?r^<=$fU!VCm)e_F`dZXE20*e$Hs{ zr`TUCwdQgw>cy&BfF%b?Aej0 zc_pezO&G(%OI7n1`onhv4U6?9Cm1fk(>SGt5ZlD)07H7epm0Uegc>6#$STI^#P|Iy+RHhx)lOVFXNq(S_CcGQ4v0nM*L#tojMj${3TTqLY00Y*0V5gtV~JDs+&=^(qByKNVNbrOs*?8HX1 z^@n!8j}MO|wjiS60nzPzXg|PTfjm<9n%-|P34EBh-kW~}dn|_W=&_!>MF1ocAqmgR z4DpdKVI-YvTlDNUVfuL^x#AO{KFI0#;Jsp)jsu^??0&K&)N80OgXfxAz@M-!!Ao>= z6P6VqOiyVG$OVJRc_u`+J_vP|X3Wz~}ln!Xxk70R)>ZAz~f zncIIfIPCQyRVIYsqQcoH=)Z8T#(7F$t3Me9cERU{%cMHLbr7QuTCMCuJfB0(~Fy!)>QNkW{;KTMvt43T<;_?Rb>T{Z*Ymax;?h5fR2kNtgUMxHmZIun z{K4_j4pJ5hP?m$Tq3ADz{9j!TkSad8-==>pI#sI&g#WQ(lt+KyV$|H!bNxJ|j`9{W z$a=fs5MwFTwf#2Bc-LhxH708=Q;e1x>Wht@1wF+Z4)S7d7VV11&-w`kQFceoGVKQd z)Qt*F>WB;V@(3Qs5Ym*ybyo`{=fjuT7>FQLK+r`uLcl+A@}@ELq}PK-^}Ox5vtF9^ zduo5IDG|R$oK7w7BYJBhMz`R^X4UYCBH>dYA$VUEXW*NC*e?~`q*p_U@T&G9XkS|J zdmSD1gVy`9m2iU_pJT%Xr!wNIsb+ZvUZzjIb#i)4?62!W8bI1sU2QO7x>QsM4Ih+8 zgY|OH`7L-a$y)tVW6JqsL(7&`V60lep}|s(gJ-%&^5%fRN?nk9M`7G2gOsLzxuLftYm& z*uByN5T)pV(!f$v6L8RJupbSCD3`5=g6S*YDOFVkh^0e!6a2-8PlJ(x{r-mmd|G%y zsqfElH=1c{-HDMyz9S#HsuW21q}GO+#r^OL)W}2iHFhw~>(bBOc1WA#(vUlsvdr34 zG|Ux`8C^+)g}F|(H`}1;%<)WDx7za@gVCxu=ynAz0`HtDY#k=^4+ zIfML}#DPHUAY;R|gYsX2w$p>FaBy`=rS`rAj=^4!*IZCwr~i#eq;LcI>5fPwCQ2MT z%3swhsZ@eM)6wO&GQ|0&EBcd8pFcpfCCFWnt@~;7i2yd_$>IB{ER;XumYaXt>`vG; zi?+n@Ie9Q9P{3CG`09pP0vr5y%eN=wF?K)cO-YppfVTf9qh7w8fEUfe3SLSus`9@! zObw><6pNHgMb=QuoCY`41hQZ0hcoLTP;WFV+CFVxV&F)JwtG32r(J};h0rG`qw@qR zeHis*{PXeX`mfzmF9;Mb2-q>Xd0S zTKZyHhozKBt;$$G8h@$_!$g;v{jrFFo!v1ZUCa_UdV`6lB5h>uzL-2t>CR}b_(B-& znzQU17N0m%&dDHg)bP7^h*FLDa%>qtBn@#~He^=sTAc8_p&>MN^zCYMH}c21|2ElW zlF0FgBS%F02CxPNEX&-^utJP>$-#3C%0TX-G1YUMo%J17vBN|BF-QHOxyBOXYUW+ zFgO(tbyXZSIb#72EB95eZNl$KLT*=32M&g)<&jR}E{(p3E zdfz^=u?co3nKHWa{TFe|RX?Qk`oF4~y$&mpdoQJgZf4hZ~B?jTiD$ci6)Lt-G zW2OC`$>u|m!6(~?efs1dO`3oZq_vi3#%#;1)_TX81sFq5JvSdb!e!f9(^HuK8|s<+ zO83LqzMj727q!K|hOjn0JsA;T7gwmM8bw^Ig@cu1GwI5A z=rv^yv}$M~Dt#h6!@<{n8DtySUx8M>|On~t`-GIa> z*`qtCP-lc%%C>fF=7v!w;|rcUAm&{rc~rD_{%e>N?$=NK~?x`2T2o>$s}cwp*A* zgOqfG(kUU`NK1E1H%Ny_i!?}gcQ+C$-Hk}2bV;`$@J)oh_j2$3Jm)>GT5e`@v`PntkxHrY69Fv}*=Xo->Jh1}#_cNX7dbHH|HX z#(90e8K>-;puW&O zY%efa*bf~^2J%c9I*&O;Q_zteu_4o0?4MLrRQ6htU_Rs)(-;=R?nJBEFdyA?UWQd1 z-d0r!6_8D)qbRDGq@Ntu;dgpU75@qz)R?(hZCc|&fAZoCb*%)07aPZGrA=>o?&#IV zd;)DIDkGd0Us)gTsl)UX{Ru>wE^YlwQo-c4T73btQTOj@LTX${70C(9u%tKarf@Xu z5Q4!TNH&t44WIL$rwiPsnI@RmA5o;rZx0OL*odH8I2_d_y}fqjSM!JpS0dN&@gc|4 zAB4&H@bNQ_a`*6ydxk&|Y{{^JCHvam#RYnE|3XK}@3N34d9paHf55vd2kO11siGp4 zg+nVx<`{AU9E8wNCxh&Q%bcd{W4%}Fx2;FT6g@jwNw(H>Is=JGXm>EaJ#m5!tN+Rv zC+CR9Zd+#-DNMpW9@-t)Azc~{HJtB6FR3#-J>=2U)aDmHw>(@Uw8(UjH=D_m!drF! z=*ffO!vXLaA@d3RYFQ)zXQIPgEDfoL&-?C4)dMRF7bxqz_`s?Leac%5VRzR}$F zQ%EUPBuQm;!?y-{8gxQ!5&7SYyAVm}oSbXR4_YCiiMqG}bD@?-l5~U;Y~(m~l0b)+ zJxSa8l6+y^v|XX$MU2zI7g$ zK3T$1{fhe0_Iyq6q&GlSCfX=DJY`vxBJlG5aq$K#9v>*)f8lM&-!j(6QuEDsHup)e zDz&NuNovq()~6ejVeDnE5XSNG+dd219?MS|p%9OnBJQ;bBtwdA>+A&jp}fv%pXpJ0 z;{;DAbRD9Ec-1iad9kEkVQjMbx88oov^OO6ZhZJgS11bCT4*4N8Yw4KQn$O(c;F$(zp{WGqk+WqjwF(cKZP-u8%Wfs8N1gt0 z(g%|7L;FOF-z95$BReVC>Fgz4H5%YC3vRHW2-R}H@b@RwD;U>j(R};JY zhni{dw9n?fNYj4OYKlq^X8;V$9VTgWZRPN)q5M39yon?Lo54~ zHiS^H+x-+%r=~2(b%jr8d9kWa%-^q{*S6dt8v#Q`0w8;6+RJ#~;&uPuwRnyNk=DpC z0#ne(2y7T#$3unDNN&dwNDA@%xzQMf)A*mf4LOtSbVGboV7}lDC-zCd#r1`KG`?k@$&SPI$4n$4zRsL$trQD_HmG_L& zH>IU3he{x!lB@#{S#;WvtY88LV`1^b!5V@5Vz*h@aw`L8IU<`&GFbrsC_wLphGV+g ziTlSwQ0#W=+91k~@`X6hU%hwUU{-k`Q^!bA;u7|5~o7N zYFN5ICPr~MV=7ju06(ErmHU=YN-rPL&^9uUsuMD>kMUS!(clo$RLJN6IW;kg9nd4AyPhS!6Wqf(@p4i zg3qOgn75M|9tr7@DYRQ~MrDDf56-E11^g4j6O-U2YPwhA+=joI32CIP)o;zFCzkx8 z_hN=S8L+{+!Tx~fcJtoMG0`-vx@BbNZs-e1#uS*$gYJben7p0YIDA_}*2G4yvE8z& z`k@~wIZRAa8>CNfy0x_w3LHgjYRFa(sQ>a4 zTBWvwmMDz>(@!X<63NW)MHZTmink&sv!ZWX33ZgEVuiW{VWPoJ&~={C%bNpcfi4si zksGla#2gB37+}u@eja^AeS(;~S|YJVvUmP%OD7nJFkzPWA-J;pC(+kW#sK9MB+$pc zqxzT(E|v-n=Qp-biOmm+MJ5LRsQI1!06ew$A*^4d*NGb*n!q+S8alzZ5yW21i)yFW z^u8HUw}wIybfJEv6{Ret!PZtzHS89O#YnSR`p5y@g~`%JPIKR+32*&rP1fjWX!W;z z#56e7!*hotbN}cZFBG|6uOl(DLCk z#a~y9UG)U9r&%GSL>r(V(4|& z$>J*MG63TzY?B)gOJ_QxKqa*pk|K=3)6q^m7DS65&%nN6b7YYWHDkTaxjP|P8Q4u| z*CNI_VnteNMWEPK;y~OXE9&Z}=jJYt(&_3#XiIGcvO+&_#LfGgeAhff3vos&c#1vV zS6Qv;uU^t!wr!%l)&mgmW(^yhZx{9BpHc` z2@d!?&LQvLB=*4oJpuqlh-)T*K7zeT+$zG>a}IF=TI_>{SK|yjZ|3p+o>gj{<)Grs zvEsfX_4W0gzDSjw<}hJVevU%xHE{`hwXQv}J9XQBz;q5hz9`ui*zjJ1a&sE#uwU(u zYSm-Kh#*;Hg6rR@o3#rj#$+mlQM^hOIf_iUJ$DO&zhJSYkG`^85J=zcvF>gDF=!Ac1XC#{sm>k(iiJzO|XhoKZ-jtSq&X8*Q|;*{j-jx6%-g|2*G@ zcnlOa=eW`avi_|wUR1g8XFWRnBpy|9L95e~o!>S@a(|+)bWj}4J3VyRAxtb$RZU7M zqjdY>1sbs=>dwY&S>kVs)PX=Y=YSP&w2Fr6A(Z>Mbn}&9`eys#y1Ly5Q_$>FtF#;~ z>zN#u$vYruU_i(KAXw7MsGu=$Af~snu5skFhK(L&x@emHJ=*=2anaa>{c^jLqg?bK z8ZR;)CUw%RrA1ZHb=Y#DSK*pUp)j0c{AOOdeYlL%y}oHa>v_JZDL`l_X~C61 z8WEdn6&+GZFIjp2JduJ`OAb^!#D@;J9D-GQCqlc8Yna`MzIgQXAbt9h|Kui;R!Dbn zd_syHGm`RPps4`Ruut+qKtSqW;TN|JNPEpm3h}e$TRWjj7B+kb zG)()9a#f1CuS~VcPfiuv2hsaiQbc!=xIn;>Z_o@xuwJO0X6CC-#{x6FEAh^Ya@h%x=He>WD=uK!3?UEO1MG2>Jw=U``e9QL50 z4h>z!gxVMI7fNfDzZg)!3DXN6tIr1Pg&bm-80Hwc?JY(T#|Y2R5R?3mACWq+nB21wjaTy5vKg?aUUd*pH>ta2@)T4?w@0 zEjW1~r6slbS~Wzwu?ebv>~-p`G9d5@g13ESfaR^is*^8GrFLx zKq(@qGJ0W+MC);Adkk1(v^iuhLq}t<9>x}<(i80)d*OK_l@7rqF+%OBG6%&<1WlVe7J1G36p@2+gdPwT2*`$`F%un@z^5 zGIHD!GHBoStLqVRf$egQn%%-}SP6d9U}Sr`*`2jeh{f*QL10S?ajAB}4F}wFu{3CV$C8gvaDo~Xi6Ujj8z(ba%Cg9aM z^#Z-&)^+D`!O|Oy^Qd2@h^DjWu`ugR2Z$<$mqpcx%n>4|wmDh*!2d$>>BZJpkXoj0 z9<@K=tR6MS(O1Q`{moV=EN6Tv%@PUi)>WuU`yZ}C66$wpmY=v5_<3KWK>{Hq82l1u z2-en?FNCgSfr*H&hx^k1HtET;f=XqzIb55&4y&-?$#C22H<&;BEp z#6_yBt78gIpt;$%r(ba1K<Rgynh3ql1xco*dyu!=VY94^;mkO>4FG zw|GZhR`vJE%}@%fS@!Va+h7vww^MIgPwxje-wdEo;+`e}9z$8X|K0(XTg+6mT97>f z8{UMm=5R|^rA=?ks>2Qro^gJ%!?D|5vCZ)Gf&P>;Q9x#4#mpa(BsewOtiV4K0)kJo z*_ndP8;kJC*Rj^O+K4l)c^Z?78$wrj@@&HjiVoMOJ1)8ELeb zkOIQqPKWsoR@6v8EDgJiTn+c&&DJt>UL!B58?HS`|2IAnm3zAs67OB6?B4d>7MTII zE71eHQimekDkv9hi}bdAx?DJkb_lWWo|fw+_d?k9gu>?Hyp23%0<#XPjCV827#T;P z$dPq=W7wdRnz*Ut8LylTS)7gmevZ?mP$*vH`pe=pIUhB7{D;s%#_jLax?_@^Wts6{ z^e=*+@-bgqvbGPLxAQk7(k#=Sw?E2DR1SR5<9C?*e3iC53CH|NU`|0yC9gvE8tO?I zh3}ZZKPLZf?I`q#;9UU~U3p?2Uk{flQvkXvObwJk>T+w%c>rE4*rs015nC*RCA z4@a{Voe_fPf?N@VrCPBoave*`_1R58e_zA|>SGm}S@)2lv$9rq8C!!GR|MnWIF0eJ z+|%{^GItPp(|qAp;C>Wx?(mI8XH^>ea@0Vd4vXn?%AP8vyGmNXDq#dFF$yEV0rmb? z$?d4@+VMGR(AWHP$>k0SB~}m7R~$*t#k7R!y{DDQc-?Bpt39PRk2&FCBnQbCf8Yh$qygr$_I+=ywPz;c-H1h!JktF)wu zkvx7ENun}6{j4Kpc7!|zeT#)@{|LLjiI#SR>v|j$qw)>Az;~<5aKSyD{tmR)HWSBV zC!lywf%x#Ej)q8?l9T;{(c;+mMDB;5!#v)xpaF4qIP}iYC1t9VPaUZ=!Ru!&7ot%}SYpHOTFe=xR&6`9 zPi-~5?ZPp|zn;;A#VRvnF2AfBxw{PuU)b{A%^lxDAzBi52#!txKi3F6r{QZgndz7SI7^!Lqv4 zR~YB;CFGc83~AkMag!a1#h&>%mHS2A2ZPKEKyK7A?giES26?!s+7G)E&d1dFwdhmXb4eCjZeg|q9l6CA=R*YBRXis6Rd zCDmxoI*Iz^Xeb7C7o}vwn9PBj@zpyG8YcD31ZqF` z&6Z$x3U477&snyz?H^aw^$KK;%Y3b8yxrTCoacE@xf)FQ+zV$POv@3wdt^M`b6UE) z1rTI^9f`02^(-t$J_ZH;R?lrv>$}B663$he{DaZQ|=g)T;e-U*9aD(7N<3Tc^h? z{@^%a{BEJ7Bq9B&GWP)cI2ejPAkdb$3Zg zJODj)o0KFCBqeDL@y}>_Km)DOPXPvU#Vfad$)CId)owDaQd^D)k#tGQ<{=xy#^1wB z*xIY>ZrG9o1`I@U(wtr~opZdFD^aLNB1ZGQB;4~#%AVFRR1k-7VtX;R? z|A#Aj!B+XxZ|)WGTPkf`fT zOh0ifZ4c!W=f9SA^i%!#J!6Unwo{P9$CKg;h)YVinAx@Lyr8SPTtVe{%_;_3Lg44m z8ND{$CK?j9O}sWl9$mC!eX;7p?46-#fyZxM(0QP=&ZMw^{gRb=W1A;AnwZ00lx%Y# zHKgCZfkpoZWmX2e!9jA7r4*~&{liKMws22@h2uxv_4r$VYpTu3mtQiyz*U@cxUzsE zn{x3a#o|d8!p}|O2T=)y`2uM>%pai+&<9S<`^9vbOJ2hfi_z@U=mm9Q#f_8XKC#Zt z)jT+1X5LCnJ*6$iml;eN{C3TH@=?&&mlOmAc^!|zN_lwqs4;<|VFS%mVnMKr*@25oiKYrb5n#_La3*01R^@-eT4FTw4R7x$hn>1oSwK9W5C1TSnVRK} zy>ly2{j&=twhl_oE;{Af0#~SV>5uopeS4rpeiwtn8vg%V7fLT^sY4%|CJc#2O1_gB zsUt@E1|AJr0V~82vug9%e@Q_J_?3ckWVwL2@d$rOg`Vd8Y@2(+tU9m>((%B8>HS^jcYu~OlCijFK%6W0GhLn>;?`Iiw=+P;q7FixCPvYvroQtGe0w~H!i)p z;UOVE_#}U-)T6gR<6**Hdn8CrSX<4iE#CdwXL&#g&AX*z6!r%p>h|^KG04I2wmsEZ zqWW-<$K4>wIxi$+%C2fjLqFu8?PNVXFk$>yn!MzEOf!;PLuj0K#6}X`)9QC4qVMK5 zJQc7kfDuu9ocPo=mKiLM|+`37*j#pO!GxFYyT`!3cN3oyF9 zy80R5%KL#fKCbd%W=Y?u3Fb?I<~UVyH}x;hWr!~(9ZRgNWV{_NFVE>iYmg_%Z&d3G zcwT&)zWQC{%Bs%9Nss?qqT6OjsgxL|n4!(U!ReH%hXVg@}4KuQY!QZ0T(5yq`oZVys# zm6S+_NivfRg4CP3H*mr&oGn7=%J_3yoPV*JEx;J&ORSaH8gvQeQdQ;bhxc~5`gA7K zHBK7GBXuFpBRkGmzbtcy9w8(UN|Tu9EE>PHba8R3mGRkOKP7arBvtRYjoKt5G-F3o zeZ#^r)B&!Eg_N4H_BT!ZyB85aX2M%N!2Vpb%^s~Ky?<+&DjUlQn6$2ErKJcX|R}Ym9e)RrnQ!u2;Cip8N1eqT+p^y z%~0nhbJx{=?FEKy6tOK0_cT%>=+z2W@n@N|-ZPKJ4b4!{Cp7~^X0vtv_dT|!9u|`1 zk#%#o21Jh*gGWfyAv5xF2;$b*9-)_EOtVuOUFeYQg9krS{2|~SAt&^so zqyK8dwUTE1rrv%5Whkhxvub*T9tgRA3Cp%P{-RC5Ip;AQA-`UdB^%3HV8Nwh_w=omyaAYju8+#q%-2s8V-1&nVD zXi?D4Yly&GX=Fbn8nTNYpKPo!$_?WyLSJW5v=AH2o3&oh}-}~)$Z}7KkaVrAZ}W6%V`@f zaPh=U8|r^>@qE!^U`j8*E*$ZknDz&SY35;gII)mJ(xV#t>1IXk3Vnoz_d^#f?^BAk z9UYC~c-^0)eye);P~;Gvb-&T~+FH+Z1MFSz7m-x(Y6$hw1Xa{1 z<33aXa_qd^t2wpFg*c$KxYjCm2#c-#{`;!5j3@BwCOCg5)Ha7e-VbccnIqhgv!ITJ}`^KQE*`TUH zVELQ)-UEpa6V|T|98z5g%VEhGB9wM$Iq=?j#`fsnPpNAdSp=E98DAJS2Uw*yAY4^0 z*>3zOb`1p`z#lo7bV#&Y7A)&FGcBt1unlk`uiPQ407J$HAiLQ!4u!mt0B#StDTy~x z{JJLu$Nu9$qMR#J{4~eM+i$O_k_S->_xVASn`sgf$MGJ{QIQqw=e9;RWK}=I=u}Ry z0Q;dAcx7RhGs1{T!gOPy*aq2HSVHRl9nqW-psDQ@Uj;23Uy#?8rIqqIB|6jOf)myv?LT)rC~(R2h9G;|$ydL?C8}b*!GtM> z-}9Qq+FN|U?8O^FDHU9ZC;VNAYelUv}sq}G&s#p*ucQk-g3BF zErc*YsnM-UR;5=qg_?^yPh)U(E_lKey4N8qmC6Ob8mZQ4cv#2uYGST3W_wS9XlP_g!LDbCy%rG$5lM}9QEJFdmekAMIhM1 zDL95|dF~itGwMdEGC!EJPAP|!>S;W1^K+OuXea>`>H>)K)mCsOMG(4%J6Kl3uW!_ z3GdcOmirJ}d17tr_UJmpnh9l8-ay7~8Eud}*IDGtB^@vP`(}9otT;iSxOT{&bfEIv zzdFDn1E4{cM}bXwjgt1^$AjkMYEO#BbQFT3+{v#3E+ z1g4VBp5Jh%1)^Y7sbjJQ18A9_>iBwP4ix3?-7N7 zAtB59=}O}l?%=W~B!q||By$cD&e8I(NQ5z0)9ej++=+DQi*z_=#H6UUs4*u5$jgQn zjNXVYkp?jsng@Poo?ei5an-;_Na;l&;%GtRKKs~<=JyVb#+^PBDX>EpgcEZ{!Y?zr z{(h2@J!KG*iq%eQZeVpERy24m>7_=<@a3YU_N&x1oukC}RMUJ*YP`wvJk?LIO}avd z?iL9RtjK3Tkqds1!S`+YG6d*IA;%Rh;3|AwCn5X!V$F&mQDDMjqH?ZAW#2e_H#g?q z2Bc*kmYqPYq|WCAH~N9D5bGk3(PP#d>(bNE11bqYeb2Kn7K)A2*&=X{T-d!B+KqFE z3ynIqY{be*afc{V)V8~+-wp@i;!%ZW;UNT45w$gjB%?(i06`(gTut% z3CI`jM@TPnP1^fOUh%6PBtZ1dEohXYG34e}r~DX&lmGh6dx8VLf9yEt=Un*Wn>Ya+ ze)a2q0(9_(6d%rWU2=`2S#F5lk}y zC_JJr#0ch{t_p6olPF&vc)x6^ch0W6*fsS7i=pXkviaHmUh?}e8=_k$_ot?Qd2(ky z)5@PmV9r5Y`jZ2ZXZO}YEKqssjz`o->Zl6K^0oFKp?*H{H!b!Lal}WK&GEti{Juby zWZVLwa>DnmViv7kNNE95R`6?KM_N4FtSS1yj3M4a(!PQke0UGIlnkM8!t!wo%mOd@ z51wc_-5JXH@*gjm_^%3 z|F8_^lG4jdoFkVqei;ls8l$rj)b{0L;;}?iUsxh5=!3 zc`i#6llq9atVAb0ocexm=occGm9g1Mg_=gxkht$mgha6n-hUuVt)b{bOC@AV>QqeF{R~~$OXbN2p>jMO%^$H zSSf15q%%cCYPS$EM)xl%GrT?L^hct`aqz-pU6;g2e|1zT3?m(jxn3JNLo4@~FK2aa8`FY4LG4tY1}{@)CQ=}2HNrN&@b z8m5?lmi>*FfF9I4QlZAr^q-?pulyk)pSfRvG#;m`K^BAuBPCGn%M1I#v3!5tcA~DD zsM^V1$2~*9IuWShrV&Me8ll9VFtBRLO7RwjrI%if)d4H^v4v7xCmyGIQe2U^rmRYt zCcE!C3jMk)u9^245iPW7Fl0iT2_TH0E*zD`{uQRg;hl|ScJ zbKWELLKifZK-(a2 zPPg35Qh%g?zF|{hbYPyiA@|4lDm?;2QcafB+uWWsx(_pXEvL!uC_J_A=na^=32lj( zX8=_&?09AI8CP((MJ>4cxO;XcX^LWr`EOIKFPd(($L`Okq=K`joN@jlp>a=B{n;u2 zheXHSi=oJx1K{iLJaQ;=%aK=Dla5-$4$cm zmp}5c1Cry}!HNp$=L``)E(bm+@FdK9u$~Q4ppR2xFBOeVz9pg;ZKIj;@*-{{Z+Pa; z_~zb?iIZ;<7@MI>cOpX1rr-Chq+r{h2(bN;o5)lAiro0!duZl1Qr(%Rs+CM`@Fd=B z`LJ}ZvG)}TO!$Y!#U>V{biY$)b<~dnEX#bM2@k?ht|xujZ_cy~+ZOFU zuSZ9qBk~rnT~G!~0Igy|GU{=IUb1{^a_(Oh+J{%gsO^b_c%3 zgMl4*!HZI%4+AV@81~}DSL^;?QEWFAVZ>Q@V2-uzz3;YgCa@Yrff^K}-&Fp_Z+O4# z2kdJ#TK9J9x~(fSyhMZyMpQ(y(Qwu_;i*ruWMAxvqVi(qifQmX@=H$><7>Qmus@xd zV%PA-!Y1*O&~v+gWdiC&Ao~eQ&*=JM4y(aU0K3%X{uv7H8uZIA3F+K@Gss`~@6iZ? zp%DYnJltS8`rE*8|9hOA;{d96%O~Y2)dw8d0#Z*=%%((zLpw&3N;=Udp28!cg&+-3 z-Utp+7xR9jd>q~8?nIBYv9TtkY7X=1QB6Et25+du>{rT=PDflz_n$Inu@UB0YgR#3 z&yv4jfHa~czR~C4)Un7AZ>A#cx+FsjnB*c>AIY zW=HfB#(gZhct9@q++I<8yGbH8{p{vkrTwPC!^^)zRMbt?$;n`w5c=ji1D$oUJQc#e zmXujiHGZq~N{c2aR)l%zcn|hfn;0egz$?Xk8Hrwq@C%ItiM|%Ow?FFoo!L6P?Cg)x zVtkc)t;dne5-e<>AS(IzFmn*E#9l15(xKWd4ii-NkTp8IK>Z#NAQa!qMKm+;GO~`z z5OgRSP9k6~1DIQDV$5za)REpj3wmHxNdQ&Rq`uhuTf=Os&9%*YQ0~2wlldh2N?`3~ zgHg(W9HH}bW_JMAXI(fl_*!iD??^7!WybT%p^rFTZe%|yyiQN0%1IuRgU%X5gcmoz z)LkWRMeb1;fhcP(wQs&T2^w?Wi9rx_1M&Llo_!poAx9^#cXf5uTY^9xy+dXThD;Jb zR`HaD6*LZZoZ%e<$muH%G2&b73x`kgUo@y8wLs{>!j+}Ggnhl&g@!nMy6bkr#Y;wgOF8!=8_ zeL@&-gT^EgsGEM?Jp$u3{PZnP$`Q(~UTvAIQsNc#f)mY;Wl2%?6Uboi8|R-#5ov0b ztp!5$LOF~%90iJCW5iNfN! zlJB!Pyus>~0_u&tyo&s#JNVO?2pIF_K3HK)M^)|hNV|R$`ORMSV6qDn7d5HpXfo)t z-t&A;9*g|Aqhpjz*5;*@20E$52kM^g7UGGc67Ocr>@VfTV#HrZo+}3nu*c51=ozV_ z62|mEK1lXRPENb(l>9ajZBj9BbXaUXSBcXL7f!utiJ_iq7kqj@-}w#<;d21tuJYS{ zP#f4C0R-uh!;*+96TwFT#VE`>U%=~e2jaXpI-Sd_KR-H6ZUC?OV!@tdwOz@!s zgP`tm?z5KHMK^nAnP}+5gX3SWfOA)@t6V2G%y#iCrmL~-l{fig(n@PZ=}>+o&HNgw z9x#<9`1w&5??p%?ur9L5ch|l1-V_C=s>-|C@fHWgLL-&uCv?@RWidm`1nHD6+ySZp z10(|gYEzLH0{!kvR7p%I`+2s11#q!dx{jgOeJ^RoMt^s83)t1Nz||oxq*I`<-)`1~ z^=X>xWQ)BgO_f@^Y;0iz`}tnH7liKoM>S77lGE+20M$sx&mT5E%{w5c$DdPL%;4SF^J)go$nR2G=~X=HM1^bSQON1!CI^=tWemJ2DRu`vRhvfR zClFEaVbg~}jjyi{KJ?%fu4jAJrZT_@-T@r}11bjq&7p15zi%l0|L=I;Hu+OBZ!SsC z#TSU-iAN#_VLa8QW4z2_+E@C`8NlcoMrLy>k!AEEGvp`Mhtg(dSo3Y!u56ExT*&_q zTxg3mFSAfGKLmiXY#zoJ7D{bS6Sd!Qz6S=u#h`o?4ybc!`z!2RhO)dPeH%ZQ3_psaroinUIsvAwEp?G!|C zubfQwjjoY1n1Ao7Kbv#1p5)KFl=?zdQsny+nbp+4$&SHWNq)C~Pc&5&1Wz=5Mx%fQ zmS~DpuV95OB5z8p{LWZe6B+vVL{k#&Eu7eh{Mo6;A@OYyjf~@j$org9gC;)O8jjQx zTOzM~D~HG8Wk8hG&#oM6e;(aA&}NJm7Rq&e5{m84(3tp5b{w@E*F4UdX)(^&8tE+S zmQ7E1!E3ON9v4q1=_`)3b@niR61}Q{+Dr7z0>Nr-L$T2Y#O;AofZnBYGgPed`EL9 zYuo3UssFV(e2zOEBGs#2-RPb*LM(}Z+p72;L(eb(oyaB&?M*awurF3p_(&IXpfHxO zq&nM&%3pb=?Hy*r2y1BEHvbSF>wrGRlsNwKDbl7+4;ESp!TBk7!b;|K6BKmKxu-Ph)csjU6iVZnI6Le)@P@_Q8OrOKPtK-ZqaZ|g4#1Rwrmmb#V7c;=Uy4> zheUKVSX%y?Km91Atr0>a)@7nE?gL$4OepI(=OizZqCs@$Uc{_Y^huR=Lcd?lTlr7% zanu|YIl9lPDmA(n^44D?sFIPdO)EO;+G-)CR%iZhUnE+X)6Eie`Uy}US37qVQ~fc4 ziVYn%sA>6_zw&FfOS1A5@#mNN-Og1op<*stq{KZYGV7o)q5YoZilvI+Ov9Mo2yKdDr(F)B@NB zB@b*+qo1o_e_3^c5wyonU9P8asGkHh*=9DqFm7!gB8mv~(KbdCjxofj2ZBhWrueO@ zcwb$%7Y!R8Y_Q1l$5Hvc6kdj5kiaW{(lz%ZcAV^+cMa~QOBHwOlh5Ic0Vf-ZVSXtP zON3D54QJ%j(Ih|$$(EEHmXyK1JdE9YFZZcG1_k%Q04e|gCrxUcA#ccmy&hcX_k4nG zW*}fh*1!XFOvF+}hY`5yqB~oLvRpV0YX2C3gU~zfyCTN)SO#01tWRP@-FGDu5*CjD zKZ9TpR}=5;qg9xbF0rp+!Fi9*Kgw-2!)euu!zbcd^WkbKJ~I0@;eOm?=UsB$sjp7D zUqTY6`dr0Q&vINft10>U;hqo#hoHmP(e>V~Uia@uYDX$$-VrX>(o}Ct-6zF%V0bpt zp8F^iD(W`Tr2*lD1%(Du+@x2&^CCmXZO;>;6^gRwpS-zWp5tcOUug>B9?0 z;h3hKf-HHYE2;EN^jMmo$goxk4U0uqrBozYn^XU0B^`rGM&vfC(B-4vk6wbhbQI2@ zmbQvqzpn?mxl-Z-F9y{**Q<<%Qo|XG3SXz13>w=UzZm{uvkl<|A=uK=GoA8!pugn~ z8X6chB>>u7FN^`G`xe^0!-%UbpC?S~KC$rrIf@YVjOwH2R}iBf1F`f$(3qImLzIx4 z;mX#WNCjhF7X!Ga{TON}GZ;psg1(XZKZ*H3#||@bfx+-Ef~d2CN6ZipZsOZJyk0sT z!{deDPQ!3O;M9nVXF#_j>baE~|FXB+kk}`D8Qkrzhx+ZnMb8#1b?JTJY2rgo0}2(@ z5e40zy00eYIN7+}E?CoFtaaw+qXP)Y$W9li8LFOhg=)D|u#bJ0KC=`T=ee%EUwu-r z5|x1x_sd@)f<(YxRPQ8;^9yG?jpY^OaSka_@TWUAUn}`ui@$}MhGjwuy;Km73>X-p z{*KM!M0Gg7@h$g&rbhjqePaUqd==pHCva)MfLg$p&~$>B=w;0bw}(T+K$h%E7rcd3 z$BVvFssPk?Gh!6NAG^oC*2vG9aiX&Jp;?^EwhS(3N~?OYQV`)%ccL^-)LuIJz^Wum z64kM3Uh4ohN2$yP4%|trcHhWf8}bKX`amEBT(k#pL-yuKs4X5ydp^7tI45>29#XWe zOFy_&b4NWGaI=X>IX+oVOKVuNSkFu=D!7z+Ji5Hod{YOE3DXsy(BXGQEhqY^9~H4R zU#Z7YcHBK4f?&0&0=3QVWXS(50Cp^NSpU|-2%}Q#+71(qW`qite{g)h#&hNU8S0*) z)+L3mypv2YVbg;MLMCV1f?BulCPE6($-)g1Z<59) zzxx$e$@m72;C%2vPju&LU_;w})4)n+{J6UP9(k|357Sya`qrsl8;57|)2zB(ORdG7 z(UxaJ8Nw3&FckaGge#G^lg*2#ou!l=epq1l$tgzduhMCxOGUk0|M-KC`ww?GJupz} z04OS2-Xu^G*h2}-Y|yFIoOBUCi>_RWLM4!M&Jz64csgwMiZkmiJey}^zR0b6Q9RKC zqSQ(dm6nb|XXPi&vNedO@AtF{1pO4D(N1HF;KgT7m$&M*9k-(RETn$M5Zgz=*d1Zv zoSLFUQh9(P5f_9yk29={iHcJt^A8EmD+6^6>a}TUD_r|R29`0?jl4MG7{ysPQ|=xI zTQJlb0P4nXQ+j{v82=b0zKuPpBJ_>?q^E~VdUv%q*wvcA)s%vogMX9be2)LXIy$|- zoEl=4$8FOi@>p@E@Wq1zx+&)nwvkk^K7~iKIkA;*$oi2?skw=;S=07lOnC-zy ztd&~ZHElxw5R`on@f{dMEdXLd4cq(sUh(LEt5;MK+p_x-T1##GfB+`&6fpa!;i<=A zS0kV`E|wM&GZ-+Ss#dzB^dM`;H2y_DI*XNO{GuPTx@EWaXneAugY4Q8HfJ98Oc`pn zguT_?CF+6AK`+t1rpu&kv8lgIn4x;J{;UgulG1dQPL)`l%Q~I&5#jOc4!1UBRo`>w z23@$`*|+R#>!%6uq5R}|%whlsbZlv>&VK{eVWru%k zOB}#HQ*c)A*<$k%Ip=)I>-Kh>({6^YA)PUBMq;YonH~8YkC1wQsbhNyEU7do?7geP z!V}YS9yUnvp>k6<3+R+tapO(&#`~z!M{y|XPDkV(8=8ra{03Ul_c!B+c>8!KpvGOt z8MMmR7OcwB3MqqHt@MUUs_g5Ex> z!gHs7f;aqXQO3$r$7mO*T!MZ?R$%Po&Iqki!8kW*|2BfupltSmswk{xlEWNOS#YA|FvzZ~Kqz5>8BWrIN8S<^0Dl z^i%HJ#|&eIdcB}L4g`E7wO|e z8r1hiWut>Un}GlP9a`x-!oOMEQY8a%B$Sjqt#H`K5p6bYiMxV6Rey^!F`xcduOk*T zG0H1u?FuySeR8)grq(uWTk(XV2lx|bt{N>uuIt55-8wsh5x+(b&2UD3hnEev$7lrO zBE_BnysT_Sr>sO2jKXopL{%iYC?6&35pIpfJtO(;olpYWCdTG%s7ai3%OORpwn|n6 z>c3`~vO6pVCQQB7Q#@l|i*ak~go*h7XnX5`tk!PrmrkWYx*J5gyFpsIqy(fS1Vli( zySqE38!1WYPU-FxkT{cA@4|Pzd!PNC?`;0oXI|r;^Lg%j%rVCAy68N4LqeG!Ts|V` z-&~6GQ~X$JhKHr1aG1-Jdt5ssar#YXqt7>ruk4DwE7rg4<%Hn?_|cpimLS^ktQ6ua z((|EzCY~w0$XOZWT$>_wj!N@)HPM=i zH&rJmIgZr9nSnMP@im*8xi7I$60kPi zG91Aou1wf`^gZc+9#E%16_?#3I)}w>2!N0RA5Bf8Of|H}8)cv_`Z4uPU@Oe;s*)Un z7GpqBvWGdO(0QtyfB-+hSS;}#g_M4ui^B09WERscZOC9g48o#mzd^290g93}t8w5A z28v3vipnJD4q;H#2eHT}JvaP@(&44vlMTyAjIoj)wyuTaqu8@=?@+pAuiI=5pC@KI zp+;t6*ttu zD=Hiu(V^Py(O>QgwUuN|*I;&+S&cqdgh{e51vp4*`Q2p8)0Ns|p1W$S8JaF-%@-rO zRr=-tX4f!*_KeS(wjEVwDnQZrCzCm5RcRS}fX~Fambzi(UF$GO<6QqYP<_cTB8uHTxX>a6 z@Ak&{Hv@LJ37xTZ$ZbK=OQl*NF_!Hgl!rdY1JUQ0E>IUSnc`uBq~hOv!yI{8Z)G9h zMP>?L6Z75P{*IHYvteXqyDTj&*Hw7KBc847DQ)_x&tmvBf`qw-yso&U*6Z_!b4AG$ zm0EyGlS0b1Kh9FX0sj-dqb$)UCusJhDz&kZfU9)E{bdQJtQ>2Ug(U{enQxom@d+)N zQDyNZi~_I>mYwTB4&w%X9>NgI(}E43pcjQfn(j{{kox1)5B-GTew3dz_5f^JAbz|u z@{UO!iWJMfDE8r&g%zZ@RpkRRa?2ZOb4YZ!Bh#Tk{rVsgAXQnzHH&Ya`SO^SG(S#@{Unf-Y~W=F>fM&vnSU%)J2&xJI%y!$ke5v7kCAHT`KEWKWfVd|0w*` zGSMzjb*xozC?96^vHQst-8#z#!+ z)IO<}XJe@m@3fT)Qxi`!EOKJ3qrrOzYgK>e=qP?v7)lHkXV8xKT`ty05||eNgLW9p zq|g_c(3$W4zz#PPU;F~^I(NvbZTBRUry12+(uGQerMaAphBH(A%?&Y5n_%iuTYoBr z%bBM2xSnbCmp3C5LBv|JN@vKTSW`jF0b<$w9|+FZ*?tYUSQFu*70U;a`O+G({fg34 z4bTI52yEd=U^+lxK8*6e|BZn&-00*CJjcJC%UpcPKbu~E-EADWK*@~SnUl&2aG_ne=x?=A5VvNO22t)Aq$v}Dh1-Qw_tAUXJ{f0shxLRiT9IVQE> zZ;v|fkSYCc$C=DvOn|)t<$3{074x%F_|!(jQUG2X26Ee%MACq=OZLmlYRn(z6)Hvm z>(GyzKs-Y8EQMnOuPxpZVKNk>++_sQzuX;zzC=(tYVO#gN9DzfQY-Umli6~@hx?24 zM87_upT5`o^v`0{s~`7}Rc@d0U1z|otE*j$!xv`H@+Y#_K4%%9b~^Ug*u0Degr5cc zs>y_Nd^B^k#qkGpwcQ2DI6`2FxHe3@feWTB(H#*kkmE+{`{|h~aCo9dGPB+Lp;0`c zgKXnu+?|1CBy;th%9~0KG7$|YNH>}KN*xOtx`X|&=-=rdgc3dxY5)jL2~xoXwftkD z#qermdHYj{ewj+Mv>N%dAt8$(HBRSrl9PeLmU~_5>#TqHJ|~92WflbTVqZFPo^+Zp z!&$R#PYzl>Mmk^)-&FK6iv*@97RJYw{Ee`jUf8j|N|hEFRuC>{^BCI)mdojd2QBnZ zw7dhf#4;rsgC+o4o`Q{d_5vdBz(ylHN6OkWMy9{aZ=49Q2r{523ZX%DAHhaG0NAMD z_oTVwxwMT|cCU$88}gkW- zWR;`lC@-}aRENUe=FY21sD4(9sd;8EMu!RdqwJ@)-iL8VeQHq@F^%WUc|jl#viYCL zHUwmk2&+4QzWZYd@40+Q0GBUi`1Nw!27Xv4VZu6hLT5ujSLAck0sqx(Vu9J)pEDIL z4Sd*srK74pc(sloY^T!B-kCDFO!{jpnla#DxOT-NPu3aPuJUlMlowNmpCUa7kb5G) z2oR9YsJix;Bxe4vC5huWmk_cix|}$KSGGm*@2;AqiA5u22IMMPe7Kp?>HjA~q#8#3 zFk(Ce4EUBFN~zzTS*W-j*)0auR&pwOeuBc6EUmNI(|NY=_}`{zl`Uww41i!seuAnp`+IcNQn+$&6f2JuUV0&3~eOf}h&% z@8b_UF4*ek9_ho3$u$4h{3w>rs#h^T;sf&*CdNmq#7QcnPlrb=NN}v@1o6NdJ-Ha; z<)ASOXE=nZ%+EAc7x`TBPIWjeN#DE-%z?NdP$rAf1+>W7Ej^nBHu7<__!f^kzKxOrPIuT_)MGbr{tB$DIBFs zBckj6o!F8L-L(_N#Okgmm3y=heqNPCb}8mRPms#8zO0&-lCpP4c)3a7Ip@VR>jrLc zZ-7#Hdy@lLoGc@9{iDM8@5x}NAt`Vo?0-{^a@#in zrqL*7UN;JVK5y)Oxlu3X&lNr|_k0yvi}(g?R5eu_k)E6luCQ z$5&gzbf4G?z4b=5zKq@w_ksVA1h$)+XQ_}t6I|oX|9iFZ4F5d2Vet)9*pIn60VHbG zj$UXo&Vg4wfc8mNp1afeJ=Z zc+#8YjlFkdX(ng|r#wlV)ax83MB>S&C6~N7oZBlY*+Y-GFutLt);w4h(AHo*bR-cM z(R^x6vD3fmjQP08X#Z8JxAK98S^9g6xP4^Jpiao4z>WK1EvDdkMHG#_ommz!0wNbO zV2V;FvZz!#cl)mqQAmjHthaJH;=&(2NP}afP)0z8Cm;JwXU$Au^zr2V%_SyA(6J5s zmC5dbNAc!m41uTtN!xxkU7lp9rwt<3HYN8Xmt;1prUyK zK6=deNJrn(-gltxQPUv%S4J|_q6JC8T)uN5WFqfYZ8Ouh^2L%O1Mlt@j)JNNzat-^ zWG&W}Lk;LenG#A!6+P)d#hN^A-I5uqAmRCM z$Rm=;&|R$^3GJ~;L&H%~ZNf=>?NRVj4J9`UOV*bKK<7yTy6mF72E2%fIoFG`1h$eL zz%yld(ww5yocs(myRBsTY;$a8!<@$cgGoltbw11R^xo(PpwRfnh7#>r7BolZon=a6 z?k796JSxvA_ARJ<2$}lH`8w zldo4U9A^z@9nvZ7Ctf^7Ww@u>lI>mIxu=Nl{WAD2SKPR7N2^NjqVuqS={(uLjDh{j z<;RiqJ<#y)MzDL}(HSE2Hw8b-FJ7*eMK4+eYo^1A zt64dmP3{}OnIgEI0`)e!ef^uyb>Lt1I}!#E;kU5{Mh!9~Udi63rEPx{g>yed-Kt&)u^gGez1Io!$L!kHC)y(XK#o5 zyqQsQvB>GNE~ zT13ouzF>$feO}+N^1);9@z-Vc50}}X`g%XrfLp$cK-C~8FEb)(2vMWU+qf(ZDd>b+ z>7bq6X*#Co!mS6zel78t{P76m`XmSwAc(4sv$lV;{~o8!*zS{dcAi_OxagjDxxOW( ziu?NJI%;E1+U17t;<+Ns~AMAv_SQ-5ng12zWf|UONKbiSOQhOopG8!|K$Y4#m1D~rWggu`g(9lKYv9z zf+R%hMMWNC`p!{HgjLC6%h4WvT$@P`m~61Zg2b<$r3kUfhI;;I=GDF~D|Va-$&eji z-Sc-sv1{RQ2BzQ4m4i==Rbu@?u?-nMuY!ua@u1c=8s#^1{I5@$pZ6qRI?VrGOxC z{BJKc?n*Dm{j%IC-ISvz4N+u zAmvTQ{9KmHluZ3E`CRwhUI+g`B?D3qMYNV@=SRy8$>bWJ^ItH%#XdwtkM1cH;?;&> zOD&_7FP_y)L=iZ0u0aMbTzV#y`;AA^_IQQri-bv!z1Koq2?TO0(uLj5{G^0|jAHJ) z;Z^xr_G^R^F{HrAX!bd2Ls#F6!q^9$gHLpR0CYA&a|0kFdf-8Q+TU;oGE&X?eu%pH zW?(hbUu=)-n(g2Szq7{zktA=BA#*u{CuS^}X#(>{)dlw~LzNKJv)V{XVG?r-R?Aew zG`p^rX3LFp4~tLZ+ti@NP%`8ppV?a{#O6nXF}t%ugC}0TeqJNu;A%ue86(n0`D-)bom8tl3;$xf81zhD?P znfO+aVKs*812!E`8f$iE@b5isfpc<#NY}0yf5x zkfF0LT;+S8OEg5kf?+E}m=Hx@p7>i7$0Qbro3|Vdy`4m32z>Z#gnQOhTv#U!{Rv6o znSCROz0J*|$~3;V>vPgnCy(Fxg(qui39O}ZWXA%i`{PpHc{s&yE+i#6iwx+VaLzeF zixx+c9qIajpgOG&JFOr)BS|Y(w2R~TpUHR?-%1-cpXg$w|8Q!%_i-Ba!DD!(s7w|{ zf3rv0n_s;PQRVMhRppB~L!^UDX|W|4g+L}5Bj%DBjC4v|tOM=y9H!az z;Z7esQD+6HLvP$C1AS`7a?d)Nc5L7U2RdGF3AZEHqFo<j2fLbK-^C5JG%$>?8Ql4fXZ4B=1~U1J!N^fw zWh+KmFyEIiNVr`WB98Bg)umMgY}Qvonz{6ox1Xt66TF%e%f_!=;ra*pqZ3A zUPD~{WZ}CLEP5^WBU}kR9FoK1HDfHxx@xNBLy$;MgxUZ?SwFROz}!CkA^ooSqP)_)(^E{S;1{P zXFGIzX3dcd4FPHER%VlN z?zKyASsjSx`xYx%lmrd>^+EEpExyJMjH`*lsWKD}=bt|DV&;QqaPW<>L-8F#N6&Ro)`Dm`lJ60gJHV z%Rz-7S`rFVA*#J&Rc<&qMBdMIR!fm?dB;G#Jx4F<>$)-x*ihpD) zW6#i}4&w3_?<5|Js&brsT9D6@DVMC3(1YWH<#_bvK>H@3XZqjzw6x1E z0q@37&@pUl2GQFn)s{upWR%aCy3&lkcoydg%J;B0LVBSwjs~ZMU>AvI&&J^UA!82w z4{}z@A}cS_zZNMWTNx(lb zj1(?o(+}uy0+2{u!_SGu%RDfZQfI?Suck=aZ9G$umqUsung~7UiH0eLr4(wcyM7al zD{6TGg-tAp|77rKw%(4+P;%a!wP)T(dFaB4l8MCu#(KOY?BNg&r>p)>18sV8+p4sXD9~1v zs*>WZl;ZmY4%JBSw&mPz(f0-Vc;=OANIur^w2!_ne`mX!wmQq;dUo(k;YHR%6))IP zicC$XC-R!-Ioh5{TNH=+Gghllmqn$9poe}o$4z51>0?4sT?r!DCa^Q>?CeaRMqYoW z`9&;=;c#oz$;qLyP`#^xlJa+Jcul!&0PkbRZTeAcP$yw9DQ8^NTok*2!JT8Mij}-- zpi(C-?vkpQ47mo-mR;xbSPVB&O%H zeM;)ts(hTiBuO_lX&1@Oe$aVm2X2yH5j=3ZhVr zwSVNka06Tembpb<>FHHT0l%daCbd|bKbyXvW_>7bdY?6VHCZHSee)i!jAdtsz6Q8R zx0RxG8d}pPdI0TLakd8%oJw&2H~Oq%btNJ~YqZaK6vrJMDc=pX`0QnY2{yVx`0LI} zlg2!4(}}MpEN#zdWjF8oZh?Wz;VD+p=a~ub83*)9E8Adm97Oj5$63UC)s2TcZUH<} zR^j*FE#u44aPi)myKLB~&Zs#}%YkgKy|4LUuOxi3SAGQcN`A3RO3;x%Qj|O5>=rao z;Y=BJX5O3Yi|`=13BBVZiG0S-PEnBW5is17U!{!e7(J$t6qKTz_M%|)U0~Kkrgr3{ zV5i-g@#wHowQ*qPRDW%kwJ?m)C9KTDPgOXWu%13wTMQ}7Vrc%((;0*}^fm?ya*-Uw{CNw>`?)t6Oau|N| zX*fLy4o?*=rw~I^vJ70sSSO^fX!}^pTi>~%l1=N9!NG@c>7Rsa3xo?2h0c7B75%%_ zc>J9Mrxj7&=Ek}0rQbjbw4$w69oG;W@kT+pRzWV%5+`1_*uC6yxS;;x_wL(gri?i( z{TSc8IFpE^3lb~qEF+5}a{-Hi$i*EZt2kGgs2)@D#K^Gsns)pKjGit87+o#0`_GNv z$uPzzJ9wRjdH0CsSu0enzjXhr7RCQWqaC2JH{FQ%-?9dPK6_f{fFRphCDHeOi9PRf zz5?9z<`(g0WeOZt)5YD>cIq57g6uFzjzq{y@l+$G(5k3=o5|54S%_J)TU7r(!Z-gu&#}B-xISdY@;ToI%ohag+99J zmtvGFw>_Q*<(}xY2XubFRqp{^{o~PjXolmhow3$F5Q5*`Qs>OMoGslZ^qkc5RJH1G zmRNG~H>&E4LPts+(hT>Emfmk->>Iw2-kotb9MuO`*+q%ifU?Z^q3-CYzZ>LSX*_!n zv^-01nSz+`696Oi*&?^4{En7Qb?SFB>bphd6B`7{_}WGBlVm#;b) zncUBO|I;x>_bLxvGHC46Ps!cFo8Ls?=Vdrb9*+y4^JD=&0Sgdbo{?uB^;AFCm;{Qt!SgF$c|5p){}`a*3Ub@ z3{0#*U@P#|6nNmfqPh4LNKNrDw(5WJy?j}x3IXf8xv=0Xxx}Zz_PJmGx6G&_yBpd$ z4$<72~89)1IF*Tjx`;SE6gR@eI zO}}I`UObx`!-KiuK+1ZdF~u=Eg*fm7B1C z+kNz)5wWq_kyo;WNypi}MUKlK=5M`UO>Nt1f@#^$nxr;;IiL8lwt=s1HkCR_`^goe z9nQbjoXDLdl%9b%@}1ueMDuc}Vs5Y3BpDOAaNXwP!{Ykn7JLS7L4sp!%{@Blj#2dN z4xQBJNO3m_%MCmwT7o3{jpYHP{YzI~pO;o)q8Ar=NpbEaFa9&{yE6N%b#RXjtBTE4om9&KxN7+W=p?|>w?8wzZl@_+eo@rz zI>Chxet&VX14DtHvFviwXV9^HwRNKdqWd6NFujK35}uw^l1r|5v3A=z*bNKGjDY@bKC z_S|S&??y_i`60^GCs8^9Q4$*ue*rCj8fE2XzYM37{R-%%4_{^)ti{xPc5$QTr}}Hy z*C*lC6v`KK0vqsT4sQNuAiGRCAx)s?uJnE?^Ic};-#5oOj80q=3pe}~QI<2Ag5FOr zr8IN;!Vt#dIgmD8rEH(@&v0Q|#jz(Qt%~_WXY*){bvd}!h>=}&s6Y_I^m;OPchU3) zvk9hhw$F_@iXB;2G|pH6>|O$SMKySjL#-+`9mQKfSnY{6W&Id6wq#I z>y&HR*&25ch9ADw?uh*PNVfwwX#r~?<3IPMG6};2%kolti1u1-HVKK^mzUM;G%fwv zwIBiF&$+SrcY&y=L?48JbXNPM1?@UejqeG4%&yvXVJ{iyP*1~0wgy#Z;my|SX{aB!0_`l8n3-Loo(+jj97{aN?lxR}K z58AP8w$$hsWV)tv+yeF9w|}AiILqM_Y~`-nLlhbW0N<#OUg7=#W5u$mu_we1l`OS6 zFZN6Tty|vHH%>-PLc}DEjZ29vQgzT-t#VrMv>7@^UWZ{(hhOMe{X{^{>B>7pm7dQ2 zt@f?bFpG-$59kZ&NNr3tTYmyScPijx0D#>aQTZHmIAqMzKc9@IO{~UQW z`jO5WM~$(pv$Km19s<*~DEeu;HXcI}B&HtEp@xb}_>6&}Y9EdpvPyzg_k8QjJ~~x= z7cV9!+!S=N5H2JBleemF7s5A#kj8t&aV)Vm9%Eb1{{iC|`U3{=Lx9<}C7b60gM_q2 zq+V&&Bb8tGV9dJMb1j-C>2nI-xd~e!d*y(27*Db+=^m>e(>X5n(L4=zmqHlP#Et z6oBSsl-T4?sc*1Ee)=Z9)R;;U4yZ+W)w2^LsC`S^Z=MI|kC}HRFJjE=p59-L4OY87 zDjvo|!{e(qpGH&raXpOq>Xp*lOMl>%h`dJa-cgy0{26Y^k9O>;-^Q3RqG_=I`UCR|| zdJY)F*2l(97XM{}FB~pGJhX9F`5wve@g3a+skfOd}YW1X)2mXXShsZ!K_JlFBds!G)iO6b?2*@>^=~ z*byu-(5=kzy66@Bcxy#Z6;);F__DsL5aw3k8xxstvAKi8kIl*vL1I?J@-?KW&o z9(sF`{)XrB8MKMC(yx_BiYOk*$JFChjYW=1{g!R0iV84uu3%+|(ixHDyTZl!q(Py2 z7gkmG%wt1dULK6W5W}VAjf`#M@s|eLXlTxhV$X(b1Jc+xGMMNyn%yGC(Vk6jWrQi%li~=NnAM`$bQ^TcSa z3QwnvSlJQ((uDwVNw}XNBLkxBix|m(#L$hQmSh5Hbt7tN*ltyjG8Rkl$aL# z`ZC%G+4A!CMXTWp^?2S&^2#FdeS60meeu=PBJp0m3YeVcG|63A*N3Cd!jrwv71;a8 zJ)p$y&2Z4{`9PF``UBJzT>P0#2jIB=@d!7fR61H5`zEEg{`E;E^Sjw(ZJ!qXuXHuV z23VZ%)iw=;wAPG!_8mt02ovH+gaW;U-<|WDxt+F+7h5cAw$)vTHdNDT66axOEa*K3 zC3$t6IXUloR64D#BH#wr^kn&WGHaCU-{e(Hzx~}6g)Hb*3jbS{>wPBO9?}OUrslTE z4NL???Z1o4s<9^UQy(HZcoK;l5J}4TV(k6Y=)aDpRR{Ai(mr3++O`v_ zX7H*yyiSoJ0IN~TmX{TmuV;)WY6c3*OFx3LGkS@E3ySV=_hj;6r}JYHajH z(?W_Vug)l)ll^)UF``=C?dx}(&xfHqLArNLB@>szDfE~2i@QSJ>@BQVpAb`|Pv-a^ zq=8WWT?%mrq#-scW!<;a{w?iDCYZ}Ii6W=E0yrprvkv(_t9ng2$cdwiM$LpOYEq6Q z@G|mJZvzRFIz+ve?&LdlS9(rB_kms+!QAuO*Wd$ULMsK#?(^LhBgJmkV4^>Vjlb1B zV@WF=a$a1`s%Gl%!obG;nH#sgUPUhc8e0c9KWaBJlBZ5TA!5XyE^CffB;t3Aw~v|J ztE8Sh*pzM3r z6tWaANK|P(-|?{(HtwgWID~#H0zI`kY6F!N@6Nm>V(RSzF zcjL(&ko}6_h{$bl0EFU?-rcN7AS{3@V*Li4zL+K$55ZjI7&4VcE&VQ)QrFgv3pur+ z+x|#YTYZHx+}k|xhW8Gz6mh;l2)z)gE+9Z?JGbW>;JpZ$J_r)Af?q*%dofdi5K(Pb zMefJDGK!Ca+ZX9@v@PlB2iO+pVlhyIz&w5<>7PjT0;C?bd53`Z-W|4mP#>VVeGQWM z&s}39UM&=hf3e*Qn=4)kj<=HN}f= zS_eUSj;B4oTaV#51&^T3=yC#&Fa51JzNOM zWbbr{?PUkPr9vi<+Nf@$IqQL7{<-^SDSqZPENL3}frP{FxE+*VQ*oLG^^+9W;zfLa z1AJHUZnxm;4{>LWiF)92pwDjAIET#6xae$>^QRu;FWNLobf?I z{lq;#zP{KO%Su&%XY&wvUk=~v%^Ag)htR=&Nq+t%NjZm*o9KVK& z8ffq4Rj3gf8ZcK3DwJp1GcRYOI90fjy2VRb>X9}vD_17K7g{IBM&Rkp{MCi)xkg(jWb2T_XFIKi%vZUMgokZ0vco& zWZUd#gsr-m5eU_IiV;Z^k}Q2!gM%=Hzo1;y@p=>Cx8=XGj4WGup@8Zhy!`3B(9g+9 z{vz%ymrFxyv5x~_E5!)C#9eKKRYni_(r#RgUYyy1Y&r8; z4wm@qz(Gxnqw8JqgbS;y!AIQe!_(CalhEe zE1)c#y=8*3UItog?0kn{9)6p2o&@U)1e-yZQUvPsN3ch-gB9`Fx4%@>3vn{e8dPcjV+E#IEIQZW~O+QW6B%8hh^k0 ztP%Cc@r;ARc`^ksUt}nv`(JLM((LI5y_KpQZ1wFth?ZY$v;P&f%#dUo5~l_?6d@yCwrt0`(v~q4*|M9`5=GbgKX*TUx9}I`9ZRU z%D-i~O&2&aZyXK2dM8ofu$o`YqaWeLbd73nHKzA~)c?>ZCS2m%k89|v#NSodIYVC+ z*u1`2Vr0VsF~l6;&|i<#D+dTn5Kf@SczdlN27Xr*he<)x9_?~Vr{_4iP=)UW-C(+4 zy7km*rK~g-*6hi8yAj14j?FZ>hhAh@oj&$!g+5Um0H}q{dWZ3ti~9d>1~J0#2B-U%^*8 z<)CNYF)NC_n4sCJ6V2bP)j3-KK@fnZr23rQs)nFdzu+W4vf^_>KiX}bjTBw^D`cd0 zG^T-nI=zl8$T_e=eZtBo%_fEYc5HAos&!Z=~-uAs! zE?iVA+^(SzNw0oY3f+o$6HS>Gtm9PxM^z>@rC!dV2zu%zTma{+G2HrB zd1B#{!ZV_~lJlJ>s(3zkZwsUqem!eU0x@jL_uN-J^S%lN1anHU@`0Zz%DtG{wlK6P zv-Ju*MX5HD(?vFFtrOKY$^v)`AY03zNy^&q!M*G#!I*mTsyXp(5cnp_kf*&2#rhMY z>854^s@-0_Lba*ipM!*!hI8NgNAv}lS4E)WEqDZcvg#teYm8n?bre`k!om9L!3T2u z4_vPx%=h_hnrJW#7bf~Ppf4IB^fQx8=Yay>Rv*5V75dC)F)rgJvAW%-px!6LvG-Y~ zubVy|W|a#=BI$VuuJe1I3kWQK{vrU%G~5(>+Y4&6&PoTjw3N{{(()f!OywzP!X0hP zU_g$ke`BRSEw9wozSQgVi$|oMm(oDvKaa)Ya5=3gtBTO-8@{9=)9ZI+82Z2+vCJYl zEA1AHD{fooD~KYMP7R}Ms=-h84#cmAG+aV?s0V0@)?H#BU{^*R`S=DhEF)ip2+lVF zsUzRwU^uS*Jt-%t4OKL=JRe#Ycbwj>-%Yl`hucF2z77OK0Hk&cmr14x4aecDC|}w% zKR?t&r7-?#eQ&IHo}LAH z_Sh8&W#E74k1pt+y5ldofrGr#a|^c^_!p3uP);gd=@i25t0w?p0y|J<`3t~g!OG&v z5S-i2nz_B{AM~7*l>l$tF@go)FeUvl{hF{SdS?ckiYq`)k)~X0JPn@+t6W*RYdT$g z-xQt1remuHojufpYL~8}gz6*MurHtKtiRV6dwzbRA;^;e(3pzM^~OaO1;l=$S@vN_ z$d^7~c_|yRN!>{k)o|3t3LiV7sk+tFgu*1WLErr4pQB7a^CA%@5|KJGrOlBDfbtT= z0@gWEub#QrLsp^ZqA1jB2#|V7j=hs)K*925Dy=M%B9VmiohwNn%h zdSB?Y)+2$*T^&i_F9ff-GDKDCWP-^)lSvo5qH^nyyoOBsb@nyj z{pxK-ScL~bm_AEOdk;He3>)btAdHm6J|vHYA%7*0HV;kF_|?9wG&Ol2Oz@eo75^G_ zjW_cAK^m^jlj{XL`dY?Zls!wQpElunIgWY53_R%%o}gPEX|8N@F-Kx$)8}jB)0cgv zRxc29Q;JN05->2QNwzoB2#mRYtIRF7iAohHwfaVt)qE`)VgXWLkVeL*ZTb=$#g(-%oq1)Z{atzrz1ITjY$$LzfPV z9j1kNuhUXC4gK%Yo|sR;hu6~Z{p}ckr86Z@^acTXCF|14z;3Yt!6?Tr zAQDFXS12=f17doOOO1u?m-xiauTs~tl|}T*k&3rxY+Gh+Io+`PPoM>v^@QU)QUgfB zR$-Yj2x}?%-Mq!J6v4)@ik>x#S;}TNm+5?=2sV~p+e6%*=`L5rsG}q{CRRH*(KVBY z7rioSdR>i4%%@jYsC)TwN^QfWh-HlBq~a>3EB?jmPj?Ut*Y(DX?yaUhf<8H^1DVnn zE*oHuq9hAQdI{cv(>ezI!8z^biRi?o2c-reQI`3Ij2)+3qzZ|T4htokiz zAKAw=nh3W%UYk5t$Bl1({+;Sx>D2F0*7bH72xthRv63&^`qjz~gY*~8m;3q~mfihB z$O|d`0phQgG+m4aKe`=Mm-66LV0HzgVX^YBQUT-i^15H6yNBCfyX{;qfITXcbL%Vr zgSNpZ+Cl(r5*9BMAF`x>X**bNTieN4;PzYvQaTBW`ID^XXIZbc*uG0$%v)g22V=B> zs>?tg^+&(d3D?tMzzo!KnJjPfoAzrgx3}E@VKOY^D8_o2e4>aVDEYYunPw-ph(?&w z840|}WrpXS-%>ik@3rh;SVm+g-@64NC-kOfcpSUAp1B0=xL(JrA8^>8gMmmF2zU;W zUy7>8Vp>XHRGl4X+`%x{Zc0TBOnQ*60D~Nkc9pIYWPY2Q6SWehn2H4x%@1)dJc%5TaMW9qZwuk zz3kX-a9i)3gk|L8`TyX_1;T&})U3FWfHvJ-;O}&kX&WIJ`1u)I`n;CZ-z}(2 z+QVsb>~glviB(Hnx7DZxEfp< zXigI|7tQ2u7zsv#^?w|{X4T%?9Y9s#ep!(muP-*WPMpvzxA0;AYXyvwK6$*Vs48q}Ihkhqjs4tEX( zcJ_Cb+tp?MXZ-$Bkr7;ySn?5tW4m z82uw2a}}f~iX#BUzCmF4pr(J^ZQw-_e6RouPZ9xw#T;4L4}6*9pZOelM&e*c(_tct z9#z>%%dXkZ%b9r4y=Eq9L8Yo@@Fg6~ab3|@(x()$u*QkeP29T_bTVXu&qY5?Z9*Mm z%Iq5|-js6FD5yTlAbcVt5|AMX_fZNZ27B?LJu%gOS0YF5z$n%-n%H- zvmJtqA+>jB0mNz8xn~4liR;2M|S`{*!e{OD69_Nd8kqj-4%ok*qYZEHF-lD>Z{m3Ldq&aU^&u5Zene?$~ zCDEOQ{UY1DXuQJNc+mrUT+0m$W`KZIC;l#cXNsLZ32N%2*C$(9r_R*6U2cq~>cGD+ zgK|%_#Q@q+l*Hcr)whiLf0Zi=SFozb+JnQ{BcrqrDE3h$HKpU93}k-N3#>h*jZKp2 z8an~U`aa@+qPki0(z&+77lo`7PG43RH^`f%@PESUjh;GoM;;LC6-y)>Gk)cP6Sd%! zq{Sb|YxykjGrXNpv+u-ZX5rF()ADG?Y@!wDv7BT=Uye%PJBrJ9^u|=3s!gy17ll$6 z|22KdKGp&&E?4yGSy0Vx{d0Kgzr9&8V`uEW@WIX;S%kx*;0zgflEzad`YPQ&&#v=L@cEOMb0zVUi~MXj%rNL~n?&!4ggdQeeqe3@SbO(}v^ zo&PvhQC@9FZLqvaP{n$4fLLUs38F9%C}*yBYlQoReJ0ueuM^1Wpd32MANb zvB5Oddk9DwLcP-83-)Yu}^#Vz?9`E%;_G^+-p@pE9@>mY6 z(C$dU`j;gP|G>@yVS~+BJonPlx+0N)#?Ro7!E`f|19+O5aeJxRBdD0Pi%Ax2Q5LeT z<%Mu3>O$p(des?heip6`t%YFfr1)-1hUO$6<*)vrP^|Q-&1( zd?XfcIJH@nWf(R~v{rVCyEdH6v%_=9r7{+V1G^Ion%HLRC!{;+8jZby_H;4r!2TxCE< z1*w=UWL?`!c65B7KK7in@$&zaP=1I^3w z{{k{?IM~6ai%(gKJ{i(I$XK2c5bK-{2uTkq%DVH5k(2-Bg%hOmLbVRnn~4dI8-}d? zMP#cDrIEnL#K0fH9HC4YA|hJtA}$fCg<_1v)ZI_Zob8I45}|+>n{+9FXliDu{CjA3 zR7YIRh>8FbJ+h1Ij~ul^`dB!ZNFG(;2OU(^ziOR&a>af3wNBcEk8FP!yJCq-Dpx(v z(^t7#qif%hJcMdKI!nd#pDu)jcU0NI1}dFfv;t48Vt$@Ql@w*>7J0m%Jk|v&oi}ao zc>>Q$vJrWOBSMY&d&O?p>wEE4|dm5nhvM)s8z{ut}z$!li`lv-tg7Kb7BIRzGNM{$^AV-<-RAoFs-$Ga4RV%yFPI z&IjeUdDX1mH)ZH+bWXoDn>!Oi@laG%I~l&5L-l-uz9@rFiCMz z?^siw)OBxfuL)?_1dIn?vwSjA?v(k>THE5ljb+`IUCXm79wi_|O2JS5CQYXRNsB+# z^GBKxwVKyhJS0vKsf!Lfy8sc3(k>25$0ejdN*hC*|I$K%VRGJ={ zUKkWcgVq2Fv)T55(19Acx)7rNUDCKr!0^||=nV)+=o85afaJCWqnDuHo=U!FIE^iR zLU3V^cmW_)e=23^y;`jDme1^y?86<+jd=e-owgDhbWKMy@pt*lT>ecIuEc=jn|%i| z*j%m3#->adrt7g?RmqMBE-1T^XbO7UsMh7C9b&-C{FYEK7bGE-((e*({3}0ays#H{ z{r7|5!xel!Ydrn=pWJE8m(*SQ%7l(P3Dd+b%Zx`_U zes)!(hKsu+j-QA9GOsqTVvRd{|B5SIFh9nZODXaphLR^SBmptpVjb*&Dm}S7ZWLmm zN&^y`2q33p^Q315sOgEX^P9=Q{PTtC(A+@}tU%oC*KzcIUgOg%YHl@NSd8Z?wG~m@ z7qy}+*Pb|p*!6Rt3Ph;~RCPXFu=&XalYt9DN7g`srvGulaT>K@hrzZkYZuaRS#Vjj z>$l@q`#&xSdKdYo7j8R|zK+PN_CF>;ShVt4l5?Z5l`R*Wasx?mZ_7ASzK@&`TBS;5hhEc3ebS#iwm&=PNDAnUem6Ie z%oYod-G#_L-h~ZBI|^q_w5iTV^kJrs{y)cw4|zkWvmC#klI;|6@8ZM*E< zl5hhg6qy&~1f)NiH_PAMbXULK45Bf40q&&&vz@{^b?!VWVcIrRY;Dqq7y-Vp9G9YG z4X%yhRA3v1F%SMudjh)ILX>TBE(jSrM z!`G6tIO?xvruhti#qKFNZr3O$@qNq?51yz=1JnfYk_Fzw9iBp+s9t=0w{ZSb&-qnb zc=*{2*W3CJ$G0_Ix30X6s_cGL`QarnVDPuMC(w;5BWr~2|`6Yt{l9qc+ zD;QzZtmYFxJxP7<$Z7H{X0u4gbMXvGz%WWQ^0yiP!%~7!|NVj^9S}d@3@r`%{*Q-s z!q3?!nb9sWIg-c8nsfmL|A?UR|Do-z!>Zi2_iyQxPNk%~rMp48Q)!Tr?(Xhx>26R! z5ox5mrBk{D6nGzmz4vmTea`n>=XbsQzZUm+V$C_`7~^x_c3wTw;|w{{uIrGXiP3*= z&so_C7SWY4ZHYclj-O=om5U2I*>u0C_Ch%K$&2YYNGI`v!<$vVuI!tZ)YtVZh(ne| zE9a^YB2Yj?`W4hu*wrJqQSeSvL8k>XXT#~iv0Mssz&ej*+f)W zzQh+VzKdqgb#u;F3xZs9n2jFhI|)zL#rrB6K8>@&6y;;}tu4f5n)bo)Md88ckbc*} zo0LwCAvrTqLzGN$em?*~9nlVHSpAa}OVl}A<-hEneVK#o$LtEj&|{$hmcavxiV$K1RPP{AWl#HS8$= zSA1dj4l>Q~RqESlD*ojU?BCbuN`EDtnXB4pS7;&S)ldfH*i1+pekiQqLR}IkH`E}6 zr@yD1TAEYCUP|Q+b2dR4{R?MdUd@s49m+8G(=V&_T3P{`{Sl1j#hu%toh zmc&t^8Jn9(i6n<38l(awKmY^9`G>>IPhZ6Djl|VlT*(uu8?ReBW4jo7c$5EB)`T=R zCT3wF?!NuGQr|FI8sitWI5Hpjf99C#19_bd8&f%(pVF`B-iBk+*swu!*gTuuc?K)V z99;BF;{o`@LC|mR@rOLOQRT5YW^h^i z)8O$x3}_O<**aHB6iIvZX@av|I7t(gpUflQS&>R51u6JEGl~NWpCz7>Iy9!F(Z!l& z#bU(5Owf*OAuX?^6nq!{U_jlalUOyRo%z_m8P5pD8$MJ#apgeDodF+9zq_QVQimX6 zVpi2DtBzHBz5e7jtJ)4Apy0mg)n#_prQP|=aDLw#D}6V-_9p;J;p08px6hQyzLMYp z>?<`aP2Srr|6HC}lBL?bMiOB9=8&J7rl%=nQfWO8iT=v=)R=9KDNWB@zmpucZhF8_ z80eOzpj;TMs~9k*RyOAw$&U+u?;&#i%W~%9oSHFfB*1{u?vT&hziGW+WQjo5w>)5d zBZijK{MA47=bj4SSQJl1=^nZuDTcUzZSg-_k@|Rc6entY&4Gh3OWC%;VfWqcyB;Jg zv_L&v&xUvdiF@DJp{qw5E@%FTW+482Z|_<|sv#O2=CJ9hdo<1QN}S^yvRd_Zr>T!F zPxMhl4~w;Y*6k6L{MEs3yMu!+!&4{gqvh3Js&>nD4ysA8*yUMd>3g+|AZqggwH_hI z^k7xLZ3zHRK)sCM4xe6ZBd6mXyAw{WYw+O>>N!{2u=8?Rxp*NYsTDXc=_U3fLeW3E zze(~SffWLQwNv1w{{lVzIaZ82TI9xM3kQr9pW=I_O7awMa8~S;7L$Z(43p+MF*Yhs z4(v`Q?x_>`Zf%PM_#%)%R_u$s6`!_tO}vKEtr&ZKjFLhn?(zPNJ4;|j&ZRFdNIrCU z0Ni;-j-@)))Ahi1?Zh=;-u}3s?_kbi>0XsCh^it$6%z?9CRo^SkItl}iR7kprVD@k z%!{xB*z@@pu1@PWK^uuIv8j$o+(D{0afC|hP&!La*d_zv<(KEo z*Z5d(_k55St57rXt66LX@sSu<`N+2Y>~F{`{2}odI3D%3GBe>EdVNsb)pjYS-*=zW z&8CeA?46#7I3@h>Ak!K|W-%Z$XCrU%Z$z^@($hB%cNh%K;$d1kcVsi%Vg!sj&qx* zb@gDB-75az6S~cvgVoMcJt#<_@p?2w=x^pqmi?pr%CKNG&&A$w9ny8r61C`y;UMMf z_p)zNp}4Hl%f&B9xh#>sT@b-8uG`tBqvgBU0{m=@PGO(|uFbyM7OcjPujbcF9(9MM zgritFOkY&rx`_GzU@m!RnvMn$Sqg|`=%20vzeNXBf^wexzVb~9yn4GrF~$?L25_D# zHFUZG&eOn}6*3LLc`9H4I8PPNTi!c53fd8ezWYRogNxN!gQT2{i1a9mU&Ci`z!bBK z1aaY={Zx9i`&O^iP&fk8jsowTzgjXpKzE7{)?_=oqdQ@!mX+c-#Fr(OjA_$((7NPZ zqRGyCqd?fh@Gj>L3@JaEBe^U^b0qI(P?5mvM^xU{!^8Cdafy`4`! zY7V8$5`6F8(yN%>;|UFkYfNm);pbM}bd=9p(UtXZxw1hnR~c}*;t~mR?hRuBZ>T$z zQ@Z3#_q_ILmT=k35@%teUGK@andY?1tbX=SXWEXtgOcwe-M0FYRYiVgo(mWs4=Q2iJ^L<^Rv5=q-ZrL4gG%ye%@6DG&*u6?| ziV)KsI}8(yGlyCI5*z4f${~u*zJJ53Koph(3UTO7Vtf{ME@IBkpj)%OGP1*aDWcStAQ@!p`s%vWAQLOC^>l>B5@ zk|NoB1SPa1ZL*>wHjlp2cJ`)#&99i*e|`avo!(d6l=#JxdQe9t=a~r@w7f*^82(R; zj6r3KDI7>=$z_qM8{GLh-|=~IAE>#sZkiSyq(^4Sy@UG3!RZ{**H+5F6C9CNxx6JG zPo4482J+Q?z{4PVD*?S=b%n40D3LNf0=Ltmbw=@L!5{pnAePjQJJ5qY(5(?eWSg!&p$nR;0M)wHDAPEyM>I!iNQxav% z>PEZ?e!2%E$tQ>(fu3UIg!CP&yh&BphZo8c>s-V-L9NSOu;H@Tk(YL|JBK`&OC_$X zV*yw^IX*vg20b8oasBqxb(!XQDwK`UaIRJ{>JEH2zmyIu zWaG;9QyFctSC50i%C;hN)=&%mpo`|9+IM-`Ou9b_PbI$yPcXj|o_-ZdSJZt& zD7fD1OZRnlnc^y2;gFC;bhIcO3Dhu$eMIHZd{@gCf^AFsDq)7+|Kp8l`kW#r29weS zVBY2dC7NNy3S}dz!D5t$%mpQinc10f=XB~IRV_}ra*Bl^->1ms$zxXkB+OP@id00_ z3oZM@ch6^1WnK=ddSXmlnS&TZ$VD3VIVqu^)rrEXSB?(DHb+Fw!>LG(6iL-lR~<)lX=Xj;fwi^$n+o5C4xIHsSppV#bE*x3}rY_>1RV zHsKw*&gre&E1k7tT2ccf?}Z19b~p#}dEBPmR$Na4#9L;6Ol2(c5JR21O(aFJtTxOf zr%%R*5pWZQJ-+EfPXb*UuIz;V? zyB(qzB7RlhDOh>1d-D&Sx@ol}EO*6HS=iv&s>eNDd;{KX`TqiXO7IqctBpL=9&?19 zg+_{*LR5fRpi(VU9{KL+lQx`gW&Jcohtp0mrdX5NaD%!+U>bDXFqd_rI`Z9?Keu7c zKcu-ysz?R^?gKa zG^xKRP&Wa;os;x}_%m_rhPct0r(P#$@ojW0Gw{Ws`e4UoDk% z-DExn;m`J9F+nTDCcH)TU1a{fh`L{-+TV@?(&>BfS_{Dq+_b1XxBOR|?;E|@bFAwo z2gfVC&?Ls6c)5fhOCqz*i>4%>Gh1-tQ(GB9YY94Chwf8r%?1S)dBq2(QQ!*zbE2eO z6ZH;4tZb5`AKa8h7B(8|ahFp&=J<2x?izlRf3cqgEJ+u_Fu?m{!V#ot(PewP#r8%< zQu_tMwZv380sPZjwiBiT110gvyqJbN{*$m(Nb*}LNvE6p#dHZ|F|7g?)A#!p)xXA~ z{#g8hbZk(3stAt{B3A92=crpYRrf;D9DM|L=@PGz@DFw+q_17Odb3g*67<|Aj#~_( z-Odhq1a_j)m)xlG;6b+I6**!!FvPi|y5oeMG0kV~eVfp2mBDZ4C1l*3R(65uM{oz#iY+hr1?97dSzqL(MQn{GZo_{&d-OYH+NuC6@_=_ z#y>}{wDpm5)TdRGhz~HNpT(7YS4HuSy=GH>jH*t|o%8tu&$8q_yi;*CZ9H1Gpe-!4 z_2Hb^@#bL32@F$Ny7O8c1J3O&eRRX91bRN)OGyRJb$?H+q z1)d-ZyI#_0_Q+qQss*^X2rG@PM1IU5tlHrtL_5JnS%I;uOkj@JQFVGJ9x5E=hlL=n zcCNjNxUk)b8Qxn+o*%WMdg{x#tGetR}gYWgDfatFU^vk_; z$p+i}E$IZPP(`kT$j=5TV!!v&M73wl75@12qi61L_ndn&gwXTJUiMG~N+MN_ZO2G# z(Au~b%Vovs;o6rX;l^Zk-}e11yB z^>lK58AafVvs?G$EiTD^$9oiZ*?99Hb#R$IayO_{k2JE*&)KPJg^v+j7jQfun@!tl zEInGo4P2L=O93B95sFWicxyy6ZBUpZ8!v~ynUX2KJ=w8AZ2(qgmmwIxq3nFqZ-1ts zazbEiw;F^Go&tla?bN8(;PJ4jCIYzxb-*P^ns!bC%lPdQOa*;l8O0++c6-4rWl;Ve zmipsb`isbLEmF(80@AdmM@!l`X6ZcomvmzCwA0wbiQWXFq!?dqG{kGARbRJ22S?G9 z?2f9&#(amj`ZnDH1#^CLV0iMD!*edK%OSGLW^DHr<#BQ_#xrJ(K#7Lq4cile3Z)S; zI>JDAI}UCVUiA#J=5HPI$d}n_rV4L)J6iAW9V3YFdO&!?%s?9WZ496s;c1pPS?#9h zBlJTucQgXr+0r7L(p4e)x{Q`WWxgD@Z6V3EiYVB;-hHFAXE9n|PG0^f9k&{E8Yz4E zF^{M?kAXCV2ga^8k@7QldMToveUwNEf@G2P=I+-TYa$V|o%9w@nUAeJH)-R`Jer-p z*d>CuDbJ+n-;iPWFW&!t#`15WEE4t+L;7 zon7OW_`?&SikAOQfb7mnkXgM)AIoc`Mux^#I zE6Vs=qNVY}4}}28&1wK{)>1W*!mpgp30d`k<+>Bb4afgsFi$Cb#vPE_Tjnq8^y_ZKu(=reW^_45?j4?6F zsz~sLMi+p)0B2((J7dF035$*~qQ&V}HFu1ap#w%<6f%p+;FCUneRw_OL4>~pglmXf zl7e-DydFSrjN@k2UDE2#1d|YV?PWCU0E;xwot;jgZ`ibHg&w|HEH66bldYrOMDG;m zdpMQmNVf9hJ3SdQBrH=VVHta?z-)p7BvA}yUt|+rBP|wIam7zS!-5^F_RV8(Voh$GA*GLy6!1q9a*9o}xfA(qI zodxx;trm8BN*rwF^hlY%(>hRm?CJ(Dk|bEoGM@8pGNp$*#1G2WY0VlaPY~PG?z4Yk z=+>y=spqiSUyU#xp4H&PFzL@m8SaN}ylf@Eb;N`2mFeXhf9YbM=fd?ZgG*@nSq-POcY59;f+!u!KMOChLSfI-`+bg z-cr$P@%tF8L1JhGVz|weOa1+1;jW7&ZesoLNeOVWFxx2JI8Xp})1ja9aF@M7zMu*C zf`X-rX0Q&By9{hD`l2e83adBkLWhpyzI!e3jszEEk&I8>F5i01-t=lxwX|&Z#bdpt zd}I^S4g+!i?#=t|ofp&faC|s(3RpDH)36!%&xc>efutOJVl}FC|&y0YW93GwyZNy3&ZOnzG#s6nt}M_#Ws)s zIEi5We=3s$R=Gks0^s;qF<2P(q#YWMMKkMqLw2vk11bBm6nlff9c9#p5e?8~X^spE zmM4xmyChdB0|jrbPu_p)`Cv!;KlW=!Ok{Hsa)1SCL*O74!_;|H7}Weainx}x?CnM& zd=6RsVb(#pOVJCc1QKEpr!#SH%E8(}+3MG=CcAhQn;J zye#&xN85V0l=*WdjO^H|cZk)@uZCbTLQxzw{KKd`(v}2Y!t*G+nWaMF@<*Lp1aQ?pfAqHvY?wf6t>5#y0_YR6erYZUg@MUB+4e?4+dV z?s>MUgi3nvql=%@u}5$|YS(OPK+PH}o$&9f>r_yh;2)k>Q7e2Qm0|YnnFAZ1Y?LM% z_Lc967?H*ji!8?QrzW-#ep1}rE=8seJ@Pp;9+fw3?ER?;l_?(CLda z-imbHD(+AwCr=OUOs`nqQhxrIlKW>P+jlmccU|1TL7?$J@TXN&9``V8D&swP=>|me z@9Haph$$$ctUva*BZ>YK9V$$ZS!V0%=XA=Eb-xwfcX(I;7X{!zLTp%U_t67<+Ocee z)WQ$DFLMBdKYc`*iu3-8@@iJ=k1lS?2|LkAdjGYZKijxFm7YXu+X&)?w^eYJGC$PZ z%gC$MQc!hTGJXSAtr!p!%k=zYB@=9F6(}WxtS~2TNARqVfB%aT)1Ah7@X! zGD`8DdOKFiTfWf{E;R%W$uwre&xY$jGj|0CZlS{O{my82R$pURZy!g7J6HB4yKbUJ8SU(O8?6g)5Rt1Cw#;$| zuOjgSy19p(5P@#)k2AmkGWWvu!=@=4WIg==tf!Tg!B4>If&GHG-7iSaqo~%Rxa!hb z*98w-N77h961joXNPg;tzOtmZTN8~Wg+#9xQ(*YmgLGG?_*I{^4ra=#Mwr0+UW%Q% zay^~xA-Mhs59$5m(}IsGW+b_mAv=iVPsLi&lnsZkp{bG_v0MWnPHyz z;Xh|ihw$y-OX?-E!eiR&&$r5A>1ElfCA)TX)o-!<&`;g-m22rU!UwYh4wDt8Pp@?0 z>a!=BQWcGk9|EcZ3FspbkRAfw5Lf`n2FTmw9*<0LGiPD-;|cb-2-*|)n{$P;v>z_M zTFHEK0bK(#H#&syk1Nv!{ZO3RS!;(k*F<67(ctj1nHss$7tqAnY`s!e+=?7(#z6S| z)ImJ7vZL+sM^aYkn9b!}Ht~>MrCdh45!6Tt)X&q8jkcRqw3JKFJ1g$DcTL6Jl zP7>0;*Q&J-+@ zvXmzanq($Z2C5x`b3gt13(SCWJ3yU)v-->~Tzmf4miJEUc@35mzNLdih}u z9RV{1#+T3JOQl6VwS*fllGUng!uZn<0K2Mn5AN+kX!^aT9G`VF#SGelx4h(zj_r!#xT%v(a6nzaJz5C(*0we@#c)-;E=E6d4`U%EfTob zq31li=cYGW_3&+r|51$q=>lg+RxRi1YbG2<3JRS)y1XD4FmV6AW73vn5=Ll}j@mLK zU5d6+>d#v4HZp|C#qOI_kU>-qdX{$PWoPVI6ka7yuEnf5^|norN~>9x7dULJ52L6U zwfi(8uI6wR83{=&$n8e2^H~c+5riCLwnZB{?gLu_39J$uF~*zfR!p`#qhJ z*Indq z4+b<1O{;2UjX4@8COlr+IyH0DHxVXx&&N~=&pI(4h{nFvo`3OD68wN0MF7_ug^`&P ziTo+)hlefhA&9!qfV$pS;6%T1N(BddLzdM#5-y92({~h)0ZkPRlSBk+?+_ z7M#IE)e*4<%Gp;I8u)6iD*SzxqsBaOH^ygu;{qeo)6-`J6b-^!$cS>U(IqugO)DAZ zX1sNIf;7rIY4uz*riogsE4A~d@R@I58^aSDQ)cFYzm!z@o`J?|i3C*WS7|5QkxgQ6 zus2rO-y^#jw6EQ|VDMH;?aoBPz$WZ1&N@Zbt*> zM|BAJ$-zl8upyF2rTqaKtxV|wGY(_24PZZ9TOA<9ZhU!4(w^>Cib}{5IDv=W7&yKy z5VM=G!`%-+p z%!q@TCuw%p`}mp}^6@;}8*cWj)q3C0HM0gA4lo+p^r-rdhh4BkIik;emIWW-BHhRn zagLx%#4;syY+ay=hld+osq)#z6*e~F^?Nmp+Yyl26zy5fv*4Yc4RNw3`S@pS=Qb4` z+VnOkD3W-2sGm(x=1pId9pUxkg>g|C7Q}R^Cz3zB07M{hb^vj1U1f6q-HVL(7sr^F zTc`5s(@ifNq40S7p{JACr`r;S+c2FU=%VR|8);`%CobP3o!)8InyKO=&3W2xm0O#; zg$5Y#1;NqMsp)4qFlXBZ$gQK&6p{$S@f3Z$ITO=^Pn_wZ%)%RaE4D^ra`w<-LEB zc>j_MfPA_O__VY{CpcI%$ftcMCN0l1oo6=VF8AU;J#oy~ZGYG8uGZsj65bNFa~|iL z;!X3jvNV_@LZ+)ZdP4gJxZXr^4udcU6Q-fNWy z(b^4YRiWVbd+7b%`~NSgEn`20&Dv_SXTKmRw{<5cQVU$66dnLy-icTm_h*`q{vXYK z*;T#Q+?Sy7tr2y(@(4!G8zXzFT>Gur*RU zkXJ%+HyhM@cAoo)TyVVMaS0sfu$iT4%%TsT)i+38p35?@oF&mc+{onGsr}q30OwXc zmF62)Cue~E)ao#|_2rNTmLwu?0=WUu{Vg;3mu(U{C7mtA*FS8Ncur^udA{&WLX10) z(`i=<+`{T<>@4dqK>H~b6N%OB?O+C-J@K`0$bK7N6q>HT#qC@N)X2NU6+K>@3V8e0 z^Z?;&W^QT&X8 z+Ts-h`D?+w{QtiBTT)vzSy3~+jUisUQI_^pLo`dp_pJuR(X`OR(6Ojy<7-hor2#!( z1xz&(0`Q=TKCc_3TjgO_?ABNNEkD_*e2y^ye(|I=Y>SR=yq$dAeJphB5Vk z8(!X((aQzSecCPmFOU_+pu5YCw2KeW`;AZ3z#`j*WD#{$E1s_XBETs_#I7Nd)D7qV zOjpT?p`@I2?JmPX28>Mztw?TO!|}a-HFT|uz}Hx9t&loCvV6eV`yar`Xbf&=u5@1y zQk-cOO#rx6{5{;tWyo$^tM+um;h&4k#QwWz_Jiv0m}nGKiO<_YF8(v-O1Sxh@`w7c zA6Mi+IXzufR{hZUUn}N^8rtRavR*V_Iy&ZM^eta?L!tf?I9Wy57U6ONhPKr&QEd$o z9AP?JQD)}v&EX457ql^VM!??3@H^E3uM;ek%ni!Bx~c-1CU6SIGdv`UCQM=#J~WQe z-kAZb%4pNqVx;^IP}va#Id_n!(~GP;aDPx#>@-$&${pdn;hE(p1`5?}+gJwkU8o8_{(p<*wW$Jb95= zRdH1Z7YHUpX_a|pRdn@I0Dz@h_FFUf5mO8*`I_ewG@o@T~%>x4wPc?`Lw^Iu*jvcWR)~f{oC_)e|Jan z(1)xvo2_LrBY8v&28kWa29s3(XjgRtuvUgKQv-U#nGXKKDbEDLSpe3+Ri_)jMvI?U zrThY5!58M_K96~@Mv^@!7VEypU}2sgr60HJH^05}MuI!Ps5eVwwn%q?PywefQ|v8p zmj2Zu9<)##SCp7O8-_%sP7-50ZJ9i0!R^w36;YtE>rllD_#)YxMXXr0Td0~NAV#<* z@*e?ItWo2az;Lm|Qm

rQH*8(#G%7J@R=6PFME}p)SZm*aIwtOmAlm{P^aHHgYyK&3+;cn0__Ca|{vZRq@Z^m0SJIbE2T-BUfro4Fly}j<{R&o&ihumtQpQ9N*-*gFI3FU*elhuqKiHH zjt^dDuY(P_i6^wATHlz>lcMh5_6Eyney@m_RuQry&_?pkt7!k#$oa~vAUA)dC=&le z-|30dz!NHuTrr51Vo$-LWbX8IHgr3Ks3>r?+xcaR*Jo3bXG?U#Tz zXDV%N3I0GzU)0kWKDX4EmXI6SPS|}lj9vodWSl3s@D^?*20L~47t9;vf_(ulm@5N^ zGMK~NUJPjIRKHyGb)hhMrC>MhI!FlCdrdC8w(|P(8dz6`TKu!5G2$ztYC3APTU;WQ%*cxOh>KrkNlMRqm(&UXbr+szWNT_JOlVTypSi<6{WW5Kq*k187^s(v6U z)vFJxU@{pDH@Q=Q*k$Zvlg4|DMlS$sD#n(H>SDSVr zA_=|09Ah!TpZvclK@*U&hD-T0M;3lG-O|h!_CBN(z#FS#*i!n+g|Vy<8ySw~^UcwX z+OBv3|IsUo+3W+27ZZ)jn21eyrXwWoO*LgF4V$IK`30+`#T}>Uwgmk0^WO+ce(dgo z7oU%n6BnRx+Bm$J->zH92lHcx?i@NH(1MlebDm*(9%oU4NTmf|lZ|7{>PldID1r^( zeD`e2BF}D(Do+?+CE?<}hSkYom3e5XXaxy!5C{@&*kiI>vs)0y z(TT0{A$G)}P#eF$@53NUhXAFiSqdj$#vu3IheBZF&hVO7PRG4w(J1n0#Bno80{q0$ zyq-9;xT|TUSY?nU3sM>_0=<3qfK|736^)n|nDWjPU?WZD_k3^D5`UmcHAE!HLtGI4 zqrdxI6lbF73=Jh+?L*?c1fpOVQ1E$zj0-IFHwE|R)&#rsApdU*0y%K2k6H=%jc#&Yx+L_vX)uLiC6UVnd!i3_<0;qgr~FDIX6q%kH$Z=trJ zGh4;%&?{Xv2iE+h`|EZHqIv{SZD2t3{I>+thvM$6@NUc-;3D&%c}J3_LD={FaezVh z*8#>T@M&q0jbkkvdNk*LqyB;5a z&?{RJPA%#Fs(Xq0dd`KNL0q4u{Xm)c(tLs1GMnKw37sj8X@%OOplZC$e&p2It}Bar z$2U6fnB#cu#5%FEsEpY;Dui0qGjp>>IkcjUi zMgh@0256=nXlH*&G}r%M63q+7a-?r>y42KjOD{0p2uMauM3}|NJxJOyjE0KebnMt& zRc7OKk*BNWbjxX;*+rldOQBg8uwKLRmob&={*P>AE=c1#pYzn-P)1hQCUF%8t6x*b zSIKj6kwkoEa7r$9JH_F7H?)B=kd407KS}sEt4TU=AB)ZykQ7Zqp)W0eINEqBzuawF zvEklCY_!?{c=X)WO>tN2n7BELz!)64POKFjLw5BIEWhG8BN#9oE}G6F%2j-mC*7Dn z%l!No=SuIO5p1eI=KEVS!$4#f$QMIAeFzYwC+f%wtMc`>A0d7|3ot1S2(y3kST@h+ z$=JIhRl;#IxavvYK*bztn=p_uV+yM^SXfrr$7aP9c_E))_!}vUr2iT-?nYAEc@D44 zU-Xh6KGtyylWLrS-`$VKKi{fQ;i8Ft9PjZVhtzZctt8ewtXp#&Vd9CoZ zJ>|EBZwTas$M|qZ0)6(4KVZ3{&AImB#^iIquF|LlO&U~rP4F6-X^qlVCP>{fxu;&tHs>c-0(wwFBnK_CE z=Ai-;(xaX=E%!a}P*VPB z@K_KIO-LjKLn|^hGWM=eO3uRM69(efgNri!nDmSER7r2t^4bgEFwXywZ-Q4Tp!GJe z95Wd_zfJcNrDhJr`Nm63S%!djwid-P@Nd%1K@P{zQL5OS^z#~SQOW%dWCqeIqEyLL z)__ux9uy1E0Zu*E4Ui?9~Y6dKOPW9iuxLW-e zxD^AVofqL&*7{Q?_26&_jhMBToijXhOPQxDaDVW z{bIb%oO^nD{tmc$s-8#qSrA?t5A8iO!aoco8|Mn4>VgldkK7yg;0&1Kv%ugQCeoxd zra#5D&r_m(eU(drfI8lI%nCY&ydw(<<-Wqh*fH@`Z1kZk+elP5jq=ZiY_?g{qoW;n zjh^>cbmc{<5BVm|4tPJch;AyE>>OC@+Buuk&YlYvYie@N1EQ`r+}fOBs031v!pfbzk`G>MEu(x{fnkEqYRfN*a64Gx5uWR}tNR z*QL^ose6!C>#hxZH;ou?4gsT&H|lcd^&HddC;jb~ZVj3}Q+I|v@MC9QcfHrK-<>RL zfeh2wt-_dQN^bXl0VD!h0LOs^&{&u)@wX{tfL?{q!CROy%mYJFq?$z zmgCXcSJEL%T6om?c|>9A^G8$JAHE2p3XV{J!fHU$Isf_%+1N;>LbX3LGpjUucJ}Q2 ze0H{@+g~jOLU)ZxE;M1mt*+O5;b~J$1=))b#nP3p!s0#OL)~4at)2rL39#kE3*nPD zMijcmIYh1U_i7nI)J_0uDbNgjz-mCY7~XcvbAGcf2<=Op9ey=~6|qEbmL(Pq;xkAY zU?4d1v*@4ME$L;2l?3cUn?B2^S{9)H<}?RgJq$1^pjq0_9N)}&jXNjCtaIvf+OGHN zR@KQJ@p~Kdyx0SX3w}|QnBIcQ%6YPO>33KN5pQ&LfN6E;@UFc58^58;#s=o*kHkGn z0W!R>wuZoyK7Qz?Zx!OE1YHyeyn`Gl%a-a}1`jMhr`ptCbOCjebGTJsa?HmNxoATU8PQ9=(0vxBtSnSs&VG!gr@V zUZjPLUt#(Sa@2W7jgeuoBL0f50S)sppQ=nZbbFT@*9EJasZ9{d6Uh2%)4j&FhaIat zh?prrjQ`#+)^A<--oJQN<4A;HLmOy0YhTI;Nb#)i(xZl9 z2lPUWUunjjLcZN0?H)U*Sw$*h_R%T7jUy7wt5 z#wsxJy`u7@Ug@1Py6bCfcLHQie)fnDi;E`)*Pk4uBxfIgi%-JqN9n+2+|yu_Ge_&7 zynl{#L4utIg8fE%Q1rL0>fHo5U^iV^Jy&=sWRe%6;c@nJ`L-~<(s;+*^WgSk;>`?I z66%Ma8nd?TtNOlq1+-hqb`%+8E5l5|nBRZmw9K8CVvLLvrBKvwykC?ZFlud$u~2P+ zKfsAw3tJ2R`D%I_{}BP7ES@IE3)9_|LEjmy6;zn68JLB@Im;aUREeK@7EsD;PUWf( z&%QN?<{3aU*e9PPFjL@Z`7=eA91-Eo;N0frCGacFl-!G^5UPU{$bm0D5kK`sdY$XH zJ!CGar(bQ@w&gUw$>cYhc=Ak?mRQj~MdZcj8IGo!?+FwQ%OpJ{wVK0yG#};Ch`m;- zdH7@da5U2%9ujX54YPoTiM(MwumX@L7N{Z7=zSY{a)Bhb7Aw`d{Y9ScYB6KR>)B;m zHUdG~s4Uv8@HW{~zJ@9KQ=WFjjNxOmT+?A*NgNXm+_vl%h2SmVuf7ReZUQ+Kx%qmo zqcs@dSZze0yt)Hf0VTCc&r?&^5B3hcV>8o_e7fSnt@xod=;lyaZ!%L;5 zN)nANxX&>N`b^E!)8O6CS0Xb0q7Sz|8$|RxAX;x$0v*gAL^Oc5a_5kZ8@oW_*OL8M zykSM_nPBQgIV~WekQ_@npsK(2JnE$U9ehv&WmspXS--n;*AGZ&SB*{%g!kI^`FShl z^mFscN^;pkpLV+6`_v*cVRQ%yxmV5MQ%2>nK*%b_M+pzW@1j3sO;sRz763g5#T|rT zg?D;@<14Z(?n4Mq$XoA9S2qJ^KES|PilC8(!Lo&3=H2C?yP@Ye)GKcoQU3{PT?{a& z%glI)uNC{LVmTV*%*aTO&O?HhZ}Nhzd6Jr@jz84UA(EYgeFuWljxcz@wfaF zvwW9+f*L7tB(5{GnaGV+R#_1X(*ogz3e>=DiIXu`d<_4aGUwtj=4^&cVo^03mG8+L zJ-uK3x_4zxQWZS;ST6zvQOxXN+8_UZWH=<>-<3vz`1GO3Ijs_q&LxtdMgJ!!oW@8N3^ z7IF@GN z8UqQb;V*$rT83a~1|+E@9Ganm6_**;?@+5Yx!|Mj$+*R6!Q`Gm@7H&g&D(Vnmh=#7 z1%v;9v|3VyC)Qx=@)V;r{&W&LIcHfRhQ#kBZu``vpdleu+&U<=Z`>|T%K3ZM_l~no z__%cIJb+oXg!~a!sd1u%oNQ6xvs$0YAAdv@PclB{5WWGL8 zU|95l6~ag3jPD`cAP}zh>bO;6X1~2i&RT_GA@<7k3Q$C=fC#|rAPzEP|3T}kLZ^Ro z6A}_~L%wA#^sm;hA3hKK^vdyy`A{~(juw3Y^`G)cPW!Na6=AhoJpu3NuQ%SR5*X;@ z2_Ay=!9d;8g^KYp-9OYVSrp#FR)Lw&ngTqlZ(6CZEA+w*%JpB+;u*!NR~Thiq@>?;K$U%O`9lmG%qw3VMhShnqwna-uknP^m9kCv#Jgv*0ky;(u%X+%av%e zh+@=v34nQzVvJED?&zObWaFw*6-_!rNzJh4ff5Vk*YB!Un>E0@h*)&#zD|^v&Nh_w z&jx>a_Cc_U=VK9!enTnv%NJE2O91PhFP{|z+j1JPLV@g&VUJCH_gBTT;i=@VmZV-) zM%C4?d0tHXx!I!aTeArJ3^bRjHT&Ymcns+3T{U~^#PheS2FjsRu@9}YXy?Qhv69Z` zB|;A9ab`>@oiw6;dJP7aAL9&#)AYYN%~=FJD&H>Y>@#bdfUFRr}6rlT#}>+ z7}a!lIF1*^OqAodDP!!~tX>|5v%fyEZt*Q@SgCu1%A2)ZvSwpE_A;(b)k_prvhNwI zLe|iR_Yif90-w+2p<>ir{3yl`t+*=-`+D?}_kNyaMAMSime58Mt$MZFZ)o_Zyi~xR zHauDFVPZKtptJ=)3xf{xxnf@9Zq+z{6*>+ zcV)(xmQXYjo%!WL`&?;q_7sYbKY1oTqmMC3ts_4*HVG|_8Z-Fe5;-^j)q2`01%J*R zOD4?f>x+ItY2;(6V8is{*396ZOg09_;=J;QZTKVlzfRg$0QHYF8IykNh`a+>xgl$` z&)Una^LMG)AE_-kiY_Q9MYR)FzZ@7JBRRfpzCC~SW`}yzuf%e2l(Ew3{ZSvB$YP;J z%ZG4GY#VwZKBg+R<7$gSUwF$oZY1)3EqlaRUZ!5y(5`Qf@MU(%jUWQIeD(b`v+Q%% zg9N6@&Qy`HX==-d)fnRV@p%*M?ctcA!?9UjvwR5~>X=Ix*PXwbUv3exmNee%mb8)Z z`p#cLvOe4U1^j5KalgQ5NqebOD^_FK*QgdfkMVwIgaQ)gDiCIT%=Gf#w!QL-tI;xY za^mfkV^Sql8$-JU;xjU@x-W;xh^Ob)YgqJPqM$5EdXyQZ!4nrI648t4648pxjmjFQ zFsQ!p4sMF{?vD9E&!BU;L~`3Ik>aWGB@p1f&Usc{bV+37wPSQ?%BR^=>V2<=2t>~s zpr;m*=uG_wsd2U0G)J6LO=L4c^q+CMN0fz^6T$&ZG^}S$55W(w! z;0dUmFJKLT;J;GFlM8%R{KAYSq`1931}#VaC*Rky&X#M+wmPCeh>m4uSxGu01?RtK1Tjq6XR4+Mf)gT=FK&o z)3$8$5jz&Y6f1qfwBW0oH8IK_1sJArNyv93$KC@ZX9B%#E@<0v#WqCwhJjBpLe#6j zr;m0D_xrx{Z+@I!>)7XYvG=jpI@V%eV|2}L$u#S^|CP!=z`6=x&Cq$#@SiqU z-}jG8^^%b|1CILLBO)mAtBpmj@r5VqGUpCzK7wP*axssD*tWf%pO^rPP)UQw4LZMp zqL_w401@JT3om(16_z=VfQxF|vDv2a1+?1`9`11#>MmHiu@fa$SJzV!S{&QmZ`*Bh zkr!xDdLNCcc^|7}=2@2|wBo*M5^2ZnRD2l$5xQvy-uGoD}kl!dJ zXu}0lbzEjNM3;8@ zI3g>&A3Ic)Yz*gRUQADqsk{7^^K>X~`qqm`TV10ZvPZk%V3LNNI|Q!L8zGb#hI03$ zt=@y>S_76V)IEO$)aLfr^`|C+z}A*qPNS^B-d$q3vjfFL2HaEf@Z+A`;M_~ai6gqI;NFGn zul0N!Zm#tMP5s~lps34pyBes0;C4pn54IzHo zJ9r&X>B#xo*VLcL8eUXi#7>g?tO~b1A|o?hrdGvQ=d@1dc#3=Urp2Y{v8vZ8<7XY{ z4hNWCbMS4}NK`$u9}c0pI@3S(w!7C%8o9O&GSM8Fz18ZI``={RA)nPIFlaSshKB zWgouyWZGlH7<~6n$t}nF2bX;4?EP%b&pMvhh)rc9O|3PLp|TVOLd>UzsS!3B5j{c4 zt>FVV7y(Bs4-5Yut(1%yDeV89>+(P{Dtwi6a&zQ@P>7#?OHfe@HMHR%g&`xl=}5Xep9gFAa5dN5`lc_ zx+pV>G|Z7IkR6*^k@z<*RskXr)*ck$e^@UATqti#e3JreC1Ji%)5_E70Rt!x3H45V z_g2Z3*2*c#fY3cx^pjJV6b7`=KP$7)~GoL>=M&C zGPSEwlDTG6=C5@1{t+hYg-qfTz(i4n$BIWvBtw#a`t321M5#BXO3HKu$>jubtG!P$ z(qdQvc|D;wWB6l`Z!)melHp}|#%45hury1lew;^J%tfQ1YEg$o50}asAlq(EHN(SelQce z-vA9NgFO@ZIs2)~Q>r-*g&rXa$29lS4pPNYA{N#-O&#Qr)sus+maxAj&Fbi_T=Ng| zj}%fpc6T@Z(dG@|9*A&+5z^6w(VCv4Ra<6kyev&>Dp<=vn23Z_p_g1ij2U4Cg+`zJ zm#7~c^)kbkd?XU=arjFA0}=Yqo>kr0Z*yMhEo0)K6iY+=Egw3%v5wWzHDjr-Luy9c zYJ{I4PVsEID=rx>c4@8gj{sWha^iV^zo&9RoEZ3qNA2wy1O)gmqekvBf80bD3fsj@ z^u;|Ps#6bQ6+oVRKy63HllH2mvhnH&ZVgvZvsF;Zwpuev=(FLU@tjx{j<9*h%|zF#1?K^a{Tf!*~ev^ z8fJ~y9Hb!2nc|O@WSzihXhzn~&yb%N%m78onY0=g==Fu9#x?kEM^AaML2dyXm;15N(ulIMkT5P-oME6p0aT;z%XY)5j!MC*0&F+mZ>s3UbV$iN# zsfX|)`E}}!7VA^;sOdMcbZs=PjjeQ$+p;H@Y}ot+{HA)}0ru#-jdAmJ>OyDUF0SLn z*N^etUL`3w+*6qS?UA~WPQlWIbwVPx9%upbqp`E}G_3-hG9j0MTcQ1U$6*E^!YfD&;Q0fsrOH5*N*_UwE+SwHqh6)QVs? zZVltrYev5Omnb1g1_OMo9l))wwr}89bQ3Jt&jrgiBzel5p%?x*8C-@Ml16a3%+(P zFHBRt;+r&iaa<5~-&_tnsALzYWbv>B9`xw9O8PU;-{sF8;4Zk)okntBf4-`@u6tW_ z6ssl^fqzBkB(K)yFN`8wl^Bp}fEa*+HWH1y9ytV5%%B5V|@sgcvYX8lcsyh#s56)^B5fw(YAe3ED_gNSDPF-+>;T4V+ z*897k+}wlp*aOx>J_Y0PZ;?;8aW1^4M_~hQ+ca`kuiBbmi(WGyOH#^M94r>cjgRmc zIX(4~968Sl07pO!jp{d5_!?Hu3_P2r}4mW^yaO__A-j5!Q;NIf7<-k|=z|()fIBmc2Lj6E7ffNMG!96k3rTzR&0N zaSNWigS__u@;(50lhaZk?B>>N1|*^0121yz*0+kpxzcG5?Rk6l=>T;p3PQ%(OGduP zal1N-uQF>#0WFc=?8N*{XR2~%lt#ju>0C{|oM<^JwTqR7xJoE@K)!Zmoa6rZF`OjB z{vC=0*v_%2rxZzJFULE|0c0`cX?B~=FYFSooirltS5Ys^SnT;CRg4a&NR_Bh=k;X* zo92rvQom2>$WK3)-ZJ3s;o=wy3dYAYK0N>67#+`VUWkFsg;U77+Bli6t)ph6Crrl` zF%Pu{96-l3$r$GJ_?N>Y*V%O}8n7cPY;Saw8r((vi4f(=r5T&O=4~^wIQ)97>XmvM zMC22s5DwoMRNUkMwpK7_TRg@HJn>hRU8)|-ZWf<}@K8R8QJ_6}dL9eND1^;+n2Tm_ zB9ie2h4W9kCMM^@+zVk90 zZ`HAUoF%&oa`iRr`%jtgtD!d%qy`e_p#C0Pi<>>nq65F=?V#{2;1;5py!1$kygN-ggC^b6n(08QQUnEr*>V zhvBGoIwBc{6^crDf_>DT1IuZkHqtnc zQlPdpD=stAR=iewvxUk2ik{iumP!RHZg3%4`V61Fbpfmaya|Q96cr5#!uJjx;sbPt z0J@9>ugbf?vHSkn*@pKuPxlJG(AFM-qS8&KZpTDoZpk67kYRYyP*@VZ4`X8F>GJwI-KaLap21UWWVWsPj_!i5bY`dLnk9+c=_rb z?1HX!x$m2&7M z7OVA{xX9&kwDU)1=evak+5 z4fiPE3_ZE{ir0p~U~wjDIQa&#jPMGEvjfSc;Q6Z1#>|wfoP#d<7vk&VeJX04euW(y zMlMM3SDD#JQwF~-<{nh^1E{DmRLB_g>4QJ^fY=79UviVp`SGpLde{8amJD?Ley0$4 z@bEG4Fkxj~;N7sn@ZInTaQj=$Pp_2KU_Y_UdnS2OKkduR6qxfGKXZYX?KZdIRn%34 zOE?>N%`B>6KnvIW+NVar^zB0e1G-D%B+xyWAma)|y0YM78hj)iE)tg_mBBC=l9^oA zIn=S7FFsua>BfeR(H=+huL)j5Bu`KF)uoMD`((xRQZ5*JBt9d1%bA&JO(s|OcB_O9 z*U`mP-HhYKNZk&Xb^-#^cg}@zxBUq|5SSHyM)gewuuDs-F*OJrGyiYdFXFh4*cq>&@|Kv)-R-~MBSq_6w;X}iSfOjF!OJV$V|5DR$Jd9%6=h2t4 zS^T-@puq;_t#4@@ra9k)+Ip#XJ$)b2e7Qq)K#$w~-$p=jY^pNXAQmXnBoX=85ib#q z=pC$f6Koj1kmc|=%O-ucGL)Oi6nR><%z|7^aY;D%tO;@YUtO)p*~CWR^kzM6w#BVC zF8iU;KuCAmbzZ>A4)O-eSl0qmdavb-Trv&RTaKMHJ&DU5-44%I)e)ZEg+Mhjc^AbI z?+Oif!sDC3#JrO!USCmIDaKE0`vk~kpihNi`_Ez5hAa2Z80vLQnS1Hkq-x0myU_hftV)r17%lYehZ?g-tnmb!pTu=`)ioGy z-ml38$x~Utx`9Ct09P7fWj>i(zlpR90g?74%50*7;U95OBxuTCWpQ(4HOY#(^8848 z>ar=V#NB}Fyc97`hqr(Y>HHljLFb-V(J=3W#!vE zsM;7=7eI4;N@`@v6M#W0B1eYPf|%9Yu#gT} zKLj9)D19?zfnwlSH>F|yi-sGS{`KIP6B_=Z zZ$KgWD)gXCaH=0y|1(%>utdj`1emf-xysj;<{IfvFfRFD#5v2e!dwyF$m!VRB#wG5 zkSKR5$Zm9Om!b4KMt+Wh$K`p-*?w4XBW#B}Vbh=RS*ogCb(N15^(IC`=#K1-np zJrV}-pFwRjGTR835K1L$Va!daW61#RDH6kg6x5fEMwJYxeX57)LiNv4QrU%Tsl~ZU z=anTU1Z%Og8_z|tZZ6HQvUujg3HWw zESSWX^6n{hFT@bP(vnKe%p|a@cuOFyDwcu4+(r~H!63dUuVrB(ycw4#Bw?>lL5qNd z0L-lzWMCjn<{~Jb3VMGipog2VqL#@sNYKK2LB;CB7@FN`wYeS`qH6Efrcot&+=T;< zZ8C)EqS@2=2MO=$Bqhq^??a`4BBsHi9v|%|t||L)emMQJi)A81%P@)=u_Fj<$8DaJ zr=zRpXhl;LTACg>+P%HiOMrPFw1)YC+^axF$7^j(o3GhXM?rBx(c0R2L10R>i6QhH z)x-qV8Bscr9y0LoahtdS%#sP3`bK^SRuGXv;X-P})khN%HFvgH)>W`1uD-8O>5^z?w!QmiPpmd38P$1a&H z_~Qa2{}FhC#P+jsFd(t`ju<~R-p{sZ*#M8L0)KKb4cvXt$)(@zv!Dh5XS)e0OT!r(wGGB-XT&+kVxTjC*{8&QaO~b!T z0k&4pmwE1XQ@sbf=_#fa=dPK(Im3>P>#?B#>Y{-z;^-i@ZymfIH^Zs=Pl}68XHwH86`R@AROMEa2 z=aKCejt}* zKtcC=!-?C;n^^c+`PS;FkUImb7_LPq!mVBO;2-_HEr5X)1gq6R=Yeqgbesg&i;oh# z*cullLdhgCnjeA`h=jzxM_^0oNfF3BUdGF|Pku$}m7Fh&6e!^9@%{NrIck0l_B((c z4*;G60PXoqAb$%-^(61E!syQ`>##i^tDk(G;7t&v3C%bzD#VI}ou&YRCvHnp5%Mfd zfpOD~q;|DzKAR**`bn&HM$SOM+S-x?3-7woK$83j(IY zS;z`Fp8)<pY;=P*-F^Xj zE-*DKyZp$#cu4=(rQ-`A4C3t#9KeSy}f6?E7>`kDs)$$n3yX)Nlc(|aBj`3 zjB!g_B+f!g+D*wDIOk>3k&{fkL`%MD)#$&g9fE*} zPBIPcC1d)uCuiaZ3nNM_i{~#|E#(jLk%*}Nrm>v2%Bq|hB8RU+tB;W-JujTJxw#pn zV$Xfx4p{L6U{?UJ+$bvs(9aKn+3-41oFY8sNCN*TrKNeWE|kBQLdEH>iK3FLhG}K< zS%I1rS*CdzD(k6>4XtF`#!i)6vkN)|DAaa@U!NG3_tfX%mZ66O#O`mIqVO9HDikju{61s%7Vs5VZ*^-g3K-# zr0DO8HvVJUp+kY*Ugj$%rtH@)y1MUblRvmB%0vl=f45atiSD~As^LLV*FaHC`ILR2 zt`Cc{UmRZTe_wO)!>WE_b4e2KM9d*VOLfoRKZVbd$Utmw2uy?f$fb~~FLoDl?D@wV zo=!f+Y9Vso3PlV;pMb}i6=m#C6%>-8hkBC8qL!Jp#&eRfn8+b$ypCH>TF?X7EcpX7 z*;__N5M@+(`2z3TqJamnZU9*GU)$k8>mR@Z+M=khk;9LZz;{BmPG0JGO*PhFs)r>iZTl?N;GhRDJN}zl z!a@~DVK^Bhl-?0v!*Q!*B`t}K4L7_@NoOV)<`k-{j|u4UE}z6?Q$BHSW;qB?uQBwA zJ-uclTM_K{h)uYtGin*0V>nyZcs7n{!hwxsy=-TH*odRCCRL{3esRMf^eWL_vRTCJ z{`z_DL1`f1z>4qlPX7!I_|*UdvU|KR^PRopq{zat5D}lS76&HjV((lllk)j;uCT6Ihc@lAa~!4y$3i! z0h|GEUxEEjo122iHG5CGawUPQs3_mmRWv4$rVJO~Jq^O}=k*F0@bp1&tKM(4`R#Cl zTKQqySMbQQXVKNzjs;sgZ7Y|$9hW9s{2tWTqnq^{enw?_Vs50|OJ0S(;^KO!mNKPss`~F=k*79KVuGLSreY!`;R-Upc6}%8@63|53SIfxAtC%x1}wSQ8AuF# z?9OW3>5a>eptyLPdcbFKP{1f}RRl|KU>>(~(M9AAFyaHi-~iwr6jJ2>D=t<4(xP7J z*Qbcwh@pI{Z^W~VoM#04%8Dd}Z-xOiuTY2m-j6#1!is6tW=DXPFv?(c|M?>}@K^2A zZG$}IT=)!%CU;%qJ-<=O1 zXWJ~6tJ(8CM=Ec!H?o$mWSdE4mtTozef@V9RY{Q(_~x5O|NFLd(5#?)Q&%~AjEXD9q2l^eE1YtMBYaS)eJ_^Y>fn-B zZcJx$RDK*wKwlwdB-6faJd{#zGn}uzFL?4iCko1fr^vquxH0wtVfH1g?~m#MG)Po& z)LMlZ5@RPZs=)WRhReX;c0j<5|5ne-|HnjmT{xoLzcA%8J?{mvf#S`+mIlR8wk8E4 znU3gXs|s9C(P&b`qd!IQq)4}=YO(zz^GRJ{h1X4rtg;0yI99ubJ04zO;1L`aasO!! z&v@mOxqs{~1h&?9e$O_}lt98WaKQs?=*j6}1T$PN2a~Vxm*D>#Q~YNO%FRf4gF(*(|a z5g98!5}hAug*#Ndt8ggVa(&c_fmEL{>oj(gR*Tq8TYG~3UfdnmYeq*TDvdc2B-N>2 zmelW{3EoMwmN*(}j3zbx%rg{M;#G~m5VA}v6^yC{w*aXzNI;ih!Dp)3$1gU*yKdFp z3mpBA)Fs6JBi)JOiScWOYLZZ6rnW%xh4(IW|C?sh-Cd-mn_YSGYFX#_3BcajgVdtKEO~DR7 zqI_QPV3Zi2F`wcntlXO58Ksm)t-ffU_`0yAulB@u0##_zIkJ+M*0Ci$mN6{0jK z!uMa~_O(Yy=v1>dOvq+d)`Jj*nNuQJ(*kXE^I}F3}{P51_QyJ zhtrH?&&xof;(wePrMUALMYrtNlt?7go^>5kQv+!;G|&4%e8N7H9f!knvvca47CMm! zgu66s(alFdyu?}Ya1D*3l?z+oumum?;c@dOxU_P4>bn8z6Ysk{{TT`gCTyW^RY;qX1>&h8QCey@@!jKk^$IK^;#p6D&*K z0X&5aVI)sXzn8Y*a}X~h8Ryxv+OOU@nL%+TN}I1W`76MQO}ie|+IquiwCbxv`x=-o zM@5WiTIO1AP=ui+xCI@od;(z?u>U@IRGXCJx)IOnPUb`IfwVk(#*lQYz{Dwo3J87@kn?q6LBZWinL5 z(!*$wr0e2}gHY*e864-xzAptc`7}SL!Xc9SmBy2A)ITkc34_PbX-C7si5v>%4HWy+1;5n0a&1-`3x}trEjM56>{amb(?H8JsG(qCm5Zy7hzYL^8GmsNwheI^n zy;7S8pYaIzjQQTt`QIn$O}_zo-Wv{pVO5~0ogtJXi3$B2(+5Exj|BR5 z`%+dAF9eXzF*2(Ci+yij0^>I1IZx(`1Kg~%RQ)}NwoKt5Ht}6G9uKO41*)kuel`9VS@^g2gWJ5Hn&70!c5O;w-%421U6_ZEbXW6fiV9XZ^M`L+@w0TI(iUJE>ni zhY|x3QANpd&7VOA&HOew>(9$Y5lX>UXL`O)#VCaNjms2ER-F z^xjC!W@coBxVj6swxCJ7Zl)fYLdtyU;z?^a4XyIsI~aHX2mt`3thMs^7spBcf5>ri zWRyh{_K@X=q;N#T^qJ}7vTU9mg~2Pt@MYAaBTO?{eDyHIjJMSZ!efVgacKWIoJcMd zwJoWM69?W>9jUncWAkT_VK0@Sig@yBBX_BbMYiEGY{BrQFc85Ygm(6nW%5X4Dg zv0)s7xdXaT?9>fsXj`vWbDBUjFiD`yhjtbij?=eVy}OfX+;c)cb1Zu${^wS*xWF**Kya*rhPZ4>$U6bqMPZ=q%DKXZHJ#LG}hUs(|1vtJ<5?df{8Hq4?RnBw8^%Rm(GxtJYJl8M!M$Om4pZKV@Syq^<@M8_9#jq4x>_Ni3MyVjcnTZb#WHkjZExfsM)&03M)xd|zL3HfT??!K z#{l6l#C2aPDSDw#80~)s_b7P{zJ(Hq4s3?>7nzfyAU0PwP<{HR5!LyXTt1TAzsv=< z$T)dDrd`Jd@d}w9unN8*d@)q_fZIH!i1qU@vV-0N`DgVtI1ETQz$t0sx!))ESfHnf zUd2OT-1;B`%;o|G;7G-7wjf@^`wxy(B$8m+t+?Batf=V{5kyImSf{P24|>bi)IwzA zuM|g-0Hs+-e{ytGs$04q& zd!2f`TpxdG6qYFbtE6yLRY=*_2jYn)6YB*TCgIahS4w~2u6#@4-QwNnb!o~pkMHhF zBGi?MLS3y$utvKvV0kiUNFR1cEpWdo!;iSBA}hD7CW_`V zg%nJ<(tk`5D^{#YqFwNf)nx=cFnMiY%289{W_UH^V=WDkB zP??nS!Rj@tEfE-*_fgj|OQFvjcK$*iC=+m`q!hU1A?3 zm8fJB5`ULqGn!aiAsMP&w)tqQ{qjQI1XCyERugnp(t@aauB@JkhE`mztU6TUZeFIP zIO&L19))@wVe4}5U)LI@luB7#3_$x4FY^7@LVBW??U} zX9Ai^h`mY4>t0~yo&4_pbn!DzGW|AA(mp_U_oMbY zu`1u%K>7g--r4D^-TC>x2vce6OKEQ(%&B_EROw>Z<_K-FP9r@NI}Gj7-QsCHFbEh# z$*qDPdoRW#a#T|hS8%#{_3W0rBO3KBBC(k9Nq<`CN})9n=2E>vNnCw&+mH~FWXhtg z1MSG$+_2SXVNz)_f*q~;<_&gG$u2q$#qdS4V#~ss6)W$nvM^?5#^*DvVqQ`qBzU>T z>f-k#76{{?_wvX~(S z+P8bMoJkp&{fNGdvcfD~eL+14*ZAVZ8*gyXW^ds7Sj^3O~g(4giydyWoa_7$^^CwM`j(pCHT}fa%A64N})0^B%Y91^g2&vdOmG zhO9%_VoFRCPA#ZCF|fY3&S1+<%F17Gf*{B-zuElJ*$_S`4;3iSJ>wV^H1D_L?(L|z zJjWa8@!g2?r>sZez?gR}eR)dY@r%sB=aP`R8k~BcCtr+Im}BO=s?qYt{Yo6GtgGlg ze&G6|$SV~Fs>~2#dF#dvx8a@jhzID2m7HL_^#$mz~S-S8GUX}wY<_WDuFGR zL%W<1Y8?1dS3um#=cdNbDBTCbV3gKIl_z+dOKKj+7C%^^CmXCQ>0DE~$Dq8xP0ds8 z-V(!uGSGlBKs&`oK(&7>L-rjVx%v7U0_eyLX@z)e2g22+$mOk$IyM1hl}=? z*6e3uSNz54Ojs>EjZA7zkAN)N#_(>!G%bov!$>^qyV!4)XXau-P+*PeyVjuiUq)ek zTr8C``kt|y>89}r3x~>dD{)|-Co4XhZMd>{dwo%&!i&hBskl#Jx z*cy>cHoQvbPG}jpA`%#&0})4ynj*s-=RAg5{Oh8Z^vTHc_}RW{O1;%T@*%U|&v*D> z;a^T|%yGAtHV+_S0gwW4pUD3-EK^h3gZLTQWp@cfQn%JEa{ArCjlMY|;&^J|YRWzN zs!jY{@ai;0S^b%E8;Ag+Zun^f@5aqn9AO8gzRq-8j;@BO3Snp51^nG~mSA7km=YX} z6Dr|B2qVw%#l>obE#yyKwa>8@6Q?~q`&7n)J_Wztqa%af;7?dNH9W_Ye0$7?8uOBl zM?B2q-H+|v@1(2yM81d^G%8Ok0@B31Uq{_!-&Nr8paN{50`cwgV$herEvl(D=N8X? zWP_c%6vlqfp|1pUnB-!T0gcI?EcTnCxfPw=+5%77e zdCzx#`+wE0@~gjGL*gIwS$l~yI9h3*7$;yE97XXl>C-FLcPz}Q4F6>&5B2zuekC7} zQU(e5p{$t}{cXvKAm|uA_5U!d;uy8@7B&BvG7w+i0_p$xv62>z(JSnR)Hk^7Nj%LK zxE$MP)BQ0b)+CbQ6++`vj{Y;vCc&Y7R3Oqbp>@-!A5&d1W2c+|-FYJdC#;yFaaFCZWK=FUct18z^&G_8owDvvBs9ji%mxCs?-TByXE^Aj<%yVn^ zk~IVc(b6;adz<7=NNh1x+ybM{9AtjgKU|Wtrx~g>&{4bh5`6)mWYmB0N&X*t)H}BG z)~*Wqr(IS4zt~khY*3fGY)wOl0mgn2|@Dvz|nO>-l{sX9O?hZ2oOMA_m3ravuTix8Z@{eJ%gbW^!aE%;EKaK5A z1VCps1^c(o9gW>Lr2pt$l^9L}n}%v%-ZHEhP9!4+#W<>X>pd#jXA`-=WBVihWC_uP z7R@G-c3(XGEW@4u@DWzxl5|`&)4%bYN)z~of&C{zD3WKbme!SH#8Amsc(Z>$39Q7@ zYrHClNS_gG)tX_HRq43i=e9CXmTLCT^d>|`Pk(VLMCIQvSQ+RWQf1{$c5W$rP#p=5j(eQ+(3wKtLANi|-mR6!BIiO8q-Jy|0 zPcWnS@2E`_wm?^=zvS8X+S#JY)$YrwUa(|Q1 zrZ`)Xw##A~SUOn%l%|`i;Ci{84_tXvP?9qNp({T#? zS2=L6p`|KuppHRTCr8!(LqHqEG>VEu8XiJ=o5G`fo5BOMof*bYmK4P@A>5ei-(y7@ z_ApieK7fpfH}mP?o!sjon-D*I(Q8J9 zT+v2tsuj50_wx(2BKBopssaN?4+8V{mQX8+s|4=$RwvCKYLTVA&b$V{q!k+3eqvTOR{xsm^Zd}4 zyhrMd$$0tbkE7M$?R^<)Mq$D=JkE|J(pkK%4W|RnG8NG5Gv=(U4&Lqu1UEQU3JI@L z@|322=Q`cB3%19{)TA`-m*ch{8siQ0B&qG9lh}KGE;TSa`!f0Phnbf8)EFgQ1VX6E z6Nk=sj?W@Tj_&Gdcu)^MP|tb2Rr$|W?oXN9Pgh=tQ-s|XCt16J(jhi(FeA`{8kiP?eu5dr#&Gq~AH(gYG?UD#cAy-R`?{I`GHByZ! z&YmlkU20=&o1jq3LX$d%Q&Ea(?>Pdly*G?6?c=;H@!}y=jhj7TOVgus(;o4#Zert# z+<&149+XD_lozlaIQ;W?{70wC+k1+~2{C+>nf#<)QsksPwkFif^>bK+I7?YNXl($p z^VdNP!tohvf@ z=69*Xyn*K&7xk0e&Hh>#mvNwNE~weBy{2oP4fYBwaxn)(XvenBhng;4zQOIG%bb!U z?N6|R1t%A%u|0-4vXuI+&~S%#?*ZDU09t7BKyo6I1MHhl7t-#vC9lrOrQ1XOgFlLH`~k^DbT zl;@{D$KbGTuUDsSYeO5baN8C$mUj1kv}>??@-X# zmlAfy_|0PMYhD_=JS9{MWqQzC`dd3I_jx>f@j(~2IhWd=vB2WzD3J05Jy+*jrsQL# zre_|@Exqp15PdqTU|tqjeAa?*l-K1DmJbtpdTh416Y$w>v=tqh*IlBfx8fCzny2Ff z+p&ViXB0B9vOMlqjPSvVkpL_9)@KCl=THFm{dJ&gnb({1yM(X7dIwXI7*s3VZinPE z?Ra*hm4gMYnlgKpo=TjrdFTb78D4%z2HgYaXR&Cz%q^nlz%bA1-<-H(0YPhRW;KB1`!1D#6q?(`szdwI; zI?v<5FMp$_JP{Lha(<4ChN8%UVAc$6miB0AZH4S~6ZdmEjfWr#lvP`|4|BUU#d6`L zu%MUxlFLNX;}^4B;4LV4rp=LcA+_Yek3J9u6tFDz#`q5+EMOx5lu*3R@ z59Uo0fHne`&{Fps2yQ%U^&zt=Q-wRtf9bLuc+6`*JP$$>j111QeqxL1s_1C&Q>$Bl z+G$9;*!e-sHiV=!r!a-#{Jt5RftxZB4WV40XRr_zfYrt&M>akO<*aZ(t#edF{ z^2WxQkOs@;^!Ao8myEd9JnUY?PDuk;l0O};lwV+K(*(g9+tPnfkKY%lWD5F%#GzSL z#utELN1_`wLFe=3S~PJ=5e=0Q?ld)U;4P%k`Lr2qU_P4jMwr5km%fu2^TO>QX-&o> zaf*c_bX56nMXt9z78Te*cG^-TB8L0{@;a{dh#9Kw?e5yZ>IqizY^~Y95fCK_n6@sevt+ zE{QJx3bq_4LL@l>I&k$7A8|W@rrcXWD1$+@M@+M*uO$Q3o@fvlo~opzffSl(bc({; z>ud;$A~2e@_P;Jm5RW5(OtM;SMPe*I4F?9GL#g?{(>x*E$bZNehK|T@|1;Yv zV2t6)4g*8)tyS?R#Na02I@9Ro%|0W4+Y=K&+kXR_PO1$J%jvHy1sj;EoLb=@^4LT* z=#kjr#hI~zcvOg*#azaflT=$<%h;`^_qOl7(p*T{xv4KZ{~u^pSs4GxVyW<8hQB&r zvE*&Q!zt2bE!ZZG2lWRaKVD(_!~H5SL?7NTmr;xB+#pSX*(|Gq3y}4`!lGg`&ojic zuFybyXBDl^(M?jK-P<#Fyz?Q@IGSZ1vn?}Y#5?$Lz&NSb!x_>)8sJwB!74SQBMYit zJP*2HlQ*QHvi?8Afe!fic+m&K6iQa;_=)>sPk&hO@$t-3qnFad!t!xW$fIuC3@7BPZ5iB)O9Uj@+_jnZ@g{^TpY+q z1+wO{rOgB!NYH{&e10Vcq&Sb zE|m}`kioulQ}Vo3+Eso(;@wyQ%56|kMXF?}V?o}hU!<#!YX#=qW1uZIWpjV#HxW{K zlb{dSVd+guR?d7fj&7eIt;D)-kJC&_S{}t!2IouJVj$!gJj<6Gxq3#R86nZ@*h^wV z;&+WP#JNZPP5Sf2ues6(n=1vdx#FQ|cY}^RH~|1NSHFC*Cb&yKk;i z5By-gIdvbKK8uJefvo2?S-s*Ytgt2p$D_pKpxNQa(Wexp7Y6xKLS6H5#|!&e_x|Cr zA5J~|!2)}NI=sbAcJ*Rj6h4PF{%(W)Ff}~hb^vwkfmEJXtsrLaxR3w-hHLPi-E&ZM zDK;;zy#wb)qG8+R2{9OJykv0-#4R#Uwwbn)QJ*)0 ze4Gu&^GL=D7WrY2PBM?w%JbRB?@kjo4+^FP3KnuKqx*}}`KLLS?9kBA(yckxAb6dF zf>MeUphept$#-CmMAuc|mIx$D6R!W%eS~djEF9`_N0q1G)Jyg153gT3lj>&@MRN5^Yd?1cxr68N z03HPH(NFhWHV3yUojEF;{LKCZU9WU_nV;t1j?lKIhC#a=$Y zo4v@;HB?eXu5rwAMCa+(%_`}~7o)|5f_(Pp`TG732uMkHcMBrjAsx~k(%l`>-7VeSjdZu9goG%Kf^;b${5HbO zJf3sroU_j7_g!oLnYHE_uKT?o*!$l1b-ykX*V9lcD2`F+Q1qBUT%EF-!R&;CF}ScX zT-eBM*Tf=UAxu|J!MCv!`bRgh@Q=1slDAVR4bo~ysvp)1V?b)418T^|J`wvJgvI#o z7YOSxegA^xdpr;Bh273zsvnmJ_iIi!4-c!;WOnH|x1V3BlzQWU{LYjrE<9Nx>(}az z{mbizUIZN5R-$vB*q5Hm%-e0%)I`v`R(%FX8(S04QR;@?F-&HBlkdtu#$@yC;CTB|!lxpLR_|&= z*Xv{X_qNr$?x)?2#h1@x-ZxrxtOv}_ z&Z~K9?H*K6Zt~y+gAR3Z(E9S49J<4vxRna^r!s>q5zG#nO@^P+s-<-KPO&P_8(o63nFhKy40FD?<-lwx8ZkgVJ!ms%bmpS0N;7zXSa z-(3bWK9eZ(>~?4sEk))cp&0HCriw^1v)R9I4N7XcZhUim8HtbE}9??xBMHDds-StESh(_h^xdWLKlg2A>I z?8pzQ4*=P!@1&XMF?rR@+jw6Z9)}@%yRP2w;+F8@7)hgCQlWG$l*uix)Uc`fMK@Bt z)evL;+0oXG9)2tx?O`6{oh1)HX<%;bCV5_a-WcVG2|2bIYe&u;sOs(i6|W_cc5=3_ zM7jMY?&Q)eAzNWFTLY}OuUMQq`(EQDh(<<0N#A_4Tqrz^-mtoi^Ichi3382{RFcF{iV0&S;Ygd7iw~Y6szqrv+pE!Y!d^{ZiouQiVqDQ|LXarH4SjvuLeS#85^k5=5(`|!?WWA*40qB>4WN+^YlBa@O& zzJHq3*{k93hxOMLkoukh^(CRzBmVX__l|PK$9;^oLzGb0LuoU2H7uDqa`mSFCH~Ze zICbI{G>PE*hKi>A3~+vA@K=si2~zeZq0{B|SU@&eUOu3TWr&g@#_l*(YYj=4F(^M- zT)VTp@J)`W1NHD^DNICOEf`((^N@B~YxNg(U3+=!`dNm^ape2!bqG=q6Hrf!vhpoB z8OYzQJH}PV^ql1(E^u?qI&UtZK_ssxOn$hPfieH}YV0}i@yhMJbMR@9kKbh+{EBGv z*|;6?PS82O$#S}#8eSOAqa=EdK00#ufYJHg`!csPPJTqt>zREL5uQ{xA|nz0*KqEL zP47var`Q`&dIY-TFN4#a-1L;39+M_uE$7sRA{Lu-cv4%~=tp&Z-7P|}cXSL} z%odz)6t?a6WR}wGy{)^pp4OpIqGz6>tnck$KZET8&T%5;0d&k$S zNRLLV|HtV%JL5Vf>7q)*2$ryei!!e-E~bdz0E*!R(nGag+*f z_dva$qSqZ4pxTNdgR0Z{lU7 zP$JR}R&)<~@+n-x4pyfz?An?{A`lkv{_9q&oGp9TDjjPol%3IJo@NQk4%{HWq&5p= z>KM}5WL}j^IeoJCkdwihCj{ah>`JD9jx|HStok=Mcnhqf=Ao>YozUj7^`Gx3N>nJpEo6s9O>yXlC>~)r6<#&}GqvzaQKuLtUAsFsmQyx#hZyhqQt+YT$!^% zA`2p`1%(d=yqbzuD5AKyVWNes8&e5-^M+LA!3$1YZbye8*-sMYmg9%SN(XV#5xxuQ zp-i2+gsk#h&jESglYPrh^}2++8-*XrrG zZQQ2DV}C6f=lP*!aO`Z7PdGubrZ1=$_kTqtmzcpW8AcU=r9lIBjDcL@eP#iJM={Vm zt5kii>$?&ML&T%MfOgs3*SYT8g z4Z{TkJ#ODn#FFuMbd?WW84B%_ISAs9Zzg+26aE^%Q(!)iAx_4AX9}7pbrh)>7nv!< zBI$>LLb=lyFa~>`Ao0FQy~lV|ae}J=Rf&~BIPLevV%J@yV>(UfnVPbT=X5ycN6=lz z=h*~d%eswtAFQdfD!oRnp&{S~A_u;HN|y@E&a5 ziOZW@VU4}9?+dr&6q=?Vwu^gNWa6W;&F4Z3$cPQ=+Ay_5ko9E-{X5$g;5plQI@*o2cuTAVOV?v^EA(Zgg3cyVGsal z3ue~Q0KfJT;mjHEW-~uRzj(AZf0EmfAcn%z7tkK^4I|}5bELh1q#tlX6ESaSwFg&M z#lnI)o%qbe(@!^}=Iez8WsVi|0!El5r{~ z=6O|3#7e-BZE-%lg6F=sOi_fy|Ab^d?>3mMK;mNK%g6qRK!_#XEghE6hRW8)MdBOX z%765h0wC(x0Ci?K6iolX))FJAZ>PFvSMeXar-c(0Xe2pUk_IT5M~Waj5eUc2nc+e{ z>0>ryKSH{8C9Z7LO{xE(@OVGC#7m+A$qu@!8T=5;qJ%PhH+!xV+=g5#mcJyZ4Fjcz29fWX9DM-mu+ne!#@OKR!7Sf$V@l5~!q*f8~2r>v-go&5nU*sC_kADj`$?P zJGa|@6=7YaU=*ZTIm8qW+1%}2e%7Kpdn+U?ChhQrJ3z1_ZzB1-r}rgPLDQQIzH4H?p0aSOBZ5t2%`nPA?yQV8+VTF^I{Qbrn zPR|-|S7+L7E(}{016^`RNw9r}Ir-0tO@mJ?QrU#|{j6xV(_B`|Hf;n}oodYBGq1n$ zl7Bin)PRE#wu~e}3tD9j0bB9Dy-s!Bd($`QFYaogmtEzmAYps>9nxs_5KQY{mo11c zPC%C!TTSL~C?#Mpct(AmDP+g<8179jdijBcEIPoWfu6@X1ElQ zlp#`lx|6X=p76W%1-_~$x9;M^R`R!Pv6Hg>8L+`X$aYQrOU~QZtzY2cv?0I+Pdq#Z zkZ3e+Wk`;}O>ojr5P>#1W{I^Z-&UB;m!HQh2u(i!x=r@FVo5`YsXB&cLzBA925Bwd zX^v?z0iV-`40~N}9#&AwItJ?C9ktG0wDWC2=m*Yrf&0>YKuY5RN>eqU#0Pfe+I=uvt7TG^L+;Td73C_Se_Or{zb1oCF+EAJL&y6$(-z_2$Cku#Vh_skKF5q8 zEGnLa;m5Ax3O_--@0t61Ew)c|3U|&0{f-*EIZT|rBx-nAF2)i{*!!9-&jvV?D|w(= zW$qQlfGFYy6v3^}!-J24DEh<2!}Iua`b(;K_4h=W$7OUV-cK4z5h!Dm4|naRU1f-- zU-JrRzkW$GqI3L2_mc{ypjMLB8Cp=_=U&YygjHEFQLxkP#q0we>%s|OA-jX5RoYMy z1Ate>emiqwX{h9CN%u13g=|AU6nsPcYGI+q+%u~b(?>2Hzv)PVcRb}$47NWz^pf!w zPyF#aO3GH(;n1qY>C$BG(b;Ep2qt-_OWkPxS?T9~JIxfv+eWv^0aOf3`Sq~?#Oi@h zoefea4^XF$w(ZDoCw~XAx&k&CJY?OMENdg%LB*Kb${~JAc}YaMMpZ15&mJ77~%y7kT_*xQvu+r4(A{Q9-7lG zkWcd6eTxXlgMXWR-=V5JUrcbEr)Le5C!S9ytQw1Qa36QPIKC1Wbs^U)ucOifvU> zMr3?ds0-WlKJXDa()1pt_4sy!2GzUK^YNp`k8U%MQeK(gmp2I_k{=Mc@H%7m!LD8K z|E8t<%dCAUrqTHmnclz-on*_`cK->kivseXy}M$hPrL1=>GWM>B%E7tncd4FJ_UAlvYm(?R}vM?r6cZGYoRCn`aoi)h<2T z$>q(z%d`KNE5&6*XkU;Wz994YS<$GM?_y~Cay`Xp_O#eZ#N8BA*niVG!;xd2z|bA* z{L(Ft9{-XjMp?#d6N}q8jTkFbj<2+4iihZ*eFR_1IHB?uTglADYO!w_@U@ ze50etswlg4W^T2_S=W+&C(GXhX={GYss~~Z=6Y}_^6=#ty$>^H#r1 zQ-tYGpF2_7Em!XQ{Ts<2Ms2u3)Udz8g*^!kKFs7=SPH5Q2adjI&hC2x7E=?)a~l>v z7H-v;3?w)S7POm!gN<8w#N17^t;}^j1XeTfaESc*!A|}*TNslG0ND2kOkc0pp*|LW z8Zlk%-y-%?J+J>0ozMaIc$8xl5R|^#UZ?i&Iz>uS`hMwS?U`KbKJ!lKSWir+U{1(b(Xm9WBC#eFZ?h#F9q1i|?v595 zV;oa`HNaysQ>Vjp{<JI=FhYH%q78<{ysaevPKw+5>17&tsGa-oY*vhEFn-Bac)PKXDY7R@3P?%#p_>!EQ zwI;Lhju2r0>9>R?YEH?`1$T1B4I4TZnZB9D&L}vte+4=Q8}gGJUjXdclGnaISP5_v zt^6SQOu&>H7FtLb$Qkz05mcMSR!LFmXKUp8sAK_SKp-Es@L?JQ*U)lEkDLvfYtFrn zbxyy?$UmZ13S;!+IFj{O@j^2}7@?H(Tt`RUV#MTxZ?qT|Zz8jsyAmxlb>>RjwN`^D z-x^!CZa-kB_V*hqtmHWuJ~=s$k?j&W{{c28)L%cM(^PA?i(xufblp(bU7H^rr9LE1 zLf3&u6-0eWA65PrXevoXZbL!UN8Oi5x@rU3aDfinDtsJ_wp=*dO*srQ@yFX*RDaFz zyL{n(sUAssXLw6GIr7SXpiGt8%hwHwCKS*wS10D}QO6h9)&-0u7iBuh#E>0$%vqn9 zr#)J<`o^(8Cr}eY$klrtc3x4&%$CapS?!a!_QZE{PkOiAMyOwgSZ zQ+wU; z;K}IDFsnL$jSkC~Ii7hqA#V4-@#n4$tzlYM&(Mw%kI2$SJSb{(`v-tdMV zz2ms*R4Rmh2A^_*2TQ+kT7^2w)~7{DmAKf8=etd9!;cJdUdgZ1?w3?=2*7%Bd4|to zdDT%Q8|HT(Z`n`3StQRda+wI%a#JpEX;gRTzL9~=vF_#4y%%~2B2*9%itxN=4C0mm zPzq{~yi59I|3byWmvT_3B4Y3%y}WM8sr#c7moKjVCG&#&y5?T6iPdp5-1L?oaZGbh z52uEqV}C7T-2n7sm<=Ll2!&A|d_-)G<+qNXAPH3aToKh2b?7^Oc-O!r<4g!V4Y!}_ z!~w!SyHSX0)Ks4B{IW*M{d5m0htEDDbz&TJhXHSSRCyjP8Lfo7M7Ez;=AY}(dMkhi zUE%RTbPpoNQpszCTGfcqolqn*?{F}6En8*-hS2&)o?a$tXam}Yepcl+>FV}SAn?LugxrVeE# z_T=+AiaWdrsqP-9`iZK8S-E(Dc-9x{3TU6Is-F!apJ87KAS*7XSq-ouz%NOYg3&xH ze5^I02UNp_4c}#ZoTZ+8-i4BJ9d#I2g(#v<`IUHLl!XQ*sZwOIR1!>3z{kurrFc-I zpPj0CuB^2#VEi-TIuQO%{Y13l{U&?EAFoJtX)^BIHa2bTe9J$`L=ce?BlUR5X> z6KK1aY2OG!3KC@`lk~W4`pT7UVE4XxbH%UD6ehwcq{AR0ifBqMFdr1>b{$nOOQS1U z^3cXV1NlKBzz-^CUsnMi0{ubvw5cOrhvt6zW+uNEsLWW01d_U4`0TrVL1-z@-u4AL z6yO2ryv2~{;LtA{n8b25A$3=U)Ggjc7COx}R4o23?hbdKJXscM6%9eA`n6%27=)DJ}0KWW=(?Qx$)4$N?6Oe8lYf?Md=(W zFQ|FXm!IwGisZ?$mV5jG3*oK7^HByGORmP~x$oaR=UtMI)bm4Kx-_9^OP9JaSNIkL z?*DelfyfpEWPAGBErYv(TpC|0^>od`qN0)&uFa?CY6oJhOBtlcw5`Z&`XU&Lfma;k z(kY>JW#KQQug=N!(ESc$l%31e!)sjjqm)oA6rU))81o5vu>&{8pCiHhqn!-Flp9$Z zH`DoOE>IH*N7!oXP%V)>$f+InGIi?H|e5K-cQDA~P*hJQFqpuZ~0v^~bph$c^v zo6~F%WxZS34#N6b5S^f2TE~loNpgAoDC#Hps6XY}`T35!TxjeXR>zkopWbQ)z;K4P zH)B8Zc3yp4iACTYOb8zrypjF0AR)$0ZE);F?TN8%ER~%qj?amCePr#qvtkcgCkx$1 zINY3WlXllhlmB2eGuq(N`>kWZzS6j$^UxOBg2e~!T1?KecFV)tlOCum{gEh?}5a(^{qK$J-V%E(~D=l`%! z6Z~I0$v|Nrd=~UuU9?H^8Ckq(u0m<1?T0WPX%4hnP)=3lnL{KBsU)gxA|6c-+cLw{K5~bk0c&`u}(&^V2x-wYdD7^ViktV$?W*OfKGK6`D zIF%^XLDT)oJC4)~>rJE?N?I}D0?7x48|F~N3y6G9*AJ2WU-p!6^%28NP$-1L0Hw-U z?;ppL!Xd+&alx_fWCwl4jJ%&i6v~K}m6PQo+^OmUnR|CIwW$kr4H3ob;KEdKL~g<_ znRb*mI&KFjUcw)A4WUk{>DIuc!;0WZ_M%q$^`f7s>H3dJcD0`^dTLb0?+gpi&HL5F z!zTwj2!`N-lNgY@-C|IsVJ=xQp%JY3OL+|P4v`IZgHii$fHPnJ2B}IBc+Pn+4>tB$ zts0XRh9DW<0XZ8TQDY&-kBR+j*rre5XZoW)MP#3@zlM`0Z&?=pL{xnh)O^ngm;jdk z&Np4hIr@P>)8T|Q<=1GElKIGYs176_xVNBbzYBXrA|a(pm8iEkiR?cF?ksL1DPGnv za;RZYdfEL%9~z-{o^v;qSHtAo9VRqO`)Dm*+?UR5Jg(Pt&As^pW6=-%&HR(D(X8Iu~clWrfjrBM6>@4g5L? zIFxH&F#Pb_w-FJ(w|W9TF`sUHRK(HIBs;QGJ1_<1?uM0=h_G5XP=RKNmWmbz6@QH? z#fxX9F%`-XmU8u;_(m(TB@gY)*%Tr^AEsAjcHrP`Eg(%%q}AK;6$JoQCEn`zpqA-^ z_p$HpTGQhEKLAxr!3;mrbL%bh#4iVz(|`@(Q%xaW;kYO?EFuviO?lP_M3s3RmRbv1 z&|eN|Mbl)Ic|Xp_46Jv3qU7KJvPkZrW{kLkU1jRPyP}NfXldRAFYE<8N zz%5FKc}R@~{7I-vp4XUnChD}#(8NpdKs{h%`2&ee>+W56jvtlC{@mAm?)Z(-q@}7O z?VIzQwIqU4^{#Ky_he*Lp*IrbTZ5_PaT2cQMX(Q-*gVOiMzmz=lTk zZ(gebvqhp=jZ*mez*E=eFwE!ir6UwxN+U3zRzJN+Bb2TB zb@Z!a@xB2+%2aDy6PebUL6*(Va`FZ)S&4T4?=a-Za#GBf&B)7LjXsb+yl;!1cY&1i z5-5l6`U>J7<4C3>zVHN2uO2NH?4wF&hjd1D$i-+Tb2y0E1Ue->Gu&TX@?M8{D-^Wq zG;A$OVYj=2jaXi}1-*%+yR@dr64j6IR}6c}x4<$&&^JL+M3@p;H3(HzQ2@bEDUXMQ zbCNW8{u!ye%nnXW<J$MYVwQ}nETJh2VMNFH@3R{%q@GbL!E4!s0d<&xqt)=ncAXEt%o{K$iR5Osv( zwLuX&@-hX^lSpPcv(pV%T2Tbb0F0s*nj%i2ImF)#l_Do zXuq9=n0lt&ER@l1gb>DL=khel;cwrh(5mk*#0p5oazMqhjtX!7A+h(5_3fIaq9Y-b z{7`kzldIL+O#Akf9aG??6C69p z(#UkhP4m68t3}4OD+an6jdZUjT>G*}82yC3ZVmEJVXHY@JahVU4rAQtAMUIS-d%!3^*;W1{Gv*LPvOFM}uqF8v+zjL*`BK%xRl3W{3b-Oxey3^_ zD1iJz<)lH4E~w0is0hAP){(mylEXm*b!gwRe?^Ze%G&>Qa~M5WF@N}58MHx-MPOFl3-WD~R zPqmOR5C~!oRk5!iCEYTbR!hn%_~Wwj<++I{tdJ~UWXB|v8KsC@TA{^{O4^VRLd(pA z%c;b>2)0edocs_CY>(XbwqVjpa)DkN%)E4MJFylf`D%YtQz}@>n0d8eWX+|ebYBHB zNEM1e6?FXlLqf6I<|Kwm(98|W2y6qk{@58-o z-9)(nbGG01rVSQ{lf{#53>$fJJta$2nglGKc=BMyjfnsCd{x?V%H|w1SA1Ux&9|Ts zT%<`cMt`Qp1>F~fnkjhcS9ArE%A-XeqNgC2yx42DYR(^iEr~&7DgiS6SyQONy#bkj zF5ye$I(_@Pn}2%hj>zTS@N;;_TCxE$5+^JY!j`^v-u3a><3}C0`|hH6&o%sec|bfmSY1v zc9xWm2|+}Df#`17;eP}52p{53=J!4x=gaZp>-6vNQ;dskSjVsnV?v(l zx%>Azm$)>BkdY%q;{v9J_c6T%9Pw32-_Fvv{kufz@*6a?p`S=)pil4Pi|=Dp#p)PX zps3zZiMLA0(7lWSyX2obKsA;C7Yae}#X*Jj@F*%P4n4CIxIG2C{~8E@6rlnX5rjF{NfOt*y zd1Hg0TJPF@LO+0~d8^^<^2ILXpT?$t9sq|z!=@(DV1V&ObwSZu&jw#+)OdA!zBj$s z3N%1NkS9((THjTX#p702edAHH!Mh)BesUoCQ~`bQNnEfGL(#GSXRYj?p*^)ogBlBk z_D0|ekO~P}dk7`zoH-dNzIX`DAGu?mh*PLFU#kkq_$=F9FxAV#jt57eN=r|SsFd?m z16ToDA=$U7=NT$2TJRtkGZEWv?f@&(s z9mC41{Bckj_zh)r2x`jd9rm7MuZmNJ3Qu?m8#j^0nf_MY-_Cj1xsdP$TXbK z;Ce431=+YJ*-l z#lbQC)?!R?PROf%bQS+YTCBNs0VNDGoH%_rQl1d)sff{@@t?3-cazarB|9PUYY7qH zzZ0n2`}@f#w7^FAv*H4~gjZjh?bFr2)P`4=K^-2UDhE_x1i>SRb|uKyr=}~8>D^mu zKUjpl`j7j*pE&mg3He~ag^7q^vo=_e8k#G-Z%h6Yz>49ANfc>v05tSnTF-a+SnM{! z)a;!xLWU!U0$b{L84-4WlMkCdW;gqmpIIG9h}D0_6nz3%?0}win?vG=kmK^b$1w~u zK9^?HH}HsG1gqOOb(}*}a0?NARQ3y(R2&=E7y+e(R-?Mg%MQ?8bN|o-Gq3o&6VX2UEmu+5hpfGp$ z=BiR#L-^GtB_-AOw481f(SIJ12FAYeZRyL}u&-faN4pF;ps~yDCR+3V3AJwjEbz#T zR%QR&LQ6pkLYZ+>e>B@~gA;Hbnz;lyY;Y2yKiH8Pc-HKvcx_-kZ}A(N{MM8L+Gvx3w6 zCfCx^?$gpe(XY`^4`L^cEdiaIZXm{^q*`{fP&^tQCSUW{^!*Vb;UAV1{Cr}=&jYFv zquiIm@%MP1#<4onojQPFB|2{vB77xD{#A>9mD!ki01dgMJe0{y)BdWREL86C&w2Q zr*WaJS`GWoUf&W%7M`Qef$IrJHbtILHqY7_e}FL=&loKBhwOZmp^mdx7@7<_>-kgj z)MCR=V3F-YwzR#-I+IRHo~t^&U1kW$m#WTTuqDW(58A~@j@fFpGB1C>{Ks1wg}6sf zVu9tEA}O(f>fanRPkhYGy%N&x5tS&jE?v*Ak=ZM zL4*K4&MjvWvr~C=Cp8Bv=g;e0eST;AHQjaW49Gjml3Gq7#IfFIpLH zG?Nt7=&{W+(R+5)aTz#Nd7Zw*>aJ=i=PcjA*{*IJgba2aB_nkm%dc+Jzn|NhOwT}i8_M?!m-R6cZZanMm zAB}uKYS92{DGb!H0Du2mEq5qi_M)!WGG}}Rii7fs-a-8O?MRA$2+g! zrtG?j!&Ju*9Y%jFKJlHcdp%Vq3!{2-am{|Q)^f7vPdlAvU)N#En~o3u>M}gk%iv~Q zi*H87Oe(WL$KudK56TYGU?)H&XB#DSSGQAa)>Hi8C^XsAFLX%i)u67r<-zeMgo^>Z2FF0TVp-_T3XV6kz_^o38`QHTUdV*REpy8-2w(9lsk$gC2_s6U}zC`h<@a+2wkPRY93y_qzr(W?7Zs)u0=##dWy+FWZ zLI zHX7%Ovy4tj{>+dc2G8)a1WmnqP{^4zjE+uukPZRED-dET8HnY@j4f)Wg{2yL7DSW| zb7Wgu^&qesM4&bx5O)3C5WMNPZ^%SxFCY+n-m{@d)0rRlVr?Ko0zO}R!zccxhAEhS5hIo>He_GxMl+93ujcY^*?hhUI^KXnAFds)7NK>yo ziAtMdOaQ-FeV#oF5}4vnb%j)pHwcHC-?W@*DbX($_lwTLD2iGg}ESKVGKL#7eO z6rtx{{|T%C#$vNRM`!%d4+5qXnHB#1%u+_ev?P>)tK`y|`$O*nsYwT@$(vpu20R|9 z3Dm?#}D2AzaW!dD^cHBN(7catldMumrKu zK;!Vd)b?j>^05Rz^D+{C_qgMuBpUPVt2I3qs$DcmmV3FAAaY*;ayeqpR3UD$0llDB z4%If#@*q#hEvom|{7*?0uJA^r_=984ZK#@P9N{nd^G&oou09?d#0B{1;_cei1wLYh zZxls*6f6j%&d8Peezs!deSmwc8pO|A6AYmbpD&^3IbZk&@KK}#h%5BNrD(4tc>HksDvrqNCruKr4-Za@h67RA6%b-E!nC zuEOS-XV$~5W(DNTbb&Mb^m2+5-2S((tqB2;a6D)G9noeOW4JGVSQsyo;`)^^hCzeE zdyHq5>>X(?da$p%qRVSwIZP{b*!2Di9)hUR1JryyTvYsR2N9vD%`<0Wio<XQnty_ zMC2X_zr?KgHjyjxF%)alSt^IoJJy74CQt-H=!QDCp2%0O<1H>kcA5BSJhD8>hR}Y5 zu`#C07s;IjQa3TI?CRVgjo9g-q2&A9a`QZk(Xs>#i57(kDEUV=)muKNR(*8R^3 ztxSH80J`X3WUKniOur|3|7myBb-NkT^*b>X@@pST@0dxxxu_W=w*xOItA-zfyi@0+ zQ9Q)V{|0Q;x|zulrjLw`ol5+f%=c&3@^d5y1EXKdquY`I)`~1+Wo@rLqUJw0zIqfU z12JZ(A_>?%W6&G1hQ%NvdMn_zQT3rU`TE#AIsk-#gvbK175tCaGi>uCAb(gZtV#WlU_ z>so)^w5H@3S<{O#qaDt%0v?Zfk2Uv`66r&gs}C7We)M_s@H^j%LYh~O#z}V* z8xQTP(QkOGKW4RWRmI0ub~WKfRQ%Q+_Dh=>v`;vtCjx4Qe+w2OPq0mHIw30LcZf%ry{ zN2)Qkg1uCG&;5O$800Q$2;4=9hkX&jCw_Z`dEYg4w(}UtV3_K3dlN>HnU1l;`!)aB zNg@!tdwX>|(e7pjC}IHk8RQukPosOgP$6 z6ZlyjpE%L8y{e@L>1R+|xpO5xPr-fDE{4bSpR!!9dj@aNL&zk({ydfd4~dJaJRsc{ zF78|a{k1+}TXem)WLF_2-P;H`cz9NfrrIi|AQbR7Vkra;m|!MMWV+e~?F~_xbslDT zOsKkg=dw)X%uSWk&yEZpo^YRmlxhT&I-4F52kr@!`qu>HeV4)Tbm$XVS+VTh)Au%8 zzMr_LvoA^`2M8bl-iZcL7%#~X$!QLyz%*m$4CJXVa9+k zPq$4E@YLU~!B_M1%(t(!vO>vgV&0=wZ*{Co8Lr+gNs5>DOJcR3#zkgnH#zVSZ1LI* z3`b>%X}f<`AFwTEOt4X&nhLh|CRw9?kZhG|pzO2U0YP;3+0+rKgv zEeSp#(6VdWbCQJ%;u(Htcy6iqU=Gv;soxZ+e^9SO`gc4P01m2Pp4m9&JAdPyFvwy~ zTzWB;T*|DR><4Qamh`UgD3quX2QR><>f4_BmcaqE{8AdU&ZBnOSVO zU0+_`~#079V&77T`4164;LK7Y=B4SUX-<8NW7ma zlVfhN+AB0c&h3UircEJHF;)4Ur=>#r$FZe>K5jedObtG66!GqvVcd(FLEZkZ-nLU9 z4APO`4pe6jmLNAgeSr zf&0IxJ|O384xF=j)|1&^i|+(GUSQ=wW;E-<)Dcg7T_yfGVV#N3286f7(r}+cpfFlE z5MCo_@J8fR?5U6<3b8f!q#R|eOU5U^N2)b#)TBYoGSoWiZEgj8BAdCx&>L59J)P_s zjH-JD1sdP3qjOF$dOvwkTEdmaQ}S(%rM0~EGPPUSMHc|y*YZcUEWcM51ES6XP&Z%@ z9Sc5i_gh=S52nKBvXY69^eV;{Fu~lxq=+x3qmSODr<4_O24`^}73xPzxWKSTWj0l!<^c8Hi4G{e;%AX&{&$@fSksDOwmuVzPUn z9b@B?)d1Zln-;P%K2|VJz}-YBj(DDzE=3G^;t;WBH4&)}27SneIr_TFm|weM-fKKO z#9P@z@B3YHG&P}F(mS`5lt?NU87XQV_c(J}aqd9~?`p9d5!vkf3bR2fv;->b*ARjI zEjY}_AwDYe+6|n8CwP;BN9wfWSmC7f=h;z!L^faOMrN%Jr57SjwsRt(v?WaJrG7Gw zfyqJB5@lApdP5IRpu0+UqP>Ex(Y=AyhxUDg0RAB~HNOMl+iA{cBeztBa_> zDawWAbKbJP`!cFQ%CG{;xNPhI`<+n@*l0Y9$`=;R0g9COE;vr`YTq0GIfRGyxC`X- z*1+fMTqst--`!p4f@|Cv_R$jIpOU7#l8R^BdSF+9N zo0;=zuU~u*N#}$n&p=4yVRonk!|K2-gFv zttIU%_s28|Ql<@1CYHxr^grGLQ2Za?0&ofy4dZ|fNpR{3+D-GBW-?^!J&G>?bT5PJCx##lr)|o@cEC+5f37&?y$ls@fYjx z!zdU`(kd3~{7j|_52aMWvI>?eO5GFe`ur%Me9jc3KS?OkI$x}q4*w^O<0PsD3;ze9 zsP<3QwR*QClUdy*iV9hwul?zw1?tLMAslC@6R&?}^O2;UN$qAQiSR=nZKJC*#{c;m zKw04hVA4+QHm}5ve|}__3JpXFLl*);!jc9y|NVp;OF<+yzF4PhxO8a1ZG-+`GVx=h z!%(a{V>g`v=Z1K*IjNhGs1{m(xQiEspxgenP@>w+PI*s+!4z*gO(v0C?N<@zEIP;q z5jy@UFBET4Udf20&)@rsQM}4tgiE2&iRk(Dk=jz=Q6(n^QRv6?^UPrrpD6fxd?Ay~ zjy5kq)6|C>kY>;)7=tD@g$#^{-M&`JwA8e!zmF2$!0@oVAn&5@m$Qd_a*X?Uan8g? zXzr1rYWK$hX9V2Y$5Lc|f14!?VGMq`f$xEUPhtY;7M5L8VGgO|*JOk$@k)u{ZY`Kx zZm)e?jJvyk$-M_HF9_{#7K7`sD{AJ;=W1g~#iJ!6Cb7FVP@+NR->5udHRL1GAIf}( zIP<|{8AR>>U3`;HSe?r0If`wKJ5^~OKP#B{GX3HXIjFZQ(f_w8H566?0=q#8_;O&gidVY zIhUabZW(KtJ`?+%eJkktF@of^hGb%EE1S*JL!0^vVnw)1~va;T*u0n>rfFPlSbeBjsh@|Kt1*JQrI|P)x8{xek-tXS;-tmp`{Q-OIXD;?( zt-0o$zb9PEP$T?Z7f>9hJui;OgnVe@E(z~%ipbI2xyE4~6Uy^xn~4rWkg-vMU(1~4 zs7^Mnzraq5!|((}VK@HaPkuV?t9+@KYVsX)qle}(s0>tk*aM--oZ?>D1WrZ7_VFc< zM8n{GS;$+<$Dw`WdXqM41|ACaL7>q#V)kpx;r;76!#vqx`n6q;I0pVq7C$#0el^)Y z*vv{&qyDJntBS7Tr<0scP=F211L5p78lZk;=y84pkUQ!y>U?XkWvW`SFl-p0$Urdv znla8R(7T^s;_(}8EoRbsI_p6+u3lYu2XW+vrU)^e$%GfPBS-}K#hSp8fLHi z+w94$irASZ1sq~GFhZT|OPhigY=VMwsHR-{u*OMEIb%9*r z{L~&*ru3S6v&R=3=rqCxY7cCng`H+qSIXt*)TzV0_lI+9YS3q2QWIBgzQTP+%2sKX z+&iVEl-yG|!R@_|eEGcVZ+8xQ_&td?Px~l3RXHSvg5#OdscgID+_zZ19)TGE*Y@81 z=qsAVnt;_a523&y9+iz)-Cibe!Q~1jbSj<`2n&bLS?eDMYYJNRI4jJV>tvSLHF85Yx17EXwUiI3 z`$PVhM=>PcKed&ofH-WC@#Ei+*+0X+oz+EA-;yZMA_g0iQgUYD%TfX3W9aEBzthDG z25f3ozjxO>V<|`SwnECgcZ^Qo2gG;uFS#A-gY&tbP11gwLwiNQvk$^den^quI%_YFn}%n1lg`jKVL-zKfkQBx@#t~j!? z1i$!DPVG)Z=5rVf$Mpp6m~(~%U{KApwJ=LoVB;8up8;6k4-U_sPl#AV^j1~xd?6-! za}b`GooHc!3~Q7gxAatRuISo?m&IkgD{WBfPG};U8WK6ul%_*=aT`WbZ$iI)`!?w< z5mS>7z8CV?5ahuCd5Me@OIO{qqlIu)4}Z@j2qd3r#_%eFnoSH1#e2nlZ=jVWL8+`a zKZj4aZuGxj@2hVaitv8PKBB0_^j(b8V&Vq0>*f22YWv9t=b0HFw>(4o-SrCRN(!}d z%3lE3*Nk@y0{7cJ^7zbi3n{=evrP@u!ykkJq-0b=lazd#d2e0ex(2qHWjc1uF$cGG zckaROmj$Z25K$MEhPQ8MrI?yRBA>mP0Mm>yJkFzo$>|0Q@VZ|{CW;W5GZ5MP1M-3^ z{;j`(Q_=glXpN6Xyi!h|zmnAiyt8jTKu(Ea!wc~ITmV8I9V^9;blY$8nwst)=(%|) zK;Am6h8h7pk1a*(a7tcPP2o!B8I$YD4mT-{!dP3NL>he2P3~LGA@U?mstwKXRoN-IcibJkh3-Sxk26SR@w3HK0bU(>xVofi0!9pbddo zNMZY(C!zfErFvN&*Pcip*x?fU2===5V#Pj-O|Sm3ibneNYZPYt>b~bBiLkOdn|g_p zR#5@tog<{fbW7Kjl@j{)qvEv0wE1^J6DYz0xX`s&7PRph5eGxO$kX$W8c)s^yYI1VwGPSY z&>T*elxlEJ*JUrmb|lJFN>NGFv7>(>sC*HgbqAgm>=FlG0Sf{fmbDOC3XfA#YKL|9 zeqTj{QF5c;&MAPP()$(KN_1ugOHGnK`9io`Km1KiaX0gG0i2v|C@C?Q_t}z`tIH&+ zczdze+tYa$oB1fp1Ahl7!~MKn-CN57Ny6G5+=p+Um62P4iE-h<38ckR#ivs`8#^nY z%jJKCpw0tOhgG_Mc-dw>_5YTR7V!Q+PhDzp;{8cosQ**Zw>V5v`8l|a7SxjI%1w#o z0{Oo zn^CTj8r$Iu^Dh^&+%xkJ@g+DgF6O;XXP)wzmSV<()k5`dh%leuPrdF>RXxQ6gKJc5<*4X+J0j)Zy%bBo>K81rn*4O9#OcU2 zgjpZ8`@ftOUQ(Lw&&yM4Z4irrr)dxV6F;SafS>9w`Z%W-m15qBCK3T5QhzmXMU5Ix zia?)g>hEI(&{NX?{g^Oj9#va=KdZ*vfQhlt&Uqbr4j?W`hGYT&Dix7Bp4dbxjMRTS zBkVYDkVv0xcF5Yo^7uD?DnjE~y7sl#BSx16XsPxE8lp>|V3dPF^da`u6&3C(aDhq7 z0_AwG(GA~+TJ01*pJWz3RgGQx1dC}_^*ohF>C!+0i%wCdc@-9l?)!brG^XA%o2K~B z8K<+6*z)z#1ZO;Zt-E`s5hSj!^%gh6VPW-#7~|Xjvf}J#%C2i%s$B>L%#>abu}}E* zEN~)>1XH(q5O{uTOg(NQ_Wlp_so4ih`P_C&h9sD`vW{mf=`-?Qzx1J$gRR_*rSHYZ#|ORmnqpr7q5iv1aBna9vMf9rXt8F35^le8yZOIh zsEQUJ*{J65AcClHfzjT-J0_Jz7r`VKcX(qGXlE^LbdXd?|3z8(Lv?e*w+cV`B4;d2 zHt>AAe(3b|d6Y=oo|6C+6bX+*WNomr0>fdHy0w!(B!VR#Dfqgvx}gqK_txm}s)I@a zWhhLF(M(^Jfm_%-AT}l*Xtf?JABZn1ClX{rq!d3?rOoEIRuK?jQ^(jwjZY|L%)Fo#}bbDz0N>`88ldktj_sT8FasRld$`au2bPyev9D^D?3}tne?V zU}gX|{-Uhv&-AapLlrh$162l0P$p2G-$we9%BW~IqgE?lTO#-gvMHihaIhgiI2xCs z^nr|i;J&!Bm4i=QYaCymD+ceE+sq|}qLH;O9#;l{jr#jIg7+H|RHMsXDC#S&=8_Kz zUL3;RyZ>h<`DCEd)U;m;JgSOH^2ak6Kf*`?unaaKLNE+29d-sVRV&*H=k7>->wN2i zxci{z_WBoDq~zJ_%Z6+9AM>6R=%ddJ%05ZLKXSd<)(h#LI(NDzXA(% zmk1YdZB;$#ZkBqhZbaiah#N{0XHVL)eNSVSAa!6RTE#f0Lw8!xZj*dBhPmubK_9GD zce0*pw+R*E)r0ohV(_`(QmjvOu8&fqKK}?y{D)3d_F?^Rq@H+rALiiQOfMi#IT`q~ zLY_T6HP_r^^oJOX$B%s`(z%$2-_9#u96(ACw0Z$rHGS$OQO<|}v4UO4$WUPBOkrec z?HpX?M8_@?JJZKVU3wJ$$iucqFgz1rKSZ`{VVh1_sl$G%ws0%m>g+& zUGS=qfq{Lv*q%Jj5of_THKvvA(mPwe89IZ8A}z-kl%q6pHo~`cRVmHKLJyXmzaz8D zwv;A*%>GuUldr4Hy$nMSS?8sT{fk+}D3`yuAib+0q>O&xGuPs3IaKdtop-(IZ47rg zV_7X=>FIq&bLT{Z0yNeJv^yrSbYxnJh#71=wU6I#gL5V#QJz{D$j{Rnq9~<@)v&(c z6>yQo@%G^Wh*ft4(g)lCVwL@ac5XUjr;ksoy`p60Yri)&6+pu<())^~-`7mUT`X7= z!h(4N3kHRWRv`x=oY>CC+klB~+lFhAK%bu?678=Z+FxxMhu{>q$4fe$UoBY;fiy}i z?=ZW7ll`;^I$`rY$D*yz3Egf!x_UXlP|+@#vSOI`M@1g)mtG!LBBgag3IlKF_&Uap zcLf$@kE{o=qwe3|JEee3+O2@x#)*(nF~@6>HM+=5w=N|1B1rTBB#J}#v96AHJNEtn zpj9qGO;2S;vy&zk8ds|~MZN73+M_YD9!eUq6ZO;xGFWrG5m4b~ju`U{VOe!)uk`}T zT4=LPffT0-`eU}AC?30pO0zt!Wg;d`sHzzDu4cO?w_Y{o5EeibigGjSUii_5J+S=- z6Nr2=8tG47%h1$qK=^Q>|!-gJr@9rj@-)jsOCBO##)uUt> z@)jK*1YiD~rV+yN1;UBQ)#pN%L0IvNIfjY8UJu*1Yv{CC#I2rDg5OqigUi;$hVZR7 zLY*L-opwly!p0CCWar?ON|w7R`Zc-}-cBYd$!QmBwuSH#Kj0-N=xUqDaKxAV_A2RL z-utph5d1i<8Jl10?5wchLMgOcp2nd?fci62&z~hKJsu zcOE|oahL!RVs;&=gH~|_W5kp@-=VbHHp2|H=BqR{)nrLPdWw)!+BqTH!1))rx@&7E z*m?T{1yNjREJ6~jjyVpfST}63OV8Nn`-a!z61JlVwK?&cT>KuXW3qLbW%fR^Lltw} zZMKKOq#mwU+2R^3m|}dW!=}lqh&2zxo4yDUiSN(t%QGNEEUxad-!Q#Dw=av05f!kl zyM$F^yD!rG$GG3`+vYTzdz@{Z?LF{$s=cgKw9m-1(A3ZTMpay@LfxpE+8^#6ty+FX=KyFd39CI1m zoxiAmi6mN=gZ^ElVIg!;iMS}XYYP2=fl1@X{I#;yT7x+^2sX`PJl z$sRRE5-uUetK2Af7Q?XXR)+JgJ(H}G_vCZ^%EG&%7fS|4Q1Tp5a??Rr>q-grobqe& z&HXzrW&3fYJgweS#X;zbL?h!IJEu{jT%BmqD#%H^av3yD%T%x<`HfV>BQ@%-1#8Q^*`(Cz;&FBw#VgyijL=8A z2!jnFi~t}Emzf>3D_Q0hDwU8>mU@Sy@5QsIq6p6h0?*RnMN9qd&aNl7k>b_#Plx?6 zqqt?;o0a$&R{7kwgS9-+ZUo(=K2XHtQ#ySUKquWAh4ZSJwQSYR=TQ8D-3KxL+ep!zu P>(;|=BzXycc!&NUQ9E6a diff --git a/tests/wpt/web-platform-tests/css/css-regions/elements/support/static-cube.js b/tests/wpt/web-platform-tests/css/css-regions/elements/support/static-cube.js deleted file mode 100644 index 10b045301c4..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/elements/support/static-cube.js +++ /dev/null @@ -1,52 +0,0 @@ -// This source is the javascript needed to build a simple moving -// cube in **three.js** based on this -// [example](https://raw.github.com/mrdoob/three.js/r44/examples/canvas_geometry_cube.html) -// It is the source about this [blog post](/blog/2011/08/06/lets-do-a-cube/). - -// ## Now lets start - -// declare a bunch of variable we will need later -var container; -var camera, scene, renderer; -var cube; - -// ## Initialize everything -function init() { - // create the camera - camera = new THREE.Camera( 70, 4/3, 100, 1000 ); - camera.position.z = 350; - - // create the Scene - scene = new THREE.Scene(); - - // create the Cube - cube = new THREE.Mesh( new THREE.CubeGeometry( 200, 200, 200 ), new THREE.MeshNormalMaterial() ); - - // add the object to the scene - scene.addObject( cube ); - - // create the container element - container = document.querySelector("#container"); - - // init the WebGL renderer and append it to the Dom - renderer = new THREE.WebGLRenderer(); - renderer.setSize( container.getBoundingClientRect().width, container.getBoundingClientRect().height ); - container.appendChild( renderer.domElement ); -} - - -// ## Render the 3D Scene -function render() { - // animate the cube - cube.rotation.x = 0.5; - cube.rotation.y = 0.8; - cube.rotation.z = 0.2; - - // actually display the scene in the DOM element - renderer.render( scene, camera ); -} - -document.addEventListener("DOMContentLoaded", function() { - init(); - render(); -}) \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/elements/video-001.html b/tests/wpt/web-platform-tests/css/css-regions/elements/video-001.html deleted file mode 100644 index 4f092bc63d7..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/elements/video-001.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - CSS Regions: flowing a video in a region - - - - - - - -

Test passes if you see two identical videos playing smoothly.
- Test fails if you see a red rectangle or if videos are out of sync.

- - - -
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-001.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-001.html deleted file mode 100644 index 6bf9668fd2c..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-001.html +++ /dev/null @@ -1,45 +0,0 @@ - - - - CSS Regions: fixed height flexbox inside auto height region - - - - - - - - - - -
    -
  • Test passes if you see a green square inside a gray square.
  • -
  • You shouldn't see any red.
  • -
-
-
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-002.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-002.html deleted file mode 100644 index 5c430d5b26c..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-002.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - CSS Regions: flowing auto-height flexbox elements in region - - - - - - - - - - -
    -
  • Test passes if you see a green square inside a gray rectangle.
  • -
  • You shouldn't see any red.
  • -
-
- XXXXX
- XXXXX
- XXXXX
- XXXXX
- XXXXX -
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-003.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-003.html deleted file mode 100644 index 291d92dfba9..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-003.html +++ /dev/null @@ -1,55 +0,0 @@ - - - - CSS Regions: auto height region inside a fixed sized flexbox - - - - - - - - - - - - -
    -
  • Test passes if you see a green square.
  • -
  • You shouldn't see any red.
  • -
-
- XXXXX
- XXXXX
- XXXXX
- XXXXX
- XXXXX -
-
-
-

 

-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-004.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-004.html deleted file mode 100644 index 11549d176f5..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-flexbox-004.html +++ /dev/null @@ -1,54 +0,0 @@ - - - - CSS Regions: auto height region inside an auto height flexbox - - - - - - - - - - - - -
    -
  • Test passes if you see a green square.
  • -
  • You shouldn't see any red.
  • -
-
- XXXXX
- XXXXX
- XXXXX
- XXXXX
- XXXXX -
-
-
-

 

-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-001.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-001.html deleted file mode 100644 index 9431fa52ceb..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-001.html +++ /dev/null @@ -1,94 +0,0 @@ - - - - CSS Regions: Auto-height regions in auto-height flex container - - - - - - - - - - - - - -
    -
  • Test passes if you see a blue rectangle and a green rectangle, from left to right in this order.
  • -
  • The blue rectangle one the left should be taller than the green rectangle on the right.
  • -
  • You shouldn't see any red.
  • -
-
- XXXXX
- XXXXX
- XXXXX -
-
- XXXXX
- XXXXX -
-
-

 

-

 

-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-002.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-002.html deleted file mode 100644 index 768567dfb3b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-002.html +++ /dev/null @@ -1,59 +0,0 @@ - - - - CSS Regions: Auto-height regions with vertical writing mode in auto-height flexbox - - - - - - - - - - - - -
    -
  • Test passes if you see a horizontal green stripe.
  • -
  • You shouldn't see any red.
  • -
-
- XX
- XX
- XX
- XX
- XX -
-
-
-

 

-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-003.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-003.html deleted file mode 100644 index 8a4a4a9966a..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-003.html +++ /dev/null @@ -1,65 +0,0 @@ - - - - CSS Regions: auto-height regions in auto-height flexbox with flex basis - - - - - - - - - - - - -
    -
  • Test passes if you see three horizontal green stripes.
  • -
  • You shouldn't see any red.
  • -
-
- XXXX
- XXXX
- XXXX
-
-
-

 

-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-004.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-004.html deleted file mode 100644 index c636bd9e9eb..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-autoheight-flexbox-004.html +++ /dev/null @@ -1,72 +0,0 @@ - - - - CSS Regions: nested regions in flexbox - - - - - - - - - - - - -
    -
  • Test passes if you see a column of three horizontal stripes with colors in the following order: - green, blue, green.
  • -
  • You shouldn't see any red.
  • -
-
- XXX -
-
-
- XXX -
-
- XXX -
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-001.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-001.html deleted file mode 100644 index 6a5287d9296..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-001.html +++ /dev/null @@ -1,90 +0,0 @@ - - - - CSS Regions: Auto-height regions inside fixed sized flexbox - - - - - - - - - - - - - -
    -
  • Test passes if you can see two squares placed on the same horizontal line. Each square consists of two - vertical halves. The left square has the left half colored green and the right half colored blue. - The right square has left half colored blue and the right half colored green.
  • -
  • You shouldn't see any red.
  • -
-
- XXXXX
XXXXX
XXXXX
XXXXX
- XXXXX
XXXXX
XXXXX
XXXXX
- XXXXX
XXXXX
XXXXX
XXXXX
- XXXXX
XXXXX
XXXXX
XXXXX
- XXXXX
XXXXX
XXXXX
XXXXX
-
-
- XXXXX
XXXXX
XXXXX
XXXXX
- XXXXX
XXXXX
XXXXX
XXXXX
- XXXXX
XXXXX
-
-
-
-
-
-
-
-
-
-

 

-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-002.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-002.html deleted file mode 100644 index 3cfd9bb5dd1..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-002.html +++ /dev/null @@ -1,95 +0,0 @@ - - - - CSS Regions: Auto-height regions inside fixed sized flexbox with column flow - - - - - - - - - - - - - -
    -
  • Test passes if you can see two squares: a green square at the top and a blue square at the bottom.
  • -
  • The two squares should be of the same size.
  • -
  • You shouldn't see any red.
  • -
-
- XXXXXXXXXX
XXXXXXXXXX
- XXXXXXXXXX
XXXXXXXXXX
- XXXXXXXXXX
XXXXXXXXXX
- XXXXXXXXXX
XXXXXXXXXX
- XXXXXXXXXX
XXXXXXXXXX -
-
- XXXXXXXXXX
XXXXXXXXXX
- XXXXXXXXXX
XXXXXXXXXX
- XXXXXXXXXX
-
-
-
-
-
-
-
-
- -
-

 

-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-003.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-003.html deleted file mode 100644 index d6062aa21e6..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-003.html +++ /dev/null @@ -1,108 +0,0 @@ - - - - CSS Regions: Auto-height regions inside a fixed sized flexbox with column wrap flow - - - - - - - - - - - - - -
    -
  • Test passes if you see two columns with a total of 6 alternating horizontal green and blue stripes.
  • -
  • You shouldn't see any red.
  • -
-
- XXXXX
- XXXXX -
- XXXXX
- XXXXX -
- XXXXX
- XXXXX -
- -
- XXXXX
- XXXXX -
- XXXXX
- XXXXX -
- XXXXX
- XXXXX -
-
-
-
-
-
-
-
-
-
-
-
-
-

 

-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-004.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-004.html deleted file mode 100644 index 2317391169f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-004.html +++ /dev/null @@ -1,72 +0,0 @@ - - - - CSS Regions: Auto-height region in fixed sized flexbox using flex basis - - - - - - - - - - - - -
    -
  • Test passes if you see two green stripes.
  • -
  • You should not see any red.
  • -
-
- XXXXX
- XXXXX
- XXXXX
- XXXXX
-
-
-
-
-
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-005.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-005.html deleted file mode 100644 index 9c54fbed41f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-005.html +++ /dev/null @@ -1,62 +0,0 @@ - - - - CSS Regions: Auto-height regions in fixed sized flexboxes with align-items and justify-content - - - - - - - - - -
    -
  • Test passes if you see three horizontal green stripes.
  • -
  • You shouldn't see any red.
  • -
-
-
XXXX
-
XXXX
-
XXXX
-
-
-
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-006.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-006.html deleted file mode 100644 index cc863d657e3..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-006.html +++ /dev/null @@ -1,71 +0,0 @@ - - - - CSS Regions: auto-height regions inside a flex container with fixed size - - - - - - - - - - - - -
    -
  • Test passes if you see a rectangle having the left half colored green and the right half colored - blue.
  • -
  • You shouldn't see any red.
  • -
-
- XXXX
- XXXX -
-
- XXXX
- XXXX
- XXXX
- XXXX -
-
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-007.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-007.html deleted file mode 100644 index 185ab3ddb03..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-007.html +++ /dev/null @@ -1,62 +0,0 @@ - - - - CSS Regions: auto-height regions inside fixed sized flexbox - - - - - - - - - - - - -
    -
  • Test passes if you see you three identical green stripes.
  • -
  • You shouldn't see any red.
  • -
-
- XXXX
- XXXX
- XXXX
- XXXX -
-
-
-
-
-
-

 

- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-008.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-008.html deleted file mode 100644 index d8f59720c9e..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/autoheight-regions-in-fixed-sized-flexbox-008.html +++ /dev/null @@ -1,60 +0,0 @@ - - - - CSS Regions: auto-height regions with max height in fixed sized flexbox - - - - - - - - - - - - -
    -
  • Test passes if you see three horizontal green stripes.
  • -
  • You shouldn't see any red.
  • -
-
- XXXX
- XXXX
- XXXX -
-
-
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/column-flexbox-break.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/column-flexbox-break.html deleted file mode 100644 index c1ae0901693..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/column-flexbox-break.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - CSS Regions: fragmenting a flex container with column flow - - - - - - - - - - - - -
    -
  • Test passes if you see two horizontal green stripes.
  • -
  • You shouldn't see any red.
  • -
-
-
XXXX
XXXX
-
XXXX
XXXX
-
-
-

 

- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-flexbox-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-flexbox-001-ref.html deleted file mode 100644 index eec91745a23..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-flexbox-001-ref.html +++ /dev/null @@ -1,29 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  • Test passes if you see a green square inside a gray square.
  • -
  • You shouldn't see any red.
  • -
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-flexbox-002-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-flexbox-002-ref.html deleted file mode 100644 index 67eaeb881a4..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-flexbox-002-ref.html +++ /dev/null @@ -1,37 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  • Test passes if you see a green square inside a gray rectangle.
  • -
  • You shouldn't see any red.
  • -
-
-
- XXXXX
- XXXXX
- XXXXX
- XXXXX
- XXXXX -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-flexbox-003-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-flexbox-003-ref.html deleted file mode 100644 index 5b1455c3f80..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-flexbox-003-ref.html +++ /dev/null @@ -1,29 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  • Test passes if you see a green square.
  • -
  • You shouldn't see any red.
  • -
-
- XXXXX
- XXXXX
- XXXXX
- XXXXX
- XXXXX -
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-001-ref.html deleted file mode 100644 index 6fca3fe2008..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-001-ref.html +++ /dev/null @@ -1,32 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  • Test passes if you see a blue rectangle and a green rectangle, from left to right in this order.
  • -
  • The blue rectangle one the left should be taller than the green rectangle on the right.
  • -
  • You shouldn't see any red.
  • -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-002-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-002-ref.html deleted file mode 100644 index 399b70455c4..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-002-ref.html +++ /dev/null @@ -1,26 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  • Test passes if you see a horizontal green stripe.
  • -
  • You shouldn't see any red.
  • -
-
- XXXXX
- XXXXX -
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-003-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-003-ref.html deleted file mode 100644 index d0df028dc61..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-003-ref.html +++ /dev/null @@ -1,26 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  • Test passes if you see three horizontal green stripes.
  • -
  • You shouldn't see any red.
  • -
-
XXXX
-
XXXX
-
XXXX
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-004-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-004-ref.html deleted file mode 100644 index 97feebd2060..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-autoheight-flexbox-004-ref.html +++ /dev/null @@ -1,35 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  • Test passes if you see a column of three horizontal stripes with colors in the following order: - green, blue, green.
  • -
  • You shouldn't see any red.
  • -
-
XXX
-
XXX
-
XXX
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-001-ref.html deleted file mode 100644 index 7f270fbf7bc..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-001-ref.html +++ /dev/null @@ -1,37 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  • Test passes if you can see two squares placed on the same horizontal line. Each square consists of two - vertical halves. The left square has the left half colored green and the right half colored blue. - The right square has left half colored blue and the right half colored green.
  • -
  • You shouldn't see any red.
  • -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-002-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-002-ref.html deleted file mode 100644 index d623729da73..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-002-ref.html +++ /dev/null @@ -1,30 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  • Test passes if you can see two squares: a green square at the top and a blue square at the bottom.
  • -
  • The two squares should be of the same size.
  • -
  • You shouldn't see any red.
  • -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-003-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-003-ref.html deleted file mode 100644 index 6d64025eb82..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-003-ref.html +++ /dev/null @@ -1,42 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  • The green and blue rectangles are regions placed inside a flexbox with column wrap flow.
  • -
  • Test passes if you see two columns with a total of 6 alternating horizontal green and blue stripes.
  • -
  • You shouldn't see any red.
  • -
-
-
-
-
-
-
-
-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-004-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-004-ref.html deleted file mode 100644 index 0687bd34565..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-004-ref.html +++ /dev/null @@ -1,25 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  • Test passes if you see two green stripes.
  • -
  • You should not see any red.
  • -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-005-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-005-ref.html deleted file mode 100644 index 318f7ad70bd..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-005-ref.html +++ /dev/null @@ -1,27 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  • Test passes if you see three horizontal green stripes.
  • -
  • You shouldn't see any red.
  • -
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-006-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-006-ref.html deleted file mode 100644 index 2966e51de9e..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-006-ref.html +++ /dev/null @@ -1,30 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  • Test passes if you see a rectangle having the left half colored green and the right half colored - blue.
  • -
  • You shouldn't see any red.
  • -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-007-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-007-ref.html deleted file mode 100644 index 2e8c850db37..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-007-ref.html +++ /dev/null @@ -1,25 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  • Test passes if you see you three identical green stripes.
  • -
  • You shouldn't see any red.
  • -
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-008-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-008-ref.html deleted file mode 100644 index 6b83e0fb3f8..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/autoheight-regions-in-fixed-sized-flexbox-008-ref.html +++ /dev/null @@ -1,24 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  • Test passes if you see three horizontal green stripes.
  • -
  • You shouldn't see any red.
  • -
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/column-flexbox-break-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/column-flexbox-break-ref.html deleted file mode 100644 index 563217f2a76..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/column-flexbox-break-ref.html +++ /dev/null @@ -1,30 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  • Test passes if you see two horizontal green stripes.
  • -
  • You shouldn't see any red.
  • -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/regions-flexbox-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/regions-flexbox-001-ref.html deleted file mode 100644 index a0337adbe55..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/regions-flexbox-001-ref.html +++ /dev/null @@ -1,30 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  • Test passes if you see a green square inside a gray rectangle.
  • -
  • You shouldn't see any red.
  • -
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/regions-flexbox-002-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/regions-flexbox-002-ref.html deleted file mode 100644 index 5dd4b7513bc..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/regions-flexbox-002-ref.html +++ /dev/null @@ -1,43 +0,0 @@ - - - - CSS Regions: fixed sized region inside an auto height flexbox - - - - - -
    -
  • Test passes if you see a green square inside a gray rectangle.
  • -
  • You shouldn't see any red.
  • -
-
-
-
- XXXXX
- XXXXX
- XXXXX
- XXXXX
- XXXXX -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/row-flexbox-break-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/row-flexbox-break-ref.html deleted file mode 100644 index ad6650d3063..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/row-flexbox-break-ref.html +++ /dev/null @@ -1,23 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  • Test passes if you see two horizontal green stripes on the same horizontal line.
  • -
  • You shouldn't see any red.
  • -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/visibility-regions-in-flexbox-ref.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/visibility-regions-in-flexbox-ref.html deleted file mode 100644 index 1e46f07680f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/reference/visibility-regions-in-flexbox-ref.html +++ /dev/null @@ -1,25 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  • Test passes if you see a single green stripe.
  • -
  • You shouldn't see any red.
  • -
-
- XXXXXXXXXX -
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-001.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-001.html deleted file mode 100644 index 0f56db981c0..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-001.html +++ /dev/null @@ -1,43 +0,0 @@ - - - - CSS Regions: flowing flexbox elements in region - - - - - - - - - -
    -
  • Test passes if you see a green square inside a gray rectangle.
  • -
  • You shouldn't see any red.
  • -
-
-
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-002.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-002.html deleted file mode 100644 index 7e0635d7667..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-002.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - CSS Regions: flowing auto-height flexbox elements in region - - - - - - - - - - - -
    -
  • Test passes if you see a green square inside a gray rectangle.
  • -
  • You shouldn't see any red.
  • -
-
- XXXXX
- XXXXX
- XXXXX
- XXXXX
- XXXXX -
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-003.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-003.html deleted file mode 100644 index 314ea594346..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-003.html +++ /dev/null @@ -1,56 +0,0 @@ - - - - CSS Regions: fixed sized region inside a fixed sized flexbox - - - - - - - - - - - -
    -
  • Test passes if you see a green square inside a gray square positioned at its top left corner.
  • -
  • You shouldn't see any red.
  • -
-
- XXXXX
- XXXXX
- XXXXX
- XXXXX
- XXXXX -
-
-
-

 

-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-004.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-004.html deleted file mode 100644 index ae80bbc8acc..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/regions-flexbox-004.html +++ /dev/null @@ -1,56 +0,0 @@ - - - - CSS Regions: fixed sized region inside an auto height flexbox - - - - - - - - - - - -
    -
  • Test passes if you see a green square inside a gray rectangle.
  • -
  • You shouldn't see any red.
  • -
-
- XXXXX
- XXXXX
- XXXXX
- XXXXX
- XXXXX -
-
-
-

 

-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/row-flexbox-break.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/row-flexbox-break.html deleted file mode 100644 index 402242284c3..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/row-flexbox-break.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - CSS Regions: row flex container fragmentation - - - - - - - - - - - - -
    -
  • Test passes if you see two horizontal green stripes on the same horizontal line.
  • -
  • You shouldn't see any red.
  • -
-
-
XX
XX
XX
XX
-
XX
XX
XX
XX
-
-

 

-

 

- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flexbox/visibility-regions-in-flexbox.html b/tests/wpt/web-platform-tests/css/css-regions/flexbox/visibility-regions-in-flexbox.html deleted file mode 100644 index 230af22d1c3..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flexbox/visibility-regions-in-flexbox.html +++ /dev/null @@ -1,64 +0,0 @@ - - - - CSS Regions: collapsed region flex items - - - - - - - - - - - -
    -
  • Test passes if you see a single green stripe.
  • -
  • You shouldn't see any red.
  • -
-
- XXXXX
- XXXXX
- XXXXX
-
-
-

 

-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-001.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-001.html deleted file mode 100644 index f0cc63139cc..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-001.html +++ /dev/null @@ -1,91 +0,0 @@ - - - - CSS Regions: multiple auto-sized floated regions - - - - - - - - - - -

- Test passes if you see a horizontal, black-bordered rectangle with a green square at its - left end and a blue square at its right end. The rectangle should be approximately as - wide as the page.
- You should see no red. -

-
-
-

 

-
-
-

 

-
-
-
-
- xxxx
- xxxx
- xxxx
- xxxx
- xxxx -
-
- xxxx
- xxxx
- xxxx
- xxxx
- xxxx -
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-002.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-002.html deleted file mode 100644 index b7a2f796dc0..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-002.html +++ /dev/null @@ -1,62 +0,0 @@ - - - - CSS Regions: floated region with multiple floated siblings - - - - - - - - - -

- Test passes if you see four regularly spaced green squares.
- You should see no red. -

- -
-
-
-
- -
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-003.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-003.html deleted file mode 100644 index 5e7f16ff469..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-003.html +++ /dev/null @@ -1,52 +0,0 @@ - - - - CSS Regions: single auto-sized floated region - - - - - - - - - -

- Test passes if you see a green square with a thick black outline.
- You should see no red. -

- -
- -
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-004.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-004.html deleted file mode 100644 index c62000f014b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-004.html +++ /dev/null @@ -1,73 +0,0 @@ - - - - CSS Regions: named flow contains a nested floated region - - - - - - - - - - -

- Test passes if you see a horizontal, black-bordered rectangle with a green square at its - left end and a blue square at its right end. The rectangle should be approximately as - wide as the page.
- You should see no red. -

- -
- -
-
-

 

-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-005.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-005.html deleted file mode 100644 index 7257ffbbc97..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floated-regions-005.html +++ /dev/null @@ -1,77 +0,0 @@ - - - - CSS Regions: floated and normal flow auto-sized regions - - - - - - - - - - -

- Test passes if you two squares side by side. The left one should be green, the right one - should be blue and they should be flush to one another.
- You should see no red. -

- -
-

 

-
-
-

 

-
- -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-clear-breaks-001.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-clear-breaks-001.html deleted file mode 100644 index 4e03aa46a38..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-clear-breaks-001.html +++ /dev/null @@ -1,88 +0,0 @@ - - - - CSS Regions: cleared floats in named flow contents - - - - - - - - - -

- Test passes if you see two squares separated by a small vertical space. The squares should - have a black outline, the top square should be blue and the bottom one should be green.
- You should see no red. -

- -
-

 

-
-
-

 

-
- -
-

 

-
- -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-clear-breaks-002.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-clear-breaks-002.html deleted file mode 100644 index 1a8a97334d4..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-clear-breaks-002.html +++ /dev/null @@ -1,88 +0,0 @@ - - - - CSS Regions: forced region breaks and clear on floats inside named flow contents - - - - - - - - - - -

- Test passes if you see two squares separated by a small vertical space. The squares should - have a black outline, the top square should be blue and the bottom one should be green.
- You should see no red. -

- -
-

 

-
-
-

 

-
- -
-

 

-
- -
-
- xxxxx - xxxxx - xxxxx - xxxxx - xxxxx -
-
- xxxxx - xxxxx - xxxxx - xxxxx - xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-001.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-001.html deleted file mode 100644 index 0e59a21fc72..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-001.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - CSS Regions: float in a named flow - - - - - - - - -

- Test passes if you see some filler gray text and a light blue square in the top left - corner of black-bordered rectangle.
- Test fails is you see any red. -

-
-
- This is filler text. This is filler text. This is filler text. This is filler text. This is filler text. -
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-002.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-002.html deleted file mode 100644 index 03081e52bde..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-002.html +++ /dev/null @@ -1,55 +0,0 @@ - - - - CSS Regions: named flow contains multiple floats - - - - - - - - -

- Test passes if you see a black-bordered rectangle with the following contents: a light blue - square in the top left corner, a light green square in the top right with some filler gray - text in between the squares and under them.
- Test fails is you see any red. -

-
-
-
- This is filler text. This is filler text. This is filler text. This is filler text. This is filler text. This is filler text. This is filler text. -
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-003.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-003.html deleted file mode 100644 index 6f95a8c402b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-003.html +++ /dev/null @@ -1,56 +0,0 @@ - - - - CSS Regions: separate floats as named flow contents - - - - - - - - -

- Test passes if you see three squares, side by side, as follows: from left - to right, a light blue square, a yellow square and a light green square, - all flush to each other.
- Test fails is you see any red. -

- -
-
-
-
-
-

 

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-004.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-004.html deleted file mode 100644 index afa1b769537..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-004.html +++ /dev/null @@ -1,65 +0,0 @@ - - - - CSS Regions: separate floats flowed in autosized region - - - - - - - - - -

- Test passes if you see four colored rectangles, as follows: a horizontal purple rectangle, - a vertical green rectangle, a blue square and a narrow vertical black rectangle. The - rectangles should be all flush to each other and have their top edges aligned.
- Test fails is you see any red. -

- -
-
-
- - -
-

 

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-005.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-005.html deleted file mode 100644 index bdb6266cacc..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-005.html +++ /dev/null @@ -1,70 +0,0 @@ - - - - CSS Regions: separate floats with percent size in sized region - - - - - - - - -
-
-
- -

- Test passes if you see some filler gray text and three blue squares inside a black-bordered - rectangle. One blue square should be in the top left corner, another in the top right - corner and the third one should be somewhere along the left border, below the top-left - one.
- Test fails is you see any red. -

- -
-
- This is filler text. This is filler text. This is filler text. This is filler text. This - is filler text. This is filler text. This is filler text. This is filler text. This is - filler text. This is filler text. This is filler text. This is filler text. This is - filler text. This is filler text. This is filler text. This is filler text. This is -
- filler text. This is filler text. This is filler text. This is filler text. This is - filler text. This is filler text. This is filler text. This is filler text. -
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-006.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-006.html deleted file mode 100644 index 6f0cf067bc0..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-006.html +++ /dev/null @@ -1,74 +0,0 @@ - - - - CSS Regions: floats in a named flow with multiple regions - - - - - - - - - -

- Test passes if you see two gray rectangles, each with a blue square inside it. The first - rectangle should have a blue square in the top right corner, while the second rectangle - should have a blue square in the top left corner.
- Test fails is you see any red. -

- -
-
- xxxxxxx - xxxxxxx - xxxxxxx - xxxxxxxxxx - xxxxxxxxxx -
-
-
- xxxxxxx - xxxxxxx - xxxxxxx - xxxxxxxxxx - xxxxxxxxxx -
- -
-

 

-
-
-

 

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-007.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-007.html deleted file mode 100644 index 4fb9bcb713b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-007.html +++ /dev/null @@ -1,85 +0,0 @@ - - - - CSS Regions: named flow has floats and multiple block formatting contexts and is - flowed in multiple regions - - - - - - - - - -

- Test passes if you see two gray rectangles, each with a blue square inside it. The first - rectangle should have a blue square in the top right corner, while the second rectangle - should have a blue square in the top left corner.
- Test fails is you see any red. -

- -
- -
-
- xxxxxxx - xxxxxxx - xxxxxxx - xxxxxxxxxx - xxxxxxxxxx -
-
-
-
- xxxxxxx - xxxxxxx - xxxxxxx - xxxxxxxxxx - xxxxxxxxxx -
-
-

 

-
-
-

 

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-008.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-008.html deleted file mode 100644 index 8de84c11c01..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-008.html +++ /dev/null @@ -1,78 +0,0 @@ - - - - CSS Regions: floats in a named flow with forced breaks and multiple regions - - - - - - - - - -

- Test passes if you see two gray rectangles, each with a blue square inside it. The first - rectangle should have a blue square in the top right corner, while the second rectangle - should have a blue square in the top left corner.
- Test fails is you see any red. -

- -
-
- xxxxxxx - xxxxxxx - xxxxxxx - xxxxxxxxxx - xxxxxxxxxx -
-
-
- xxxxxxx - xxxxxxx - xxxxxxx - xxxxxxxxxx - xxxxxxxxxx -
- -
-

 

-
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-009.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-009.html deleted file mode 100644 index 8ae60c334b7..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-009.html +++ /dev/null @@ -1,71 +0,0 @@ - - - - CSS Regions: floats in a named flow fragmented through multiple regions - - - - - - - - - -

- Test passes if you see two identical rows of colored squares. Each row should have three - squares, from left to right as follows: blue, gray, green. The squares in a row should - be flush to each other, but the two rows should have some space between them.
- Test fails is you see any red. -

- -
-
xxx
xxx
xxx
xxx
xxx
xxx
-
xxx
xxx
xxx
xxx
xxx
xxx
-
- xxx - xxx - xxx - xxx - xxx - xxx -
-
- -
-

 

-
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-010.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-010.html deleted file mode 100644 index 068e7b85d18..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-010.html +++ /dev/null @@ -1,79 +0,0 @@ - - - - CSS Regions: floats in named flow content are sized relatively to the region - - - - - - - - - -

- Test passes if you see two gray rectangles, each with a blue square inside it. The first - rectangle should have a blue square in the top right corner, while the second rectangle - should have a blue square in the top left corner.
- Test fails is you see any red. -

- -
-
-
- xxxxxxx - xxxxxxx - xxxxxxx - xxxxxxxxxx - xxxxxxxxxx -
-
-
- xxxxxxx - xxxxxxx - xxxxxxx - xxxxxxxxxx - xxxxxxxxxx -
-
- -
-

 

-
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-011.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-011.html deleted file mode 100644 index 5a70d452a09..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-011.html +++ /dev/null @@ -1,70 +0,0 @@ - - - - CSS Regions: forced region break on float inside a named flow - - - - - - - - - -

- Test passes if you see two squares, horizontally side by side. The left square should be - green and the right square should be blue.
- Test fails is you see any red. -

- -
-
- -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx xxxxx xxxxx xxxxx xxxxx -
-
- -
-

 

-
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-012.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-012.html deleted file mode 100644 index 1a7e610bc7d..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-012.html +++ /dev/null @@ -1,85 +0,0 @@ - - - - CSS Test: floats with forced region breaks inside them - - - - - - - - - - -

- Test passes if you see two identical rows of colored squares. Each row should have three - squares, from left to right as follows: blue, gray, green. The squares in a row should - be flush to each other, but the two rows should have some space between them.
- Test fails is you see any red. -

- -
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- xxxxx xxxxx xxxxx xxxxx xxxxx -
-
- xxxxx xxxxx xxxxx xxxxx xxxxx -
-
-
- -
-

 

-
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-013.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-013.html deleted file mode 100644 index 0ed9d360455..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-013.html +++ /dev/null @@ -1,63 +0,0 @@ - - - - CSS Regions: regions wholly contain floates flowed in them - - - - - - - - - -

- Test passes if you see a blue square and no red. -

- -
-
-
- xxxx
- xxxx
- xxxx
- xxxx
- xxxx -
-
-
- -
-
-

 

-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-014.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-014.html deleted file mode 100644 index 56387e6db8e..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-014.html +++ /dev/null @@ -1,66 +0,0 @@ - - - - CSS Regions: float overflowing a fixed-sized region - - - - - - - - - -

- Test passes if you see a blue square and no red. -

- -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- -
-

 

-
-
zambare
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-015.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-015.html deleted file mode 100644 index d94dc521cf8..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-015.html +++ /dev/null @@ -1,63 +0,0 @@ - - - - CSS Regions: painting order for floats overflowing a region - - - - - - - - - -

- Test passes if you see a blue square and no red. -

- -
-

 

-
-
- xxxxx
- xxxxx
- xxxxx -
- xxxxx
- xxxxx
- - xxxxx
- xxxxx
- xxxxx -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-016.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-016.html deleted file mode 100644 index 511836617ab..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-016.html +++ /dev/null @@ -1,63 +0,0 @@ - - - - CSS Regions: float overflowing its container does not interact with other line boxes - when flowed in region - - - - - - - - - -

- Test passes if you see a green square and a horizontal blue rectangle side by side; - they should have the top edges aligned and be flush to one another.
- You should see no red. -

- -
-

 

-
-
-
-
- xxxxx
- xxxxx
- xxxxx -
- xxxxx
- xxxxx -
- xxxxx
- xxxxx -
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-017.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-017.html deleted file mode 100644 index 62ec78d496e..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-017.html +++ /dev/null @@ -1,83 +0,0 @@ - - - - CSS Regions: float and non-float content with forced region break fragmented across - two regions - - - - - - - - - - -

- Test passes if you see two rows, each with two equally sized blue and green squares (blue - on the left, green on the right); the squares should be flush to one another but there - should be a small vertical space between the two rows.
- You should see no red. -

- -
-

 

-
-
-

 

-
- -
-
-
- xxxx
- xxxx
- xxxx
- xxxx
- xxxx
- xxxx
- xxxx
- xxxx -
- xxxx
- xxxx
- xxxx
- xxxx -
 
-
- xxxx
- xxxx
- xxxx
- xxxx -
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-018.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-018.html deleted file mode 100644 index f9990d3303f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-018.html +++ /dev/null @@ -1,78 +0,0 @@ - - - - CSS Regions: floats and cleared boxes are properly fragmented through regions - - - - - - - - - -

- Test passes if you see two squares separated by a small vertical space. The squares should - have a black outline, the top square should be blue and the bottom one should be green.
- You should see no red. -

- -
-
-

 

-
-
-

 

-
-
- -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-019.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-019.html deleted file mode 100644 index f5bcdbab2f1..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-019.html +++ /dev/null @@ -1,78 +0,0 @@ - - - - CSS Regions: cleared floats are properly fragmented through regions - - - - - - - - - -

- Test passes if you see two squares separated by a small vertical space. The squares should - have a black outline, the top square should be blue and the bottom one should be green.
- You should see no red. -

- -
-
-

 

-
-
-

 

-
-
- -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-020.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-020.html deleted file mode 100644 index f83b9bb96ff..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-020.html +++ /dev/null @@ -1,69 +0,0 @@ - - - - CSS Regions: cleared pseudo-elements (clearfix) in named flow contents - - - - - - - - - -

- Test passes if you see a green square with a thick blue outline.
- You should see no red. -

- -
-

 

-
- -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-021.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-021.html deleted file mode 100644 index e7a19b40de6..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-021.html +++ /dev/null @@ -1,86 +0,0 @@ - - - - CSS Regions: cleared non-float content after a forced region break - - - - - - - - - -

- Test passes if you see two squares separated by a small vertical space. The squares should - have a black outline, the top square should be blue and the bottom one should be green.
- You should see no red. -

- -
-

 

-
-
-

 

-
- -
-

 

-
- -
-
- xxxxx - xxxxx - xxxxx - xxxxx - xxxxx -
-
- xxxxx - xxxxx - xxxxx - xxxxx - xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-022.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-022.html deleted file mode 100644 index 4a356666870..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-022.html +++ /dev/null @@ -1,80 +0,0 @@ - - - - CSS Regions: float and non-float content floated in different named flows - - - - - - - - - -

- Test passes if you see two squares separated by a small vertical space. The squares should - have a black outline, the top square should be blue and the bottom one should be green.
- You should see no red. -

- -
-

 

-
-
-

 

-
- -
-
- xxxxx - xxxxx - xxxxx - xxxxx - xxxxx -
-
- xxxxx - xxxxx - xxxxx - xxxxx - xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-023.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-023.html deleted file mode 100644 index 19386d87444..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-023.html +++ /dev/null @@ -1,67 +0,0 @@ - - - - CSS Regions: inline floats and non-float contents inside a named flow - - - - - - - - - -

- Test passes if you see two squares inside a black rectangular border. The left square - should be blue, the right square should be green, and the squares should be flush to one - another.
- You should see no red. -

- -
-

 

-
- -
- - xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-024.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-024.html deleted file mode 100644 index fd472b55d9a..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-024.html +++ /dev/null @@ -1,66 +0,0 @@ - - - - CSS Regions: float with relative sizing fragmented in differently sized regions - - - - - - - - - -

- Test passes if you see two black bordered rectangles separated by a small vertical space. - The bottom rectangle should be twice as wide as the top one and both rectangles should - have the left half green and the right half blue.
- You should see no red. -

- -
-

 

-
-
-

 

-
- -
-
xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​
- xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​ -
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-025.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-025.html deleted file mode 100644 index c5ed63f5248..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-025.html +++ /dev/null @@ -1,71 +0,0 @@ - - - - CSS Regions: painting order for floats and relatively positioned content - - - - - - - - - -

- Test passes if you see a green square.
- You should see no red. -

- -
-

 

-
- -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-026.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-026.html deleted file mode 100644 index f0daf87d445..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-026.html +++ /dev/null @@ -1,107 +0,0 @@ - - - - CSS Regions: painting order for fragmented floats that are stacking contexts - - - - - - - - - -

- Test passes if you see two squares, side by side horizontally. The left square should - be green, the right one should be blue and they should be flush to one another.
- You should see no red. -

- -
-

 

-
-
-

 

-
- -
-
- - xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx
-
- - xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-027.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-027.html deleted file mode 100644 index e87cdafb021..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-027.html +++ /dev/null @@ -1,72 +0,0 @@ - - - - CSS Regions: floats outside of the region - - - - - - - - - -

- Test passes if you see two squares flush side by side.
- The left square should be green with a light green border and the right one should be - blue with a light blue border.
- You should see no red. -

- -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-

 

-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-028.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-028.html deleted file mode 100644 index 1d2bbb10388..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-028.html +++ /dev/null @@ -1,65 +0,0 @@ - - - - CSS Regions: floats and non-floats content flowed in a shrink-to fit autosized region - - - - - - - - - -

- Test passes if you see two squares inside a black rectangular border. The left square - should be blue, the right square should be green, and the squares should be flush to one - another.
- You should see no red. -

- -
-

 

-
- -
- - xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-029.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-029.html deleted file mode 100644 index 5ed45e5d2e6..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-029.html +++ /dev/null @@ -1,92 +0,0 @@ - - - - CSS Regions: margins around forced breaks when break is around float - - - - - - - - - - - -

- - Test passes if you see two colored squares each inside a black-bordered rectangle: -

    -
  • The black-bordered rectangles should be separated by a small horizontal space
  • -
  • The colored squares should be positioned roughly in the top-left area of their - rectangles, but without being flush to any of its sides
  • -

- You should see no red. -

- -
-

 

-
-

 

-
-
-

 

-
- -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-030.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-030.html deleted file mode 100644 index 3527149b668..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-030.html +++ /dev/null @@ -1,90 +0,0 @@ - - - - CSS Regions: margins around unforced breaks when break is around float - - - - - - - - - - - -

- - Test passes if you see two colored squares each inside a black-bordered rectangle: -

    -
  • The black-bordered rectangles should be separated by a small vertical space
  • -
  • The green square should have its top edge flush with the top border of its - containing rectangle
  • -
- You should see no red. -

- -
-

 

-
-

 

-
-
-

 

-
- -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-031.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-031.html deleted file mode 100644 index 819185d311b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-031.html +++ /dev/null @@ -1,88 +0,0 @@ - - - - CSS Regions: margins around float and non-float content - - - - - - - - - -

- - Test passes if you see two colored squares inside a black-bordered rectangle.
- The first (top to bottom) square should be blue, while the second should be green.
- The blue square should be roughly horizontally centered and the green square should be - near the bottom left corner of the rectangle. Neither square should touch the black border.
- You should see no red. -

- -
-
-
-

 

-
-
-
- -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-032.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-032.html deleted file mode 100644 index d2263281ba5..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-032.html +++ /dev/null @@ -1,89 +0,0 @@ - - - - CSS Regions: padding around float and non-float content - - - - - - - - - -

- - Test passes if you see two colored squares inside a black-bordered rectangle.
- The first (top to bottom) square should be blue, while the second should be green.
- The blue square should be roughly horizontally centered and the green square should be - near the bottom left corner of the rectangle. Neither square should touch the black border.
- You should see no red. -

- -
-
-
-

 

-
-
-
- -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-033.html b/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-033.html deleted file mode 100644 index 4374e7145cd..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/floats-in-named-flow-033.html +++ /dev/null @@ -1,92 +0,0 @@ - - - - CSS Regions: borders around float and non-float content - - - - - - - - - -

- Test passes if you see two squares with differently colored borders: -

    -
  • Both squares should be inside a vertical black-bordered rectangle that lacks the - bottom border
  • -
  • The first (blue) square should have an irregular width purple border that overlaps - the whole width of the left black border of the containing rectangle
  • -
  • The second (green) square should have an irregular light green border: the top - edge of the border should be invisible (zero width) while the bottom border should - be thin and overlap the whole width of the bottom black border of the containing - rectangle
  • -
- You should see no red. -

- -
-
-

 

-
-
- -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-001-ref.html deleted file mode 100644 index 31cd9ad49d7..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-001-ref.html +++ /dev/null @@ -1,71 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see a horizontal, black-bordered rectangle with a green square at its - left end and a blue square at its right end. The rectangle should be approximately as - wide as the page.
- You should see no red. -

-
-
-
- xxxx
- xxxx
- xxxx
- xxxx
- xxxx -
-
-
-
- xxxx
- xxxx
- xxxx
- xxxx
- xxxx -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-002-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-002-ref.html deleted file mode 100644 index 25a261179d9..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-002-ref.html +++ /dev/null @@ -1,47 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see four green squares separated by a small horizontal space.
- You should see no red. -

- - -
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
div> -
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-003-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-003-ref.html deleted file mode 100644 index 45dfa2c7fd8..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-003-ref.html +++ /dev/null @@ -1,38 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see a green square with a thick black outline.
- You should see no red. -

- - -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-004-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-004-ref.html deleted file mode 100644 index 3dbe4d5654f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-004-ref.html +++ /dev/null @@ -1,54 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see a horizontal, black-bordered rectangle with a green square at its - left end and a blue square at its right end. The rectangle should be approximately as - wide as the page.
- You should see no red. -

- -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-005-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-005-ref.html deleted file mode 100644 index 84e636ba12f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floated-regions-005-ref.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you two squares side by side. The left one should be green, the right one - should be blue and they should be flush to one another.
- You should see no red. -

- -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-clear-breaks-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-clear-breaks-001-ref.html deleted file mode 100644 index 8c9cf1982cf..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-clear-breaks-001-ref.html +++ /dev/null @@ -1,68 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see two squares separated by a small vertical space. The squares should - have a black outline, the top square should be blue and the bottom one should be green.
- You should see no red. -

- -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-clear-breaks-002-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-clear-breaks-002-ref.html deleted file mode 100644 index eb4dd9442f1..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-clear-breaks-002-ref.html +++ /dev/null @@ -1,61 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see two squares separated by a small vertical space. The squares should - have a black outline, the top square should be blue and the bottom one should be green.
- You should see no red. -

- -
-
-
- xxxxx - xxxxx - xxxxx - xxxxx - xxxxx -
-
-
-
-
-
- xxxxx - xxxxx - xxxxx - xxxxx - xxxxx -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-001-ref.html deleted file mode 100644 index 454de85b43d..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-001-ref.html +++ /dev/null @@ -1,37 +0,0 @@ - - - - CSS Reftest Reference - - - - -

- Test passes if you see some filler gray text and a light blue square in the top left - corner of black-bordered rectangle.
- Test fails is you see any red. -

-
-
-
- This is filler text. This is filler text. This is filler text. This is filler text. This is filler text. -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-002-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-002-ref.html deleted file mode 100644 index 3b668e88e09..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-002-ref.html +++ /dev/null @@ -1,44 +0,0 @@ - - - - CSS Reftest Reference - - - - -

- Test passes if you see a black-bordered rectangle with the following contents: a light blue - square in the top left corner, a light green square in the top right with some filler gray - text in between the squares and under them.
- Test fails is you see any red. -

-
-
-
-
- This is filler text. This is filler text. This is filler text. This is filler text. This is filler text. This is filler text. This is filler text. -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-003-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-003-ref.html deleted file mode 100644 index 0a517ab65bb..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-003-ref.html +++ /dev/null @@ -1,39 +0,0 @@ - - - - CSS Reftest Reference - - - - -

- Test passes if you see three squares, side by side, as follows: from left - to right, a light blue square, a yellow square and a light green square, - all flush to each other.
- Test fails is you see any red. -

-
-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-004-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-004-ref.html deleted file mode 100644 index da9c45425e1..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-004-ref.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - CSS Reftest Reference - - - - -

- Test passes if you see four colored rectangles, as follows: a horizontal purple rectangle, - a vertical green rectangle, a blue square and a narrow vertical black rectangle. The - rectangles should be all flush to each other and have their top edges aligned.
- Test fails is you see any red. -

- - - -
-
-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-005-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-005-ref.html deleted file mode 100644 index 16e97261c86..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-005-ref.html +++ /dev/null @@ -1,54 +0,0 @@ - - - - CSS Reftest Reference - - - - -
-
- -

- Test passes if you see some filler gray text and three blue squares inside a black-bordered - rectangle. One blue square should be in the top left corner, another in the top right - corner and the third one should be somewhere along the left border, below the top-left - one.
- Test fails is you see any red. -

- -
-
-
-
- This is filler text. This is filler text. This is filler text. This is filler text. This - is filler text. This is filler text. This is filler text. This is filler text. This is - filler text. This is filler text. This is filler text. This is filler text. This is - filler text. This is filler text. This is filler text. This is filler text. This is -
- filler text. This is filler text. This is filler text. This is filler text. This is - filler text. This is filler text. This is filler text. This is filler text. -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-006-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-006-ref.html deleted file mode 100644 index aeba68a527c..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-006-ref.html +++ /dev/null @@ -1,62 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see two gray rectangles, each with a blue square inside it. The first - rectangle should have a blue square in the top right corner, while the second rectangle - should have a blue square in the top left corner.
- Test fails is you see any red. -

- - -
-
-
- xxxxxxx - xxxxxxx - xxxxxxx - xxxxxxxxxx - xxxxxxxxxx -
-
-
-
-
- xxxxxxx - xxxxxxx - xxxxxxx - xxxxxxxxxx - xxxxxxxxxx -
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-009-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-009-ref.html deleted file mode 100644 index b1d011b364a..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-009-ref.html +++ /dev/null @@ -1,62 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see two identical rows of colored squares. Each row should have three - squares, from left to right as follows: blue, gray, green. The squares in a row should - be flush to each other, but the two rows should have some space between them.
- Test fails is you see any red. -

- - - -
-
-
xxx
xxx
xxx
-
xxx
xxx
xxx
-
- xxx - xxx - xxx -
-
-
-
-
-
xxx
xxx
xxx
-
xxx
xxx
xxx
-
- xxx - xxx - xxx -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-011-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-011-ref.html deleted file mode 100644 index 5044c77fa23..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-011-ref.html +++ /dev/null @@ -1,53 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see two squares, horizontally side by side. The left square should be - green and the right square should be blue.
- Test fails is you see any red. -

- -
-
- -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-
-
-
- xxxxx xxxxx xxxxx xxxxx xxxxx -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-012-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-012-ref.html deleted file mode 100644 index ec4eeff7d91..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-012-ref.html +++ /dev/null @@ -1,71 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see two identical rows of colored squares. Each row should have three - squares, from left to right as follows: blue, gray, green. The squares in a row should - be flush to each other, but the two rows should have some space between them.
- Test fails is you see any red. -

- - -
-
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- xxxxx xxxxx xxxxx xxxxx xxxxx -
-
-
-
-
-
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- xxxxx xxxxx xxxxx xxxxx xxxxx -
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-013-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-013-ref.html deleted file mode 100644 index e974e3feaf2..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-013-ref.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see a blue square and no red. -

- - -
-
-
-
-
- xxxx
- xxxx
- xxxx
- xxxx
- xxxx -
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-016-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-016-ref.html deleted file mode 100644 index c91451cc7bc..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-016-ref.html +++ /dev/null @@ -1,47 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see a green square and a horizontal blue rectangle side by side; - they should have the top edges aligned and be flush to one another.
- You should see no red. -

- -
-
-
-
- xxxxx
- xxxxx
- xxxxx -
- xxxxx
- xxxxx -
- xxxxx
- xxxxx -
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-017-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-017-ref.html deleted file mode 100644 index 2998a3af57c..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-017-ref.html +++ /dev/null @@ -1,70 +0,0 @@ - - - - CSS Reftest Reference - - - - - - -

- Test passes if you see two rows, each with two equally sized blue and green squares (blue - on the left, green on the right); the squares should be flush to one another but there - should be a small vertical space between the two rows.
- You should see no red. -

- -
-
-
-
- xxxx
- xxxx
- xxxx
- xxxx -
- xxxx
- xxxx
- xxxx
- xxxx -
 
-
-
-
-
-
-
-
- xxxx
- xxxx
- xxxx
- xxxx -
- xxxx
- xxxx
- xxxx
- xxxx -
-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-018-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-018-ref.html deleted file mode 100644 index 2961fdd0e28..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-018-ref.html +++ /dev/null @@ -1,61 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see two squares separated by a small vertical space. The squares should - have a black outline, the top square should be blue and the bottom one should be green.
- You should see no red. -

- -
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-020-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-020-ref.html deleted file mode 100644 index a85e0e00ec1..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-020-ref.html +++ /dev/null @@ -1,53 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see a green square with a thick blue outline.
- You should see no red. -

- -
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-021-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-021-ref.html deleted file mode 100644 index 37e5b42c94e..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-021-ref.html +++ /dev/null @@ -1,65 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see two squares separated by a small vertical space. The squares should - have a black outline, the top square should be blue and the bottom one should be green.
- You should see no red. -

- -
-
-
- xxxxx - xxxxx - xxxxx - xxxxx - xxxxx -
-
-
-
-
-
- xxxxx - xxxxx - xxxxx - xxxxx - xxxxx -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-023-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-023-ref.html deleted file mode 100644 index 14699180ef0..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-023-ref.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see two squares inside a black rectangular border. The left square - should be blue, the right square should be green, and the squares should be flush to one - another.
- You should see no red. -

- -
-
- - xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-024-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-024-ref.html deleted file mode 100644 index 865fdbef760..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-024-ref.html +++ /dev/null @@ -1,54 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see two black bordered rectangles separated by a small vertical space. - The bottom rectangle should be twice as wide as the top one and both rectangles should - have the left half green and the right half blue.
- You should see no red. -

- -
-
-
xxxxx​xxxxx​xxxxx​xxxxx​xxxxx
- xxxxx​xxxxx​xxxxx​xxxxx​xxxxx -
-
-
-
-
xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​
- xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​xxxxx​ -
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-025-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-025-ref.html deleted file mode 100644 index 285a96836f0..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-025-ref.html +++ /dev/null @@ -1,37 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see a green square.
- You should see no red. -

- -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-026-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-026-ref.html deleted file mode 100644 index efc23cc6381..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-026-ref.html +++ /dev/null @@ -1,53 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see two squares, side by side horizontally. The left square should - be green, the right one should be blue and they should be flush to one another.
- You should see no red. -

- -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-027-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-027-ref.html deleted file mode 100644 index ff55dc55ea1..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-027-ref.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see two squares flush side by side.
- The left square should be green with a light green border and the right one should be - blue with a light blue border.
- You should see no red. -

- -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-029-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-029-ref.html deleted file mode 100644 index adffd0f2d4a..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-029-ref.html +++ /dev/null @@ -1,69 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- - Test passes if you see two colored squares each inside a black-bordered rectangle: -

    -
  • The black-bordered rectangles should be separated by a small horizontal space
  • -
  • The colored squares should be positioned roughly in the top-left area of their - rectangles, but without being flush to any of its sides
  • -

- You should see no red. -

- -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-030-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-030-ref.html deleted file mode 100644 index 424d73aee03..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-030-ref.html +++ /dev/null @@ -1,70 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- - Test passes if you see two colored squares each inside a black-bordered rectangle: -

    -
  • The black-bordered rectangles should be separated by a small vertical space
  • -
  • The green square should have its top edge flush with the top border of its - containing rectangle
  • -
- You should see no red. -

- -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-031-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-031-ref.html deleted file mode 100644 index f5135cf6f79..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-031-ref.html +++ /dev/null @@ -1,69 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- - Test passes if you see two colored squares inside a black-bordered rectangle.
- The first (top to bottom) square should be blue, while the second should be green.
- The blue square should be roughly horizontally centered and the green square should be - near the bottom left corner of the rectangle. Neither square should touch the black border.
- You should see no red. -

- -
-
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-032-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-032-ref.html deleted file mode 100644 index cd997eeaa16..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-032-ref.html +++ /dev/null @@ -1,70 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- - Test passes if you see two colored squares inside a black-bordered rectangle.
- The first (top to bottom) square should be blue, while the second should be green.
- The blue square should be roughly horizontally centered and the green square should be - near the bottom left corner of the rectangle. Neither square should touch the black border.
- You should see no red. -

- -
-
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-033-ref.html b/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-033-ref.html deleted file mode 100644 index 892fc993b58..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/floats/reference/floats-in-named-flow-033-ref.html +++ /dev/null @@ -1,78 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

- Test passes if you see two squares with differently colored borders: -

    -
  • Both squares should be inside a vertical black-bordered rectangle that lacks the - bottom border
  • -
  • The first (blue) square should have an irregular width purple border that overlaps - the whole width of the left black border of the containing rectangle
  • -
  • The second (green) square should have an irregular light green border: the top - edge of the border should be invisible (zero width) while the bottom border should - be thin and overlap the whole width of the bottom black border of the containing - rectangle
  • -
- You should see no red. -

- -
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-content-001-ref.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-content-001-ref.xht deleted file mode 100644 index 2a6f3282d93..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-content-001-ref.xht +++ /dev/null @@ -1,20 +0,0 @@ - - - - CSS Test: Redirect content to a region - - - - -

- The words "flow content" in green should be in a single line below. -

-
- flow content -
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-content-001.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-content-001.xht deleted file mode 100644 index 83b8785a79d..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-content-001.xht +++ /dev/null @@ -1,35 +0,0 @@ - - - - CSS Test: Redirect content to a region - - - - - - - - - -
- flow content -
-

- The words "flow content" in green should be in a single line below. -

-
-
FAIL.
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-content-002-ref.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-content-002-ref.xht deleted file mode 100644 index 262d8ed66ea..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-content-002-ref.xht +++ /dev/null @@ -1,20 +0,0 @@ - - - - CSS Test: Redirect content through two regions - - - - -
line one
-

- The words "line one" should appear on a single line above, and the words "line two" should appear on a single line below. -

-
line two
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-content-002.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-content-002.xht deleted file mode 100644 index efa39f55005..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-content-002.xht +++ /dev/null @@ -1,41 +0,0 @@ - - - - CSS Test: Redirect content through two regions - - - - - - - - - -
-
line one
-
line two
-
-
-
FAIL.
-
-

- The words "line one" should appear on a single line above, and the words "line two" should appear on a single line below. -

-
-
FAIL.
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-from-001-ref.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-from-001-ref.xht deleted file mode 100644 index bf4eb591dcc..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-from-001-ref.xht +++ /dev/null @@ -1,23 +0,0 @@ - - - - CSS Test: Region chain ordering - - - - -

This test passes if this is followed by three lines of text containing "1 2 3" in order.

-
1
-
2
-
3
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-from-001.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-from-001.xht deleted file mode 100644 index 65a38c9d71c..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-from-001.xht +++ /dev/null @@ -1,55 +0,0 @@ - - - - CSS Test: Region chain ordering - - - - - - - - - -
-
1
-
2
-
3
-
-

This test passes if this is followed by three lines of text containing "1 2 3" in order.

-
-
FAIL
-
-
-
FAIL
-
-
-
FAIL
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-from-block-container-001-ref.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-from-block-container-001-ref.xht deleted file mode 100644 index cfccb15c786..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-from-block-container-001-ref.xht +++ /dev/null @@ -1,29 +0,0 @@ - - - - CSS Test: Regions apply only to block container boxes - - - - -
-

This test passes if this is followed by three lines of text containing "1 2 3" in order.

-
-
1
- 2 -
3
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-from-block-container-001.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-from-block-container-001.xht deleted file mode 100644 index 491a977c500..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-from-block-container-001.xht +++ /dev/null @@ -1,57 +0,0 @@ - - - - CSS Test: Regions apply only to block container boxes - - - - - - - - - -
-
-
1
-
3
-
-

This test passes if this is followed by three lines of text containing "1 2 3" in order.

-
-
FAIL.
-
- 2 -
-
FAIL.
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-into-001-ref.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-into-001-ref.xht deleted file mode 100644 index 8b1078464cf..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-into-001-ref.xht +++ /dev/null @@ -1,31 +0,0 @@ - - - - CSS Test: flow-into behavior - - - - -
- No text should appear above this line. Below should be lines with three green numbers each counting up to 18. -
-
 
-
-
1 2 3
-
4 5 6
-
7 8 9
-
10 11 12
-
13 14 15
-
16 17 18
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-into-001.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-into-001.xht deleted file mode 100644 index 858928e9dd9..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-into-001.xht +++ /dev/null @@ -1,120 +0,0 @@ - - - - CSS Test: flow-into behavior - - - - - - - - - -
- - 1 2 - -
- 4 -
7 8 9
- 5 6 -
- - 3 - - - 13 - - 14 - - 15 - - - 10 - - 12 - - 11 - -
-
- No text should appear above this line. Below should be lines with three green numbers each counting up to 18. -
-
-
FAIL - empty flow should replace this content.
-
-
-
FAIL - disjoint flow should replace this content.
-
-
-
FAIL - parent flow should replace this content.
-
-
-
FAIL - child flow should replace this content.
-
-
-
FAIL - nested flow should replace this content.
-
-
-
FAIL - noInherit flow should replace this content.
-
-
-
16 17 18
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-into-BFC-001-ref.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-into-BFC-001-ref.xht deleted file mode 100644 index 66773da47cb..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-into-BFC-001-ref.xht +++ /dev/null @@ -1,29 +0,0 @@ - - - - CSS Test: Regions establish a new block formatting context - - - - -

Test passes if you see a blue square to the right of a green square.

-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-into-BFC-001.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-into-BFC-001.xht deleted file mode 100644 index b8fc34b7d38..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-into-BFC-001.xht +++ /dev/null @@ -1,39 +0,0 @@ - - - - CSS Test: Regions establish a new block formatting context - - - - - - - - - -

Test passes if you see a blue square to the right of a green square.

-
-
-
FAIL
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-into-invalid-names-001-ref.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-into-invalid-names-001-ref.xht deleted file mode 100644 index faddfcdf5e2..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-into-invalid-names-001-ref.xht +++ /dev/null @@ -1,34 +0,0 @@ - - - - CSS Test: invalid flow-into idents - - - - -

You should see four words in a light green rectangle followed by four 'content not replaced…' lines.

-
-
none
-
inherit
-
default
-
initial
-
-
content not replaced by none ident
-
content not replaced by inherit ident
-
content not replaced by default ident
-
content not replaced by initial ident
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-into-invalid-names-001.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-into-invalid-names-001.xht deleted file mode 100644 index 21241516bd3..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-into-invalid-names-001.xht +++ /dev/null @@ -1,73 +0,0 @@ - - - - CSS Test: invalid flow-into idents - - - - - - - - - -

You should see four words in a light green rectangle followed by four 'content not replaced…' lines.

-
-
none
-
inherit
-
default
-
initial
-
-
-
content not replaced by none ident
-
-
-
content not replaced by inherit ident
-
-
-
content not replaced by default ident
-
-
-
content not replaced by initial ident
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-into-parsing-001.html b/tests/wpt/web-platform-tests/css/css-regions/flow-into-parsing-001.html deleted file mode 100644 index 1827dc52cb9..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-into-parsing-001.html +++ /dev/null @@ -1,68 +0,0 @@ - - - - CSS Regions Parsing Test: Parse flow-into property - - - - - - - - - - - -
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-into-region-children-001-ref.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-into-region-children-001-ref.xht deleted file mode 100644 index 468b5a88c02..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-into-region-children-001-ref.xht +++ /dev/null @@ -1,24 +0,0 @@ - - - - CSS Test: Region children are formatted if directed to a flow - - - - -

This test passes if this is followed by two lines of text containing "1 2" in order.

-
1
-
2
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/flow-into-region-children-001.xht b/tests/wpt/web-platform-tests/css/css-regions/flow-into-region-children-001.xht deleted file mode 100644 index 1d5966cc447..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/flow-into-region-children-001.xht +++ /dev/null @@ -1,44 +0,0 @@ - - - - CSS Test: Region children are formatted if directed to a flow - - - - - - - - - -

This test passes if this is followed by two lines of text containing "1 2" in order.

-
2
-
1
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/idlharness.html b/tests/wpt/web-platform-tests/css/css-regions/idlharness.html deleted file mode 100644 index 3d6f55c8073..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/idlharness.html +++ /dev/null @@ -1,20 +0,0 @@ - -css-regions IDL tests - - - - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/inheritance.html b/tests/wpt/web-platform-tests/css/css-regions/inheritance.html deleted file mode 100644 index 865a1b6b1c1..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/inheritance.html +++ /dev/null @@ -1,23 +0,0 @@ - - - - -Inheritance of CSS Regions properties - - - - - - - - -
-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-001.html deleted file mode 100644 index ecd99200f43..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-001.html +++ /dev/null @@ -1,65 +0,0 @@ - - - - CSS Test: calling requestFullscreen() on video element inside a named flow - - - - - - - - - - - -
-
    -
  1. You should see no red rectangles or squares before or during the text
  2. -
  3. You should see a video playing below
  4. -
  5. Click the Go full screen button below -
      -
    • The page should enter full screen mode, with only the video showing; the - video should still play.
    • -
    • The browser might display a permission window asking you to allow full - screen on this page. Allow it.
    • -
    -
  6. -
  7. Exit full screen (e.g. by pressing Esc) -
      -
    • Video should still play
    • -
    -
  8. -
- -
- -
- -
-
-

 

-
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-002.html deleted file mode 100644 index 865792d176b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-002.html +++ /dev/null @@ -1,61 +0,0 @@ - - - - CSS Test: calling requestFullscreen() on image element inside a named flow - - - - - - - - - - - -
-
    -
  1. You should see no red rectangles or squares before or during the text
  2. -
  3. You should see a picture of a cat below
  4. -
  5. Click the Go full screen button below -
      -
    • The page should enter full screen mode, with only the picture being showed.
    • -
    • The browser might display a permission window asking you to allow full - screen on this page. Allow it.
    • -
    -
  6. -
  7. Exit full screen (e.g. by pressing Esc) -
      -
    • The picture of the cat should be visible, along with all the other initial content.
    • -
    -
  8. -
- -
- -
- A picture of a cat -
-
-

 

-
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-003.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-003.html deleted file mode 100644 index 2430052bd19..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-003.html +++ /dev/null @@ -1,74 +0,0 @@ - - - - CSS Test: calling requestFullscreen() on inline element inside a named flow - - - - - - - - - - - - -
-
    -
  1. You should see no red rectangles or squares before or during the text
  2. -
  3. You should see a green square below
  4. -
  5. Click the Go full screen button below -
      -
    • The page should enter full screen mode, with only the green block being visible.
    • -
    • The browser might display a permission window asking you to allow full - screen on this page. Allow it.
    • -
    -
  6. -
  7. Exit full screen (e.g. by pressing Esc) -
      -
    • The green block should be visible, along with all the other initial content.
    • -
    -
  8. -
- -
- -
- - xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-

 

-
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-004.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-004.html deleted file mode 100644 index 7e18319a1b4..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-004.html +++ /dev/null @@ -1,73 +0,0 @@ - - - - CSS Test: calling requestFullscreen() on block element inside a named flow - - - - - - - - - - - - -
-
    -
  1. You should see no red rectangles or squares before or during the text
  2. -
  3. You should see a green square below
  4. -
  5. Click the Go full screen button below -
      -
    • The page should enter full screen mode, with only the green block being visible.
    • -
    • The browser might display a permission window asking you to allow full - screen on this page. Allow it.
    • -
    -
  6. -
  7. Exit full screen (e.g. by pressing Esc) -
      -
    • The green block should be visible, along with all the other initial content.
    • -
    -
  8. -
- -
- -
-

- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -

-
-
-

 

-
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-005.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-005.html deleted file mode 100644 index ccaefdfa8ad..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-005.html +++ /dev/null @@ -1,83 +0,0 @@ - - - - CSS Test: calling requestFullscreen() on a fragmented block element inside a named flow - - - - - - - - - - - - -
-
    -
  1. You should see no red rectangles or squares before or during the text
  2. -
  3. Below, you should see two horizontal green rectangles, side by side
  4. -
  5. Click the Go full screen button below -
      -
    • The page should enter full screen mode, with only a green square being visible.
    • -
    • The browser might display a permission window asking you to allow full - screen on this page. Allow it.
    • -
    -
  6. -
  7. Exit full screen (e.g. by pressing Esc) -
      -
    • The two green rectangles should be visible, along with all the other initial content.
    • -
    -
  8. -
- -
- -
-

- xxxxxx
- xxxxxx
- xxxxxx
- xxxxxx
- xxxxxx
- xxxxxx -

-
- -
-

 

-
-
-

 

-
- -
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-006.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-006.html deleted file mode 100644 index eb824172f74..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-006.html +++ /dev/null @@ -1,79 +0,0 @@ - - - - CSS Test: calling requestFullscreen() on an element whose descendants - are in a named flow - - - - - - - - - - - - -
-
    -
  1. You should see no red rectangles or squares before or during the text
  2. -
  3. Below, you should see a horizontal blue rectangle and green square below it
  4. -
  5. Click the Go full screen button below -
      -
    • The page should enter full screen mode, with only the blue rectangle being visible.
    • -
    • The browser might display a permission window asking you to allow full - screen on this page. Allow it.
    • -
    -
  6. -
  7. Exit full screen (e.g. by pressing Esc) -
      -
    • The blue rectangle should be visible, along with all the other initial content.
    • -
    -
  8. -
- -
- -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-

 

-
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-007.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-007.html deleted file mode 100644 index 4b6f3310565..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-007.html +++ /dev/null @@ -1,70 +0,0 @@ - - - - CSS Test: calling requestFullscreen() on a fixed-size region - - - - - - - - - - - - -
-
    -
  1. You should see no red rectangles or squares before or during the text
  2. -
  3. You should see a green square below
  4. -
  5. Click the Go full screen button below -
      -
    • The page should enter full screen mode, with only the green block being visible.
    • -
    • The browser might display a permission window asking you to allow full - screen on this page. Allow it.
    • -
    -
  6. -
  7. Exit full screen (e.g. by pressing Esc) -
      -
    • The green block should be visible, along with all the other initial content.
    • -
    -
  8. -
- -
- -
- xxxxx​xxxxx​xxxxx​xxxxx​xxxxx -
- -
-

 

-
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-008.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-008.html deleted file mode 100644 index ef97e32bf9d..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-008.html +++ /dev/null @@ -1,70 +0,0 @@ - - - - CSS Test: calling requestFullscreen() on an auto-sized region - - - - - - - - - - - - -
-
    -
  1. You should see no red rectangles or squares before or during the text
  2. -
  3. You should see a green horizontal line below
  4. -
  5. Click the Go full screen button below -
      -
    • The page should enter full screen mode, with only the green line being visible.
    • -
    • The browser might display a permission window asking you to allow full - screen on this page. Allow it.
    • -
    -
  6. -
  7. Exit full screen (e.g. by pressing Esc) -
      -
    • The green block should be visible, along with all the other initial content.
    • -
    -
  8. -
- -
- -
- xxxxx​xxxxx​xxxxx​xxxxx​xxxxx -
- -
-

 

-
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-009.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-009.html deleted file mode 100644 index 08c586c6d52..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-009.html +++ /dev/null @@ -1,77 +0,0 @@ - - - - CSS Test: using the :full-screen pseudo class to make a full-screen region auto-size - - - - - - - - - - - - - -
-
    -
  1. You should see no red rectangles or squares before or during the text
  2. -
  3. You should see a green square below
  4. -
  5. Click the Go full screen button below -
      -
    • The page should enter full screen mode, with the green square turning - into a thick green horizontal line.
    • -
    • The browser might display a permission window asking you to allow full - screen on this page. Allow it.
    • -
    -
  6. -
  7. Exit full screen (e.g. by pressing Esc) -
      -
    • The green line should turn back into a green square and all the other - initial content should become visible again.
    • -
    -
  8. -
- -
- -
- xxxxx​xxxxx​xxxxx​xxxxx​xxxxx -
- -
-

 

-
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-010.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-010.html deleted file mode 100644 index d2f4b13b058..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/fullscreen-region-content-010.html +++ /dev/null @@ -1,89 +0,0 @@ - - - - CSS Test: calling requestFullscreen() on a region that's part of a multiple regions - region chain - - - - - - - - - - - - -
-
    -
  1. You should see no red rectangles or squares before or during the text
  2. -
  3. Below, you should see a green square, a light blue square and another green square, stacked vertically
  4. -
  5. Click the Go full screen button below -
      -
    • The page should enter full screen mode, with only the light blue square being visible.
    • -
    • The browser might display a permission window asking you to allow full - screen on this page. Allow it.
    • -
    -
  6. -
  7. Exit full screen (e.g. by pressing Esc) -
      -
    • All initial content should be visible again.
    • -
    -
  8. -
- -
- -
-
- xxxxx​xxxxx​xxxxx​xxxxx​xxxxx -
-
- xxxxx​xxxxx​xxxxx​xxxxx​xxxxx -
-
- xxxxx​xxxxx​xxxxx​xxxxx​xxxxx -
-
- -
-

 

-
-
-

 

-
-
-

 

-
- -
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/support/cat.jpg b/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/support/cat.jpg deleted file mode 100644 index a4f14f54d60e592f3ca8b44360931898602ba6fe..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 21474 zcmb@tbzB_F);2nZ+u-i*?!n!H4i3THT@&2ho#0Mzhu|Iv8Y~GCTmngOl6;fB&wKVc z_x^Lg`+JM&nbp-*y`-4xXUY6t`@Ic-D$6U$1AssvKoR~2`27n2VFCQ!fiBDW+1mgB zN=hsMWB>pF0`LGq06aLw06*-bApju!Qv`lU!VexUZe9^?E)gzaDsFBOIL#*n@BP!j z05I_Hv54?9An0$}0ZxPdMO#4sjDvIjPif#o|1kKy36KFGLJ$xUAc%+vh)76?$f!_M zR1_3cJWMQfC?OsZ5g{G{0SP%hB?&1l836$m8x<`BBQpy#F(o?}I};Z@6EoAFn*foJ zkWi6PaZyomnMeponEtQZ??C`IGQbb;8VsZXfUtpJY~b%v03}>b1i0<~nD1W=2m-_9 zMM6eFMS~A$hXO!AFc<^@BOpK^@X^8W>i`Hg0uD8|6e6ysITDRK9#3d$2{Ns8^ANt) z!X+KAg+~|)Dghx8F$p~bBNHtU$*~ge=GL?&k{9>V*!W^xFY4-n3 zv9SMNn*Cd`fArb_po4+%#RFplBmf_^Lqn4S<1(SC1qrrq4Qs>HUrg7RFm=-jcDkFs z;`DG*j^R-ks+#zYDXxB7Q@wfnH2vBODbEdpo?cv`mV%Qpf$`y6Rk;I~qV~fwvI-QG zrY1qxt-+;$_rZ(i6>k{6Bt<*%v!Ky~$jN86ML)h%3e%;2eZH7t9H-T_jp~4vO|JjA z7=^-WF4GveWGXqQ9Mb)hc|uM4fTN*IDY#mSbJLVb`>Sj1 z*=gndpa+m2SNXFbt^K*~i6<);cO}Qd&%$_r;m7_+U4cO+G{bMw;@?7lRFWDe^qh-% zt}Qbw7OM2{pJ8v5>jC7o!(R2@=|*A z?U1hM0VX#*>kv&Vd+%FAmEd1M7P_4Gwi)&|B*BX|9ERMvY>%x!DQhGAc9jwG@VJs` zq3*%V*s)2?U7X{?x8gx4d^#r5WS=oZBZ&!fQ+UH~##7jhicIvd8lWneBDo>vlIdNq&4&!I3?iB$viL4hzM1n12n~NNn?{ z*A_A$asgb8>GR^e-U}UkXKiXE!~PqP&pF#bBrWoTv3Ob6_~CjWDky)1I$0>OBh6>E zAaNoWZ?9ruk=N|0E@3s$A%*^ZY^;R9@Sqjqk9TIqcLU6pMM7qoF3P)X+h2-+dlmLu z`gDfu^#)c#n7)`w7s2;cBE^QSd=563)L-qqvDDuY;lTG~}ySe)@UtS0m*Iwh> z(~~y6H1(@Uo$j)c6B2u;r98NxBX^+GOWisz<}gc;Kli@tu!gw0!YWgtAZ{9qoJTx^ zz*cu{9T4#C6>9s;d*nv!hzZOPTcmv?yovnKeem1IQL80-3m{rz`R#FDqQM7`}49%+%NdV?l@0~*u(mQ&rgNgEF+xn=2IsRN>u$*95*qcu^JvcD0IKP^|-Ty z+4?-wFrIfkyF~t~xXTRYi)IhqOgD6`p35?;FRwWrnrP5WcQcij+GSo=v5 zYp%E7Wz@t#g-o`*Jg6R%%P}R}aQSt66k4FaZ5nNdmN6r^%Je#+xFz6BH;XHX8ZplW zW*yJN-sdo2BgM$*et6j!uBX94z>f-iYz`eHYSh+Qwe3`~FYn9}NcQNWx^+ql(D}Ui z*|C$5t3auf=rsJoQGZ#hJ(oa43^aXk2uu3d^!UfzGFxwReu39~-srR}Dfx8e=TfGhpBtExUjD2s!kfT}x^C>wVGD8}6Oze< zRK4r|{-sGE{EAV3!84!r&5thNQDnFI8E^4)58=?E3-B4{O8gZCWBeXPc0lpTL9?~c zwU)xKSynC9sPAB|5%23pmSg4?rOlZ*9&)nj=L*lThEsB%RhTJ4_V5O*JP_FcNN)oi zxH0+>=eW2W2?s*td64+hINv1>h8}B$?PO-guujsp^OuMU-pBu7%*z)DiKhag1?sR& zCt$9ai8<&|VW%M9R+EPeO{|t|p>Q>hQlly#CKX-7_F>X>MLCDfPbb6bxl(e&;c22e zzM7>ok1eQ{ox%{9$FZA;Vug-n))%ij^r0N=1g@WsNE#LdjCyM-2=DCeT^4D}!wr#%<-G)|7uSv!&5L0sdIp9&VV4L6yMB@J<(VeCWLiWCD zsJK{~cOyPu6l$a}ay_eCSG6M%#!DH9ZV13Q;qP-w>e9!zj39?g~lb!QzJ$Gf{`~v(;C3y8voCZr!(t z^=2|dH3_=?LGKAEcwqVtR!Xe-}mB>?m+boxwS$F>xEZmwK<=z`5_g#($P33`kr!bO~@_ z5&G%ac=aaw%L?C>H=_6w(kv7c`GU3f&VHvKJBVQ;a~aK7d^`_kL-YxFn!L2wUfEcW zv9^C*Oky%-X^YV9(?6*-axl1;7I=MX;#7pW8YG=EXN8LlAZ2i3rMM%<+A|iRA1J|J zZlZJBqMl(o!g>@FdLw^%n0!IITF*YJnUC_)03d8$ynA!_xx%n;Q&qP)BG36(e$6}b z>z0ijLWdBpLEL$=m+e(}1+UZ{K3#2{iob1x$}%TmdCuSIiM%fG8fVR_?fV$n?IO%Q zccwjBj_#pgd{FxZ{bGh<>qjL4eg8ma=Gov|Uw5`4)x?yt@MDeKxs|EoF-agW=SvuG z!j+~g@g8GRRDKEp@r>=ke5HN#0V5IQVHt}r;+$0S!Bcb6q{*|hxPh<-IG^D}xLcZL z^D#-0BBOD3kbrL668;R;EZCzX^SUXqL$ahRB<(3!nTd_x*b_pksrN1LSI(md&n}fGlz5iRS1k&d-+psOF!U@#Fh>i{1dba%*XYx{Nep@F zeyV%#^b}n6Oqi9soBIkYO9mv0`~IbO@=jtfUyUox@^@%ox1hMsQd`!Sus{#dhtnxA~7$RFXuX;_0|1>0U8y-ac&vD3flO+ z(-B3P@;X_H9VHT+4or(VA_F`((a|Z9)9y48?X=2ncR!csggIKL|%QRF_V$ z0=+gfaIk|BTt82A7P!mdYoZVdI_W@>l&AaSSq~WTG`0CX3>3-d$MI69mBVL+xzVJg0mh^_=oFN=n?oUiBuwSk*s+-5t{6LMFM^j3;bX2|91ERfSc97f+2t<_CF(-@5Da6`37tBlYaOz z9WIRVU$g$-Cr~SEPfK`UKo)+<-vZ7YP7lIqJPREy892QR03f4VIa^r)04Uq={utZ8 z#-Q5$8Dsk&W1PI5?EwJPpg;Z2*5;mYIt5PCSvb0R!RfX?{T_eMo&1abkGWpfmhk(b zZo&J}eY~yVyiotxCEC~P&s?-W`r}!;dHkUx;IyEnojH6AS|6Nd`&)iE1prWb{xP7E zoQwdsuz&zN4?8!Ng_F6ZBbBG6xznG!{%^NGYxVa%>0Sc>Sa8`o<}JNFeE#l({P{ot zpaQVqfh%GF1%MX71Yig700aS|@UWE}KpCJ8&;b|#OaYbvJAgC51Ke;1F;MxBy%S?f{R0 z-+&JwFbExl2O|i0V3|Jj(2(|%xfM0^+z**o@a3i<}JON$;Z-dXk_Ygz~E`$og4iSYY zLSPU}h&$vZBmt5KsfKhwMj=a(9mpl*7Xk(X83HSU2!axVK7uWRFG3VT7D6RLJHi;k z3c^0Z4I&~U0U{%!Afh6o0ipw9AYuYyA>tdvLBs{bJ;ZBxoQ)WX6-f+99myQY3n>aI z7pWfUEz%;~&%8rML#9OLL6%20M0Pr0 zqx7K6qwJ$RqGF>mqKcvFpgN$2qUNABqK=_%p?*h0L!&_xM$<&IM+-sAL2E*rMB72T zN5?^DL6<={M)yWfLa#y}L|;e$j)8%}fFX%th~b5igi(Vrg7FFC4iguX15*jp3iB0a zK4u5zBIX4a3Kl(<6qYGg09F=OE7m;L859M|0F{B7LtjGkq216A&}(d5Y;J6IY-j8Q z>{{$8>?0f`90nXY94nj%oHCpdoIPAHE-kJMt|e|bZaMB4?miwO9wVL-o&#PyUIX47 z-X%T`J|Dg=z8`)*en0*;0hoY+K#9PKAeo?rV3pv3kepD8(3&uou#s?)@Ro>_NRr5! zD30h2(F)N6F%_{Ku_JLRaVPOd5(o(ki6)6JNfF5y$r&jgsVJ!>X&h+_=>{2yjD<{# zERd{>Y?kbroPu0|+>Jb!e1!arf`CGj!hs@#Vu0e95|>h((w;Jd@-5{F6+V>|l@nDC z)hN{^H5s)cwKsJM^&Ish4I>SVCXD6{%|}{PS|M5++6>xZ+Dkf0IyJf=x;nZIdK7vg zdOP}T`U(1521W)whG>RPh9gEIMkU4o#yZ9=CJZJCCU>S%re$VCW+7%r=0fK8EFczs z7CV-FmU&hXs{pG#Ya#0b8v>g!n+sbh+Xr@Zb}4or_B!?*4gwBUjxdf+jtfpYPD9RA z&I!(6T>M;4T;*Jw+&J9I++o~3+~0Uucr1DHd6s!Gc;$It@pkcE@v-t*^A+)}@#FHV z@kjFy^ZyhO6z~ve6gU>76EqVn5d0v7C!`^iAT%kAAS^BXO1Mw>UPM5|OQc2Qt0=pu zqiC(@(KE(p*3ZhH?TOKdnTwT(ZHrThn~A>`-d@1vjf;mE<{^5j0r)5zP(*U4Wh@GAr=3@Rchswk!^ zeo!J;vQ(;3x>Oca4ptsjL08dM$y3=?Wl{A|?NI}%DXXQcZ9S)d?()1-9iXnHp055; zgHgj>qgNAAQ$sUf^FWJRD@bcX8&~^EEQbx68O^MFI_FYBZDdHIeZWCgJWw}n=Pi$#(}jm6}}@x>3X?O(5zD3o-RGL&YOA(r`+9hB>q zPgDq1)KrpG##jEVa;e&`)~X(@5v-}HC96%Y1J!xg9oHMzzi*Ij=xStdEO|rlCcX*K zRX8!zUTVT6?M|Nj+S9^DJ z&vNhdi|3c8{fGmMgRDc!!s_%vFCm!@34j+A=ke+gWGXL!PrSfa* zxAX7c|A9?7;IM@1A6z19ZDa23{`|~)*jX_a8-5ft$poXY~lL5SlN5oySh->yZk|K|Cs5&IR7u4 z{3GW-nAywP4~{G0a=NlpTy|*(P6%QAe zFaY3b!^`uRNI-O1IL!O}`}cQvY7!{}0Qi~w`}bqX@83V+wg7Je0E6Ct=;}cs{p|vIH$mTP2T&9tK{hq7Iq5 za&+MhaIIYM)LkQ;Y#-Z3&~#yF@wCnozb%uxY_xxQeNq@ymXs)?1bghQ`VuxBD#Jz`JJyR*@leiMeqH!wv;^c?V<5Xcif34jBbLnhuG56|5Yz z6|w5&hi)tF z`;(KE^?Q|XD%(xaFG^n!eP}E(zIS}DS8?X$pDcFNYrtGlvH#AF|9g4F4;DqVuF_Kd zIA%?!B%&|bQa{Y))fy|`e5gR-)XQg2rXAXx=yfeQ5MwO<(L2-H&Py*?cV5BNo<89# z*mOhgwCP>6^-}EUkape`JsH&inPD^$eS#1yUFxSu)J01ypo)C3VJCXztPxy8lz-iF zPz1vgt0*Waif*ilcPx2z^j6@(SM|&OL&>|tpWG&nY8*M0Al z>3T>iecJh^(7J!Yh+ZZ$Hw!j@_3c+^y&wPd{S>kORPgHau1(Y&W9he+DGo1nQWUQy z9=TG<_)=}vgpa70DO5%1hOl$2R+WCmXek_G7hUF04*QNPQyIPB@$bYh(`T>SoNNs@ zzw)|Y2_}0U{!Hq-GhwVt_%0))%2&vhy76X#%0~Kif`uV%dHQ$@HNaJN4okj%rH|O- zv+m%ET&=uwM@1BB0AFcx!~=uXZs6Ig7n_t4)eSF2t{-1;_AlT55?u8EMCVH==AMA$ z<@20769tn2Aj8c_66-mH%`F}wBqs7+0kCo^RQ4v<&NJ_Wogri8bU^O6WzVLc^MxNi z+3)-mANZVQw|qnM^h#-8IE$Kls)a^sQ7mU$z7i?T%G^d8-&Y8@WC zMIMF(ad)8;kmazvBkGH8(`y-Rco?Ml`=glojX2IPSIa#$o=hT-L`8Wec~lkdLN+9;{3`4dRMOIiPP0#tQ`ez_Ywo6r39cMpq4*tn?2Mhza8U~e zo%q41_uv;4<2++cowT_zkl7j4+1a_0huPnNy{%DhznpE=3w7%j)bk161nBcykb9J6 zdk)l{7Z++K)1gN$(-Nj)OKaX4^ULP>&%K7(Z8!6Ro)h34e~|5gtpT^sQ5b3C%rV$+@Qkf^I{}VyDa?b5iCAq+&syO*zKT0>yfk zv`CPBdoI{vjUBcxD}BdpxRI=?q1;ekLZVT*oJy4(YioPH_ZrZY*|S$1AP-k@P* zU7FSyDGe?^*12}co70zSrS4yGp(u$_j2brHnP|Ki%0>*h&*Z6w)*1L{xzv{+^TWLk zo(b|7tQHRbMBX>7>)s_ro344@<|+lnOP6y8%n|CiQ?rwH?#XK-PKUO*w`RU8%{NEC z`t2gFLKpJBo|&6itd{o}{)kvS0bvFHENRZ&y!|+mruv-tnTHL87WXm+I-HX@kq;JK z8zC*bS{ZnrR3wt`&C;s1%C|)Hrj+m%IYC~n9OXEE)ZTgTD)OZ#H&J5iZ$Pq*FCy*L zyoJYckbG{^SS1#D@>4-PdoO|_!f(J=Sr~sE%m?B4$OWu^LBh6zfKlPSTyqx9OB(Z1 zc+_)seRI^cZ3j!9IAGuF_PJV^WYL2P|9b1afZ-^Yp(Ay)T7bI=L0N+DZ@?=97tHL) zJQMlcu^vNL|Ko>>cH)PvUCY-*^OOGKv%C^dUsrjTgt?<+{3y_`Ij^JAb@L+HJ`74+ z>#0A81d~9T*gdP+9_=sRSujzKnaEKTR_ThEn*Qu=K2=rM#W?=eR4&3bL<3NAm?oQ3 z*uTf)K#syJ!v;oKaOLH#PPaXc-q9ul zmiN+!pMTrpRrVsO%F&w{_1MRak#ttbu;_a8fbVI{8IGH(;-&?D-sNPEXuQ@&_!JSg zT)*hPT%T@~ppdbiw?T5{?9x$XQA(j~GH1V>`X7R690VKc0- zT|u(qD6`2d=!kWqgupfGw^&<|pg4EEtY#E+F*$VNy)ICXI6$K>yPq3` zfHj1imiEq8?23}Gzy z@a|TbeefV=?ODZ=TFoJB1?c<>C1Yu+aHyRS5h6Ddz!tUnRXxk+sdL4jf_Y8O>^ z*KuWrqjs4;>zq*?Z^3#;v-ZmYtv{)9KF_Vqx)KXTAtSwNdLpdS=HMASR;6Y6$g4as zLuBK}x%=>uRC>>#Wc7jDx|(Eh|7N~S=fjJWy0uMFOY1`Qr5LmC=oHUp)hCRd7F7KL zbzfp;UE2m~SUOuAFlP}TQAJp;wCh#Z!KCV59BmLT6b8#J_ImOtePvE1N=GVu>-oOW z$p?v)mBZhI`$@+-MJ0py!ky1Bfz4R?X#^!n)cix`3FyTv{$=&auilwdLqin2fbS|rkM4-Q(m|}kqVULL*A0Kv$z`hc)089e-;7>&=c)=UI!9n`JVK@+k4dtSe1mkd1oHgCwtp9NTAKrghQ-g7+xTQ2{ z%yGHg|6&jN!=9gd4%zpijq_3h>2q%B6X#>n^b zM4OXR`=04{nA%cIUX)cTr1Eg$(d+O3@L9Ltvz2Zp#|ZZGoRGC}Z{Zv%d_qGZ9mCI# zCuwf%QjMQyftMbs4-d@CS^tWds>7j<8c%{{2wM8RWU{c7#-TepciO*|!+OY>e4Hn} zBWb41l3>)lTQA#Vt8aN|?NgllS&#-ZsAICn8P3qpyl<`#7#?qKxmvO%vxA$J6AA!= zK?v{{yn^#D!~Uraq~-=gaj2wdxHNHjAkyaUp|p}(CC#Zr{{lOR5+I$Qx$HO^35^k6R9YlUA}J_e{uSmp*?lhe=DVqSXO`Zy%4%d)Eyz_{u%JBA1D9EVJ| zV+^BNb!1u4egoyTfz_U6av>szm1x>-6kfk$tX z(_m!A+rdMX^b+WWYGb3T$Z8n)Ev_Tm+XWtTN+B^mz#%q%Nu=iuS?5C@rHy*9O=~J` z>*Q@F*Dtl7hZ{_`sb10-O6(>`xb&N~TRaIPG;JSLSxAI3Cyfo$^n_;YkQ9Bbz*Uiq z)=5U4wroGo+|lZF>@e~s3JZ!P^MkR_+gSlPU}6J!O-ihFpAU!GM{vG=(QE79YT%Z{ zRk|Nr;>tyWQKLVTq;Es+Zy<@RoVv?dkXi&??gY1KH58I&-X`IlT@OmYDwU`;+nGPl z%Qm=hDXG;M8hIN;czuMme31!Ph^rmoCe`h+4)~1y)&AHu0<+Xyvct42IJur`M+3$a z(sNW@=44}4gCzRFv1yA*+JBiH!?3wI;2FY+SrJt->k^wA26L^Z)`E^Z`MYd2f^4C7 z9Bz}}03EREdb~4-#@B3-eNrYt=@ZS&ju{;tJV?D^-J4R57-@e=Yv;y_gsOLr*#*^a zU_s@!&RN8%q_0cq9j-q!W_&Hccc47B&wEX2mZJpfPq3lfll?j{SJyPS>dNtRgnLSpn8v*uXFCXXj07`!=Q%u-f<5X&i0}gZ^YIr5|-&8Q`P1T4Qkf6*R30Hfg*mxgG5mc!&Hi>%mxE|2}{MhAGWtGg*@GNNKX=QSP8 zyiQtM;W*-}7x^Ll9vSvI1Dq&LjkEbv@APHWN3ZtR5sX3hZweX;Z-3sXn+>~JBe7~` zi$)T?#Z(DOf>NEhW(>>mGjzth;F9n%eo>F5P+q{zFn4_1g%ZF*~xk4I7=I#HSm( zP}t{&q{SVJf>|3v3N+o6rRaSmzGF|-NJ{J|g_U-+Qsb}4yK*L*HFG*!HI}g8tsB;? zs2b73=@7vWPW!=;13GED5@R(3ObPdz>*?z~;sPtCaqBNwO0GBObY+t~;QJLl6uv*f z9|3>GiQsk2@R$z(zFkRannT^;1?0^`3p*d_prhTTJGZ@!B5!eQgGcg3`-dsa9xeu96TAo+fd?NFb*kldP%2HocmoXDYhw5QG(M6iq^`KfNpm# z&qxemj;jszXi^DFOYpS2>R#PO{MUPgtH<2Sj!Y31BE0xXrgm9}W=`9kOm_59Ydnyh zJ!5I9cxqImHGQV^>rX7seeWX0XD~*Ix!LOF#k1Ljc`;pB_%CH+cDO>Yo9M0H)I0}y zgmq>Q5|5DYu-t(0Uug}PQVHN&>|>pqvvYMlxAX;OrE^v5t3*PGrzo4Zbc9~u?D^R+ zfQm;1Pt3-b<`dL5m#t~zm)Hj^>X|>$BJYb=s2rnm(!rBRl26u?{LFSJz~>D6OT(J) zANlUTQLAAQWvyP&48QI$5E9yD&KTmwRPv5dRlzXmGJSQ@QqfVbmdOheiZv2Z(wg0#W2QMq*~i30hO+9nF8B{ zM=I*pQv!aTFONUy8tPE1?G6!cm^nt(Q#7&BpNVMZJI|FyDa*&Pk|B`d&TbHic~8Rl zmDaL&+~#{$_-{aSzCZZs)rG^H1dRi?vNx-7eI>Ry(XM$}BB12fKV0LbThlj)Xi zIO52{0;eO+BKHR&wEVDpL~^k@(=%B43TuV;Qf1WGEMX_uCNdn19y~8ArS|jlmuKM$ zXDZfi`jqy%)3oQgF=M`tyG$bj0N;mM;cCM-XQ&g(?)QAgqtY48m^Al2cVDK+q!Y*Z zB`l*c#_CNbrow;4_`DqV(mNpqWUHAks@MDCj~V3HRe#1jRBWs`&e+7z24-nkusstE zxzG!zdlyZcP8sOP*Otdd7U$StME>!Wxkv9n;cr08oq6O>RogBB8z)RZA#k^Uginzy zf|a}p&O#THiPvmoh}wL81|Fg*ZE+;A$=u**KVl}6 zKQ5EuGu2ofvlZG6bd|9bL2Az}$z$n=FR0zssx}{$U*Yu0E@2OP-a^o$A;1c5qohM# z#WJZxq@8cZVLSGwuZe*n3%``Lr8@MgCml6E&>apYpyKa&L=}J2&GgG0a>-2)7IjDY z4X}LQS}^=0;e*GO_UHuKpgSs_FRRJGD1J>~^}ajelnu))9)r@d5`!+HEel!|4PnO> zd3;%{k;?Pf0)Sr!waMqRjn8-x)fCp{f_HiOJ_!l8fax5ZA=LQC435Rp*V#BfszZHf zzQkx_-E-*wQa&pfy$Le#&y3SO$lKCO?Cp*FVbd%-?G~({yD1c(LpF`0tt!AiGx=)Q zD8@QGx4Zp51e3PQpg<%SN2p6V;W139w4zYPKcp2p90R!Xz?V=8@Z&I@?HgK>Hz%ow zls9D7sI!O`;UYG6bI`jMhjnzGq1xz-BWWOx{tW9a-FLq*$L7SoB4E-ezuk_%jK<<9 zs$>vl=iXlHW9#Ekgau08Q$_&B3U~{y0SB+s%E?r*jjL>%-}r|<_nmb&D!{3A-bCol zsZOiZ-?g=`^i_4wb=INI6b)A^qr*^T=u#EP5Y3cuw-!clL_DA&Ttt6Y<9<(LpkgiM z#n%b8YuJ*l4nfyGXJwer-+Fy+bg6|nWvl9=O!0aXeFTb0>&o*pH~yJ=O_=$XA-SBT zU(IYIt2XEfh`4H$z3Ze_mMThL^-s{ZK$gXSATp7J&AybsSvvQ zdZ8NHjC!5FGEH3@t(-7+fSuu2&3eLkf-bj8&mwF+IBq^fjFv{_f+~-pcBD=BgU$y% zAeU(N5bug#yUgv9Y8@@Hn|O*}Aa|%>j-D1omQJ1ce?&Gb~BGZrLPgJcNWms~u?tzL!9uKtf zhL6R@YKs{Q`<6|6VMu&(Y`U~1yqVljSrF^bZi980OwT4t&6i)6x`o<7^Mj0SRC2vW z-4a3_GPtmkFoJ#Y7j^+7o@ZF`iJT4y^iEXrwx>7+a^+Sh`bUC@j972Z8VKtcWdlBm zmFt^9H{GU?2pRUhOYYebxmhtr?5!CPOV?7ow#ct>zPgJojjls1W=(Gf0Wv&puV_s3 zR!j5k-PWU+VZQZEWShHSotdUlPL0J8UOTe}A7v@oO-kfu zx2;@e$Ud6HS1u!+si6aKQ@O@J|JLxJe}_HIE<*+NlkI<+`)(vND{z5R)HO{S3*c zV{J1Ak-s#6KR~`-}$dRMUSt1T7?x38y0ShO*$;UAc@L-2whKYLa-)I{OhYqNO zBp8q=JrPwf$u*tDHpUt5ib$zDK#Xm8f>i3%jL!(!VxM?6&k{^T zj^NbtHDf}CcNd`tRRX|+5^|b>y(#^;+D4oFC|6zw8bUp$tR4TN*H6j-1zYAEgs--W1{Ti zOs|6-+LjseO5b2lUz?W;>sN)R^t&)C67g79t-WY(p2fX8cU*&CG90Vo2GEPOZf7lh zR(z8BnTH5_dK+k$K{kOW#6KC^I>|(vg%YZFf{~7hv4lip5M#VA3vBJ4c4t@qjO!#o z7-maU3pYH9Wz1bTr>-*bLRQc0%z9XCE<7m4vpZ0kQE&ls&M7cp6Zv z%#$MyOquHElz`amj}=9sN4cm%dvYe*>*+sM5)j3GP};mE!1jBj1ga{kOFm=$HE!pr z+*WZ?Cz?mkNQ)`=8T=_MZnC4sMiEgX=h0WK zOj!f`#uYhZc6UpxhIiG`JUUWb7PFmnE)Xv9bVW=`Y#G@F&u{jzUa2NYq8a*aHw<^? zzAjZsHd?UqnbB9{!oVSc`D&Y4iy29-%#?Mqi&8cze8o&|GHvW~ZEa_HYA~cLsyMO} zJuP=%opRSIU(5kbN$WSjW2i2e;g#o~F6tE%8e1NO=!8vL28gEkG-$(Yt~=w89St_t(ke*mL+MGb;TdyF{H)B z0{2oVu;C8MUp~se17$#LC>7jK;c`#?%RTuMC4;V3(wv7Y^^!1?H`&Dm<7ZPn92AgN zMUJ;X!({b8<9&U1)Q!U9u&1m^J%DxtyLsU;8~m7FD~?79iAZp=5mFClq?xHVTq-Al zF2vadK&B(ojnjV-b@_4~r#O8Vqv&s(4?B0<@#`2~iYyaD8H)3>o|N{!3yh#&jyya> zi8Xn&(6OQx;!h{Eq9=MkFBj`W#}Z`9$FAUVJ2W3|IarnxzgiLtL#$L|TyTJf@4I7U z%c?KbTZ%ptU%a#r8e4x4qPRMhs$NjFqGYaV6D|H>efXF1f2HdGcG3P7Qi8i^P`Hmq z^|$hWVsy}Nr=31n1`|!k7+myOZmm=|GLuLCAinYI{8L=;QDo0^ih0#9du#l|0h0>Z z4QBE&p1V?MBwP|sf|%>c1aLf!@LrZy`if1J zzcW!ZIsMNRHq0%DpSowqlSTD!QP{0I?hw&~JNFZb6`v*fc(v?sK+HOLTW^DKo$+F4 za14Xcp4Km)93a$3KFdxVl3Q!TgZGYO^&{I+5>3%VcUWu#L%UPkt}T+s6vs0k=xxsS zvXqP{#)%4dC1=E6r5nc(eK;{*pI|EtG`j(w?S9|pUX^t(jyY7xtYR>3KTckpyK3>b zASGsaZX0CMqx$Vr!cQ}@l<=HSTssV(NL>$y!E}Vk5-zVN1jt@e&V1Y4bP@dcEL6a{ z8L1S=n3DDL)9}5B$FI$)_-NafSQ?X^Z|h=hcE56d8AJ{Br*L9LmGUm9T25L=4K*dj zj`)b1@tD6neEDWkVpl;?0gIFR{6{`rbM%c^jM4LicLvrwZ-LL)DYbG}x$6*Lz}K7M zFP9wdlmAt`@t-dFzdZ8G9q84+eR8NL!?W=mLVVbxEGwtIw{=_&6?%8*pj(0vWy{Iv zNY?8`d~>cA%C6<|P;9pB$chvbxl|E8zZg&dQVGy-qU1A8J7O5eeK>$9p0n4$eLWV> zh2N~tmnYj;PTtnM%i;1Cd)u=%M~g&Tlj*ep35a+62ATom4IX!qiFH~omtsq5SOyR6 z?C_NDw3KM-?TGOVkv_7AA03GCr1OM5WL8au#O7=cV)r1#SM#lG2_Ro$OlO2@X6l>C zoy6FxCCJWX>0^Nm!L&=bAGs=zhX*G|r|=W-iDu>ARFD{PeZ`-G|V za=U3IZgXvOvgjbU5a>`&Q5o2O7e+SQvap*BRkF(#61`#~pfGS&u17Cpq?aM)Qh)}Y z@a~)L!8Y$^QBv#c-z7j_$KQpl2#Yl_jT=Zg*;g`5wr92DwED=mns1E1cKuQ&vya}y zZq4x!LWLADSeZc-KNX4*vh9E?My>}17y45teNO2`imB)*y$A}6V|q_&LHw0)6gDU( z{ea*z;^frLn$yvQ`5M{TZ<&y`r)hA7EUh|ogP*HcI^{L87FfzZk3{vfH!^V&JOq;e zKr$-&eA|pPk{`HaZyFR?YJhrcq2H*u*{<`tZk9t{L?`JT98~mP8S*G z^%#bSL^!Jvik4vS_nl^&Kc}VM^2C+lOXS8IAma2`g|wO zAt!+-qXgAMayyn7i&xj1Ee7C=M{Tp@gkLs=wwK;*P3LE$!=sm7W0mVO%F^(iiMcmv z)?iBsfRJhuR}U`P)yQMM6<~S@q0wRC=RjC^j1^Su2}~l^^l}zv%hI$woAhx>ltmw9 z#&w^K)=>>9wdtaAl=b?KTJxH^`NB5SUjFkaV}>E@n*2xo_UtU|O!O>lMukTDLZen? z2|;VU(kyrDd!&n7IE+M9Xq^5BmLpqK5;X344#%$cvBu)qjE+!n?-d9jwX7EJQXLu- z$?LMstp6m5ZfBGd_0TwUBEyyr9Z6oVW6^M_9ZM z3`Z$5t$Q5I<3Hi9#gH>FO1zZdZo}E^`EtoEjRtWddF+CQYmrst9p0(l+MVX`ZI$ACT3Q1MN<@s# z`s6L{1-3x^LR*eZnqQRI!aA3J~DArg(YP!8k>os3b2Aa#9fb9Es z&AX=VdPOz>$VYXdrdFbF?{^A?7EJV8%16N$d&Y?lEueWW7yk-$nR-N3v`kHq5n zRZ%|>!7nJtpmJ9b4-&MtS8tn$vQ`49w&)e0YnU>`imF(Fq{lTB6qUF)wcm(}vY|aV)8U`6^u0Qxq_5o?6`OrX2Mvio~0u6b`b}_?ox#Gj)sZE(%oBc ziNY3Ls};nihuUz3R&jJHrzlj`N}nf{Wpu@~RJ|#cC!(t3 z5giZmB3dSSl)h`3kX0k70Y%hJk37rN0PZ7Arl6?NuHZ0h(pI84r%}Y@*vmuI&25dC z7+8SjwFJPm1Xx?!4of`q7U}5IEdm2R7zweGTOgjHP966GP%N-t7Yu3^5a`C;$#iIi z!SQ*5P@9Nnmx{L=s3A1YD4q}EZ~Cv%E<+;|2lFrGZ)?E(jMO;`rB*4lB$zJS&PDsDB0$`-m5;UNn+(QI4m;V4%_rpM;LgDXd z7nb71V@nG4Om?Gc7*Dc15z>)W>e#uoQR!&ZEYV4-ZaDsHmFPHVG{q-g-l~Xmme^UVJ z4a>d5^*co`iIRjP#ER>ht3zGv>%QFEUclIo!beLm?OI^#>yYw5j zBEyaCFIF|!$^}=RAy^KDb>dJNuZ&1GqZ*DuF!+yUo6#Im> ztW#hfhyjApny+xy+SH3|sLU4DaVZ>|(fM;3G?;e5lm$4=L0H6K2j(`}D$y-X69MW0 zr^$TRp#J4ocrkDjU;<+~m|isFXPm%GgBwEenD!uKR(YsgMV4Z}*Z{2ZLuOR7b5W~? zYE}now962^g!-tKhitWuba5)09xZAxqpp()jF$iC~7TrQ#+9 z`DI=A08lTPfH4qP!w@L|f}2iB&8}#Cn8QakQXXlXc>n-=iF+3%2DE*Qjj92KmEso3?jy+Z!h{e#Y@#OWSWzNE7)%8Wo;-_4X!8 z-Ec4{FfK?T56mXA>JYW_{{WD5vMLJ@NC1gPfbkFvix*KmUb&2vGK827tRrf)$?w#?=%B}mzqc05fb3ppMGMyv z$yy4texdh~73M~0X z040|CaTf+w5nS}JkxK+x{ld<}0Bdl|yNW1cCC3#x&|Bnz6A4Z(rBBbjAH+OXTpA;i z8)P^lJBn3S`!}4(rS7|yn}vbne9J}KS*GC&Y9-4ZvobC@gc^zyHuE$Rqh}j$m|`U< zs2+fiYPv)c7781AAJ2hhcZo+%>fg-M zu`3q!pA&uuF?>zI$TH7yQF&2$o0oX*CV)ju2(5xvW?*xd5!0%mtZHMgvmi2thExTh zcJ(mE#tJU}N(@nx0D3aC%7vqSOu!|2fN0BVip*&$i>@UL6HTl<8jqlGV}@YdpjKsq z%;H*hYf&)5@p8hn#B4(j#5I@ZS1d+D28M@ zwch!!@?zG#xZJrbvgbqwpi+=Mwv-fTJFe%0ghbD1!;)UYW>4l zJ_(ywgD}zKP}Hm%DPVlpamBLaqXZ$*d91!BfMw8t8<;>+)Sbp)Ls=Q zaY%1@YyRdEirCH)!p@W-_$4uD7Dj2ZQ-&FRk%Gorl+KBY(4%Fri`g9(W_;De*6*nN z&{bw%p;JKnaQdPRoMV*p4478`lByL#r z5s0u2W0NaMrkoP1NbY3>ZUGZxXs{y_^^OR!~> z)Y)NwA`X#JV(mgxyTranD@|j>pfi|@A#@SZpgIHi4uw_ z{?Kt*!PJzHF2i#67Y46T1X#`U^(f4Daoq{ZYAxF^oGXUG7RTSVVW4tiAf^O#ikK0^ zsIl0rLS9k5DRSd0W$H9WF;GqtT_pglw#)G@g>IGc-=L^yE#l^UWIjY}8JOgzApQg-6%V+f~>O9JL_?f?oK0AuS23yG}<`zd1= zIi^yBE(}!;B0Ds-0Y$hdF;?Jhcp?u7Msi-GCl zQON6H3L5t-K4Jj#3shJ-c=IlKBtc8VQLZJxZ^(n)A*=yRwgaUFHNInom#a`&OKlgY z)Kb+u$Ns`lRG1jHehXNsMGMW#W84F>Dq2tavlFUV+Sncom01+5Sv0~9b?jVU`UXWwM$OSOazye!! z9jY0=Z|u!D10|4PrklhpRfd)b!3`gX6i@>IZ`|zQfY$s<2(ut!hWLa82xJSy%LOw5 zY%$CS+@6ABvK|958Am)Zlv4%xs^oy>q^cefaFH294u-0ZJ;Hs2xd%Q-T2Vzr+JR)V zzKV4&tzZpvW5$5>Fc$FYDWo3TjY%@#ONLjD!-${&9s@Aw*j)zx!wt79R{cWA8l%eK zfE3-{7!^R(sb|P2Yxe+EH1BbJ25jOABqf2UZp7W=F1oBY?7uSdHwUTfNp0wRHolRJPh?Bms>txG+`)qlrMs z8-K{OV7!|BeT76u%R#z<3ya!u1S1(TrBr(wQ+uctM66+0mtgS@R^a~tCz_UlSVBJ8 zjpQ8Wq97iIW^hFq;sTeL!ibMk6E0B0NrCj4H!Ln1jH4AGF8PB-rmG1lse>S$cL_mT zT;=LqmGTwgReeMX_|;-07rV+-p=cr0L&yfGxn~Aj8ub+d7Ab(3)CXmcD5bDn5K!1T zwfxG;u#IC(Yk_C}>MfD{;I6jV)IEE2Et5|x)H7Ie$DOXG6}dRG#l No(B{}v$ZKOiP!tgq z?1%_Kks>0YNDbL{cJ%#!=X~F}_qor>8bpxKf2ZV6>HqpI3C&1=z@RBp%I|-0KFNYFc5)1*O(Mg2HGO`p!k7E0zvHW0jLTD8TTbXWZWMB zw*f>5?+3a(zz%>yK(+&Y1B^=oi1eofa0SQ=(1A@5C`X9^K{(oiAnYrEOW+!@1BYr`~Kx_c^LjwSjF%Z5GTkimT4rC0-BoM?t0>GO95uT87*}=HCLD{`O z*U0>lG6rYYK{@Cj#SCyAjEndP8AA*R8xR&C$XE{n$^t<+?*;e?AQ%(j0*M3Y4M0VJ z?EpbMA!8$RLth2h1+K*bf_o5OpfrI_28fIS`bXjvy8sZ3&+sL}0~iw-4|)qw;LkOq zZ!l-1jNw;cE5a3n=O$2w%mdhm%ms~H-v>Id1>uAdi+~I087M>UL+qIY<7xx!0fKOX z_yoie;(rEzh#iQ}I{}UWMC=FmA?=WR8Gd^T5a9*P3Go&B2B^CWbifOv4H9!mj6DX3 z@B(Z@5DWN+rh$&k6DdPb8kF?|MB)b6!{80E9q|WJHxFb5=zIWyKN)k?0*J&F!gC`K zDi9F2jClb6G2$NK1k4G!kI5dCeFlQe7mUl`Oa@>BxJK**zCdi{djaqbC`0^(_-N`c z-UEotLlKlM|JS$-Ux9lW^8h?BIO70F1F{I_i`dcz>JdJWae_OHG<9=|726iy`LD~!fSpaoN%pvw6aSQr{#=*GN0KbE4q(5YS z2!F_WBLhTyiL~nk2x0|UPte-m`fmV{H~?h~`w))6T+l55TR|DJE|Az01tJH^9sxw` zL*fUNV=O@#Vl(g?!(TrDBJGg11ANa|`vU+UfU+VWlRyyek@{@_k$ZuiC}kjkFErqZ z5kp8HNMDE#K+G`af!Lu71o#;{3(7!WC@CPwelY9> zF~S)m){u1xgz+o^{z16?_t}H20fv2uf04fUfPniM{sl3}h{t8nehKJEj9dnfOTZ`E z2IzFKjx0bqupfCAav^gB^$b5FT*-kp2&bJu2lInQ0V45-^z#ZJ3qY{O{`Dbae|`eW z`al`rkFmc^0Uhz%4IrQ|6j)2hys-$U$T~q{4OvToYsR?E0KpiDZHP}9&%v?3^&ozb zHNseTNINh-$`F(RUU|L#)*+nDfpXw`WFJQCW9-KOkbMe+_+T8=1DhCj|K*GE{AC4Y z$ef-51oLOampsrxUyN7>JV79i82c6QCsK}X2W7oLN7fI*3o=LGe?}QHC&VXUu1sE_ z4B<>2;P1cf02honPyx6J1oVaa0Pri2UqDCtLHa}D5aAgaQxyoXo$*{~1v+vs3=pgt z#yao+t7`$o0iJcbc6#m5DXAxtopw?GB>a`G0~t5=@-lq;hn(?5>E)X z2uGSge-4li5X1xHnT(7L=FC{XT>$xkfc3ywzhJHiSI9Gh@!VPf2aP#1^D|A3)?@86e;i4d%tzXTY2o z=S?a=WId7rB6CN$#)5IHKp8SFXvgpwh(QLIZvi5l03I0Qg8LbBM7RTS{x3&Jf5^NT z{ee34LvZ~RT!T3=><9BkVh(Bnh{PeXen8)tC4dxAhKzyOkN6GY8QjmF~C>g8d-mU-~afk66gre1R$V2c!&722dIE+(3T;9 z2jqFlSO*AsBv6j;ce0|BN=s9)OI|3J~!lvgQCVg@7->3Bz8*CsROI0*I^+gd?z) z7=6zHoB-Dd2S}eFrvI~FA+~_nLE;rn26f0<0DLmy9^nPC58)5=h0Fu-2^RFjSm(&S zh&^8cBJ)OkD)CqE09X&o1^^;{K>9&=Apk_?f%FB&W%#!aU>mrW1c=1o4A7DOfX^9w zArgzoJfVn4pHQG9A0v=an1!J2;2s-br)xe0odEF^w;demUPI8uJK%^4_$K=SQ-L2Q zyup;>04>9S<`dx9BMzZV?m{S!SqK#&2BA{05b9hdgsO!hRC6PQdX@yCKC42gnNFNOx!*QQ{WF_s-_`K(*%U+z(Sbs7znfM31OL&A*|pugxxj) zVRtG(SjSZed#oP9hKoShWIYI*csj(_D-!t05yu3>yGM4-v`v1pZ9cC$MEE58Yd%_A zPnV!Z@Cgm~BWP*r62i6gHFXF+zS>&8n%hBztvYC+;o!W>MopJs?qUgA`uh2R3d_*2 zm|#EuNP@PerjDAnrj{ls42+Bn+o_=u6&0n9AtWf;&({O#5xK)7-0Nh3pRtx6!6z^r zu_}L;@3h{s{r!zJ6Z5v7smZjJ35?!HE7|5s@BY5hsGe zK-0e+{1fI8>hB-n7ip}fO^6H(2X{mm>k%S?gM7fa{}yNxPKGo3^9c&^ibTc?IvME~ z9_$4gA)|rmgS1xANpK6O2=@YI-u~fUA$}1+i}DK!2#gE^+6liHP;IQe{a@7sWRk!o zA;QP+q@T~JNMl`1q~~xiWX9os5rN>Qa37E0(9jcJfxtARKHSIHC)}S90x~szh$Y~{ zSX)P3lkksEXb2cZT@R>XNXNi~K=Fz;-mV3dh)BOMV_iZ}7$6Zi3~&rO^ZEz)2Vol` zg45=PUsf8*-HJB{LU$~XAzM}h2rtt6KR+Ljp8CK32g6i%ehQkLFIab!~MA{R(@Qdts%&;6bzqO86T zU3~4>#SXE0+t?OeOB;M^RTx(wL{HjZRd$-AP--h>?$J*sMU9M{>`<2bCx2FcrnF}k zeXZ5$BpjE{M5zY8DB)i@BpCw3;c^mGRN3bQ515Rqv~Zk%UE~r}aFj!}#zTN~I9sSc zNotkc308fYC~BeX^Mp^NTW)RyED`$tc;>=bsHa}e?~gA#*PsUk{|A__jvtdnbC2ws z*uVOU-Z92)eEp=&JM5$0nzp%M$PqFP)_JP&x!zg_tC z5vK2A>Ly~EWS$BI;0UuSVbGCX`7`A^fS3 z#rEkf^aSr}_c`&+mDIBfcLS98mI{i9Im@p)#vwfWI3+;IrUj}P)xlr9&#}KBewy@N zQEFg!y0Rxzh^4LUz}|+@MD)}rYnMq9oSFeivGzHrb8`D93A~wqQ&)m;Uh8R%?Wzvds_2PXRAoG~;B@9)5=o=#ux|dK z_f%NZu$ex~NlYj&bfYf( zg)t=zlc`;4VNnaiA9th~qCdRuC$ToHnVS_oD(={$y$pXUU^~stT1vd@a3J`L5D2MP ztmZD+C7RXby&LiD`7@)K$h+O--jvnLhbZA#af!WEUV*HkRogCh;(2}r9oiGHPxzm~ zH#mrgX@OU3*{_!=_8dhfBw?SyqOcs>FZA20z5df|JzQ=w_6?H6#EnLU;vE(Q@+I@v zeesx0s(2vBE@jIxhcNycIRm}#FeK;ZxOBKdxtwtKw&(61Cn8Gm>14)>QFedxb^*x0 zSM_u?RqI%m_irx^%o?ificxm?J*8sNSrlzp=?k$%@uxLwi+T6@kzUVjP>=lk@<0_M z)|135+b^^ZukguzU)~9Ee&F4I#?3ty&o(mZnf4=RltjO9ybZp~x$*r$Oz22*Udr3a z(u<}TiA%JAf*9HEu2F8Hr>C>F0jls*9jdL!{=$cVuXsy$#i?{%cx`Ck>^GH7(Tb3S zR%UY#`Q(SO+3jq@skJHZ6oiBGQVzx1q@W|pI@fvP)u!U>ynZG1TrlvJB4b!(s&>m} z?RZTz5H}Mh+vR{&dX>_IeEez? z6eV%0-?(atT09nNr7-sA0W$3m&1&jvILu`<@T zwjX$zTuFZQs#~&e^G!9Z0FAxWD5p`icvf%$X`1sSB6dX4xNz5YrPQYox7+=@#@}Sd zmF?mh%FS>hI?3em{Id8sDI*;*y)>?Eo*Y_4b9FTj;t5VkZVJboE)iab<74oC3h~+^ zZjFSDAWytQ)SdohoLc9+oLFD`h#6EgM;Ehb|LY-D~j z-49RQPdCC(Mf{Z`avFu(_=sbK!=6{0w13?q<2xWJ;{lhg}DU*zf4pjqr)@JSiz?2z#wi z)6l+=X)443UG|gQvEMjM<)rsB21=Ooy0e%r{3|hI89Ug7Ark|Zr)8A?{?2R zm-Xf*_Cr_w%>~E7xNL2{oQmVmUbRv^V=}1sSYddzi^573ee1AAf}1|9OPW(z^Bh#E zB_#*kr{ssI5l-9pHV5yXg5edhj&_Lk#0EX^4nNN0(-ku7a#(?wUlI%l?bw$oGcIn|7_iesBw-8k9NXaFhwQmm19dBSu9qeeMGngBem|c~hVodg z2pL==xEF)Rh5BKh_Y!oet&HAputGH2;LXpbX>(5zK|(=1s(>lQdU&3e1V{J1HDwmi zeT7Q>vD?$kjc)TH9$}W^5Zp zygDyW3Z|EqY^#>GaU!M#j>L7)9Jk3ck&Muj&ywe@^%DFaM43E*sV_Qt?z}Z6W8M!P z@6KOC-@nHh_lDS0)C||EZHkHPYb(;r>{tu~JD%D5{P-pW+GszX5&;DfXC(Q!PV_s(mKd%*Bq zeqCLH1y?jC{J=;oHl}fPngrKKWE3-> zv{uK%bv>;$jDpT201b- zu{Pn~4sf1(nI4d3{|k4t(f2A1e)ix^?4xt1#0#alKG`lz;*ZShpO_=RMc-w;ov-&P zbU9`D5YOzdhGT2$dDJ^(fTxHY#)-3Urz%g_*b5x^@qH5b% z^k{$oKy#~RFUC=3a4CX{+Q{iL&}M5#H4D$zz8Bau50^mU*MDMHgq7_)LykLfiEZi+ zdwAU?w_`5E%zx%@CPSaJzC664VlwyaoU$Esm9O2jY{e8tMTf0_lGWV9)=7!1+5EE&#io4wnJhg+qyOnZadikX<_*U$+e%_BJ0W~1M*eXvWtqZ&lmRm9t}wDoVoLT569{#wtuhh zd)B8;V<_v$`Jki$bbvbUY_s?3RLR~t)zvi=U-S$Qia-4A%j=JsXJSn6gcNWp$n&gE=hmRaE^7Ss3v#11JFeJQDCwzxB(k}aZ=^lB zSFmAcc(;I^MW7-(LhE?D6*2IR$9f9N7gCa|*>3eIAZJn3B>L(laZAZ7`c4uyaTJf0 z2s-BZ3DvSe%GIQBfkZY}5vFaQhpnu3*NQljHn=FL^dHS1xIS{ILiM-oc17nYY)!pl z4NBKg@bxk;#AyuZJlI#z0DEepqpd~NeaU%K8IT;krBK8^sd#vl^fpC%j<{K(CAHdK zu^=N~6bFB6CsI&y_aQ7q4oilAlQ9*80%BX&Vgzvz#u^*VH3YL&srcl2b~NJmm@6&#U77}0?}C^N!iBhlY0}BbL?}B(zL2SgovGZ`U+uhEhFXXE9b1rVbpD)v%4>_gp+l!;zsR;zVGY!=*F7My#?VJF?j;(@SvC#45e+n zflc4-KYx&tflf%XODZfokgsp@cKFM%A6cNW(vV(Ysh{ zcyq6yO*A%lt_aJ2(tP&ZBl<>vs}EDV^foi=*>aTFokW>vBIGQppYshKRN?upv(aJ| zIALzwaIE+%#9iA**U}gv!6{8fbZ!VF=!ExD3L}*QJVRLBBCYdDVC)m&yO!)bPkEcwJ!J3YrV6yxIw)@qL5ljceyw)dFS5$Ld zkhU)7cwI=JbFj>YY|JFLSaO+K!^6mx$ zU!qp!H|d0Ev_Nx;1F?ogSwJ)VoUCzai zjc;Y7+}Pm=uT>i^k*MZHb}7O(bpO_BF%M}kX2p4(TXu3koyIvv+MM!Q-X$>|w%A!E zf(j~!;ST2x)__Cf-g2tPmfE8#Q@Go)dA+CR6AHC>$GS~$x5nVtDbA%3|9j1i%QnYf z!o)bN6j}IJxzWWR*97W$jLI4e(y6CdqxW}K@l)%s0lK!ESJ;`|VfNsRhMZJ%0uQ;e zR-qIV0*1CJ>~(f3Z|hujqw$={7&~8T8grRfar9*luCuAIe}JgCu+7k;_=Tn0UGo?W zjMmv57vyu{T?AFvKZ{Mw^moh29UH-T%5-R#vT5dqiA59<|Ay~eZgi)Nwm;tgXrshu zs}sZg^&;~Vt6E8HxFf<_M$2^Q4)*KPKvG)XqUsr$PE__lS}xbf2#wc>d0v(xwV4y` z>89GpH0vpJzGn+f+>5SpF_dztgmd3FHm=DU?ZwtFjBBt_(2Dei>?Tci?qkvh4?Q6Q zk0ew=n-dW>KTD3T>grhj##PpOrC|Jc!W&qL7js3WPds=G#!HXFr9%rWvX`W_MY2m zM>Vw4R|$nyN6xN~v51kKqsLR$wc_L&#bpGoV@`x6=&KRc#*OWWS_vxgjW#>7^__)F zNb9%i-s_k_wj{`tf6;-oiV}F-zR9d`prhtk)G-(;UF=FRL<>GyP1mAPlWVU^v26{<@hXp;os#B{i^FiI9ek3eLRBIIM$qOJg@BQ< zA-}Q_8Q&w3(Mp6b9)njs_~q#6P{m<4Pu`R;&kjgc{sJoX^q0AKIn`}`rJ0$lRi8c6 zcAVd&{*z|68f~U%PME&c47F*9PN0oPJQwR?&fLG>^NgH4cTX{eD3aHv;K?GP&~~Nc z&i2ogXJb6V`R!|#oSFx9_t}$*KRZz4nZsN;&8$>p3zQ-9;#fmZ+${O5m{K9;c&+Kz ziI2@5^3}7Q>i1BdX*iYI_6AKD>_+PB%2)Qz@fN1__FmLoH~EZ(4l+qtT)JgaKP0AY zZv~-IXZwOEyuArdPJ-4Los6_IuLWC5w{EV|UB*U+oaH zvzM6-EMvCcxqR}hUz=QtL5h{7Pe&!?eA(A`c2BP*gu>(7HYomJ1BRN-D~138ZjO6D zo(OrQKrNy{Ar%61%*XAYU8J;Mz=k_-p!nUs^?cCPa+S-Oop1x zmO3!B6rbXd*|yfp*30sp4E|1s!kSmmKm?b<;#dMD3rf%!8s8d=FQ;##f<(*`4|s$#UqNPv3Ni+#akSx?VpB?W3qeNnVggig(wY z4H=VbuNF$4Dg1s+x}+G-wBj^kW>3)MfK2+?(AAh1wb&<3u?>yc4~Ru+DS;)rTc-KQSBzcwjZJga8j8#6c#k`FH$0RJ;{1t*n%Deqv%vgHPpXK(tkL zA|B-ck@(WlnQp;HU9(Bthka?N$RjTm7GOIfZfr(kj@gvCD4T0` zobc>X*hkA#hHEyR6Ew8;-f|wUD=QdWjdgx8atgIGpUspKRqe{*PIO$c~n* z&|gEEp>3n=N%Vu8iucR-KI^<4oFGIIT=seo^ z?HhMTMRCTcz_Lr&Z?4g%^?>ynull6jav3!cwV%9u(Cu2GMG_=YvgD}%m6GdnavVG| zDQsY4O_J=4nfpYO@#s$9BT?KJH1-tCb?9a-Sa5r2eikZA+|FIYBN$z{?HhOJ( z@3%9T0dKxFue4CDDw zCVcabyULTsHcpUBB|7pk5nHtR*}_okyNbFV&l53p`L$Uc__m<(q3=^i!3YjFNu#%Ct-0b)?2I?V(#3oY(6$NG+f{!_R#i zOXn()`%>v8=VvF69i{(3E7|7VS^Q$h9p@!3H`zof^hQOJtFU z40zTol0jIGn^z(SkP+-aaxOR8yzuZ(PYm15y$>kSAst5I=2DQi!i2rn5?@`UTqvB; z!}gKPtgdI_I^6a;3xBMMc+=DNQ9!M|tBKPvrcl&em>7-Ywo)Q!W2@*#WozN}iae=A z+i6ai&1U0~_Fla>j)6-~LK&w<;%HdwP-MlbI2(UA(3^eIQ|xU_LGqP{{d9 zs>@{QUER3nfaz2{l_^Y7s49*oyWYO5$k)wGi>1L6Ic#o!^O<0`#?{HP#@V-dcRi|_ z+G%!AN#h9A`p|T)(F!LE5&3q`t-)bD4R&uktv8R%HI94o%+6gFu4C`~-9AsiskaB2 z7k0?F$z%6>i6{gvShl`V1!vCS2TfuyK3W@}+^v1yjV<~mOidAYL=K+ltZ7^OY?kWD zF8HUOP|wWkFzG<J5>Ka|sZ8W?$l~KRfAerLE~L9txGW{1?$@+?y>6S@HV4;vb?RvxW^3J-E^vnS_>+)>=>{AON)n!R=jSC-} zTH;mh{ieMuLj-i0^bZM+fMdA+Vjc)0`raLmjxDFMgnJ=QD3(e?cnY-cvTKTAI9^3Q7c+pXH=H)(F{yms-jt5+7cc0V1ndjgJ@$bP_& zYzyF>6}o9&fgDdRZnC^EG>mhzGqBx>NA;f3;kF@-RE;Vf6G5BRtXUNom{J<-%P7ol zhh?t!9BTDlT@m9BvT-wlLLD@@v^xbHFN=8ny`r~AnJgSSW&1Um zU*?)^LCA$yd$vx69 z4lfB`LivX1B|o=Q-N7PHvsj*DfmBlWgZHyBd{UzuFY(e7ku#siSfBNC>A&gNQWCET zLJ!du(j6qPU#`wP`+Gf&&AZfFS@(ZAR?gh;#JIQzyFOG>}H~Ho2f(bEK}1-J6snvpvv&W z>uWZ|%e|XflH6!#e_>{6hj0An54ldRS?iB5=gNLhJ=k=b-gkFBsWTp%#&{b74=Uux zX%glY;P|m~&_WzfMICNVa7xm^s>N)`UCK`_h!|{-O50~%D9D=)6Nv{3G*Y#5TBRNk_M^SUA1dJz%ie_Ep zj|!E_Fgn7OKzDk8aptuM7CF$UWJDTTkb z_U!(Sb&PhyN}R_sAxqXd$97yfOZ%eTrhNxWnsDejP96K8>3e_Fr>DhlcXOxbI&P^9OP(3JtF(aficM(LWe5qF6^0BYr?;iJp=xA+<=Ln={ zzXYQyPLHU}!n8!)^qC*Gc1*&>GfIQpgy<4mTNCHQ-34pVt@>wVdz1#*`OQ_i!ld)+RC53|+t?Kon#I9MWLvbN9N1ZXWa~|jGVDbm+Yc6{$1UZsdzBn;g2&a5 zUHB?h^YHIO9xUo#;8$=hjNHMF(ye4vGT~4(bTsCIcrji@|7Ib)sHfOm*6Wf(eT;+eOg0nnq;)h zI)Be=lXtDFo{lF8oBGRm6S>C$YcW9+z3Y6Havn)^X6(^I1rGFp&o{yH&dFb1uLtUN zM!l2AgHN9}EaYw&ZESouYkY~qwEXe4w<~QSTkB*?;%akw9&@zQ?vbg_ab1v1l*Ki} zZCW7#cO%h70mV!EA3RA^=^CVaeNhOL{ZOj2!%n2ykX)^jbk^KN?%q^w8&2icm#!T; zI#E*So*3hBt7%K7vR)s!l$dg(AZb&h?EFaJ;Rcd$t^eY?dkwUvNtl+69&bd&+$X0! zk{l}9m`1(l^^Y6WB=QM6bFIYLs(R^4OcsTg)b669G%kM+Awg{M=Lf33b#+i7cwFzF zQ@h=mC}=SrYs^0v=#WR!YTTKi-I&#}q^qt|lS~*QihD)jpDvb4Q?jFrhzrcMZq)C$ z%JnS++hRbn5A`s&r?TE3igj{%L)H?sx1wLfO;s_S84abEA6g5tr-#z8AK%4&LQcwS zAA_o$kUu{L*^@)0x}z7HV7#dP=sPLG>oD|^gyl)4f?$@@JI|3;>Gdr_R6%yV$LEQj z7j3Phc8WWN;%hq3G99p@Mt4@2$_uP#749irW~C^Y-b}E5IFF7w>z#PBosuifV!Pc; zrrqmu4Mt-#L8%C`Oi%MP$OuDSC2n{7cuniet)`OhOEu?*Z6%I!E#I=$P0RMSj}Gk( zRlH#yBDg1GUnM+Wu#~EEb)(&5*@;AFJc_^~UME1{m%)ECKKL-L6v$Sa%`KbAefV8S z5(XtWBG{4ELKMzkmS>Oeo=N7ydUsJz(x38eP^vlZR)md=$CwnOiM-}2=rAGkeRxrc zqqaPpmrH3(3Ks_WuHLx~IiyzQifn0{bFyB1C-U^ymIHe#*H2x6%XR8-pF*?~*U%pP zV~S}67joiu_`2WQqTAN3Z7P0Vaw}*IdNm2tbGg@`y6c(mc?})@%?96%G3>Mu;%-D< zZc)69Y|YNK2r@e6P{9>HcgM#vBKv$s7I z>n#f}k_ zQt-$|&RL|3asQsN|LM52_ZCGYaq{XXZ`1VzR#$#Wmf}w_*TOI^gXdl+Y5od+YMLGI z#lzhpP02JN7g!qyWRh*(Es@-1r?xH3(?-#$J>mol?=AV{G|Qsa2QBsCL+DZ27oL{; znj1pLme@DDS@fMRUxi=#DO|5GJF7vI3#ffd9~bkWCHn}9a^<^{$mbetlG%=Kc9zkj zQ@H2TCi7UhjNmlqV1*>eu~VN17fWS|W_L7o9T$pDO))QgJ2F%JIpk2Ck$L+Yhmmyp zs906VLmmrzS?-mU3j%P5Y*)od5BrU%G3vRk`o9@W)&vj~(9oa!56I-EScX|f6+E0? z@MVAO@%-|^aYc8gd?!0qHi8_=mRFkMW+v_X;p1zcF>H?a&9QS>)7F*GKGAlgc$Aw5 znf0y^wJwI}U9KNvU3cV=)MBh1>KYRyKpg6Flh3nEgnCDd$*R*v4_8OEpQ<#^DmFW% zQe;rRtQjSrg5G=jcd9Q7NcZ@WWv%k3D@S@9J=*fYv{g>dM2^>si*EkwEo)(ErV;9f+EH1u4E4@bza;ydT4#^t ztnm-yZ#HZHU*~8J4@i5szC&MXa?PUUz@R1M+fbBqdvgWl;;3s4lci4_j;7xJo1it4 zb9&Q7@%&kKeoFBGhK+kv`=6s3IBslo)T_Je6WF}v%3A%L=}>SGsylIuk)OSw`c#K< zX55&$bn%DkRdU|U(Q)1cSDx#dOnJEv#y58JDR)^Zofk{BdQwFiK4A8Qq7Yg)`DnQ* z=IOPKB$~X3`@iS2-@w`T80jHHH>crFt4(TQ5<3UK_Mv!zW7)>7azfp2@e8k6)?^#* zRT+v3cm?KM&c7GkJO5M9f|qass&e;N{XWf7^7dFU`=H-U{ni)P3`^3VL-gKkn3`>R zi(HRS2T9uGT}YC)GS`0E1|4;g(6vksHlxxr~5$)Gy z6uyr?4tPn|+F+_FX_Vm|v1A;sGYh|ie>97Ut%RjCq5yg3;s8k5rZ}^z1mwPg%;VJ` zO8SjWO2MBnTux-RU(aQ7Zhp4Mv^(-)i?kI)y~51lCxtW`yaNt)W7c zmXYjjsh;aY{(Wc~^!b@KHeohhL&a+>l#|=NR-Nf~r7w^FgZAR3wD)ar2uwZGj$y)9 zE0U6ZxxAqLY1z~ZU*h%cZ!wX%YJ?!;WIc(b+JYN&>}a#=vfO-1TP+@?LKrBfvi9JP zyWv+qceiP-_8x=G-*j@7D~h=`&l?=I*`)Ke{~O<%NPP4B&6xCZMq^7qBsCwyA6{DK zFR{9E1h$xJ;4qXj?9}K8@w8KW>o5V52tM_{{ECUGr6h#@f zli$&z=fBTIsfR+^rgHP@}-_S@0=Bz!4V6-QN+^?D>;8S$k~ zlPSnqB|R|w@-Fe3nxcQ~w%|3{v0$-qa0b|uv>B3fLECg(qgserSy`@xni$4@y4phX z%&i(lmdZyBiVufsmbEO7Rd@xv_y^zvFxATsE@)rc41!r)oB!mH05!;eHUWzs$(fL{ zelHZWlFi0YO&TnQ-MI8>@=u^!8?_$LXz^J)^oqb0+R2m?Q1uTMv7bJ7@U_O~&bQPr8vVe>ay#`{nYi zThaz7H&wCmkEx za;nw0y8q*5Wixxtv#p5YB&g#QnaR&Y2c_9e@hll|`$+!ep!4lMIoP45%1D>{h9T#J zv7W}NxYJ4aH5pbj=Hqsr29n0J4(T@(%D5XI5ySRo?Eh39&EmF&j2%70#=TfqM& zOJpQZ^lx_r#v7Ot(LygK7WYecpZwNoGjZno%~@3rq8tj!{Rj!LDPvC#HR*qEiB=Q{ zANXB0-%Mpbw`FN;s5TyNa{uvqP#US~s?JiI36BtaG&J#UnB*}yMwGUKdqg)YPcCu~ zc|9dLpIFVxKcmlWxe&%7;8LOfyK_ZpKN~_%zi=Srbg_5VjJ;rRR}x zk5xqPs!<^;Hf`RLqS?6~9i`MmQENORAC*PUj@4X!fMLHpz`W_ybUHdcg!zSRkSF`o zI`)Kz#F~5i&YDdy4WiPbiz=j0qV|NN1D&njTXXq`()?rW&4T`^Qmv_&^tk*n2y*nf z`zwA_+_cf-+a&rQm-4Ns`NN~E(A&!|&V03cr6gJ=oF}k+VvR@NcnE88Wc!H@^uB#^ zl&d{;$JQ?PQD!3E>xFS2@z3C7Zf%f@t6tnHSx4cw5rs<+YY(iMWG7Aj8s+-NcZat4 zL5wJIS+zem6kW6_8o9JNMr(hX=FWXaP&djn#p7PY+M-YIhbBD}r=vDaT1>iFfdg^y zVQWDZ^h)p7y7S8UgNG+N#}D5)xbMcf1Khh`6hBglGNBsaI&`>j$Aa#Uo%!9G$oUI= z)(kN?{65~I?aDrb`Mrx}Snr&Ev(vfKLY6l6QENdDn!wDa6^i6@0~ zBgMbbX4}Z;?&Z4k7|+7isPUNbhW8O~j{exi++o|Fj9QX$^2MY^PP9KpPNwsV;Img(U`*e7;0iN+~{mZ9bFiE|{$< zFjI7_{C0hX)XIt}(-)m*%8EhhK^Jgu1DzyG=9}PN!C*~zNELfe9RWwL`@Zo8$o=p*&NO2GNQ3n5V{IXxgKECYi>$2M^_+nAnTd`bX0ddDh zc_g@Y?~0%szOJ`vmvD`LI3e}zdR;t!PXD##6q_nSX4(hI?rozD_E$cQ_5SvBlO*tW zqrjik#>mVqq9JE8T-a;mS|0T5^;6-3fAbIMrfGMhjT0KNzN!ZYYo3k8?$|mh706k` zA3GccH*>Rmv(-j((c(5l(Pd}Vk_Dze9pn|Z@R6y8x8v~cgyiaraz7tz(P@(&ybtuo zHotmvDy1wC9p@LCX&jp1vD?B(^@&Vg(ne}B5PmgIR$@sOjP=96&8ku6NF3>^b&t|d_q@bgyk z3d&eKoj06{-bG_8C&5>+CV$iOZ~vF&SLbi;J~9JOS!!EVSMEA7}cQu3~)+!g60c11b8mJAbe5Dt;T- zpG78m;>QcO=q4uTbas@FYb?b>^!YpduUq9pi+m3WU^OdN$hK6e)?bO@snj$Yv)|I` zNUrf@&!*FC=NK;v#Tm)mQp~||n;&L-{D>ALyGUwjIu*qSyLJzi;qV&V7mjE`-1q`$ zcjD>XTtcsBnNuS*!JunW=DTI3f$bB~SOYWl7&E4!vulO1O|AT1`!K2|JyrkYvU2Gc?>Hq;J{z3 zG08PIh+Ezeg0u}!`v=fa`Lp)9EO%-04sB^~re4w;H<>P*9o1Q^Bgq7?R)z~o8G8vG zA~ss^-mIPfLF$EqTw*$n*XC=5YloUHP%_x>NR_kDn)&NoaQA4h8%XTI!d&T`bWNWYNp--xw*k zsytfylf8ee{~7i9f@m!w!*)Y-q^gm*1=7u`i!soV>^ za_C*UOqP5mp{C4y;QdZJ0(ekQYbZF$9z9jKrUDufK=y|;!pUolBo%)>hHM|lP`0=USJzMhaVNi7XJTuG4VYtnrvxihke^RsFrgytCsp-KP#Czr-{0$ z9^4SDRLiu6YR>h=Z+>Jw=F-(Zl8N88PYC4y|GbzKryYIA;in3>vJe!z)3cNmzKd@5 zQB)ymH!~qhS>tT`S(EEDxrx^2dB@w+E>Z;!#hc0F(N{8ei7RIucoFKQ{JRSEOLd8g zJKQB&dF|xx%r18O#^4tBoTGQ=4G#X#mlM`M*(Q?b$S5T8p#8}(tGV$1!`XXAHMO>F zyE7qygc^Dg>AfRTl#lL?1B6H3-Mv1OA(n;K>6gDc zXsSQX-?|DlgS|8s#!bShttsh`gA9Pe*QQ7Il@-M(P7B9EynR-aP|V^z;V!rR0(7qK zJ2V7QXq9-`@c_#GY&bGH+fZ0MBebY~MXxR6{d3Zf&#k?Ik%)r+f`gw^$8FdGuY|b@ zMMH!YI+GGVZ$VWL`s1-EH@buB%t|G&J$dw3H1>7nIl{4`m#lqKb9z>I)?lsgz6c}|8eOb@bF(7VzB23tV&&S3 zmY&IzuV!>t>4v>q?u^$c(Do-~+Sy9#nTRG04oi^xW@GkxT>Jb}XYJWJaECE7JdNRQ z5SQ0kAmx&0gGhyYI{EUxf%y%$_|x{Vl@wA5=d;V>>{kSu8&{dGVU zuTSmD?6D#doyAEqW2kQ!mNNzeNSrKL@xd*{=c5!5NeLt*3^+#cR;;5LA%0qn#3LZ& zQ7IFC;=$UZ#C>LmWB6Cfna+OqEW8~^CY!&ED=fVo?&2O7X8KRAva@%BlnFQ!9C(M9 z5sE>PWJ$0KT7HGxHY9eJ$eK-TkxD$Io1Y2Dfn?Uo;Vinke3CD&QH4?yZqtjrdpV|X zqVoyA$GHdfxGaut^9fgd>iS3%A5dd3Cc`8s+n2zHt8z~Ef59w^5>V=KcqNTYBJQGU^5oLA)k&_tZs7HY%Y!B#dKcBE^NR(f8@_N}e z|AgrwRPvAnXS#5^cMb59YJhYg@lN9+DGxAQN&4Lvb;^3qR#k*(FI}w(a5z z81tV4vu({YbPbX}M|1HME`TGVr z`xWb<$E-C?n(3^+T3OCP#k!#OKuHG|MGsl2wcp`ntQF99qYHx4C$Pe>N?-9*&Wi5z zp5Pr`xj3)nlQdhmZLkt9N(4C*C$YUJ}b&-feYjyd|DXPs-1!)8edjcB+wF?Y+5rrs`C+aDvD zo9hGW*sUm^6uRDMg60cr70Nh%P-RgEEUK-x2*%7d3)mKONZq8n-({t(oib@FB5ONG5m-1>K4_6fk}et_zrnAkla!R z*&7uxI!~{P%N;}Eq}VNf;yJ3MBmB=$9ydWH?xJ&rAo0~Uvx_-*Exgt@BQHUr58@Kx zMCo9=tyhgC%igb}FVx%F=8mv9pQlp|zvG@0RWBUrx<_=nbX~)Z&+NBs8IaN1r7EU! zEr6xQ@;1@?a8*aO)Nm5d#fPlfbnV+Yw?FQ)ssnBnWIAr)Qik25Vv{=ei;I?F@yhC! zaah+cMVn)s{G(i%DKZAHXxzr-cc~D4#E`l09Fd=-skiMOcf^ZJljX>pXvYiH1Gcf3ZpookEHFI z6cw_qN56p2|8MZEaPsh|RfZkBTRd&>paM3{VxjWd8D+2%l6+8pL#(?ikEr*aIL^ee$VI%+h6Hz z|5qTzCgvoGDy+<;`s`I;*S#^;u_MOpkc>JDwW`Gd_({Fbd+0#?U;CHFLJFbKJ@>r) zCk%=z-)KAg@tOA3U*tR*jyi>J6m4Mb^>#k#zCa4lK%!>rQq{suEN2F-1V3VTvhguj z!sKd(-pLfNpzOxaLD87bj-Dgm9C7i#)50tsFgZiNYs`8F*w%VRb*aPN`m1x(+6zlc3>$sbeU~aN&11sk)eO-7re-m zdN=oE2N~nt#fI+DDH^U)!2ZdP%xq((k&;rn@wlNyUCP9aK#aEWoa$f_fO>*C36?-x zbDb~CWfwYDus!S2v)W**LW4so62qp`C7cJ~DaY?|X^+lo954YS8ltTCXLAnYS#Ze;jv*QD0VPOY9h5a*$p7W_ z>QfN;;6%DaVxK^5$p%L7i@*tmEq^h<=ErX>;~O3{bBq9Y(oF}|k`T<+>bBn(Tt^V8 zXQZ8(b&XCY3(~kaN>ut|5BZ#b`KoAwUSyoQ95Xo7LBw&ykX{iH%B_cnYoe_M8b`62 z^B5urra(nF^?tY8og0@?iwgt0cuFF9-Q{NTC7A1w?-?;#=Hp)MWvF?7Nzw47^UR~$~?N!QpO7ob0nFN^u|ex>)+vn z3%#0mL#|@O)VWdS)=1@-_<5z=eQ=pe$M__C*61ar+F3nb$@FMJEgKxx_w4nHM-P zRo{3=R<~`%(7EpK*|^z#C+px~SNN%qb?$7ROzMe|9%X>?xP@4pQY5Yme3>qviWrFyM-$5w*^Kf zb?M8A5SB2Y=DUZ9Yg&NS_Eq4hv!oil?pnWb9FSvyi`u&ezb+SB)1!!$QpX{q1eJZM zfY`ciMC#YDFe5;mD)&k4sWkwI1E_%%jXl?=$|vwri1upL8|eKk3{KrUD{X zATO?OfZWAYz!!t<^FuEOgpXWAdSti(XC7Xb<6hw@hNV){U+@|?B=)tF)upZalfXq- zfghK_X2as49OHx9e^CY!XmF>D!gTI}1%JdM;3GLOVfCX93F6_QXY+WqdWO2e_FVVz z_5Itq{p+X?o2J1}^F5m2pFGKQ(i1_X{U0cNrABIw4cB9-@5`W6?%`O^1bn=-sGLo0rnD&F;)H1u(GDhGmeB68H+X*1G!QkwCyOLy4%e>^vkHXK}nUTDU ziwGuT=bke@F>>Et3fsJiEEv91ef5FlOUSHD$tpBf6mM#}*8G0cQ2uR>l}HSbm~eOj zf1+~*cl^7k``Eiy&iVWN5l0_^Uq|i{d5no%5emFR>+xuyuUsMD!vB^;L%u~X>he)M zJ;xW=z7o}4K&0V93PcnJ7_i_uc~-OcI7wg4#j*%lHca7|FI2T}9*QH4$B#qab*^gw z0}#c{zl7OQ`#>z*1<|Hu%~aB9&X~!w7w9CDUM9bI+!A}43cTiDSa_BNX4^Z;*PG2n0SM9s6_1Rx%sN+u}nD(I-K!20n2}~sO-_IxWYV7co4IC-<L`(jdYKZt@~vqPLazBW(Msw8FxLsA$Mcy6(OhA|Dm2*1u>#M!LP zZbF+?{!HL*X$ace=f*1yqRMr=x%*`dR>0%R0XrIyA9qoTeGOEX2<1hWHOOo^qU6(K z<=-zzc-ATQaz(q-4Rj59qBgJWOyH6iYWZ)`8o>CO$J*?uHI`0edLr^F;MyV`oXd9` zXH$PtC1hQrN;7G2yUH>q2Es+f?sO05aM^9MvUpK0NRTHNv;kU4S`jcLTNNu2C|43M zRO>x6Sv?NWs$;Vd{~F!E~x_F^-l9Im{he^psVotiMS1(%IAd zQM6&E9T1%V(wVY#JsAglpB|1+P<2v55tEs8$&96brhqq+;$qdJe`tm9f#gzc@GZkwv7eA7l9YI zNZes3u1s?=hh&X;KTz1nu%EEpJYNH~oEx~-ui}9SdGu<8Lp7)OybFz|C@Tyt^d_o4 z>kI$s_CF277$G3Uz4gN}&VNvF|B^JezftfRNpN)e-q*CPVg$e0%KE^?!QlzBfJ7If zUAdg(M3gaow35~($=2@=-7KRM@2!4}WKb-*mTX9fQrGMYWBD#MsNhe-F+o>j4QSfQ zM4N2PM;WKP4s5N$ek(kpcj-aBgi!ymETQZiob06MGp9OR+UCKZL;pBmzQn`wq?>i0!hZQ31AB)lj3k**J`ii8 zmj|5Hwa|%wg7p9N$upPP?X4E!FEZBIN1wV%3)iz z9d0ufyJd8{#!4AkL?GF)nZeGtb6c5lg>52vHMspqUxv0m99n-6bJqbmI!{g|R|~(M z=sYsH@k;Oh(aImX$TOS&{_8{dcf*$5{^1kgor`z8-q6pNFQz8?!1^H?^O`4(2Y!Z- zEV2*m9(F5w&hXX7H6)$Z&X>qG`8Um?Y@c{H6kH3}F^#?8%kd@R!L#*VU@Ecy8W=3NB-^+;U=DA)fbi2K&I=q!L)N5Q=yI4i+Oc)|Nfog>N+4+uLX2-=GJZH3yJ-$v?_()^i$ zVq$^TlGe{1Ynw1khp`-6Dlp@jLfos z58|o!rrZYk^?VG;*GIgjm*0gK4-$o?y%nZ4%_l8H)3QtcZO6G9|@ z?a$44PWu3N@>!KV|AxZY;egHE(B%)pl1N5n$0cu!LBSTHvi`$WvQ59g;k%rM@5~zR z*Rza7t&g+6QdFILvP-bsZM?7Hz)D354ldFmx-Y)?D}tTG?6LB@+fo0Xz_G5%lkn_1 zWMu1qxD^MUt!6Sanms9a5QQ_|o;W^rz4fCjzY*uX^Wqe$KU?pY#z6PU?eg@aNRM<@ zWA7M`iqLH0Zpy4pCWc=ejD2x2C6AL(GBMz2_#Pb>iMN8dW)Oo8x)*o$N!lPzd?Jb* z6t;0+rRU~E3|BsYL5;?3W+Wgg?0_`FtfCct7h znYZJDhWo2KF8o)IcDxqSxg_qN^d2I0>*<9d*ei)Uii7v)=<-v#BztE695pGv?9r_T z8Q(F34@0(xsnL73oU0Y~65)fkBbn%F6%4BnU4%3GW%X=q))IFw3c#QHOLgPvPjszk zMqz?acJ`J?>WqbYqnp0*g&2X@e#hza0nHDyTah-W1zf9&J{Mm!AOYXU>uWv~!4!}H z(;}}xhi2yD9FUW_!kv7V)bfMv)d+S>)=yNN|Jov+CL+Y2>`1&Rue1gETyWAtN4w{# zZq9KJ#kc{kApuB${G;zV$P%4|dzRZ9C^UtMOV3Bk_jeHRPGjMsXHj{EAWY5ko5KkM zJrBStt@UX!v3G>?z}fT@X%1WU6rF|-%=n)=&sFKPXtG%TLss1&h5OMrTaT8qUX6%` zlMlyR3#uhh+1K(ipIXzh;)+7Jb@8aSS|VIkuP;Z!#$3t)a-=5Q_8mH+fpSq>Wx{)Z z`K0iP``K3sXY~D0F;5Wj54oGe++=AN{l~U!%F@D?qV4rquG(rHU4&&fnkTPZ+w}SE zpIRx7LKr*$&_(06{0r;D7ux0yb4+u^Rb;emM%JO^x&+i6tS{45P7Spejzf78>fZDg=4gyz01OO{G1UK{q>uz}LD$UWE9)vY!vmr=R=DRZVyg3M+RIDoq2*FJ@V!#pQ}O)#V8pk|^}(@jEx}dj0zQFR^(t^y?(TtG zx#w?$d;$>G0TS?rTrO5Hu@J#6cetoh2f%alTDHbFD#IhhkHu5v>1=V_ej4tHcJwEv z03V^b`VBq48t^7zQBnI(;rxVgsBu8zE{?xlFhnp7YQV~bNN0lc6gkEupdH1_nP2Jt zC3Nm~+_=a2q<)-~o!`xh8G{S?)3r5H2X=vSB5_$sa_!%SF27V@E zF6em!#I99{=2(myGQh|uamE-Ea9lzA2aSZCkvB7D#W$Q!W9i*TiZEGI`}X!hmj#q( zoV){Tg#zv92boeJmVcGZ6RJ>%aT8Msx%F>rtVY& zw&_1gWdqRVG1}46y$gj~3lif=>O!yu`X21pe~4Rfi~|;TLRY9VW;;oR<#G7m&k!B1veLe-xKZ%9HAHv*ef#3x# zob9iz+{s0z8LYL}zHAE=C(^-2L1_tgVtIpxZ|0W&LKb|@=4IkKx6;m7*HFQLg1!mwI+j!v-jw~HB5L&(A;A2qgL~}G{`ShG)8CvtQUL;YMPJ!n@VLY zpA1?TENg0t$59WEAneaIR|B3uAgAq#dc6rEL;f7uNHl^;(&e+Up^|IkNr9_TvhZt$ z21j_Ar#wlg?2OhqO*Cb3C9d&wy3guJD=H4(iUH*=!R5BJYT4?8Oz-_1YM)(#eG-QB zNmd^#GpFv5Ljovv(~krH+1@Cefx|yG*i{Tp|0x&@azWD7ME2Hwp}%Y%aR&Cg?BmWF ztxw=4*8x)4pOkyNKs|h%H`N#Pe{hqKj-Ni?iW63W!w15Q@;q0#FW*GRKi#mUbGZiW z6?Su8_N7ydIX9?vElGSQd3dEv&Tf{|w>aXLeqVJ(oPsIsc6pVG8YCoQRv!J1qOz00 z&jq%d%o6TI>}+g7Qo`m??%}R$-EQ)DDcrW0AE2adyGMxwso71%pfVkps2zGaAf2K4-J4SmrxC*uoqSd$7CP zjH+;d^00n~Yx=unz@v^s!F8-hC{X3#sC9U(Vl1Y5DuMuHZF<&=!Bj&RS-m&MnCxwg z#E~CZ;~_r?ah~PLj02Rue;uHJ&KA4@#?NQD_=PVTM2NgJHJMj>>_?x#)Q=NX%by)c z40IUkqxib!1rcznNnA0gkI74Pr#suFe{VJn2z_QZirsO??7>#fkex8?xwLpC%6)k< z|68LBVhpGVuujB#LO9OXlS;0*kg~?CWJ$9TD_Ww@D+dKvnSV(w!hlj<5X&~9@%0jw zGF4rLUS=9~o_<_xq=V8~6(JMZn@6%hd5pB%XHvh&{0=H4T~;S_lNWx(T&82w@ZFy? z7D;itx!!|ITFdu@H@bx|PZ94r;W2zdFEW1D{EG;(G2xY$V=QnNp>B8%Q-&?(+eHX? z+#>5gnJs7J+h|4qX(6Lo75RTQ5Ey+>eS@7Nmxlo7H%IN~?-dL}#(W=djD{H|HYI8# z(j^z{?&$l{c%qp#>;hqq=XZCvu#_&JY`6XHkN^9WCHfcb-`g8Azbkv?(~ktBz&Pc2 z`=}shn@yqTqlEt)wD?byzbD`!93Lz8lkbd`!v94A0rANiv_S=trX3P!{Z_cf#e}8f ztaNB#ul9}eeShi)&05{Iq>R^HjW<(lkbCS+WYntnq28EtKM z^U}`9!mx;^iPvK+*XYZOyM^BJ*XBo_>s~L|0{1o%eIla$Bx8fg*`jxEAo5C zMp=H=?At>N_c(~dyvr%1BXWfjX#?kisbH7&;xSz@M)tQ<+0)SuFMq~HgGf!MdsR)C zC?Y;Dic3oUDfMOw$rgw{|N87GD(>{SWr$4l+rqB6y1(rNd^^;G*lu@|v9U=ba43Nm z(TOWhpUQ^cqk68g84HmiUpuhlOg#Sh@t(#Hj~U%wHn7`!;tKi3*!}MRFg`4~iz|SK z`2V@DDO^wezm^ZaFc=>lf?U2@JxYgzpDd z#To(Eb*p5;pM5`zQ?}^NGHh(}KMQpqd=jbgMU`vfYoJ);(P*_cA9lUuIz`DEtjgFi zt~&ad{@CCBR>o=R(r$G3u7S;8vCtIM6$B^L7X|r1TpOzAq7G%f18_9r-csML9xo?n z_FA7mEpy)|w+zv7=OI6ZVDBp(Fx=hoOV$%r-!A2YOkMV59{sDB+D z6vni&-aoF#J@8*_57}xt`jkgf`C;@AF;|4rlQ8i-F7=-kKm&JhGV28`P97e3Nth>0 zKNS|-<)BjV-6@9W>vEBvRzK4H&A&lNfcPheyVv(1HqCwD)J5oCGWT4AV+*{~0ivoS zXO!#s`UX+SL;7~LuT4z^h#HwWlfgfipINF-C-z@t4~xSM-7&#a{MjScvCLvZjp`S# zwO)Z2rxXbIZvbD}2PTYLgLoDo zT7$fW^Nu9IU+7mt*I9a=L9y*NBtV4|_e2OrEtRATi3g_PCk0?ORn6`q(iwI$tDVmh}6#cdVj4D9olx;B!EFCz3FU zMo|B}SJS~CzJVRW?7(l>lNUE>%qX%9GwRg32aNlKeHrP}d7?d&N%LPFu=U2kuL}k| zy7WfR`bgmNgpcgiFN-XoKo0mv661eB@Cy-ycer!+K|{Q`&f?{8?3a_N_@dqjgSP?QiO8ZpNJ zcxaGADO?UUbDzN9+p(pRQ+sfd`JrNTh;cUk1AG3p{`|1b?VpNglbIeD|ZRMa71lR;UY6GCl1N6-A0V*t} zKmrmzjSN+}&wd~XCOsPtRwMD<50>ZZFx=4-8j%_%Q^o2E6BL)z+h}5ZG4p3O$T&Dl z%GQMdvs<~@AK7^X`0#a&Y%J;XX_kPk6T$x&GdNL+~bA_+=bWzNQvh^Dz zoB8Qmtc~k$d4jCV%N6a6B@$c z#2Ye7o7-c8I#j89C^@@=!E<0~8JGRt`h7ZKkSHE?d4B;Y9W;weMy;yKTsg9C<+Bfr z{>`%K8+6=H=F&m22>KXz`moTtW8luA$FJRR5ae;n$Mj5Tn_)kqz!QL2=A->fkM@8~ zy3n?HSs2NfD;AKcS5T3#9B#=`B~)8`9-(p5ZK9?*DnC%FwNe#KYGouip}0v852)d4 zM4P!)PuFX_MTcHZ^<&O zFsq;y<~fuo`Q)f}V&4`#*M;Re4sjP}dt`JKjTHZ{ap~{oBSQjHZp8F^~0TyF+KafGdW_t24EeMVS%A=5rvf}z2>5~$p6>{bHVcJqhcFh z#D$isxEticEqHulimK-8aB+K%{O5;kbw z|7N6(x%)8z2}8u|CF%D(=*a$=bVg?cSlO*1{{P`{dh=vGt)86o-FQF#o4vurN=qVzd!U zmG;Dmgf{|BnA7n0&a5~DnGGj~yI1Ro+uQZ^)q+gLEs-x#$RJi`$3YZ7NFwfgf{j(m z=x~NJYN;PMvRU~omIv_Z`Q)-c-&1|yx0LWMKh7e(>wXuv(U=A*lq-ve_W}8bddNO2{#Y{d%+iZZ!{VWt@<;;|N}u^m9D#U?l>vc6 z^if}OT53~nKnJ^ioM>DG-I^f=sJ9K-L=MZMm_egfxQOlL&9yH$4#MZXGoq0`ZP+hl zUWXf($lQkgb2mbMEslvIfNI_iz%%!*jzIix@VMuqt%XYAId&WdGzn@6jC))xjc)yX z^A{YNygQ!1hgrAirZyV&vM)!}o<1KbyV+_^6IM>|3 zDV3uEw!a#qo@^$lE1-7cTrL+MM`fI0bSt)H!pg1SS!024Kh3dnOh_yS_=O2lIVn3#z;U); zD@WqA$>NXuM$02wA#N-#vy^q-u8Un`f}{%?_q!o4lk1&+Mr(ev4(?z5#*)#=@De8S zdETx&yKO+Z2^04vVG*JQ+6^azc1?EV67bj#x+`=7$r`R02?qf;K-Ks1zRPC_BxoUD z+w==q>9MS&tO{i^x?@u!S6I)B&!v+7*0GEvXm9Ln_Z~=^mrQKGA>7BlaYN1g%)sWu zDLUNax;_WJJ^boIYy1?6Ul|xcqkr6q1xwoun1*ghJHxdVvFKjXtmtkR zlEaZilWIx+iXLOK&Ux%*yv)E6I)jnb4-Cs;EmMR$E_Ceb21_jR#Z(b1vMa5Pr&|i=I0`7%=&LOvpaG>N=Xqk|`d{UDW`Eg~&g zvXx|GVFWJ2!Ifpr8Lr#XCPauJDe-2t~D%)9-(_luP&%A%PA7J>5Mz}$5G1Cxg%N$qtl z#&KM6Z`pcY`6(wit0nIiE>Gc-01wyJTm5CrsmYsceHlqkFM0mNSs z?yxErOy~t<{~L!u79s_-|uI2?Z;X;I4g5NHQB#!FPrO&GUYZ&f$R1HSAP*Cd z(?~X26yEpDl*;wFx}L47dEu;*(hSrMdBZIvVkQ3}p_~pNNEBRaqFu2;Z3tjT8@td668$opn|tO?b>FaFD?2rD;yK|hW^F3cn5S$5QK zW8va+EFCG{fZ+R-IfrGmuOMJqbw|_<#;~QJ2L>oRw_;ZI0<&>Z;2btm)b%_+b#!75 zh75uj&T?f*iAP-KA^*T>n?HXP*6@!DW@&$f%uk{pE$cl|Cb~8;|8g^sc+S>v>lNkS z+`Csl@yr|37szV5F8Kw&_8Jj!XXZnHB;AAGXTmIy3Ke+W+Y+ziPQ)cl59DHn;{rK6 z=i~KGSl)*}(K9K>6|~)SpKoWbMgWX%=KZ?+PrAdJT+96*n5FA8!1vJd7w*g9{-P=} zu;&K3=i6NoZs4<+`Sa}?IY=*8R+_b@ELcm6b1v|5eVy53!+qnhTQfxY#M_nV$Ly)c zuIWZu_A>0@e?tEZ&TA=C6ZqjoKKnfy9E4NTB#5hGJ1QgFELiCRxsbbI$6#X?tS^}0>-XHdsgEkV<1)a7QDGo)>{{-wL@CTi`6O}N0-jI72*0A(HLT@up4)%7w+YU1x~XgYIBtog!)+b)~u$FfS@piH@y@ zP|MtA6^;71A^YWsF@`P1A{ARAnhqmS{E6+#(Xr`RmN8wMFZ1`EeXtGgMnSF*4qJoz zMI!k`F-S?PRY=BouhwYE7Z357!joh4u3XyoS^plNp7~eA6B{1F-!~J0PX7Nkc>6L8 z-Zynnum|OQQEIQq$h32D1;a9)YFwTw0hy#XnV~V2J&Uspa9u00kwgWZKl)$kl<8U2 z#vn;(x$(KbdZVZIYJV@7vlfGVedg~mw8RlIf^aFr(FTXb6+qmeLeL~=h@QWGU`-&P zNx4$Ia%STWc29BV&=aqox1Q>~EGy0FwT8zE;>(t!2R!_^>j8cUccZaaqgGlN{m-Ng z)-)eIU-Ssxz<~O1T49=}!TK*6H`$C2C#>kq!qhTnpM-e+0C6&kDMh0_LTl4#I1Pnp z+7~{yFADod6-_PyH!xV#PDG+xyL2|r4UX43Nhya+i_J!jKP<+Hp-+^!5Qu_{>0J=L$I<})cad{}_1R<=KF4TL@4AVt`VFN~+BJ+3U1g`g>>ILsK;Y%kk2O z5}87suX{#XwJW%A!Me9b>md7dy)W3aw2ZMG+Jt0v_sUKeguNSSBmy};wdEr4$`8zq zRtx*22Z5IdlRBo>9ww$BW69jv#{vlixhU%}SiJI!(dY%^wJMWSMxs#i4L7FTmDt>B zG?C*@mh1z4^}Ms&uAx-$;tel2%vnx>>0m(MwqqDMvMmRGY3(%kz0De;3soIUTkA1-^c|hsmTKF*h23KHLZ`opZ@#{*0(AOr zqPJ;@_0QPtpKh|ls~e5?1>AXBz%KElM6{s}1Mebo=?E9MK5aPe)_45$w9s>Im2uE~ zeQ;zY7{?#tUM-(S-v;0c!tpCYryVw*lm++TkD}Y6Vxej8>pIVz2tm{7ZNiT+ElJ*Q zv=A_}{Y+Ky2gCMlw%rwe^O8vOUhU>xBH*^ z^&&G4jEB=h*_2lW3Z9*@D!2=0|MDXm7#dA~iw<4fTg(mRSC;rmfn6Jly0CK(UD&B( z�dp>E%D_0AZHjbBnQ;;-_ZCmJByGjh28TDCk92vlIrR;uu)YBjIGwc-N!ME@idt zK0Po}WR<#OfBd38BX) z5PmG`+(gBiy$GiF&{Ina5Wjy}WzS;JqD8(Kd&lWE>hM^SUyolDjYa;R(iz8aG2W!R z9yrLMR47l>yo!$PCqPQ|7?VYIB=o2D2kL-65__2pBpiG7S)S;r!=loiY@0J~>vWla z@9J6n&`j~KGtcvaJ16=!MMbIX-}bG7&3D95o;^+2|zUPn5+L}`1ZZJZKwj2P@| z7;5d!Ex1Spl>o7j;3YbEV*xRezYb0xpTjg0^s-0P-?w3|kzQ1S!K=3W0AD`am%=9n zl!_HJt40z7PZ&bZV@eZMBLX)*$EEwg-si4$wau!)q~CffcxMu0mwXlWoJ1duG~VO- zetdMmk3UVyUiH3O9TO$DuK>H4&EE3B#K^WdGWmSnFrGeIKsf)J9%;wS-Gp)`%7;=0 zX-}#h|IC_`IPeWLv_miIdw>Y`uBjgJbN0=QXv1Jkj!HI8lXurt&#@dAWV%$B_n3wx z=W=m!Zq%Ve8PU!oN@&We9M5+1UU6xPpca;HfiM{YjvQ_LnY_1{PBe_+BC&^_G{~P2 ze+QT0`@*vKD0??JbFlrft}V(Bx{p;j{GI@T{e!DAjszYpJ`Ow@FK(+anvv0teHjrF zn#|*;E)!NUW#G5S#oWm@)ajN46#V~E<@O7&2AcJT5uyYQ<>dQEXK#hP+V7zjF$t0`C z*shSCv0S|wtvu+x30^n+r-<;MDzMpqs=%khVpD{E)WM=70tfv*@#}t=gH8ZU*XX>2xP;^Y1&6rXAUV&I_}?z^xwbc`@zg_mM(_ z<*$U#>3th_PuG!BnIiGUr8z{KB-yDL1z3N1R zewzwRo<8mH2li2u^X?Sh=(}Z}jLz`wF<-?(H~~q%hQ0nJ%kfz9R6F=H2<}ktra3(J zYHa$=aeePv&Ez=(){Eo3`)6y`*nNldI$_yWIs=@VyN_homz038VxW*r64Ym=I5 ze0^T%u6B+=TykEGfwGaipK)BDY|I=?{!VnClZ#^gLE0#SfWQ-T+h0{ow{5iXeEn#` zB}O%q{bzav<5`C83j~(Hg=$A}15^{5A0L579SXD}a1%w<; z%!oG${`z6B5<^@6&28Y2_5ZZi>;f&1c66G$diG|EV+0y^=x^c!gc-cSI7SyMmHf~4 zB*2e-bZ1&WQZH$OH~3=N0?x`4EF~Ow{Ep%Uk1RLi9=g@%0@puV1z{c9)&mypeOf1`7MbL#{O3~u0X2pvnPIVi&(LZXmeKTjtq-!}@w`DsH4nb4C{-uJ=OZLGdU#6}(3IC^1Sw-HE*w3@f zZTXpNbiLD;hS7+3<1e?`G@LNxX5on2lU_Q5(9q37`5x15a=3y>y-+|A)60SY7?Fp9 zR8%@f!{U_jU$?+Ri07kXiw#DYM?m0FTL^J&fsCY9@D;^J{$h%`zAt-;5_aja^9pcG z5W~kVLl_p^x$o=QP5^dbydFec$UsY7U3T2zFhIltt*Nz1|Ix7vxRir{3$tpSJ&E^6 zONH;qwl7UJXnUo#fHpxeG~@ zaTk)YuE#Hr3`zc#@u$aXqxZTLPE#&I)^z}^7_&j}lkvA4Wj97#?MUxjD}g!b^9B)H zq$mM4=)`^Lchi#;X01~7oT;wNucfZ8LCQ$GM=}$-c7>FAWt8uJhiOi`MCKQGCI-^t zCzSf`oUnUI-N_Axs0OeAZYC91f}IieMe2bKdfaFs2%aYtk-qVwnTq{y%355<9EWtA zfYdv)sJb#ejEH-W|6JQ}x{W{|a1yrh>0%hR2AWr2mLq?9Mr~-!r?%D*5)|Xzmo33} z!v9rHQ+Jy7o#mF4(S2TuG1Tc(=Fd%RYcw}yR~WWaU~Srksu(I7qSZcRY84KyZ=>Tl z!>L-Wh=;lXO^&xTS~?wa7$A#x{33}ddyk~@yxU9@Ox>AytX#(RRgau<;r_hTpDU|>pCe-3qx?{D0X$9?~C{eN9oopavr*ZcW;K1Epk)uTU?tn!%jgQ*Xr zN7}sNzbtBznB;ZzVVGYVio6@8Cs--Em5Cp;?pcsN7P|zn7(x!@J=u&_i&1c3>p0^g zvDS2CwT51sx46Zwywq!wI8X}}>Ay5f;g|Rty@j-dY)az)W#|P4x7QVe8haxBZy$&# zzF(1pv^GYa-r0;cRXQXv)zVldm?~Ma#XLt`k+yIqe6qJ{k=2ci7$D*0djrB>p_MZ@e8`9i5Li+QBv7BSPIIlO8Dn{gtGQUtx^g81Qv_{Px|d zy&S3;v_P00as9MA@ubWRF?*=aRRTJH|9gm<+U6ZDaR1oE|NKwAD{AHUZ6DK*wJ2(9 z-YO20vk~gEHX=dKjRr~$FVx9oNc(}t3k37;K#?ET0i3lHo2+H@Yv(+=Ty6M15QQ7= zG&p7J?yCaVQiTr_)+=J!DIFYYhp>p`~2eAx%@FdVt7p*)?n}FJUedeJ3p>F&G z5t=+#uZvy|zEH}$FIFKZ<>EK=GKG7Ic*9^234O@YiIiHra_F1dX^j+z(Y=^^bkKNs zXLFS*;tKv(e%~IcZ9^w=yZF&!v(;Zz_=Tms%GdZy*BA++UYrAECo{@41}9765Phci zg=*^mXCiq)NwI9F-!%KLho|El z^H-}^HoPKbqq$sZ!+?*}R)FZu8#?&1b2d3b+XY`-C!cQUyA(5^iiA$(-r2p%r+auX zsbX~+UR~krZd`DRmKC;5n|w%Ix5UevZ86I}Jdl%?f?I2+OfH*Y>{`{_A^@)@kanN& z-41Eg|Cjgx1OE1jZH>K^~P<+aRIronRr%VAiRtfI6HeXL5e z-2($k4EJs)F9)s~-xMdoF4wi0g{%SQEAm;R=Pb1^U()|N$~sjTU{VKaVWQX_GJk7f z?w+#xktWGoaYQi}_*{iC33c#yqPgtlLD@6wug3J41YC?ac+??`Kk?O!XOjS)>1JMJ z;2$T&)h6#q|RKo*EIbffHTc*k2{+2D;FxOouU)OB3nZ^#0 z{f(Z8;@UuG`V?lINmrpoCLJz5+Wpn$kwk1{0EcB z%&$#ICq7r?RiPPn0bsHfV+Y;N>lI$ zs>W<+nXwE5RSsZgN5{hPK&;>QMk#x|*M2>Fc)b1wB(3tM^#>ifCjPpfO$G_wUM95dg$flE9-~^ne9@15kP@_=~QA28FgPS>G(%-*Z>tvh%_4 z<>Ibg!Q-`;XM*H;^S-l@>}y-t^#zY?=-6O2Xw%1!*q4x6rdb<#Fc@o+#`9tk$xPmZ z{7+aJTc*$cY?=NN-QrX(C&Di0CpS=-&2bXP-{X{R(ePiVav(CD<+@y|-`tJY{yNxE z_XY4kDqN@#=0G;Rn#5*_pWraf;1O^On-8;Z-)B&AU;Krfw8iW?H~jO@wF9)*& z67l-J^k!Jm9T%pBh-IE8CAG`2fE2-tlR2Q`>TJBqNx^vtaQ@^vqM|I^C+EwN$FAuR zi8}MTP=(c_gbQz|`)R-b-)x)H;oCQPMw}>KKviEICXcj3sqrwAa_yLlvbu~u8@%Mv z-xtT!!_OWAyMxL1wHj3z;YI4p`wblCPnbyWCCsKzb8D__q^s{H$w->) zPF#jG9K*sHR20AJ%fzF?FTe&*@-%h%g-Rb$3ot1x&w8Bs!a;7<`kDI9KGuoDln*m} zd=kf_ZE}lIC&eSavEj^FyF~1Saw(wqC4mtoYJ(;7USkclnfr1<8@L&uu`VAnI<7iqzS{SH93GEyvg?~zs7iwEglYq&F~$+7!R zdC?84R{lUL9Wx%>cM7$Wb2e$0-n>HOyji0>@X>)ht>5b(PUqg=bdTTt!RLD;hrhBv zLrZS>20jHDl_Z}SH`IRDd@TFRpj0_JcfHL^`b}f)$upEN0O^~Ou_pcUo)NQs#U9B` zqVmwMYwww(Gr#(96VZ56+1GZC)uVn6EvU$iIyRImx69qY!<L}Ij z;%!Y+P08av1(eas8hN9U1{Za?i&|1`UK=^g=a+gazrZ-@8%euF0ii4#xOMW(4ap~1 zws@Evv8H?PcSextfK&9JAd&SdZwO%h{e_bb30QgRGz89q{t6OV0ss|=ZaIJ*^47r$ zjc$&5jTXP|CUk8o*XL&Na{(~ZfuI}zN)qLs6ODuDL}R~lumJLfqPj8fxXvXNaGfw@ zySQo+XFuUF5wo#e@r_QBZzvoo&3yxj4Xsb?dzhoXf6bE$E=wZYZ`ibke@oQLj5{JL ziSjuK)U`Wg#er`ZHepVyj)WDuy1h?7u{aHpxX@==WBRB@5Fn6L>l=}aE4i`sh!Ncv_&B}%$+0G{_BhzfA}$%+S6 z|DR!^0@7=wET@&zh7KuGV6W!r7PIDAcXuuMB7rw?NewNz5n<-p=t-5@+l2ON2T*o(Bzz1-FK%BHK$~e{03#iL$fS zhJ*f!4`aH&oT}CaV?-Ncm6!o^40jNu;p@TbhWd=$F#C(2PsM8qrDW0$-4k7CHa~-{ ze75np`4Zh0G}>|87QqRo&Kq*;g#$5q9=Q+;mv2n3Vkq5pOM7a4G#YY=0>o_Rz*$Q2 zRs$5xVKE6cXZ>|C4BQ(uGlINbuj4?l#@BAgKd00IB?ylM&gD+6Cn@*Jj}Gepm0MZ< z2e(r8YM4NIBXW=^X1cSBsn(_y9IJ{cpew)f%4}!nsmIWXeGG&TjDJ4buFlKb69^1k z0r>6R0+U3Q;??q$)H#{homif%w;$Hac@C=x^L>&t#hNMFeQ$6R$Y90114;w5hL`Xh zx{5rwP!U7uZpKt~04pVWV9@0W(uxJ8(8z7&yCXv_-bnx&Dn$2Tvc? zijf2?yRGhTHfa-9p)EdI64~2IMMi$ey-!jnJV)5|nTodw#?`Qj9H>qg-~YAGa-{=c}y#{?U|nX5rW&E(sSt(hxh zhw#xT;a@Y?FEkiTN4uqOG8~?|-b}Kazan9aaZB=)39G+wo6|i)*MB;2O0!1+<`qDX z(3y&PUXJ;EpPt%xC<>3gEe!FYxf`6 zi5KfMkgbi9o74WBOgLnse`I=%jQ%}yPXRv@#ar_mMrwY*`|@%H`0XGo*$i#;k!D8 z{Q)!%TeNTG<)K5;!u&gu3ocm8aRkYaq*<+dB4W&dRHh*$Gac~s*NVz&b#J{H2`akZeZqK)OW}^7B|9b|7;c;2Bv*Yz&C#G?B&W{0Sm&SwUC()eiL zRk&yMUOrO5U+*C#@Y=|@l?^y9Q~o6L%4;_MF(J>gXtjWQHca3sHa z`48emz&FNpHuVS5ob??R0||k<0mfX7Y{i8%k?N_Mxmm!jW%p_IS@%Lr^}_1M28Oo9 zX`clAB-tKoVZy%aB?`5}D#*G2@=prHfG%yMc4cuZK%{-os}5YE1-E`j1e?%}RDqk= zh>`THcPXi}%Fx)SF;e&0-cVzC#zrG#L1jz&wT|lp51VCZ$kjQ&5-TM+KO|~C`N@|&y1W5$B^Rq-in5Vd?1tqg2^-#QrPARAZpx?ruam0TF~wz*sT3pru36Wn||y!AB}Iz|~o8rTJ}hi4+I{;1HG+D=c%73&*t~4e?R7 zg~ENq&1&XH(}44}JO;D4#As%WoPnA^f{K!#9b9e+7nc@hEg7!&X&0J^xLRK{x|TPJ z6)U2PCHU`K;$nzbpsHuNg9B+x(fdPoqw3igk*(D8Z*M1g`iWur0NVoQa4BZS8!Z$i&a;-n!nawC9zc3>{w)V zMDCNeh)53j)*leMNn+;GL8e`*_K|e}p_6ybc6EsxTS}CeJYLR1q!?BDx!}g^HCk_f zd)+ZYXBuQE_StSbidBf#v0R)u1GFed^>T>JAiMtkqY^8*!5bKJ2wR|JyXbP>Ap6QQuK%b zf=O-DOPV;{!XZxK3NirobAeikJUDQ}_@>FN6Z)BFvgg|M-nh*4^3J(d-qfsslvQ8w z@HZks1Z&TWB{(ETvv4>*u7j`+rySfLI8M;%1uCd$BJ2meK(3;zyF1|+6!S>H%IMx_ zKP-C>l#>U0N8qpzV4~eB5(k+!hqM?Ne%&igzsU;1)F6PO2LdSY&90%ICD{BUiigccWPsz6{8hHd-qvtfLZpCJySQeM z9z^y|VJN8#e$0zU#yK)L*eIfCcMMds zM(HHQ7H9zCjW3C5h*Q3Y)lU-$u{}yTUoT% zduD!2=7~A%lRJe>u%M!Joda?cpJ)on+iY_{4UqLGahEepwW+Rfh!c;~FkF@8A(ak0UkWdNkxyUWA#m;XES+%aXE%bp#wt8| znDkN+`!n~K^Npnt<_3ooI z6iGZEMLd1QbAHx{jF0d-wtYRBsW{A>4}`(q-|N=Yr_4QP77(RM$t?>JEy@QM++BrH zbtad5hyX@fA2d;Z(NK$&!{*h;L{7Cystau`q4v_-ZH(XF8IKzOi}=7>e*d45dKi!M z)m(c*i^|sZjrF&oEO%RFa>g4-TRA%Ow3VLz^+rCBq(F@f^=Zn3?RyLx_gHzOcUL`i z6}+G*YVU&VeB?W=&okEounhf-y->aBmt4opdP^6bCDge_;fPAkIWZ*ZltvV!

eq z`j2VWfC~6Lb*1oy2>D1ESX_4 z;fub>LM)Mx{P;r@PSS$6XdeI5K{A}>QBXl9G~X~s62$p1K9_jl+nO~L9wG!0XN8=F?&@ki?u$DgQ-P3ZUmkR)3*b+YVg;i% zfa<95RyiM_aO%DU>*w%iCKem5Uru<8xnh<-r#1tcqCqx9K$UPkzcYP&0Bbeg;3ge-HPk@ER@dB2A> zQf>>Mc&}x!!%)nQz5Ywv4+bZN51AK!?zxReq~iaTKH{sKX7aL%#R3?O;}`Uy$I*nh zF?3Ry&FC13Ia*U~6a?+RxQsHXY(1MZKp;K7b&58E4FU52*pzNB9L`!f^@01k-?M}3 zr1gvJW-%=|8!38+!D9`@KfX$`?bdZ=NAHlz)qTbzH?IBdtL#ftgXtYSJ~_ye_U7#K z$8>~)wTfh<+(~ZVvcZK3s`H=RYWzQQtG4<9NBXzhN4YI-qRq#G-RuP3e>XnI#Z!iY zAD@sM^kh1Q-7ik7$+=_pKxUXjVC%-xAkcN7ymLy{?-_r~H!ys(wm+npXtHS$V3zCn zoD>gC#W=?^>Gaw>#>evLq190>C%`y_oTNmFuVRu_yIEMlJ5>f;ui)~p2NmGy)*$g8 z!V_1AU*akJAKr@Pj3C*6VeELxAMhIjRc(3VHyM`~=YPQUI>jWGrHnzN%fQ>qXGgP% zZ&{o(jedPv-vraE;oIreLws~HpD7Q0X!l;aX>tJ5<%hM4(8t;m^Fj40PU4BP5!v!M zI@U7#J-8j>xKkp6$7>I3|6<5GUAK7*+E-H#W+ zCDw<5E*sLn@~(}*lK7=fAt)l^U4tDrVVe%w35O2x35thXCNCMcdOx&rtvOO^0D37^ zpPd*|{o0KM4f~0X&Y2{(_f>LXgI+yeKjUhxCHbe;`Peb93dN)K4?J^>vFG*3i)qKj3$+I^n zpT=U&9;63^KcepY)LGP_TL|)Lb~I6{$`UKncu~$>2fW(h!ve1Z1H8u+snm)~SHvCH1}{T2-~ z!bc`IM#-Bv(kLu=W&}XhA6YYe)VjutM@%`Kkw%f#NwpeUszjC_$91oZk78NB5%lGQ zC&d{Oly<_$%~Kfhha6Xx0>@c?;^gL$i_ zkKck08`q6NXolO1R`m9A<0s!mBs> zp!;ZuIoFL{=m_yZLJWpi;_>O5XMObQq)(56M9CdzzeEwhL#NGTZ7!w;XA4LY%?%RX z>OB8`mdIjrF#sMhOm&c1JyOL@y4r5?ml=gZYc@W5+>YL^q`rQ4JvZ+X-s(p-G(`aN zaW$Jj$K~bWvvU5VIZa>d0H%9?8PK3Rb?A$(x4i-Wk7{cL78kt!P{}qqc9e7o?_Ym! z!8`isOK{C#-5;X|8xS5*Xwqx>9Nl* z0*EiBb`OVlPVHfHt!xBzgn1~h?U!I-e14`HGmzmb^ZJJdSLy65_LBmW_bJSN3PN=& zREvd>c+-G^ zdh5~d5z0a|)UVG-l$BU5*P)B|}Vn`7s1|Ned!Ycbwn>4$?oywzTk7rTWW+=n;+9 zf=@3G!do(ur6phnV-K~{=Xg3!voLl+cY^-YCYQW(Z!0H3bh7;Hw<#LS8SoSEZhK63 zZyhPBu6vfnpqh_UP^CRRe}5groFc0d!26B^NQAjoU}Mgw7e1yabS7rM@n!Uk1}`vr zod+>Qma1rMgZ~7R z^rdl>u!PgnSp5s`BBmCXKwjL8^BdDrx9hu+k1V#seDXJO6*fR%2@6^Pd$oW zx3t`^drfS9wi_2JXM`Zkr{rj9ZxPA|ciyAJKeT|zN=%m!C{1s9mV{^bl2a(Ut+2xi zO_W`#aSCg}K658Ix1;I!(trC>Uj9aymIv%e3D?C>=IrXkr{W_?Sg|;jrxWgQ`l`YR zf{702mcCv-!C%)6o<)`a#5cE;>3T$#D|^+eRWb5YCE-@lXE?L$Y-XoJBp-eFmwGRY zOs~j0QIG?1Gu`vVe)%>3PSg%5SGG8xzF?U`deHYY9CC)L7Z0 z+#0isd6y%K*g-;>cf4NW_(zJ>!gQ9C+SY<+kS?M)+D|6~luIfu{;l1M(fh-)?C*W{ zj}6bQ>AGzy-Uq{J;0BoRFiT0h8BUKoR|o<;L?OTczx3j}+;aK$`4g0>2!ca)3Kq$v zsKQ~Abs)}KrS!*+`|eC2y5h>29$$0nRgoh3nxs7)|F;K-1b(-JEDr-o?lBRAQ&_a^ z9bMv&m#)dN=;iwjEo=8b88|yY<7tvz?rj3fIj~g%L#f|wXKy9k3qD#OmMVzJaBwq< z&>_uX8_WFZ6a?(QqmhdipT5>NY>5>yiSj2(iNJOy_vM+EUS58cu7hRMpvlV&vW&2u zCVc#(+e0WoenCILfq@bA?A&uKsOx;LZ%*dj1*VR2e@3bY3!vA1Be`56zifhXEU@{~ zQ*mg115#A1EH}bEf8YM42>uM&MDU)?6JBKSg}kdOYRAWF{m;>ajb$$SC3dF-T|iZ- z$?1A)-a)W0o!5m8_n#-E zrTY*#@%?=+HjtBC;O~gE%U6mACk%D(!fvUJE8}j1muN0buCA7cIUp$Is3xdd;<65j zuW*y@8Pwe9a<=R}tIg+$2>g-aOA1pvL|`O;R;Z1zB2ad}jlrrk;^y%Q`jXTcU8oLI z34>o|NK^!Kg^hb4L5c@<;PUExJDcolBBQiLkf)8=(Rr2$k7$X_=rH>lCNh+TN9Aqs z*$`P5`afS>z-AJIWcm%L91j3Oy)NnP3ZjW>VeJHVh)+IPC(^C@!pZs|H^Y9uC za`l6NrpR?r#b*M-DJ7Ac>zl6;wVs;k;nThlUpB{mJP!ArfI%0fiA=X7GP=f(3=XrA7R3g8m%M{QKcq=EDI(#otijF+Dfe+t2uq?R*tD#b8v>%6>iq!is9p23aqUy2YR= zO{&lLNV9KNmUfm2{lzr)e(PVV>?RO|n*Eqn7)YmhC-RZ&(K2e9f!8(y3G~}SoLKg^ zB`~>;<(9;L4D&u5lH@db@2W5ck)X($G5bKpO-pH6;k@B1&@bZKXbBZ|gW|uwxI>b_k0@b_ zDBB~ML?9iANZ!$?#hcmO?qAx#OP=m;^dLAgDGc)%8zN^z zvu=`IBy5N{3L-n)Ge=!BJc&_==6Q=9U#WxO0CB32uS=$YIpU{EFIGphi{m z=*x#BR-=#Qt*?zP;Cqtz@RYCUPc0CthKRADA>CoKijH@(8TI|LLyKy!2$0MVlJi zw0E6+qh))Qk3oR@nt;N=j+xJyxfB+?$ERJ*yC`?Gm-(!7b=I1H3f_QR?e4Sy#%s!ay#iJy>%R}f@p@?`L`-BW7pfsBdMdo~QLGwwnge&bn0t`I<9>xfS1cPT z=E2q7F|CHg&nfOGfQKW^$==q63VZQihP>bfS-ozW^6$pI%C;Kmz%5~6z*^h-t?>Q| zEs@peGdJLVG*+XBKL~rt@Xl}@>RKbH9kUNI9gmF}TKwCr0(0K6)6kW2-rBDc4Bp?6 zpDWyWJ_3*gw2CnuT$Km4!viZWj zR(w?&vc3k-Xl`E<#uir^@FyN5G1!{PtDssMFcbEUt6Md2Lm{2IqYcn3F92M?G~ z!AHHhaONPl9K9V|jupjejmh7&qIfJ{SM=jJXRJ+UNyvmqUe_lAI0U9UboetU76|l* zdpPJmE_oWEqqs-y9M8pq3saus&<;mtaPa%0NceGkH2xrO;fNuqEUbwd%td#!C7HAP zWj(E#yX*Pg${y>dB>v7#C?NT>QEj`Yp83z*;g0WCFUG$)r2T6(Q0Vsp7-KW=0p#-B zi^CCy(%&3=DKp+5O~Cg6-JP*5GvL4pZ2Rc+~4=(G;u>xBQD6FbO@;3|=b`+<2*{I7Uj{v$S8 z_PElSQsDRR?ET2UV}=sYCGyk)9N_)!8ta4aZO7=UwCb7Qw4XI;z+m!QCYnjSHgSXS0z_cgi~9}v3IIpujfKQ~16w1XD^Ibfu%)&0ZK3wYl*tvGaoIqHIZrgVOt-ux={A zU%um)uQ#N;$+^3ajb9dZ9XUUVes5wAly;ssvgY!;6CD26sWcD#!C%=Pxezi&eETb^ z!QVzaCmy1hpB$cL$8MZthDeTLI&;+7TZzNSTbypIpz|Z@cjC3euRrOFV#wxW~1!ETEECaWC)oELUKd^zR4Pl%$^{(*D(FB}fYZm1GH_S^-@Jp6So8B z=YS8=DQ9okO59zeP?OAcIfAPU*DC!SE&_Y1YKlfzSvHuas6Fr8L;HJgew8UfL9mV| zUyXc7|Mdy>A#Cm$Gpk(K!ifYeRd!2#F$Hc#CWD`6C^KBKV|9m!Q0Xs7J4Y`U*%Mu+ zB|a0g6hZSMnLC9e%zgeh3T~B85`BQSOa5XeX`^&XQ~pbfzT>1`{yRfI2w9tJj~%F} z;0dP@sn+L_a_j`$nbC)O-4wySZu~mmb!_g|inRsi=a~fC zul|8yysH(Eg6a=BaAdMsYBc|4U;06RG`9AloXVJcQ*=b`;_mWuPmSi+y}_DLW<#$FU^Xbdz@uh*N%Qz<(ImB#%vedU$d+5=B6*$+SYIlj}6-km*Es?rs zm;L(w*yJO`RhRI)Lq>pE$gQ~O4>dF zTPdU_{hrMG>~PM9M|OYJd_h5z(W=@ zyE_KBAH^GutY0Ml?@mc`z`N+tdTyRd>sL_s*V5 zCs$TZh`Y`G7)6wtzHj4?{dk`ycY*d8-mB1gH%aTUX@fet`Ho^K-HaU*+ZCg^KNX|B zVz+NiZupnnlc1h^vKk!Va_a@1bZ+P8Q$0Kn#KG5)GK$pnd1AfHF|nNoof?~-%SC|y5b$>ukCGg?qMF2j<_oHioj zIWcvaIK<*-t|$o!aX2H8g4BC?NclBA@@ZBfyk_J(94He{f3N1WwVY6{+mLeat|WPR z2ivR6_Nn>K#G&#R3v*%c3fswzpJB@|w0-;FuQ(JUwAi=5?*~L&v9w!>fdf4_UCL_W z&V_HC)tej(#Z%x;-xugIQ~?GSgfPke%>_N*7Hgsy5}4fh&YZllM_XXF;?^)#_b56> zA5gfHv8L^k9AIHSTBBIDSvylXPgWp<3%2RtGz-zP=VtWJYikm~UJ_BtJu@u<-$uk{I9BEM8IyY-yf}#7a1MQUOhErFl zwnLVCHR>wAF%q@nvuoG&F$En-nMgh(kN_F*0k;|sOXhwjwAcRr=vP7H?`Lwx zA~z`LW9Zm)U3M<_bJix-w7W^uF7}IGe?;5&G_d|a9}uJJvF`XeC5>>q)rqQ$O@&p6g_LK$`l!Y+_-*u06N0= zA%jV%x26krrSLZ@#H6&_rWckR0$`P%+N}_Iol0jbR77lcFt_g<|4a~B@^6qG zv`cJ_a<_OPjhPG8@q(D)^i4L$IX{|9^)BrUar1q+^1Mf~6fnS+Kvv;d{- zHbheK^#+ZqX$|e?_pKg~;tCw$MbnV1#^Hb|Tf10M6=33T%@^B=OjAzriX6-bqGA#W zZ-yCBB+CZVyA%f|^_t=gVDLGpk73+7BSk~Z+{8mEEdkjAw*0B+3GSI5XcPY~psB{I zlMZ;i{A3REAs`Ng{&CzFV9-jrcfM?-La151gBlfCxqT|G7sBB^2|A; zlX}TVf9f6Bvqoxb=`W7z2lrk${SzRHd%RBF-a7`O9)r&}{)XG@4o!}3Wd;@Z*}gBL zp0mP1jkL-F_e2Y7te;JEP4fc`a`)xh3JI28DxoN?^2|JjHqH><6aC>?&t$5hFT%k& zftX60`W{2XPMgKswzq3R3~&X1>Jp5|x#NwYW8Z^FD=}-`lhNGcl3jPk2%s2Bk-B8{ z1JU3ac3<~7;~C)I>6zfDFlJ%!`?h;);tOs-s9bxSxiI6VKn5zxAPM)}4~8*4u}Uuo z_t9|cNl1Lah!OJz^=@?{S4ENCeQ~e3)X@PS#^y0o&{Z9I6)bPvx4z&BkpiWvPWp8{ z(tm72$VW@jYtKoPgv8HR{>~=_1b6=Ua;$n!#%dVcv;gIF2K3FOYeio79{5Rcs0+d0 zxJ$9kFbe1>5!J`^?Dz=hR~Iz)rqJhf0>*Y9?k*P+mJ$*nt>C0@fVg*0oz=lDyjSR-! z5AgZ2u5g&=d(eQtisSqiUliB+7;k-X*{+C@ZrF`_^+e8_hGlV_my>+J5R-Furs!{r77R_=3qW zy%Mr2YU-LQnmC^z(PZEW53EE1qVvPRR+rg~nP-->&mq2>fc>;yILhcOS%RG&rI!fTN70srM=RtnRs?u5pqhf{CQc0#W0A-ot)n zIuPT!_d6kE+zEo7D$US~VhsOHpG)kr;?%_x&x!dy3DLw;ieWQKNg z?I|&Ww6t_)yL!h9b2&lHnbL^jA{Td)-=~ea=wQPcZ6zg=z}bpr@Z)e?N>h@kEOqo# zZ*?{_SEMpf=tW@qmX78LkKP2mN6kxI5)1tlV(I1Bl$Xgq0+>WQN12Me2=rfZFhcMy z9f26O=WdX0PZ<)z|DZJ?405P@n{B(d!S3d2slm=yiH)1OOE93lztCtSY)urtF)zc# zAls7(G*K@0|BH=A`0ZR$L!Dc70P+mbrZX9rap9-enfh{5J3zzZ3ek*fwkbmL_47Q* zh}K(wY&2R%++er!MRr)ON+vl+66{viGQ+gciJ@*gLk8(YWp(4JenvY9JP^#^B=Wp_ zl^Bl2cG3T6X=qCTaeel6-OWLgI_4%YG>bpioT5(R%?L#WqLptL$hz zE7O|DDkYpk#JotBDR-H+eHg)G8h9ub8$BBq!Ym%1#Pv(E*>K^*#P4(JpSKH9toz~s zKjsQ9NekN3qBD#5$%^8gO)qY^p2`EwU;_l*28Yoigm&0pQzVi@4UyH3vP(I>o}y7r*K@?1{H2vjD)4M)k}JtG&9 zz}8%ZUZ3A2f!_B+kemBQcad)OL2W;{9i&e@P1VRRvEl|$9G?|}Nw9L~+$5E@X5%sO za*Evf_au}4uz{(>$!HeIkiWKR^`Rv56p;|xw)GuMB>6BBNe8|{UCzq?GNJnd^po)F zCPis)t+;xlfuz{en!szL@X^hE!_VpXvYfww)F0qq(#@?Qq^>AqxMWId_ngxZm(x0A zt}!Oxcka^dS<)p;60e_W1N}n9P=$jlhB6-BQ2;(?h|h->c0x6 zZH1B&Rv4)yQMf}bBzf?erV(h+JkdeCnNC*H`TG>9mujRu6P5r1PEj%4U@1v3DJ{wR z;P9qPMmRn12p?0ZYWcF6*l3ay8@SVaPQvp9G!0GM$zq@Prw}y{@8w$mzmVZzl zZ19SJB+y%$VFl(Dz&Db#>h3Xn$NK_7^kg;m5GzX;3E^ele}0MNQJiZh0&#~oTF&9- zeLleib(LqPN!;o8Ff3pEXD?w83bV4^Za*?7K(qUUxWoOB&jAo*z3|J~-2YJ46qTIt zl;Y0vp3B(x#Q2+v{-HiQg9DjH4aXez`X&?faTebPjUV(}))YLZ^?hl?m|K)DAYOT6cg{N+ z)FQS&J7hrg?%nw9L*v7>f04P5wu>AWnv;7kA6!5 zbzrJn;u>v<)Q>y1#5MAb0|g;WUhg4@Ipbm9)sXMTcuE?(YT11GcZU#7^o6|un!pFjGBIUJZQTaCBBj5PXl_ zuYS{;vY`hC$K4S-KDzCKm~?$*#RExxCW>T+qvp8hNfr(7T&%_?b)}%&T88SmDv+n- z>z8NJLlpkNsY+le8sy0tE0lYCjD=+yT@DnenG36F(|<*ED+in%SRLWDg+Y!b31D+A zQy!=tuHHPw_+ZUfWjuv7MIu1UAQ;k=3QAl}W@i+WfOpkm*M9UzH+^xnAcKo{i1@&a9Ki8R`A zf`+UJ+{f+`**X=5eENH@hG`r6S_q=Pk*&b`pxBLho*3DELX}}uiG~fKfu4}+zHp{e zjn$SL5`MLm6Z|iFWKT^KaMMTuTsYBcJw5x=|Do;84)&W6O|djn8qGI(0SR{b z_o0;iYv-#W{6Wg+fPH=W0;OVug#j2#(G`ZU@#h|gZq$5DIYqV}Ohd$`vmq~V2rzO@ z6ex*Oku=w+?+NIVyNAt@Age8C|D<(SO<{Nl3ZC;r>>L;J8$gjf0^eWc($KX3tQL=? zTV@RRN=?Zjev3te_UZUyuca05f>IUE_mrs{xlf6Q|9q;0GXrSVPF$c}?RtnROL7ps zoodT9Sp)GmKmS-CTkihJ9HEe=gGVW?AxbVLhzUPX+o&f2cW*G@yhiA*zejF3%UAMG zVsh_Ie@VkXWJ|!mTAiz=M6f&9Es8muT*53@u=(VX4L(x@4V-JDBP8J`!4{iQIUqf| zdMkx2dL?U)td%-?`%W7XFmDyl-IR&)jB@ynluHI4=sX)X;Sumjt}&psIW#1j{j|rw z(XwwC^H$rRr1KJ7o3q9gA7ec|;d390kuueq^^`qUto z+(rvn***;jS#}WF+~fbAKAE2vq7H zS)|j*+ae;WZ-n{(=6zKvS%+Gxug+;&mgl$oS_#{E7mOM=Icn%yKv_m?n< zN~4L{^VZu1OBjo3)Xzan7l|u-P<=`J+kLcyo2xf=O-b``^l=yy(leD|2fouu0UL-RuL%yrn zX$vP_^Apt-d--qhWbSt%2xxS*J)TGmG;cGq>I66GGdm`Pxf+*3xl0`8RvJh zF|z4B9^f)=SCIsCNN)idc!SH2svaZs>8IRQ=?f;C`lq5@YeROc@*8^6?LY+lIt((- z^HWV``V8z`dC|w9wD?y5(^%lmueedx1R1ASzcqq|`GeMaGt%J7W}EhP zI<+fLWgJqw@|f(ZDVa~Ebn({dG*OfGjtvJroj^j)?! zd>3akWmN{ywO)bo^HjKvk0(Wx5r>_R+}bledkvDnk2?TJmNdxsIE%^RrGmO75(^M z0Ph_YeFwkjB&eZxxTed1%0Bb!h97HZA+)1WH2hzVuTBYw<~nDBF=He=DQG0!7q9* zunE7?3<~HCAKIgN-YQL*>jE!ytmr9V{uON((vnaebSK1^!q~wu{%}xJ-V7@ z^`s=}tI@bk7T&kh)I7BVxLbU{=9@q3y|sPwg2G6;DjBar43I5gO0hL|6bkK8>wP4xq3 zQtZtL@MigEEA+9asQ8$YiR5?a0o1{NOXyX}zXqAI#o1v7bOMe10mt*BBCvdcj(dE? z(CqSWu0Gn>0v^Z+NTBd+PsnCmokj+awLBMJ2_g9&0+df>CrNIu)p9`S_K7n1oP-$#v|NL97Bb6zm1Jl z@&xzXgklsEvu4_$bs(Q6rzOvU21YAsOdRS>CB297Lk0F@(+?-KJ=e#m&ZAH?(@Sf? zEWK?YzdUbSn!i{hKwAw{MTnv>CCu9yRKi$K$m~*On#D!_P-WsRn|-AiiZOTz{=2hZ z;U%0a%;{MhxnLa9-|WRQUm_;cFYBHcn;4ZB=MsnQxSYjH1`o)RV{3u^taNa zTv1Wpj_76S_3`bMMQgU2#AXmPSF2>q5d8hE#{Xxg(kYtRa6 z_8s09$lv_QQDWsweR_UjS!t)Wfy|>K!c9!z@7#*oO9EzpRkqk z7Fk#ehh9fxJWE_-22WdqPxkJD2@@LHC670ryI`I?S zTJt$Dt8&a-T-BeC^+u3EqqviQXf|WxB$!0etb0gl+Izz%(KKZxLl&KU>@SnoV>S`; z?RUOExY|T_G>GwBPLfc^&8I8pUvD4rMG3EIsq&wnjBXh6*PuY;P3Qw}$1FTCE4WfK zGNU=cL}ypG^pt}2e3LHn(giP`$9{ciIF(kc7WL*(xW9xo<>RO9FXsjWCn(l&CNEO) zFrkl;Mc?2bd)C^3_hV;=YeH}B-&=SR&pql?bx&!cQWf5xHFrias>Pk8{dp#k`DjEd z56nGP>!isww213Sx%}Ri$;f)2C(63UxTBl5Rr_O^07Xv%oyHk>538Fq^~NA=#Rsrk}|r%LCSKJxfSxm;yVH2xIBUS|lK zH`E<~ej2I_Y}UA@wvc_wt}NKhPTQd6tK~wKUd3vyc)E_j zIl-KfFm}BbG$P>g181<CH(FK`p zS~XTYKxqD^{VXRsk;bj`j6hejxI5o>qq~$yd|G6VfZe6*vv)BgY>uCxkBrq$2lRUG z5x#P_vgNA{c2DBP%Ys9j1`WP+=Ha#mDD<0WqaV|5VTlm_hU~oUHPT~JAj2mwLVL_d z|84@e4=FlEBr#}NnU&SLF>!7M6UMNgqP$nkw*GITP5fs&J)bYvMYj|8lL2wopDvM0 zprEWpV&d@us#D2=4JyLW5y!NjZ$0as>%rI&6)kNJ2l*lK7PY`H31VyOL-&eg@O|cU zS_?>xv@c;l3 zs07$e%hRxI`3-Nobsr7P_#xjGG%pfvH;>`A9l8nc-aDoVe&P|&tqLf=lS6cL{1>Zc zV5Th8V7f*9+j{%)&{tzPQgAD9r`itI((rI~xY|Ta}`t#`;+V8K})_9|gn%C75IO^3s(*nlVO>v`Zc$EGD>}cS2j8i2GUTqhBBEf zEp+=a6LKX)lv{EBvjR%;3~r%E=OW1MRjPz3DHBly2d>#4f9(`pu+Q=-o5~09&|BrA z$IKQq$&h(A6!P1agdUDLp`Ze ztpzpSZGK`(H?d!FYNuS0jy+(Of8(T{W_>Cgk{cwE_m*HmZWPN4K`)LL=^qfysUnp1GFlmQ51sy{ z9$MZKK_2~I+^)YsG|`3NAs3X~?mP-|$nSD!#QCw;zMnSA`IN(kprb&xp4L9La#|(D|uVgyx0>U%T5~Odi=z0rhd2eD(n~3BuLV=MCp3{?0hr{Sx4$)pB zk0FYaW5Ue>?%0>qc%K2!RN#FI|A>nv1_jLe zGx);JG?g#E#XRBl^GmxH$6O!lf~N!bO3JY7SZ zJE^}n3f$5>&4?CM!X2A*Q-8LCdZ-T)xp*x}_o}<|c2j?cgYRAUvZ1-{%_rY&?5q@m z+^huBe2i_`q>pg!2dSC$aNs`tO5y>BNb4F6&)g&cMkAFyG=Twfq}DfTC?xLWd{P8Z z)9EcpnUbJDaX8jAWJFzYV1{_^o3 z;p-{goy(7oMNqT;lZm5C0tR>gefL3`{#*F^Zk=ZAQ^-`q*Iq~hH?BN}kNPTbf2pX3 z;qm!W@K2WUl;1S2;dh_JKA~m}S0I09Am*)*n1dnPU#=qeS>fl=5$_Txc&knCT1@D?!RyyXZz@ogziFGVQtcfBdzlMepCQsKEq#d3B|a1$>=vwgzDXwnB!XLRq-VbomvTUV5NvF_!|v2 z$EdUhs@nAq9KDBlH7FX@J|O~LTvr*5_y~}_k_|tAoA6A(62M9bHr%0fB&Y`3xDQlx zP6!Cob3f_y0g$b9cCP;?w<{;7xLY}Y0y^`5S{GPR)vnX-Ewx5kP!cfKsS1mni`FZ@H&Qgw%j(_6^3R41hKgom`3ZEL(IWb)jOok zHE;wh0f%BG(RmC|l_p;BnLur_??xZCcTutGr9u$5=l7s!Pe?IVm4+7gw zsh)Q!lzCU02s3A|gAvyc`~faA$hpTC_GQw1f@}NB@Z}7?UM=m0&gg5BIKv52_?J-C z=N6bviy&8;ZTfwAub=cf*BjuEM_%DO$yYiWbH!oPHU(ly8=c;)G$#9?BJcE4z+-{T zfs?kloX4t`bB8pO6e(K6r+#!c6)FwuIIFixs0C{m z;3N-fICV}M@-eOawe~y{_xgG?rSDpzLQ0YKSr-nHZ5(#)?nkHFBeS zWpyt#eS?Zv=P3F~v$Z$M48JI;SWcMg#uPl8mCG==OFX>Y82GCS()uf_0zosmI|`y; zdKqlEbZ+ZSV+M#hO|b>Axv@ZC_}JsK996+_zO*fAz}uj2FPVQy#EZ(9`Qvik)epJ0 zQ+ptOha|!{Q^xzV2JK>#;3J4JMlSUjPU7zoFIM}w?R2k9thBwQUYdO_ZP@)+^EP6`Wb+-tzdN<>`%n}+B zW%1*^&-$&(;&SE=u7@V z;bGMOM1YME*}o_=AZg6nwc;j<+7SAg^OALq{u0bhO^KvpS)Hl-ztLqrPmaZ=svGeO zSE!q8pUUL5NiI8fTUT?6gz36_VS|-tZw?&vi}NR3Dgs&TkEg7we`$Zfe_PBDCOLwRz=hEzDX#&$WICn+}EnhT8K!n#8jAlB9ax9m1Kx>f8fVz|1KI zk0sKxLjEZdpPK;M?ugP}Sk(%ZXGvy=#o6`$0?gp_k2WGgsp2Aj4CM~&j@GXotbQPg zW&}wFx-RwLtfANyx|sn3PX!@ciY-kTzh175;LL!hSU?Jwkc>JC;PvPk>| zn{kTyS;P3sgPg?y&EaW8neBQQwIvcFZyHmx+*+>RUGY ze3BNh;;UyRB>O~U!H1t4=Sd1q)$ABTVl2{umF?v+_Ea}DJf}yz0v(uM9dTginS9oO z-0l_;b(qm~mzG{Hh< zQL>P6yR~8RN0&jDt0&=z=xBrKQXfFMKJHQBM&iZ1l#TECMJGicBHg0j1hL;c)Z&wv zg*MjB80#N~FAME~DnSqKxR6-c6Bu!ET^oCuBp+*Lr>SiHm8&cM(?2-|#_B|fjGj#B zZsqyBATxc1{A4#r-5)U~KB#>X@#-3amGXcvVht%iBzCJ8;tbnU7)}xg`zOfh?CrFf zwK1!!<3{>mrY`0`J&8}du&IJhIm@Y@fi>DczMu6eEp#~Gs$r$YbPG?66VR9f>jYAHXPxkhj z7(45HdJ$}!0D=es!7P%%9@CXFbO)5k4P|Ge%hr^$A0r_YvR9$JNejz?^lB=x8?jrL zfSUOKA|FZ2BfV{Z^zt+_f+A|vk<5StC9gg}KpAexL2s+yec$&-*X16_fqrIK0 zv&M>}=+DPuNic#A#86k2bI>VL<|Ur_^Ai`eh+oA7(B?rdXa7o+bUS^N^~g5mX7_?p zZiLwBc&i9{Jk!l(mE#x`c27@d(j*b4;BPI$>t}>arw(92!vQD7wWj9B!E%kX1G6RR zRj00=IuhnLZM8PSk9{x8nP^3Nv3b(VNMwiBeyell88}4%(T9Bfajn8xX`kIQlW$bC zzg50^Sj-%KsmnRZwEE_TekMHD9d^8f9fcuDU=E|=Htklm&-rAyspPU`*L z=?2<%SCO~35HI&T`j6(fci(`TtfwYv6&nmh2lEwC;7)EKJODg) zwdy;iOfs=e#BH`tW2K=+BMs?Tgl0D=c*Aqq_!uWWwWypIDEe%9qZ|1u>vC%xEyKl^ z*6^l|>+@#Y^Y0}GtA9KmE;T;A6vg@L0e%Y&{$-2qE*k&8uxHAza{%^q6&DG~m_!l} zteEEN9Dm8dA8h73TtowK@OmW*a0xNuI_^B`D!d$&E15z)l2Qk+UAu!<=Ne86CVZd@ z0Xlkg_C8gZdDgyORt9iE3x;(XrnLm!^*fmu`HY3lu}qP+D&G@SW@1j_{Dn!H6r6-Z zh!!9_0C~T&dG9AI>Y@6#31T`1iRK9D-Bx2WoQ#`|)R4 zy-izmi4rd#-IkeEzq3GyerTN4TH;`;cJyG?odZQiz+rISrK%Ay*$Z`O_HWJ74RUld zK&Ot~>7;?NC}Jp36UV=8nVjm_T(KcWufs=OpE98jGJY64@Ac()KzN`m!#>v20;`u& zpG9`%xwdRP%{4Iy{W7Gk)b~taL1&5^Z%EgMLbKVY-)RaXsVojflC7JWfVa}PE*m?V z&mN~$+3e>Cl9`m#K?bZEB-o3gr$mi`hx;Y)MHk$O`em7i?PA8_-?zqvb*!Hx`v5zZHjeN+M+g8W5yE)R{x+~$Vd6~GNhzP!M zl5_Kf$dr6kPaLQV=tnecXm)ltzm6(nD!aexR znGGX_%Jpi&rL4t{WFyXmHa^Zar-g)#?F8U%t7QNimb=J2B|G!o6rf9oyF3db+M2*$ zHdIPmDmx6he@t4A*Zfr&Pc(o}YGcqH-r{eVP`*S~7R@`7dS<-#`Psgg>GATP<0|}O zXQuO>bLCWZ6a{=^FmiK;LYCVqAe*9}lfbcTKG=kArQIjxwB4xJM^;0_99b}68CqM3 zY1jZhVq#8jNbd!UE3TB;zkji;?x%)pjjOJ15A_&)9&EULK_wDi-^o`EuSY7u72zJn zp_E{p{ohSgX!%Zbp`Am9(ZQm<@PN(t7iR{C&)Wc;@tuj1tD<2jr|t`6GwFmQdubF<=0F`I}npLI5; zyfDgBUZoN~!&Wxt^m$3f4kl$tj(*lr=X_!F6>7hwAOqhHAT+zn^^+b|Si9Z}p_iaE z(w_YIG1&N$fX~e~qNcRC8h@6{@pYbL9!g%9c4B<(hml1?W6TxY0lSBVXcs`KyfuXb zgLkv2O;+++a`r%2`dUrt?YUTVZixn9*K&bY>g-Vo@X5Xe&G5-uCaMgm#G*&qoB{ie z)ZWm-G$&~k)MfP8+iuS2?(246QB!)sGLP=KyCd&>#v|_?U7~mqq7@p`J5>(HhPEGe z&kiOUPEsL==r5N!N*)wfLL(x1<-JLO z$eKlX%KNY|eL$2X{aW#!ISm^gD#(6_=6t~f;DTC@%#X^E*QY40-d~GywE=mLjP5={ z%6U&nu+MHc0|}I@p0$!jL)t*R_?UIGu3#`A2n zD=1kC-7jPv2rtGB>?xIr?c{p1AzR&R;_k8yZG?4_8-^5ITG0kW7G|%5wEmw+mY@=S z{zWAbeLRR(4x|LYZsdQ87B}JswMGE3s;KH(Om+t*a@o;>f=qj;Wrd zN4v2SSZz^Gj7E09S zi2fTD3+eRbQxOd;+Oil_)h~}wvIfs0p@4a`vK-FomF!qstHY6VDEg8A8@ZAc>@@A? zZ$A!v5&tZNVm#r}5l9llck|G6s5aNIXarK?*gl2suxm_>jlt}gq9ICgt7$bjk`m2m z7(k(w%j$J3ou36nF~$`N(Gt>l;ujZ(nd@Zt{CGU=!~k^|PW#vWBe!x(gP zXj09!+?^chMgwO|LCbzGZ<-JZ8h~$_{$Z9IC$CyKL!pN*pP%ld_QB<%nGa92U{JZH zA;{mZdMi71w4^9l317Xvgyv|u5@lGM!c5;KKRG2gZVg1wtuJzQO|qHjOljXSKG1LQ z=S<$;Ozr4^+Uq2(lB|!eR`W`WZgk7u;NsA0iMhXi3|^dE*qT)C^7w#Q`ahxYo+oEl zz~Yh1WKncBcy7Cc&*jX0@=i-kxU0Gom8S-w#E?Tti!J5m59U*-i^QU*DU5d@W!Q`ec z5h_B`4CPnNb5`irzR_F}rFu*w^YW;R!XXJLbx|1g2Vw&>mq*$AuQ~5PY@*mhagxzv zmS~*Tlco^#!ObmE`du(&m;Vo8Zkma-@Z@iW4UR$I*=@yPNb zkZrL97M+Ol9R5EhfxRku2^6B4DdGIzui_BNo&0FG8bdYNvwU#&Ke`=KZ1-i#`*SG% z3q{lcBvvDq%pz*pwkX=GTT}lwE77Nb>2U2E^>E4WSYLzEf72rWZL`0R_j-CFU}FWv z@Ea8AwEh<;5=@2{P*A8~zPsO){C|SVRbG)s;)GDYmWKJkKbNowr4za~CMUhGF-Lvw zCm?>VyS_DhVi?Y5uLMp9CE|0-WoR+1W|+=1ugpz8SfJxK)4~o8EBiw@+y;LvxNV&z zXKH1iH!fKL94o}gmXoAd| zu$j9rTh3&3(3gOmn(pUgJ|a`%`VK5faND@pO5-3M9q$oW_tjq zaKVCe_ulP!nW9N-|Hcz@bRO^nyD>-NAmU&-hIpZU>ebjeu`Bw26ih-p3MQJqU-)vj zQ4-KPA0vCer4FkzGo@_KDITrdE1r~oEA-Y*H-`8ZGx8<18lz!f&t>~ha;zlpHW~Q$ zDZMpIM$5`r~_Sx@P)_yW_Mz__LOs9#@I#o(VlC}g6BHP3O3esZ~I z51~?gbI6G=#@orlPD?roTq01Q?t zOF4IAFnqx9fIMr=atuk7m5`M+*Ou)i^|ZcvdE>=3rriCy`drQXc>UYo$VE%&pPxPz z`n5-*ThFZAV*g#@S?ShWe>|rsN1YjlC=Rt!Dy0T+LSLt`an|zFvRD$tGDQi^Ht%3+ zW}j&8;k#wOS8CIh95%>X@gVz(CaI{53lS~E2|=@b<>OIYUPIG*>8k-?r#y!4Y$>}) zEI~7rregiauAfPY&C~oE+0zA$2e74{;LuML@`}KpIw?V08<<}cq9HBa3NXy> z?JE&~q%>s0J=l11?+r&$Ec6Tb(LEyzPW{j@b@n9``VR(7IV7h656SklVoyI zrb!071)k6r=rbWY*sVZQTmB&vj9D7YtHU4)75n^Q2(wbNAXTOP&t5DH>QE~!az26! z@vJlk-~9FUSnbrRNv$7_jKVzd?92XV88djsUeCq;NFI&~TVM9WI%armX-1oE3haG_ z0XI&y7ix$m4u+wkWujMn2!+qH-pSEbW@QD-O)5nG2cK<go#*tjBL~IYIK>?BySjlalEfnsaTZ)Qg zo$`+k_v0-`zpkL_$whG%v)DuwG%kzkCwBB}~9L3B8;9;C6qghX% zWIOsmwCAVcIT0jRf#ESN(RDxs?^hq8s>~@YHE6Jid26RTB!1WD` zJV6dRKmgfc&-`r9bXR6xGw=)e;XvkPK&a8G7^%>%O&DBAQw0*PJWA z_7cq<`+QTA@jNn-#px~o@ooDMUsU3VgZxFEjoUP-;^0$xuf8aWn-=y@2PS2eGlZn# z#Z*d;sKz@|+x$|DzumGA|8dJ^HHUw@#r}!6QiJ-b4=(7bB>Y`Ki`Y$X{cATvMA+Xn zEUe{@9EraqX^qjEgVPu}1Qi9t${yGcWiyQ^NM3q|zc|HTrOc-2X*M_fnaA3Ez7|Lq zh!M+4`^;>6eF(zaQk`**1#HQ1R-d_H%9LQe9kiLUtCBs&_D3a)5TRL5-=yguwsDx%>Sw=xjoVP+urm)~Poho|7D$;>JE;BVvm={>SDe zNBAk&4y_Yx_s77Mc9ASp_&fDT09O1#6w8MF{R!~$)4>l*eN!qr-Mot7s$yWF*8;xk zG3eCcRC0TY_^h6Md#zs+ouumsWUb!U3?r=2W9ir2N)U$d#dy)&idJ8+i4ZE6X;1(^bk>}3fq2F>DMCgV=zoX{Nq{p-6=Bm4KS7@LbEY3yc;dwx<`Uj#-3c*)h;D zOQxw5c%q@ZPQlr)?_~DiF9$WP#IU??0x9^_%&S#3xxO_vhO#U6r2Aej16hxtIWpzh zY>Y9=5%2@xBo-!eZc>R_m@(frAc=3=E$P*_nMs2*e6Ta)ARkXtA_{z8<(||t&A;Hp&c`ne6Ft?exPZ`Au{F-QZaAC&Lu^N7(k z6r`RfEe=3{9?w~@U!6DmYyPV-^B-%0<3XyU4>U*{ zn3kY>#R-5(^&!Qkuk+A{1-{oPXyf;{!U#<+yYPGzdz=%|pY^O9?m0-$H^OnpK^S%0 zw|tBJ;k2=sMScF(V%P$_rif@(SAZQdNk#@mflyDzdH+)&dj)*Y;H|Y>)JdA6fLEfI zFQoSWF3>o3V8y?P%D&!jYiWMuf`4kR&$bkNn#if%Td=#Om6744bEj((s=b5IC@sfZ?>+129ODl9#u4h|XdWM>Ev*P$xrxp9R zA0>}Cs_uO+QRkp)okAp|zz@3y()Zs?CZZknC6{Y=TDf~Y5(f;Owd}6Fu6s%ONG;b0 z!#okp)nkjF_~DG;#+FrTukH;@l5!g(O&^vMb`}5pZ?eF z=%_+M&E=cEuJ@v0plGARlzrS{BxOqHPdkeGbicNnmNkJ6 zTewKmLidC~>E=T*nERg3S&Q-ZPnyN8F$@ukM;_o5=WTc#TH3m=dVLI;gz&bPtPi?( z?^Wa?(Kb1y(((CIzL@MWzKJE!1=oCxjF=EqD2K%gE7u>-8vK|ByHIjt?--sTHAdva z8`vqoFw+ZPe%+W7F3p6cZ$$*0f8@AtWOXU-_yyV?BFyuSs<>=Leb6wp^ZKpV6qyM+ z;0&j`siibiL4PT`OLbdpWJ8$f7L~V>0PJrjiFZ*huHS>aYdlr z-aEd(dMloh>8s=6O^x-+uFIU8F2CZ212~BnVcwyf(ECk z)o2MVP>C*6gq*GerA?a!W&_i6|V->?j7nNBC{ z;>?hV&XYVSE9L^K7b45~Hx5zALVixi;_(Kv{sXi$h)B_2t&4blJorluF4({?eeHp> z)J_d7>}zi60s!eLV%*!XHK|18!C}Ft4YVbMW3^@(iqhB1;ka^eJ|)&@dl#<45Lz=C zA(1vR5YGFwj-Ohq`A*A*4~)@U+Y^SU&YE4nRy2@`bU{EQ)peyAAVHqKr_qql@)C(2 z7y^Ki+W6$NUJ!L8-aSj?-TH$Hy|#8EH2rs*3F8nWmDif;n@oU3t;WS=z6OXC`D<-L zhS{S#{I(YZ?eh5!37tN%^s81w{;U?ACVW`y(E<6n(A%E9j*svxwSqk1n5;Qw*G(AP zA?A1%!lVV(f7tfQsv@T`R7@@gFG)Ls= zz>Cw@ooE~PgRB!K?;`B1CMs@dc{jWpq}NMu2rA&vkdJ7- z*a{Np`J?H_eo{&#T0u^nFgAuZy4YG)oHh<#)%NLOLz|qs912v-Syh1mdQdE?SeL#R z(jr!@bbAB+&Pi*1)UZaM&Q%ePX0d&es!1-I>WWq<`8?J|a<|NcYya-iC|7;R`{yM3 zH?+k`ZMhsH?!%COfk#x&4HP$>k$RQ25V(5|btBbdK5&4<77{g^m)ptagYkZoc zlKIN-s|(uVf2eH}ji7mhk%2oSYzXU4R;N-F_liu{hP354il#qXy{~-XeKTXkxa1kT zD3-t<3C~$3v9R?reTSsTe&Y)87fFiPg*t6lpRG;}a1|Hq*LCa7=cqx} zwr5W?YY`;#-lA8W62qWp)>{<9u9RQKP}|yrpcaT>XU-9L=-7?iUgI*lAr2eP!qR^!nbNm1sP3^(y zQi+2wN{Zy_TNW#$w}|P3nZo7aAUqxjXEga9?9;O}zaQCoy(SEJZCBFd{&uHCvt?`a zBrEwV1BHHFtUXv<)?*3Bd_POGo#KYBv(3_l-cM~Gyi%TH+w(m=H_})1stlH4NykJX z^7Rgk*?y)KTe|5-XN(-BUOk=JwxnLTXaEcOJ=90 z`C<+_J(`XW7AVP%fYoMq?EVjXK|KA_`~CbS1AU%@XN^~-aMHvB+fb}IFxABWBqu`N zC``m_@(U~F0}ZP+mT|FL{OW@-OPbaroUmjCFnZ@sNKz_@)omnd4d4qjnTq7-`%py{p4Qk`fL+f^=QuW^6Iz_g6d*&WjCYaAF zhHS-`PnrVql0aBLiNy_{BiTin96Ovm8HmwqsX_K9vYNZ??=!}cz{tL5r7+SWjZ7eBW3 ztu6f0n6K^Umo10-#*95jBKaj-l>DECgh4VkWUerY7Co}Oxo+Rqek?9*238~Sfq439%|Yy8hEA9@(onQGU7EHpRK)a|vIWAChUF#HW9$_oQ!T-I64{s$G5T!+_?}KZ+vU-2V0BB2-Wr zpuld`Y6P8A?dBKnhH;a+&H(zHszvV>flaxr5pZB1BTUGeHI^xy%n}!%JNemuIdY0! z0w==~*JdV<#XrBb@BnM9=MfQoIj5a4Vo7ezh5iTmWe;AXnA-+locl(|Af!#H*>#oX z)`BLy8*dlUn*)ATu^HX_(y``?_Z$y~w3^*tb%8PUlgQRMwxjNi2waDcMOUw5w$~XlU`kXRrMo&2hpmB-n6u4XcBrv2HyN z2D=?}GetzHnbWv}>Cir_rRT#WVAGTP8mB8l^hTWM9$jyePk&wK1lWg}3hLb>SoKl( zD?Xs+CYN#XR((HUzte}w*%Ch(t5mI1gG3q3lWMEm+!d6co-! z^Ijn9Zf&K(CMYn+dykIciIVU}uENZN|BwR9? z`e>=&;$*|Csq?gOEe+OGZai&-S?}wWHz06ps`Z9|qREYD?WENH+hoqgvY%!dVe&$Z z=0V@NCY9otpS*}yqC0TKF=aznJ^1ZqlwXwYB&8>2ss?ho4jcDOWF%wr8&Fwe?8q3g z@+cM#QHcjuM1RtzDuC4(Te67@z_F=#qK^pZ&1bLkJ|qw#00W{`fs<_}0O$i^wOp>6 z{C#-ZbxP=mhS>{GmX;}pt9`!E(x4%1Ya*pVIPZP}=goxUn0B(YQo&zq=VnJ7;X{V|dsaxdIw(OOxHawyIWmGu_Zkt!A|9+jag)q%pKzj?QsxH^3BN%m z(mD~;gw9nf{Je4V^%52A&BO5gr9tHFIOUXwq;{|hV`IaYN$dN)3&*bszF`jn9*~Hn*H2Q?_mt~=J--2z@SEfgt&(;Z9et?A$oTVn+9r}LQHGe(=>ze0{WEqcD1frtw& zWZ1(N5tu^g!u4Eom}^kel=k@&F-mK-&29z#6j(vu8AI-1U5xp&$Bc!HT1D&fe+nxx z_iKP{m)yicBI94ha|(Wc^aC}IelVgd+H&~2T?sBBsRi`Ok@OGO+9Yrbr`_1z;ESVk zEH=3wY;pu+kI$?Q;vhk`Fr=*zZQS%KKEv|3=V?-F3z+IkZqkIX%X|dEvK-9u%j2-0 zqwBun0s9u6pBS5Nm(gN*4ZWd+Bw9JkX=X}AB1EE3X{Z4+&EZ)bOQjw%uDX;2(MU9S z_fpU*AN?|-HC*D#CjP0qELxHtJl$0Lb%N%N5EnpyD#(SM_X!a~HlTwO6e!!4+=vIN z*@CLsKc2|BJ&_Bv%M#}_=vf;=kZq=#?elYs`Y%L~mXlG&a6uJ9VRIiX+mVz1$KKz!yC2+1k>7RH7$x zbH0e&=BTx<=((C1=l-_uGgC&ZtLb;Ul%uN@qWSQuCDQ=-SJAQ)5b1C(U=TPmPK(-T zVV#ODO|VdkF(8{Se2V|{L5x4%=ijB4oJcAP(U=2Cl`!>oTy-(DEWZT~AY+wIp+3F~ z^VIoOL{~8&v&;NUf;F1R%I;G}NU2|{)I&V|F>7F#&@L{CqkxYm8>8ZVy*F;c+LlDc zJbUjo3p5plRkaGb@E+$t>cKG_NOs;^g-sliar;8jhSl=*Lo@!3Y^4$csj0_=5I6Xl zQQZE`NaD>6K-JaQB#@ErYu^qq`$iZb&TTuXA{_^S;E?jG07NF+20-XGZ$>8lU!V+4rqzCCZX)Axn$h45rAwWrDMa zVITZ}OArn)Nd4}0`s2^La+^OP4cFo-iua z)!vA6&;3iNfAOuCu1Eg;bbJNjYU z5IzY=!UEumu5P-tC#{o97oC%Bg_V=Dv1iB#Aw?}|3yA!({*rv}?|#8o=)4HEeD^jv zW#m~bLJLB_C<&7KPYSS!k_iHiwte{f0q-Jzi=MmDcDw^RcI#4A$PHp`-0Sczp86wf zdvO<{U4)iMq_jdz>knO6WWBbFvdKIM=KT+P)H=5odqYVNGOUagBYe)*`1AldWx9t* zk7lVG&GLhT7kC(6+ zRy%$Ks`l78tIvReXx=0#nt2)D6g)0$f#l=tbELvCubKQd@gC1WnFVl9!34RP1MEdb z#prRbb8}ElKQmn6l|>n$$4XHMS;o$yq^E_>1h#r1J^ZZ^n?`VVkF2-}PlLZc3nR=&2(liPBDAGo?pJZfgf;`pi*q{|JCI-yf-H=*8ZfB%8Qkslom5DdrLBgH65w zUAmFBDom*)Qq5Ktvw%^_>?`upje!*p8Jc>qAR=G3RtR4n5ny*f?HLSX|{k$6I znN*1|@{zlFkd>8SFp`+<(7SeQrSKkP*Ht!6zVpjbWP=cGd{sOlheH4G-8HxT9`NzV zK_)7yyD3@v9t|ozKbrpbx?I-7u)D%=k*oeTIFq-x>S1&m&YlzvBBLCbqT1N;+os9* z+BxkFtn%Fko3L^Dou6#s4`k-fD)nAXM1|IE-W5J~S4=)lurJ0s6`ZBjhDF>i0QesV zFg5T1%FzKdp{(7WZItKOs#sBD$AQ_H7cVbewP|9mAC52?tuW`{7jv&>aE^}7A3mY- zaHpkM(~_C#%hUL_($?#55PkFQmpjYu*1%e#Dc9^(n@})!E`@9Ar_#43KoS`^|7y6f zJWh5ZHmb1uhAK8UGzyc`3JlZ3ti_pO zDpy*6!&Use^(I2R;}+j*>U;+*^XN}5w7txhJW1!qJh5hP^n*ZKn^y**;+|y4vBMct zjs+u@oPkNVy@ZWNi+DZX&^0xSh?n>J#aImvJSD(6bI;}+4R&5U7!lr)2!(5orYrQE zYGQY0=9cN1oo4P!P3QTr_A7*tgvK3LhCn6aZny0q4V>d!Ty?C)rbu*crqpu#SSp9! za)Px;g@Tu<-KJHU{$rz%oIj=%7K1NeOobBW*1Ge(FqDLt8}s1j*EDnkFA%uGdDJ4vRu@(lI^gwmy$c0 z*k~+HZw;H(#SW-2^0{+ZQGtN91J+7oGk^t2A&zfAn_)2aXr=O1Gb7{kx*)QB^^l6^ z#A*SJ*;UV6QDZ^~;g*#W5YrW{$_hV{GwSj(gO z3f4RK98lj65mA}^66Im60-m82{-~5VDTxM9X#TNTGk;mL(>Uw$=h6ty zglgH}z33lXEyatQ0`2B>c^rwl z?Y&R6!EyTbSuE!^IAY+lEL?OATTF+4rJ)>H=lDQ)GlSqxw~m-j5p>W9I1RZH@5Vc8~) zb1N8^D>Rz!(fX+3rwDqMimWf6b9O54M!NLoRHVUug&mYV*Lo0Yck*fA3t(^$0A*Z| z7u>bBqPnA|Bl|{-1g0nR6fQ;T-^5kl$gT^{ysilOIHAG%Xc zlj9`>T4}fhx;uJyj^>~(jxfF z_zy~_wR68F;S4~rvCKDQ#Mz(QzZgv}yYwprzuJWl|(>9P~J83bXGkB zrpdiv5KJ=5*a8D$C@jU7yGNkD1kc=oKpRZN{sRD^$N#EKJhbwwv42VX3lH@rBzNJ# zG6VK#BVs@OECO4Jy>*v-3EAV1wO9*GoJ{%t;l`L-&;%(<62gLJDG`yc7|Z2ku%-^) zw(d_cu6>x?1}p0bUj(ZTEeQ#z34~b_XsyQ*);nVVLg}bL7N%Q=G!NXBlXm{FI7XzP z^j`>KJ=1K)aA~8>MZ3y-?uk?(>pRAOx|eo;4?Ow9%4sAO5zb_4 zAUELL)?c}!UH(r0@ZtQKT^Da^+L_%)KG8I+#EN<5V*Ik0FGgzyZ;gicPn>4U`>_ip zetag+*V;j(V$E|2o~_P*(motn^)zNs|G~KEOwUtgq=53m%A80^ZbpHk5t#g<-n$JN za@i(@O5O^(W!4q<>lx&mal5*IVZ`g>zTX>O``6JlP_{po{daB-`#v{kYJJ&orJLS_ z%2m^*-2rH|e$*Isj!H?%k)MS^DSljKaERqyE>`NX6TSn z6m#eEj!KC>)=(WsEA9@rO+8Cg+eN^Vrpbt}}?n|69-9>!p( zxGd4gt`|ukb>6wy!N4YmMjQHpO8#k>=77A2A1JJhlR<%uUhd&KpHh%F65emB4RE}+ z!mxQ6r>Q*3@^+ov`wDr+b%HVT_wqkW5Cu>Pg74TKNZ*Bt=6@?IKmMIMSOi!T+62Zd9(_1Dn|ih188DQN36P!EH!T1bMl!hziq%T>6?3iF3|a%++# zY<-VUKwY9PoXxyf=L{r@mpARt*6B)rTmU_?_sMOiYmlpo$8~N!p0eb3I@Zg4lh4Bpsr#*704ITmD zTc`2_wglszFe*3^r%Y70%P=sWI3rR?dvUIdCk43>5JGT?emnf%Bz~eoyFsXD-XUz?6!mHRsrMFRnfArK|A6lwhu*`6=WqU%`mykJw=7#| zJhvxVIs!W_{f^GpTE4ndEG3+Vc6*xuZrWvzT6+kg*>6k2u$_B-Wk~!x6xe?7*O1Mz z8Wa-uq`UxYRx)BRE>IUs6WI>E_%Cs8?8hMY$~}9;3OoeS$z&iTh6ul&$dW)=X$9VFU*uNgQ}2wZ=1s$&9C{Ekxx9JB znpb%*?~{7vfd=-TzkgrmqSzEF9k}lbRGkpT?E**TW(d|WC2YncOMD+0`iJ)@I#&l< z`zA&906Hi2HHGwikG2r?wGrLrxkp z?CK##PVUa5%WV>**93}hXx7vb z5e>ZMC0DB=lr;fCLzF7w$#nG0Wo0k(dtXBsLA|Ga)<-)sE-q;iic_jAe;A$tij#Q@Qa-?ywEGWFJg`Uy#@MfC0&Xn+jXj z>{+#=Bwo!sq8~Zfc`~w%*$-7+2m~YOPyiD)Mu=gQ@L=VXjwsj0Cw8WaFCE(*v7Ke7 z^-{Krif`Oh$OrEpuc#x#r^Q(o3I+Vqwh2DAJr4qXUTuHd6|Ie)k-I2zwYApXq%kE) z2fuYfC+4FXCJE-!9Xlq&IK*ppwH3&nh2a^pWhYBoH0CM1uNE=jl z{k1Y$lT-{#!%d!&<(fXV25@$ZTb}7NH`;Np7CKX#bdHpbyzSo0T^6NF=XbwH39O7l z1EMsXi0J4=h|v-Pa9n5$<%W{$&q9kRfCyWkczeZ!7abz{ zqZvS6%l3S5Y$VD}tDu4tBIwb^4OzbXBG<7KOQyMY$*CBY!AvFqpA<|DnpI4*ckf?3 zF*#ROzU@rGxYTP9_>N8!QFwqUajJCG8GL^}h|WMAI5qOhnk6&k>zM=EOlf@YRLa=0 zRH-ZgLivH*v9gdXPjI)PTWo~+QpX*N)V+6K@%6}HQKf7OUEsKAhUV{iu$tHKTWfhD zfoOTfK6LJqC_++uv!oQ4(%Ymm=MB?`dG)mV&YomjCvrYJaf(LOzsOr#SRs??8f`tZ z+>FD=vhCP0SK{)WGi9mzdK#wy+_MTV0|x#O2I*$7vQ=;$2wkK%mNV(2TV>%k;giJg?g|yP@Nup&v3HBXJg;4jYfk2!BSpL+3io_+L3x#18Ij?2 zySxShDd(-6Cc{iq5iAI8UR&ih7tt7xQ6ln#_PHNvz!8CaZgz)j7~S=v?13X``4C+h z``yWa^T1QO9GVt=q%L>RkVO5}K?%bn40vV1MiE1^bNbCNWuF!%pUGIBnnw=yY@$Gm zvDD4(!%uv4nF{n73_a^y?6N899}c!<0(AU=T299TzN9M3H?>v03wo*cdEr9)Q$-B8 zN!N@~=!^oJnACs_UG*j1$PkUewgJ&YtF~Q1}8Qy1W7cabg6?7!M z>*onkalr{}Pbz!sT?|zNF<7%CfO*LEF>igGrdWQ4j5z=7=AtaiZJ83QH@$?a+fB8+ba;LzNY*BUwEM)G$Jnt=lc->zw87Y3kBeP+IY4F_G5 zqIk1a8f}8=?jO|$^j~QW3SmFMU9=5PodF_ge6UDu(MqcUdzriddOst@34k^sGC=++9%wZn)5x(6xn^IA+#%jH$UTdiw!1zX z+dr5&(idKNc=FNsjAGBRUY!owA#_MyxjH$5q@mb#8X8n^t=MEasG5F4u7_8?R_--Z6EI-Em{0X}@zIHSi;gZWC|` z_uIcb^v4Fi%mo85CIyUMjHZgFI~OY>`hW2jdI9C7J92!a%{_z@_&Bk=;)jZHAF1d5LN z)~o<#ij%=NHS}bZ1R5lXFeA|DaPg(Mdz=JVu6STnV5h@oti6S{2$&H5?9I&1a}cEC z_W;DOX_kpn(<%#^MX<28!I0z=Y1F+Yd60AsFj65TSkmzBt_NK09XGc#PKf2XX%KSU!sOU z*OtMQ=X&pHUq~7UW3)uD&` zb~!wnTc-s$^H6y$Y&`G#%}ejH!%sN4xJIuZdR3S>TNuKm7jg~DemuojKh>^6jFrpb$XZtwL&-se-|3x46Kd>A#X^}^U@H&`~x-LIuX2# zwACWnc67DNY_RKi;z97s%zECIkVKCQuy%1{s$%6aNc_skvOQ`XP835L*{{(`n8E3J zXw{0zB`62&-)8=UZQwj>bA9f~VT0zBQOdf5N1JMm&#Um3B!FtfQ?>ZGm>X~58GE|2 z-|L*hZim1_L7t)TFXu4ZkvNGN#XOJ%(S=vJvwk({dPpv%lM>&X^kg_pfMDggH729C zi@@gk>b?CMEA|nm4_BOe*;(iK_0@?rSS)7l5Wrk4x^bDk{O(#G74X-Qv@k21pa&>H zqOr8dB-+mYD?-wk_@61D$Zi`(T4~^1XD;?7;X@F&4s0|M;44%X13T0;k#9ChUjh+mva^QEWVn-OPY zZEpMMofSnQS~yMzjSS;11LErXGcVfn6e-%UZaw;<@V5-`!_rl-OJx1i%BX>Lm^ZZ>#9Xy1|2vpi5H|?|&6IA9&msqLMIkS7bNZ;IRADum;!wk_8QJUiLu4 z*_gRxdj?yw=0D`2yU#e%?1q_ePzK@vFaB_q`IP5$EP#xxg!#FEGqbasRVASEwtden z9dD+A{-0{sTTx2UvHFHPLoQEKDZ##qClB-A=?8>qgr}RF35UTsbte&kv5%oK{xQ0h zZHGkBM%Nz||{ zFkhqqvzK%i@`m}hR2&z*W*h_y4S3QR-Lm&PHjwqJNTs0B2Hh_VI1<2pS~>#u;L{Zy znFFKtj;$a#dna`+t8ak{e0hAiPrXSAgn%}KPYZcVO}?oq5xCNZd8_6}^}gpG)5^=4 z+&YLEc!Iv&lcLD@+Vf*GHigt=MBS* zJMTMb0k}TFON;CGg0C7fCE#+n<(q5j*U*7>i$?`~XD&IxvQJy{UMN#f>k}rxp9qY$ zU1~44`Vxho&P{GyeIv%a+5!;?GE;Khh`hY@3s53D=H z${2XE*AY#Z^G^sg4g~mtU3Q_ZM8S?TD~d-3jU`KDa_?r64|5qSKbU6zP?4s=SCjjs zAPOA*Jdc4D-Ro^&wZ1gq${J&2UOW5bxyifWpp)=*;JOaM z)Ir^uxWR1W7F4m(r2GymU?%oz^+FFGxMll@>qq@JGW~hg&sk%Smskw41V3tHVx&K` zq?;!(xe81AHZl2PJhrWMZgs)eU~iGHl-4vK6M&JdSLqr7C6V8_%u6g};fbn6f>khu zWFGR-9dL|_1CR!W@kmquns@@~==2HEi(P|J+Q->a$o2{~Oh@7(vF!-^e4x@xfWpGY zi|hRgXgDCPSu(yUx+XwD!*NH2`~W6^9jb$x%Q7LpVi{d*rxaAlWA1srs&U;1IvTZ3 z+2p;@e0}9@e|e)F9{yrzC|{d7T3*VX=SBQB34Y?HuyF~`-P8%-_QO-oi;CBz##&Ym z^2dZPOK`To_buteV41!omqd4NEOgDqRq1nulSOpo(^*dIi;-QiG{o^6vDDMDVbDcG z(_u(8A*tp0*I20vob@1WmGdr=Ntw=_z#`!EFn!{r!&}YVDsq6&gQ_x_W*Dn-?DbFQ z#3aR(RRAneQ(xd%5S_7-d+$W?X~SBjNEdHjyLJ+$+H3HAi2xID>Z62^v7M+l&SRRy zd-_^Hl_+A%JA=8io^2$uA^XZ}cj*p1kpKu77|UR~(Qpo|BslgoM#6Bd2L~d_kX@ev)dyNNH9MT{GkEa zUX2H+y0Q8t;IP)(%yfE(gDbCpTD{bTY9GbsZ;=qvu z$OiyY4l>c(sRD5E7f}-N04$mn)NheYa>wu&l+}_o_Yurg51s5DsqaTzi9mSEmWo2jXnGATAP1Y6f<2sApSr! zEybJZh^$SF(UD7l>V>7sEniLcYlAmj|wN8~D8PSH^ z*_SRE5Nk!ek+fK}(E-VLov1AQ@44+W`%p2G_#K`9kCEDc%;KD&@oTTaU8$IQ zq2p9WF$pGY!uz2)G$pUuf0>}oy@kEh{%V$?_gEv9gvueucPld8WW1Bx?-?Us{gpu@ z_|rg;;^)vdJ|OAqCBCl&BVRIP(;m#r*_y1Y%6qV$Tt4#eHf;>E+kLT;9+B9ycOoVx zcW%X0s}-$T^-@Wj;~F_J&Jpj)6#5^D_F_AAAVi#sDJEz5|3yol4KXI|X*jI@q2c(O zJ20R5VVs@N!Vq$*wUCqicn|C?W^mU+{{@}BL9ImLiQ`(vf=ex{^%k1u`~q;~`66oJ zWpkCINT4Q-uKJPAsgBmT8a7q0JHgjQwg!UYenbJUqcYAp3zeQ~0!-5i%H7_vv1O_< zb=B@;)=mT#?z(_=Bl1l1pSn%@#rU;1I(Q&zuf*MeF}&TmW|QsqRB1d_ELybu6)v7%SKHD)9k5}mlsE#VJ2B=^(*%RsszWh z9*`U(cpQA}*3O`~ZyE#{k;_{?^A)9tgK)0DM1y~!2nc=9HwpP?)%YbX0O~89x<2{T z2aK$14#qhb1kwn@M0YG}@SMl@P;8VN$Le7>YoxAibX#}7UHqLQiha`Sd`q$eFyA$A zYZ?y;2{Q+*eyiv7Qq0mOZP`ND51#7F-xqk0@2f;*^f43zfUfL;i$SQKR4#j7_g- z;osN-(9avnEgsc|OoV&eMc}HV-Q5#WKMj7=F&Zxdo!ZzFQW{8w0gtP|L) z^rd2B-D_=gq3HGl|ZGg7CV0@wkWK|=!Oui_Fh~p?7s7x zsq?Xp(aM`~tx&D2PA>}h;4H!8xbaV}K+W>V*+IhX{NOs=GdQQZeOT_nmd;c|Mq5p{ zTmuJRA4Yj<;b4CX>U${7<25})u&v&Anvkq zE__UR-gVoeAes%)H#0D6hVMU^GA&b*CBa>S+Z32_e5dwXTgv(Tzi3H-iv2C3);BR@Pth5eNjB@61y;)G)h;9$~7M!{Hp5yS?=4Pew2@1qYN^U zVL}%DUvpo?IH-?Axam6Z1I59U{;^=bI*7`j1S{`*$rZxRm_i+{hgM~sNOUJ-CXwmh z{Qc#+S#p1Zp?Y}7``c;~c{x7mY)l%S)yI;b_O%CjTt#$3o2KQ=RTgQ*1E4W)C^bzL6kiT;s zjdT@tCvPyq)*Y!-= zH;Y8BggIJ=NZetfAUe^G5?LtPlii^m79|8`ymS*$xwjydUBn+3%Rk+Af%y|@l80zc z569phTOxVhhjosAGs#>uu;n8>P!LS4`i~wL6^WObu90VoYi8eE4!~Z@u-u5=eCrN+ zJ^+i`C(%$Ecqxj_;x@f;n!8rsyr!rjUEtYso5rH&CRg&U{-gFkQ zKDa3CG}D}>KY8v{_TVmih0nij$jN{9iK{*}7(QHPJQD)ujSO%<3FS;(VC~#Q5og^A z?9ZA`-HVbAig;>A)l-}QitoRbgr9*$uHxsqFwBrmc7&ho3nzn7n?dBN*VwLqE0 zyjz3^3_w;urAsl*%R*lSfuF)U@EKEieZvU~k_Kq)?&{!H$EqQxJ5F5-P%>eVuszLj zdpJn=m;Ed_=<1T|f>zsWZ0$kSO!A7>MtNQrPbY6I;Kr=}6_5y(wf3q8f0K)0D;;NV zJa7C)QD4y406rFEehLF=e{95foj1S8992I4wtN=|>O^&48ppohabvynLp*k8d#4XU z8rg2WACSP@vt$-Zfs+vB54h-hYQu=#l(wRc^qe=NIAJuhrT?Ebt*-OaE$x@SPNmWj zVbYtN9UnObHV)eGgjXKPr)1BH;D7P=Khlz$xBRm+UY|JM9eJfa z=7atKCeAx{4g3=EuJ%V)(nR#H%498fx(i_Vc4W7oR?aB-uoqWuf6_qzh( zaxTIKKJOJ=)rDr#EuH_6i_eacfsGGpvk%)^$N)HbIPkiqIY9HjgNs=&ddM(I`+~3| z_U?{Uy(!2`b43=hBuF!&%nRI2^8GHNdE}X4{1LBBDLvcwk1%eV_j6`{?fl-ykCpeg z>yCF2N%PQ{$8L~z%jIysVF>x|?J8#+^Z!*X>m2-($&;4Z3I2L98f9rz%;v28(H54o(_AGg-ZFwJo=c)b_X6sbv}OFiX^*~w+06TV zK02LLD#eV*SBI?J^Cm4>l2+_)ZBa~@F*zUS9EzItdYO82er{qu>Vkja>nW$Eu+Ter z`JV;|1T9v;C8+{kg{G&8Y!}q*`bds3Bg#2MhQ9lOZZlGU+FAi)Cfw3CrPu;Qnx(Bg z?3!Sft{3|@sL6fi4i#>x9(gHHI{CLgDtC-v3>R8CdrWi+!4tDoHiN}LN9tEKq+Lf6 zq#oh1_qgSr8=*&0U}HU{8T5->#m=o1ICv&@+?Jl$}6V`_czcHl(| z`1Nk`lttG2lotnC6X z5Z_n(Fu3G>*9a`0!+T^8;+4PsQZSZ`qtdyr-nb%1CRCow{$uOjveswN*QX=og#B86 z1><;ih-%74Zg7F+`>iyecGc9pAA-G7t&;>C1}vj|OpOps+4Kh7EumrBwwv({d-bkS z2#J8ANTQ9)H~rsX?)oy&?#{Xd+~ebY7hLBmMx#im{Z#V~B(xpTr8;xjJ59tK9Eq0x$$1(Ad6j%tv(8Y$qG|nP!ioDF<5$VIVtcPQlBIk;5)CK9QY)-? zLyT?)w_Y`knY=&yJ4%3_$OBhT>zdt&QB&TS$D6zkUP4#Sxp2x=_14>g9N7!0N$c{ggoFHCC!k#MnWS1_E%uT}~2Wi_$E zEAf!HTd}g_1=jS!BZFUWd?a=+_B_VXyd&tZ_Fo~}()hhm0wkT{``!pM2fmm} zF0)Iy7^r+k{iHQMbL=qz%L=?i>f;uAn{+dSJAFOJ{eQ=e9At-Ws*Gm5+T_qYJr<*& z8wSB$Pp2LAPGhgPf6+-`>RDK#_@1&=KpI|tH_+zh?Jpo;#hm=;jj{A`Yfxs;7jX}U zVE8G-9B^-Jn}3}-C5`56=F2{aoWP6%d+;E!+=7R)i#WyP;fmj7*TbRZ?#T>+dwdKS z<9^}ePk^rkI%30|3KspL1Ydlw&cd6(a!iQ%UeW8F4ROOe{lDvZwJqqp6<&U@b1)cd zz7x)>HJt=w`IH^LrPuPPn%~a{(|Ve{kM0Mu0?X%j;ukYs*B>W;^B6)I_=QhTcrAoI zlbH+&bWjdMkmtLLf<}KGLuIa4Quvy3Z_R#CxyW?$rJ8Z$LgmLa6qz*l^y&a2 zdF9x^$&*o?_`QVdbDvN0IZz_6;2<)_#$-jq(C{r}yPFn6=K zBWhr$jfFHMER;k~Ges*_1TXG<^4@24Nm&if65aRS@|yR{9uTYR#K`ra$Z`ny$En1` z%t*Om9+fmle1TKNtz8>t;cMZ+gga$IbTuZo|)hfA74V z;o;a)*07Oa9c44b)(&T3i{hX`iyu6AEbLdPPFkSYI2j+aaqex*f2zId|8Q$_Kokts zT8v!(s)l>=RF3nT2Biby7oUU~zSDsvA>NNZ0bLla3Q{ea7;lhx~YS} z=xtVdnm}9L@bXRNgESr@?YK&s1nIn7s3XgE$iK?(wt6}2Nt1YpQBLq6!OiKH#jKm5 zlQtg?c7;ABt*p7ELWOG=rqXZ_V`#h$W-7%q<6tgn6#WBgEqBZhe)eYck?Fg8SSx{abe$LR03C0L=K6;98dE{quJ_?*OK1qW|0RUA8C| z!V`KBYdln2#(O?d>YVN;QF=n50_x(jvhLYK)ndpfJlsO*cO4B?bIswyPVIq!_aLr0 zf;cTDnNi5vf!(Stg!o)MxC@^29Q0pTKg`!gODfwJj@H)T=^Ymx{zj5Pw+~?HuUK}x zPKf*1&doP7TsUpM7tm*5D#Bi$J%RA5@@bUdT;_Ozw|xXp7B?}HXIIeTEK_YsU3pQc zrM7gy+-c63Mq8su$mqRuBRt`#&B2f)ahuV8yASz^3nt!xA>kCz0@G9!|a)V}N4wbPWc}-TQKd zZPsp@^|#Q$i{IP60;jyg2Rx}Qc;MtQ%9PnNy(XdW62--Z&RG5f&*eyt?O@xD`)NU_ zzK)~Me|VBc6Ulfi!=Mg>Qi>TCC7P8f%B@`Rw)_S`HXm*f=vjj9xjIcQj?4-;Kg+7$ z$x}PnZI;3ug|7o-9m|$ij|0pBCrviPo$-W8%ApO(a6;W{wG}%|lrxJ1b+7}U(;4(O z&ZX%fJ&aH5LD?%p?0l~oXhZ+nlTE|;;)Z6#J^GLwfue>DKXj)IOf~niERa5Yi*wsXh!y{mLr~ zqv5iUJSmAVNj(xwHqbKbf#Ic-cALUZ`a`B{p~t?p$9s6VqyB3l-Rk?(eto2(H9Hk)=fMitI(E7euM8_NPW zMu+oC##6G!Bfnqe!<+z>2>JnQ+_!I*xC*1M8|?yjjjFPp$dQeiW|)cbB$~FtCBK~6 z?fOOKc=XeAban)ZZx0v#RGwP<$M`FHpbh=K(*ZCv=GpI!CY{@3CrH^USE)spMH$2a zD@bB%>e}DY)Zewb&S1qXR|GrsTX^Nmeb7Hb$lrP^Ld80>ro$UMsuy4N{lsB$aK$92 z{nkymM=-xSAQAn<`Vt#If2QwofFNu*5lgjl?!D9&SzK~=o$MN|HzMG2#gX3oYcof% z(rjA#<`tdQ&4}yte3H`6bXgvsagN=LLwBkZw&?)jXM@9f+xp4vpN>woNl|QO^KGNM z>cNN1C({b7j|DoA5f;g8<2rQ7)lI{7I5V+%^Ce72nD<9g+?k1kO-j8DAn~&Nmka&q zCxS3mxQ{j}Z1jChvi+{jGkE1PP$(+RFF*k{XpU7+reizdR_X^gw9M{!i0mM>5a?U> zxQQzO^;p7|AU*AbbD7hgn_IJ(Gi(&I`&D16AXYTtte^b-}U9yUYg z4Ec*EyY$ES1^G0#DvDgTk3?+YD93)@`T17 zuejl_!6ALXAI`*uB%oFOp*yt&n|OuM<(U(3HvO7S z@W(fcML?H$8Als6G&zxi(DkrPgC}9~cLtrVLVw z-20&ef61_NrFh}RK5m!e&#>>G_ZX{IZNKfvTHQH2=<{&95_^~{#`ZwIzi8H-%bPk) z3yAL~H{r%{r=~E`kJ;3M$k>Lhp^8l%>Er{-Auh_OV{4?zS5+B}<-m)b;>6IO*6$4& zX#=+~$U}tBwZnfn#P<3s^c61b+H|BtpKJ9q$s#xr{m_lBrd?icMjn?x{*~GmWu9Vb z#8`)4GMM}Xp*O%!&RF>0blok=(13ORoyb0$;?wq{U5;ROmZS=WK@~UoqLb1tf1nxA{%_W!rt9wuV=Kc?7kCzMS{}1KlG>7S86DGosskX&U^Y;K2q*! zAik#m_*uOO=mNv1S6DjmD8-bDPiq&HWP>-;^U(Q)-`x%gg}11L=WP6e5#M5*dP~iw zWnI!ntBPv5igm<{TLtD;KNZG#&nzuX`fW zP_D>mGS<3NSA_m8bF{Vg207_4n;sV0;Ks-5gut6Z^(VM^5a)@iBb3)t5dpHCgP@2y`qU(ITrL7RHJQRf;(|X|*dn)aX~$ zBr}rA|$dAMu=`{&7Z4^C?e=E9~*N zm|J*{Dx8LkC)0$zn=)B4bXVU)3M0NfmSL%oR2A3_bJ4=;zfSrGPq_5Nd;Grvh2JP- zcc_WTtl6IAVWW|y*MDC@V8S1HaG6x~&42r?)f@r)7_k8D1*pUuze1zE6M8SlxxB!< z44=6c$hB%{_xFDy0D4hFX6k=&bxS$La;9LOKmRoGL!{UN)qzEAuS^6o8Zwv;dTE=+ z#s7z^8+cF~(oID0wAMhkl`mV?EVfvb@`d*P0VknGfHu;3i1F2Qu70iD4e>Wb>1;m2 zxEm2!^KfwQj#58T;cI(bkWAyx`<`v%1?O{lWm4ULfl;LFLW+2v{?o`C1ZBGVt%}c4KdKKwPAvfASa!zIYVIgq^O$88);?lvKPPDiFTD+Yl*O)!zQ^a}B?eA8_6 zN;8X%o6*pvohNXS+O;uR*{~C-49&JYuR_a5ITY_;alr~T!-SSeuT3c+|9PA;$MeO_ zl}KqeI)KaGFiAl6Z$Y>1A>(v;aDoC6-~1szq4xT(T{a~mM=|GCnjCO6TP*bQ!b>^b z3_&`!fk4jUn-RZgs=w5xI_?Ui)}2mn2RulHw7NBXbr5rqN8 zucf7WJ4ygodcLvgFxa%I<3p(BhF79Q3DSU=PuRKl%1oPMMs|Dk$6n<=RM|B}Gt z%fA$()ul@FMQ!0q&ujUsyZ%(&mViC3@F5}`ilsj!3Fz&K3EAQ10U_4haN_&^I)M38 zdBM>e0PBaS5bKTJqi=uMmvrDi@0>4YaWNHMe%Jg&;}V-nr>d~-9#&ZWg#VolnAGsq zkv8)ZJDY^3!=Ik5?Nf!jodmFvF`#LH%D$=FJ^ae*GwYV?8-GmQ)S~kUCTY|I{eIW4 zIzLa<2BZWS>u|H)+DUFu!>mv;o!Qymu|p`~4BD5VLTFt5&}4cdSBMC$TtB>46=b9)LXi7mwW{>vX(7zUK(MR3NyYjAcqbrwLSr{NR(XyJ za94jfQhmXNm<%VNY`glOxM?VL;a_3nFY5YN0CjGCzYEy!$qbW7GJ1cv)YG8XV!|H? z%0E2Z!)|~pXX%F>5pHKn@i9bTSrEbAj9%?mMEm?bdLD{QYh`^iByM`QTi=~yP(p%Uz11%l-3x*{dOr-0rA=2}OoaEQ0T@Hc3E1 z5H#{>#HXCZu4T&^M6_yz>Z&b~mU~kEaq~rYHJ-X5BL?O~tme<8us&)5933iASM-AI zy@Dp!PfgNV{nEGo zKa{<9R8x7|w!ISqB-GHGK6#k_pWcPS@XB->||g2{2kYEstKqFK5d<*o}Rl%g%7T~ zM*Q=KbmUj&^>CY|%)(A*r(#TmiRHu=_jOfTh4yemmK$doFK~h0kn=2H=_rsJQ3t6D z$Op0y-A<5aQ8BOUcQL7GfM3C-8N~()3KzN^aJ16{>n_#kfMP}1<*#}oK>K(){!VPC zKc*!@K-LXBKOsfHfYWSf!QuAS46IwI|L0`P?+yySjGm79D3g!BJNgPeOvTScoc0ED z#qT^gJi$65@q3|__on`R>>algumeo-uU1Dd4rv}jv!1f+1gwt|R`ra`xBmV*&<@qX z3S4kt(9s2_!F;fRkJUGFyoSfGN?a{@mk@$TtyW~J%(!z2c z`KAMti4V7rQ5)?85Ndid;C4FB!%}KltMjkE9`GFO<)1y|EiCw3)$$7jdbmDhH!U1M zu&!9PCEovNs(6YYo9NE!CrujX7=uHUd`PD@AC6gcmM<2aY zJtlqBHq1sHeQ7w*8zW4@#EGR6R{9|Wkl6PrDO8+7Hwi@C_orZwA1+&0EzGnw-O2r{ zapD!6nJ9_1V3NU0Irp(>QXw1REv601Foo`K6RVuhYu?Avd9&B9g%ZHi6N`E6+tZ@y zi?1Y3eR;}QyCl!)^Y;KiduBp@Ib2JT^x)z-^FoBoz8gH2;(qsc&aN^W@{>I+{U_hh zS|ymR!T-o{vmgIdWY;07=rSpYaY(o5n~78O#L!Gk0bMyO>a=Kc@6#uP8du_Pp9{tP z&vg=)N-xRg&j6ZBH={+vCagP#f=8Ngd~(du7rpxS+9Wm`FX~YZ$fg8He+?3%XrYRr zzga_Vy4oH=kAQ!Jf?MXu>t>hd*VOUSnq4PW@@=vv zn9tF*a2Dhp;OS3sf94mcfO7XZcty!LWVc4O%eIE^nGnEY_Q# zZ>pXFsJ>!aY}af5H$5B>ZaQm;F1BQ-q$H_kQO9&3- zO|@-&5{xxkizRFIcgieMgb+)AO89sz;Gs}{kGaBvpO*7~HDb{WC^ue+JH$!F99Oqg z1NVMBhr!QQ4REa8%M(<%k7J`Qk!dY_G9zXVl5C7bv8L!4tZ*S%P65w>NLdeJqCYqH zcm6$7ZoDCzdKha83Iht6FdlpRk+FNNa+LcjuT8S|dMdu&RLkt5vea%}-IxpvV{umq z`Qu_-0NuW&hBVv2!BRIfdU_(=C&rnx+zI|e0H&>4)0lWvr8v#V(p@HkeHt|TelX^q!iDT?Q@ zg)$q!@dpdn{-Tf1{(6bMK>+5fmUPkiuJR*wtstty^!;x=L~9y2(xZ^d_aiqR)maux zGB`z|LlhwQQJ08^{n$zjc|*0?zG}|>=0=hUH9>I^=YperKx{<6tj58nEIvC|_%MuY@KST4g6=K(W8pMtWaJj#%_B^o*EcbDbqUm` zD$WP+^xyiSoKxW*=5u*;j~fsk1l>iF3YH5=6hTsp72PGlk;HnFBLcAg{=R~MrLVJ` z=}~L(PKo+ccntue0CMQMiqOq(Bt&u}#AnsA+W=NtPIao=Gn7-=(%M(C^U4B3@4CF(C$U z9#4B8hX-;Prl5|S*fZXgd$N4kH7l|87d$c-DL7ICq1-!Vb|tzId8Z0qnsvSy=%f&o zNkk;6?5Y`EqBkJu#GtwdjzsS&)hP%4=oGNA5`^0fTL}AL3i#l0jV7@Y=aTK$=L<#V^TJP9N`CE{&i2}c}U@r_fp6Tc!RQ3{BggpWc<2dm|jl#$~%G=Of z139^>B)ge(6ly|wC8n$CW^vMSPG%mG$Ru_&+KJg6n~LtG(>ppm7JCANwKPj9IW%Wu z3#0{o$+08di7ksqqU-w?NqfWqSa$SB>GZ1tJ2<|$ z-tVxZqH@`-Fz_JlftR)bG(y|%FcYM1_NX#-{-9e6yiFJ9VGWZ|1I53)o~xrK4p!Rx za52bSJBofx|Fn0^>DWA-3f%GeqvX`KhU(Bd>OTWmNw=uUnklGx9s8o;D&s>!b_iA~1|u|BwD_c6bFx`#lgLxzV9b;e9!lNFW=# z{qDa$)c&7&`~M?~ZFC1KHH1a&->q&(gC%*uz^}}PEJ>ofL{L^(P9A%{lx0c2-SC(K zH2Ds?baGHTm(C!$7!g?h)3}#8n@Jg6F5^#oo`O-VAp?RPrY-3#jBR-~6GB>5F)17c z+cj1)Yr?6P3@DifKv{-N2W`ripvDdW*w;hnW;jm+ z@Z5l>ewks;5eIQM3K5XB9Wot95g&L)DdTFDcDuC4AzuCLQNc|$620>2mlr{lb*L;*Q@ch;Qi|*VMcV(jZ|O zZMdH0NKLF&8w{yXeDy$s&cx8?vP)O7g5?kIhV9J8-=+?v-lkOjd93^Zrw!y@=JE^v z$ODJz6WhnJ*CM#YQ^FQ2={=0U8fO_(Q^U*Ks=X+jpepr%>GS*$m#5JI?>t1pWMfo}fX)??v|L*w-FH_G#x0Jy^<; zK4^+Dii9{2+81Yt5{|AeJ3!jn*$*(&yXSj9FE~>{yc)m1?`PXQj<`0aoe@K2E zh%}&ZUfbO}WdKQQni`gts{Tx8n`pHF5fB7p0KPwDR}%C!EnP}Ii9b*(qTK3}Mf|Up zwkI{f_!}XK4U|BAd*N=Ex+&TBpmsa;f(lwG+jFZiTZ+o0VXu`gx76M3$VqNbU(M*Qz^1I}9i!C< ziIDT0G?TB|p2_!DB^!;dp2q;n)u`+8rM@a`o7y&_BnpdiVeiA0mHr~6NM+YO4o-Q zga0c|-Yc&Lfe!}jYrz{KH4-gRF&W})G%3?(5%v$9BIR!nx~Ax)qZH?l7F_LoKVL61 zh<&;5DkJ^`3~2%v8&WIOJ)QEWxZ0aP;fq4}U3m>=*WA_@6B`7XqH20#av;m|Mc`P7 z*!06xnEUA;AJ#kE{#jg2l9o>X`0mv#p;2mw1!9BfcWdF`@(WL&KZ^!g5Ap9}z%@tK zOSj+=NqeYAQb4%#+^(dyH7cCQ%DpDEg}46Hjdq{PdoGbZgGnH+yPokXu3tMIaHC|x z$TOI#%+fwv9*rtXzmuK{cTVrOLMF<~yYx2)+}S=tb|fCgfTJLeWS5ez+G3(A+#tnA|?oMr&CElLkN-*T-Zg6G2SNk=U zOE2g?5i#Gf)@f7Eid*S-wShRZWslPMrMQS_`$n^?mUC!i8Fvd)^!Wq4NEt-rWcXFT z1^+vzhNvkmskM41^+z-`posxmhQwFFnShSX5Dd?uORw>MdnC5>J>bYt51O1p=fCVo zOfjJu)+Ec=7)$#-=!@?;7}W(qP=x~aeg^)he07oJ(cEi|C!GJJ9N>!*?EYTLp(#2} ze;FUouM4~$@N(Q(1x&X4>W)}Bo9UgIf3$_!g=?85JttDDei(df))QN2wqpnk>0(h; z*es~TFv1m&V0#gfLnCc~(fuop_a9DhGRGLR)tRiFa^1*Lo?vjbnZq+PeM((oEb9Jh zC%q5PhQ=sb%IU{K!z>hu0nM-#!|n_SdOQPwr?;`Ei$MhxD82=sh2JfHUhnYN=^>e?Lr z;7G@H>Iml%>v1Z?7;t$k8s8URb}D^!X@MwF2Teh3Os&4TcNo%tQwVmfe-dIPG=iLo zKo~?W;lk{m!@aXur&!Bk20w`!L+FZp@% z?Bg;#+ovN);kT2%9`bB+p}@ z4r;+LqZ^ihGtB`^j*bmsnLK&=vKU+FB=>6<*Xcx!fPDsePR!hA9r@60`f+b#&naYH#jHYKATp{9IqhaB^nRf%%u-!8s7miTaar?N zHy@F)`Rg+W>xqTC&_j_TYb~=>4TG6G?Hjiu)pr2BGbxWGUIJlH6Z95@3NW>NTtjxp zi3}k*ZMh=pk5m7`hJ;0?92oZ24azcsA1jG{PL$YCzG6JU)$vrM>Ddl}`t#r-mcfwn zew#Sz9vWs|WA7PBv9CdMHUqc7Dpt05y?2i)XYRyX-`T@RDBbMa>=CS7KDkE3ZmTUX zZ@^cyYiZ(#bhGPMyUlvA*5VKs5pac=BnL5}Nop%QL9X54HsF3GfF&U%uVyl}jyvxx zM*d9KQ*gZpf?{+RhrNE_6aU@z`1I$jcH1xKf^E5vu$k>QJx(0tPfksCw_fg$E_X&g zqyTzH>Ie(?O`WhP`H6S?>mB$*DE4P61#cS$cQy30z94a*cD{K&q4s-AeWWLlQ@s@) z1sn*QPO6-EAb|OiZTN&!b)gHrY96N2Er)1s{>)Pfm}LDWJlPvEqSGB7ViG8laeZbd zxbR*|#G#j)zC^09tvacZsjH~D$|&y~(infQ2P#tW8ujFaLHcLx6C{GD5aYoB{o6UKMf2?S&7 z^jSI6B~F&x`6EqH>4Qe2W`~jB3l24yz==eEy!yG5I!vgEhF#b(FB&u07^T1c0qLTG z7^7%XlQ$_^Gh{;UWEAGsCdC5${hj!gQo6abK@C%FoRt7E0fF>w!>rQ{_^Z6uc$RWM zQyh4H5TmdYt<9+iq4bf{b{q6L(8Va2ZM!!$nQvKhiD5sY39BRX4DCgyEyfRzL6y0o zQ-%Dl-X5e9S)ab;KfYMWfVBYBds7AaIpG1*V=e)<@AliWQ-_=tPTFs#HD4Bqm96F3 zNMeDCvVK(8H1L=>owU6nL5At!o*!Ca2j7tnBMcagJlJrc_I75bv=|QV%PM(MDK|OE zKw)vihF9{)9;O0~ptVv=?MO88$2G$Fw<0NfoCy7+%}W^<|-m>591w`)d^klo#01^szZ z(r5&txEb?^VyRWbxNkE_Rd9GNGg0F6{N^ha7Nm=qc7+>&;t&BccIE~64b$)ruI|LG z%L!ekw0ES>SL;d3M4As*RQ;C?mqyqtCLwN%sqYMd>k5tJ-9t*?hAPL=o=`;c%*;zg zRLn{~cvZyQyugPq&7lcG_TY7i8asP%T)ZlcBIyk?5x`s3%8iVBDTz{m#cTOvD|m5k zt~;4s;%@+bI&Ju|ftlW8It1l>L%1YJt5mlhDPwb;HIo?25rMrdC`UegMw!Fi0;&7U z4H5TtrE*yF+j{oL!q{DQ ze>~Z2V#v;jkYN@4g{<6Q#n}_V=h0)?9v7e#lGOTR$GABp^Qzn}fdtP9ya~1Q1^FF9 zG52wJhdYO+LHdZV)xFCMEUW3k_YS!T<@i=`7}>}`^~VL($rG5LaxC%ayd#OlY1Cg` z+LuBXsX63|9D;vt^j+{v0+tnmqc(V*>O=U5m(8?T(IOR1>J5ercA~unu77DYzbDEB zhDGti9y#>F(fZKF0BFX`v*BMzu&Kf()xi%G{z3WOkxR(<*Nc%$Jk9SL(KyFw=_MP1 z4AEFq%bjn2G=>GrF?FzX3h45kRR=6)56tg@`3#!m#O7-ojr@Ub&(7y(W5AcLXh0O= z$rOF?^TSZvo7>+5c*OWl8t2Qhc)b5f1?y3^=-mTUW%id|Oaz|g;pxDwHhtF}(3We_ zD+a!7;TEp!$AiZfuot>%Q!OOj?j{TB4>L*C$_Pm%#H`D|Ub+PLvP@0U>&j#yShR(O z1V0co`0cIe=L?L1$hD8zoV3Iv45fuC+-@Kdh_a*Is;q^P#Z96b`dvDyUfz%Fgl^{X*!Z zB5oe{Crtbky;tyQI}eW-(Y0NY+gmtZHM+)fQ&DWfj`t3{xHm2c4cVZZL(CrkU}pEPXcC2ivOJ z<3aRAN>s#B`7Df}Mkr3-bLE=foSV}&`HEZYA^+o*6sXxtI>D<`R`TSf&}`87IdCkC zBsYYhwH2CP8?DW_*!wj`r(HIJz#89B>HX2P#INy%gxRBkzU`*3@0P_X{-;ma{_`1y9~w`eAFop4D5qTR8rC-YRaVphp6I7d{`~{`zh!Y zO%Za-@W}|6wkL%IB`cTm9zoiMec4gd z38{hWTufqN|Muse(fkA8v;S9*;cZVVsj`oPPz&jY-=Z%a`Dq#j^>Kf|`b{4=ZKWr0 z6cBuR+M{-YI0uOWd?y8<`fH7uw3h5YaLb-P_j@{SKn61cE+Z`DMUKN#xy6kdP+KDy>D$WQp$Qb zGM_sQ-t36^P#!<}xvY(M?*l(N5$GrRjDMJEl>V-AK%jVb(V!dlMx_ z4o?sf;2}pg$DcEf-HYHEhq?_X?2!AV{MFY(By)Lz{QuES@s+4wNO5Rast>?fS#gvxQ}$?V*0t9 zcs2*$P)8vdQ0Tg>vVEDF#Pb;Ftd8r7K44c~MfKizsTfyuR3(3P*or>{pP77M(sb|u zvj|UTeT;cRHTT&fag1G!)VX!%y(O%=z5EQk4j7KPNtN^(bb!NxosXMtdm%?D+cR|_ zKe|mSp6fG_r`pncIjV^B^5X`JUJpcsdUaJKC-UT`904rN{`=s9?>JB9xMeJZ2!E6E z6)ROC@JabC0^En;N899at3o{DQ;jfyaK?(8G?0n6v^-L}vctLowq`Gfy||c{YorG< zF2YYa@d3Ia3VDbfw?}(~3pDl#OTkW*$UYy-t<|+&`f$X*j;TPY_ui8~Cl=MLjR=7# zhXvPTI@mZg3!y&ch1A-edg4hY(Dldwdf^zuobcwkwKt^4erUbsNxnnDw$di>%i}@? zX6o7a3lc@MUgJV%x7{q+7|0TYv&?w-R%LHw@0akN3rJ-gHjQ6|ivg%o)7Xz^w>l}1 zze@s6r?sAZxF`~QqwTXCa-H(*or9Jv3$t$bHHM!yHi5T#L>U07OSbz?Pem(^9aszpE=qXx__emLk^-Zf z>3#6+FJ@$oqu*GjZQk-1bVjL8HEb=nX1OUDfbG~_Cw|pqOLqmhK@Z6sC~w^2j@*6H zO`Xu1`L;y;d0?Mlo@-2Uc1spkyd5i3CGv5?0k%Q+Wt8s8{)X))+W%(DA|NNUrMOx0 z3a<8E&0AA?-U<}Oxt_MI#~yX)zR_0G*;L-OW|LV8w6^^xdo~^j z(6E-Ne^V{hdto1V*A*i~p=}mTDCyT~)@a#&YEKXt$WPS+Cn6E1DOq<^B>k!JO)+F( zx~0u(_W3v)Y=6){ny>R2@{|%x>D-hvkT3>Tv-rhpU7uc4n;&?2w^%E!W7Q0MjL-pd+(cOmSFCL{93C(g?5`rQnN@b@dFhgM#uv_7QDjzU=G zsy4_>?B3jJVD5Qsa^^ok6{!fUYywvIayjsy{|GkUAwM@{P9tDgZeicbb~&bxe3Ub6 zcS3Wd?gPVj2z{``BDG`K=9!29)GNJp^D|cL!8Z#f?@g%~(Odh8Pl`5yg^3;YMLkPd zBO#X3A`0=$`sWEws?2N|;|V$(AC#2p;fdTHg2~wyZLWVc1@wA3Bm#ew6Yz>>)$+$5 zF~z?RIp`H?c&IFZPHfy4u`>#wy$*Gu>lgESet3UUkDnpaeTA^X3mY6%vp(RZWu8~C z$HSe=KTLzji~oB<12fteD)v>tT9I?S{YM@bfJFC5W+#IPd5KK!pUq9x(H(Xb@JCZ{ zFWdwF?q-;AEICM#i3DHUUEFnX`y@Qoc(Rp?Vd4Cst-tCq{;;7zb#0hYOyKKH+zB^E zyf;Mcf^Ru<#*OKvW;h%NONiMgHKk~F?Cd8DN$lx%%8+)W{yqe0eM1>0UlB3R!4fh7 zJknad8^q6(VBr*EzKh*RTvK6CF7Us*!^<)3VLKrE6tluC_e$;_8rYm#6KYgGljFh@}Ghb zfUpNgfmcU|yzg*QlM4HYdp0qzfqAR`wh7qTr!%$snFSi44aCzK(c@YGpSrHyI)ooL zmh)u(ttO&Mx2$5bt8banzD~k~WGZ%8HBanf!OShwz{`u}(Qa3zIGE0<3s_M`C>&oU z!YL|pR`bi@L1cX>us;FC>gze#fmYG2oNF~$!IbEOD;~@p-qS&UnywAt?;Apsq&NfZ zcK=jeuk2q#W+SsHAOJ1d9PNZ0kQZ$F5qXy=B#dHsA#)BZ^>lHI^O3}EK+*3|a{#;n zc=n>af6a@IZ*|*l?*`?CY~yZOFUJ1NNhd3CigF@U5~wKJp5_VcQAW^-de2jT5V1_+ zAH6@@RLl{RN@~0CHrK#PtU46un#a0odn*Net@CgeGD18bU$qVSV6%dmyZHs26ve{0;V_^i>BBe>c3q$Z`d) zU`yj&s##zkfNgM9_hiH}LiCBRSj~x!pH#5h+I^8}n(BjKGK1BL+=$(grVdK!`q)Pc z^;I{@$#zOZuPN}LM9;^&{6evIR>5`<$1$nKETu2@)KHpl3TFX;vQeq zo>QBn74*>%7^vFav*P-jfY-dn;;f2X-mzgHYS0|DyDk(6+~&bipKaS1lJ44TmLn2Qp%c@S1Do|NqUdstRN%$AodC-;pM=D; zre;eFvi4vj`q!$aR--7%i8ElL#w+e8*^i#IqC~Zf?xb^)pY)*>@d>-K&N2l1ue6O@@$QRJZ*YUPRA2CK-i-%*9vrIiuPal; z8384dELGtI)_y4xA7B8Eh|Lq9w=A}v=(PB`RlYdEN#wT4t->av;SE>lA^bh@a;Z`q zr%5OJ4LSrNlkiP9)=cKtnZB z*f?~YLu**nN+q7r`sCw;{U}$!s(7GA;J(T|Y8#?b?ena9D}5u33_Ew)fvWb4brI-y zZ{0ohi*>oC_T}nRD@8tV!VxuE4;nogs=Uzsx>>jrQkt&h8s`wAUih<7bvt&ieQ)(3 zLohA?Mdwy0w^zC=v8uCf9Nbw5!!~+c;oLMV+p<%QJnSf|MepWZn6H#6TUqMvwV6L zO>IkeUidr_jPhDzIJDC>4vr_iROu%}BVtV9SCHBCCRWYba8A}*N z)pgZSd+Sz)aVl78K{u#huE~Jo(yRRK+Lp(>MUo)~0Q|<(QBe~j%ydb5ZkFEgNby0Z ztzP8vWU2f>6s#{s@2o$bvS5#I1C%S>p^M*NDNsTzhnkbZGV4QHZrgN-aP<`(TwfsJ5%-j%j|t!5uXyw2 z5X9n5JBYtjIXT!ff(K!Fcqa1g>}0Ur+VW0&B3E=<^3fR#dzh=@2J*vB5SGa^?FnHs zqUBCiDwVB6`R0+JQ{1)Ihjvi@R3C0_ts20^S4B+8yh1kWJ#ft=J7<*z1#97^+f3ey zY2h*)_u)ez+inn{uBIJdKq+Qz+W6PC91(UbBNg%H#A|Gt%c=L{P z1sy&0oqPBTHz@Hp9?EY0Z*2+^VjquPU||5Hp9pCud}O z?N$`CCr5szj57yZ&)zeOK_xV7tFc&a`Uz!cuS z{UE>{Ze<5m_$DY1s8K6Bch2k3tqXHtzY5?P?gE2nUGiFk^2GJ3^{IRG3&J-)`V*L7 zNGgAQB}i}fOXi`-UOOZhPIRgGECqj8nd5kwt5Sfo3u}mM==kv zc?sRNS%-CDAr5Yh2UjevTyYSns z3DJWAON)Db*!xgM7gz6w?Db*mjsum6%UQ^Q7jq*U28}vd>DQR#U3WemfgaU}V<1D# z!fXu|fOCGC1h=0rEY%oX=j!oyGM_YvP|KOTd*A^te~;Qfc0kLZ63jBNGzTb!a#+sP zgRlT2w;IPn2qNfJ)QH*Tmi58~y-fle!TsI0-EpuPJ1Ix89_`Z35^rQFo0vwWP)Wj8 z|I!RXc>g3e^<|x^RYtDkBTqi0ie2fMIxJ60e+f35<=>@G)rXc{iba>jQJ@b&9OiT! zicsH_;xS**GF?x$$PG?rnm`Se0zb-mLikJW*ZAgt^qAkTy7Y=pQ~UWQtzr^pJTkD84M0EMJ=`Vcv%>S#9yc-DqV!SeEVHDPw78d?Wr{;}bM z`kmo`DegX6ihIcoGG3|U!o$~~F1y!#c4vn$$$AwL0MVOezbh^p?EOfYErjmasrTmB zb9hEKV;de8R5^W*^sY6pIZwIqZwUQg2>OTT3yhV`^G*IeS#&IW@|3-r?2UidWS{;| zO|~_A^y$|gBQ_6vSriTLa%7zNg8n4Sl>mAP|6&g&IGA}S)6>wI#&@Gm3U@m|b&5Hd z;*zb~>|;B3N{$@;VvUUh+s{ltBL(riUlOd@qSq4Uy?5;pmXTXKcf#odOv_Y#!Mbci z?a|CsO{pEw8}Zm~zj;4(LdNx9o14Jf-zgC-%Pk{Ve^I%uzauN$L}xp>nm*DP{a_Kk z^p_afbgL_Xu4F&QvB{Egwean|#YAXz{5%sImg6@_Jxes1 zgZFMxNe%&y;61GW4t7%3a50jTlhBEy{Ko2u;7AJj6O|}awBd#g4$!%w(aCFe;9jDO zp8fqDH<9S`QUL&Lc()ngGm^Yj*q2(65vTl>@5zKv6FLoIdTA*e4_A)6;tn>TrPF1o z!BTU%j4eZq8a&|}J^#Z(qP!d33Fj{^Lx(Lt{wuOgfGZv0gMRAH=kR)4moB4iYq7XV zZQQS`!WdDGubaYwqJ4tH(b!KNJYUe zMH`3eV#)MpV-F}oBtDC*KYH8x{)i(Md9_S@^}e*P%f`Z#VK8p-@2Qh^5t#l2E+q$v zbee=gDn%JcuY0q~ond-;viIFwg=0$Qk_F z29;%YE7pdqd{W-opH}3jT>0r8M`=piB8;`K4CIsSO_nb;t77Po0kl|ZS`XcF8Y z&r*u&i>H!c>qVCtB&k$i6|_Z!ccTdC%F33^zk}Z)M%fD&^_GawK`oX;dtC(5`+d0` zP9^6y%IzNLm1+vwSzb{Wg}L}k0^?NIG6EFiTu10bv zz?o~R2g_U3JS6Tie5#q}7Cl*@a))%=lR!giy0h0UBkC^82nMu~T-2L%syA@4T%@}T z0daGT-!r;hS#h8L3Duwz+PF(ytl8RUWnohcfP*@V=}j4I=C~G?f9GI-=FHU>V4d z^$=(rCg7G`X8=L6Ti~Ia@j@usB<17Ujd)!kqFbiimikPn3u4MeWit!zJ9E#l^Nxq> zxcs5BfawddMQ_4}H6!ZgPPl80|0Dia{t=&K#AW@1(__qUZ37Tg{m_XFlbSw}0xqxo z1IO`fY+(m3SU+Lg-rr}I%1E5N2sQ{UAJt6nABsjtodmy_mh|ktlpkjl1{V z=V7nO!00i#?pQDV4sC&eh?|=?XzYwnOiKcD(<;B*R%O|qe zwl}t&5K(t=c|ma23AsMN`l8p15Y(~j;&%Lh%~tJdMcR<~SepwTTyhZ!@Lt2E-wD(+ z$n59{>J<}(?7P>I7s=rtT3xv@$@Ow)jh^^|C@lLn`;G{wv&ON_vFfRCO8^z{dK?GtlJ11{d3M$KBUsA?ht(VLrI>-r>Sae1BVqGtW zq%U|DSB9DlVAha2pL}}j3xF(iCJ~LYFROV?Wxvzv+`Q!b%=cr}R$W}nU{h3{B{_bhQr$mF_TXWLl;^?Yq;-j!C*$^)Z=~$x zMj*ri;|8bO*wm}2v8ZmAdIOJ6`PKCu*yn-pZ}DR5>jsP%8`4o}$9{Efy7Lr?)+Cz` zQ7RyAgC1{sv=6v_k%0-7ac~jrrDOJX+rhlbZOGRCS-%M1QW*r{5d3G&8VKiEli(D? z$xDj|<|jDX0*~nAE{)&28b0x?dU~EnJ@hV@Ui^)M9x4vKiX=(D!6&>ZNt7K-nIwmWMiE#n>g^Do_4HAn*DK7vP*A6c zmD9)NwSuQh2JlR>OxaCNx7SJU=|wn`KJeP-<3||+@CO;OH+jUez%9yD-oV#OH>eB) z!#8>MuYI>h!{ZqPdsBnIJ0PZFN(~>L-i_#`f}ld6S8i_Wv$&D#cB8wOQ|49=O$WoUam|H9j;MP4!Q zD(!{5J;FiwPxSVi{OHb{h$C_a7vxsTKF`z{GIQPp*^e3FhB8++SX9ZK{YmLh>l3=P zMEmc;JD4pYO7ojbGL7n|+;CndmusUAd#*k(DQ+P835t$l*q`3jBi0#@GoeMH(%}5tPE2f%mzclZi-;fK)WH z0BV2nVwdkx{qUwXN%-uW&b5{;_VPj!w}|!xfVOd&DpN`G^v)DvFY5e@ z8TQ^IE@bCJ#9N36fmsb|)t-Oxl@Kdqs{(;&?Gs&Y59Qq+v@e8dJ4Wc+$vXG0P&f?B zvUeal@BveSIegrIyd{xM#whWq{4kM|S-F&NNVo1y{c%^SF2{n|kY{7SA%9B)g&q3p zqkZPO_s*k(S>i9*rwrQ9P!`Z(>}PR>|} zJ`}}^F6Md|`Z;3+r0XqAKe;I)i9C*$gu&l^$nLg+Dd#hApj>gbsC{)5)(sU*Fm|$Q zE%{qka@`ArJZMP$O^dUBWYa%+W@D}-_~D~|=XJjb4<}1Az{>wXF{Ro;?@MDhnAd|8 zKnYR_58KGscS?+0F7mBMgk1Rpc1YwCer>2W_b#>%V*lFZt;S16)h0X)YylE3SnF-S zA!}5ewSD1Fwu(7P+!1&leRuGbpF#J|-m3vrDoiz)VBp5%Iceg*1LZC6Z;jJ*#be{Y z4c!Y_G+a+3^`a6gP&|!_stxT6fC~EY*gbam=TuJ0_(CsFq^nap2mI zih2XwsBFZL(7iZ@E%pl?N5wJLd=E|~e4^4Y`#l>c@Zoo^cfIU^)6XvgiUz}tCflUc zU^pY|!w`#E%lWTy(^)*YYnW(LOnWi_Cie1RIdY4AC zY71%>CkU8lq&EM}**~5||0gwZI}Y3=EVn5XUUrgM3i4LMp@rq$5pwE~Cy06@LF^v5 zvD+H>ykj7hFjb?J#8*3}@ zJ*hdUFZmx5{2gGVMGY1?7pJV?PVfhr`@$^V3SZQX1249l#B^7w=!b;Oi5>q(z7p>{ z_$M;%mqIOcI0X?*7U{LrrgLf;%y<;m6KFfvdMsh>BjGc=nkfG|Y6xqFq{p6zEXHYY zVkG44vJ`xBn-1Ya+;jKSJLN=A#7jGgoi+@V8+kqNuF4$uEAoodr~T@I?@i#EA~+=b zOeN?7!<3gBYZGi+yYza@d+<3o+1dN}1f#zLuTyP9+x2r}K?De2)1!?(k2Xamb)qd< z*G+}vPA`?JCY~?n%no>;X8ruRd*b!5n}upW^EsJipAUN7vX4`1?pbWpq{-i4@gCQ{^x=^(D^4cin_ZkQ&#R&{6&J)fjGe#oTVcB zz~cdnWg)VD*uFdoFXtwa!7-67-&$XidjSmVr4@N_4T<)*%me8s7M4gu&Xl?=P)PzR zdN&hd`eq8Ol(ccBGUA zg!L=`G4<0)pMc<(wk$3qIIQ4~AMvcYKJih9>)F{fo}LBd6YU*kTC&4{Ja?W(QD=qU zLB|^SnZEiR0p;?t8DlfC@N4U{;S-83fc)*`NsmqHqQ2{QW_P!%^jOekqUyU=1C3a@ z{ljrB6kRB1k8PRf|;#G-Q6ebLj6VsgV@42YLP)m)Kc)3@ML zuEfFq&Yf4_{bZKNOkHJa^mu)XrF4LR&^!+$Cw2R()WwNn&aYs|wws$Z2HULW^v9UU zY-~TWTRh+gp#lqx%2oS}_3+ah!1wVf{;U3hZ2r`iCTxegWe()TefG0LeINe9lt7c= zS*{p<&Q_m^>+X(?j1hz_29~BLB;Zs}5=%$bF|N2pK+IU#=+Vv5dL_zmG|}Qloh~)B zL9Q<{iegMk`F*BF)8F0tLl_k^iPFJCI9Xyqi3#fZTOn6`$NhlQ^l2oP2g=Lrsx(i1<2`n^R-OO|)9dsPY6zTJ_y zM8{W%e@Tbqiq7I?P%(b(-^IYXo!lONp9+3y@edfIC!P~!gpaxMXf&>7&wAs z@-BD~Iie<2B2acm#851F*?-x!!Qa1ETq%n{a($`)sy$(8$nvG+WjfwG&gx>n8pC7SHc&C6 zVABZH!w?{D(|N}l&qGwz-gU(t^?-GQNUzg% zMYMH!daxL#5{nsyS2W6=%&E(@WrAsYs(a1W75*Hi;w~=!O#YXL;=`Y`=og3)IaVQb z7v7~6P6e$axjycBR!sPhU`YG`=*y%Lyw(BvLL2e>K)C=Y8@Y%B#g70{mdy-nUjJy? z^lB5q2Z|>PV5`I-U4>o(t|OR+{Y{;fDP(+sLS_4WKamUvPC{=#s@0k;VHq-g8?(ZY ze9Z9-rXunzg1RRci9-`QBfcl53V32WSNo^7{Gcb$w8|Owr|YM&zn3C`Oo7F%d;hJQ zll~L*=uA;|*q}x+Rw|GY+mYvuA4n$WL_S9lCg)(nDH>6LOs!a7v+?4G5&y;$vaqs% zOLc%1*gA9hM$)WW^AM)Yk zH>wut<(&iH4PTRJlba(!|0|lu^RLHR6bSPvnp`9;I~twP{iabi-DBc1y@PBvGfUmQ^p7uKHJQ>%TB9%SwH?`e{-GyWC!68GBNx~&}#%rW! z-sx5ID~s?m!D6QH_rv6Txk?ddRJX%zeTa^jm(|(VIuQ8r%Wa7^Zc{lFA)Y`irb|LoD=}IIZ=74>z zdEfZ9M%k3DvVN`yUy-&2#98oRPop%2#$;gG6iU3}_?iu6o4TrZWd%`}q36Tf`pu7l zR=Ryxjhx5qBguZ&qAGjjZn(og$c$&S6!?;3g{%zQ-{kI{0x#k9DQ&~R|CH6(|CVPX ztGWr0*b)`yM&N-YF9!A_-Bq2F%#0OvLi2tN02c})4?mptfR3Fik-|HiTY@059Bh32 zl5)30MBkW;6yY-OqqbrT$^Ogw-WoAi4@C?1fY?g!vk`R3(^1R zMK)Yvg(Uf$G7@Y2Xw$JG&Y^d)Uo{!Rc|8r}c2lAiqpPOXdamvAn@FIiknuO{ifTbt z!!qk|E88~;lzlyRVAkzk+}Uk+_bf!tGap4Q%+jz$orr%{$oZR(eDRdK++Z75@juvg znxOO-(Sy-)_YaM8GmD~o47ysJ(DF$7{FP1p9~B&sXknseztoD@W9qlN_Qh)5mVWj% z;*udY6J^D6^uZMZV+6pnK3%4v(#qxJebSI^r0y!X{4xvPUQ#;~5j<_kc%>2r+fmD1 zNUtgrgBjKvZ_mncJL)5aKBs$_3K0lUkpYzMs|V(___!*HZFx|2eVF?PovwT+U5+9p zng}OA%2^tgAFjkH6TyNT&{l$oIDcS$olQN7(_gp<6mVDnnHe)dE4xJuh;1xe;$xn! zZHK=ZdYqz0Tg~K_ZIYXBrT%dLc|g?8Nch^nlVWJY?-zX#*@(cW@+$+(j@j)ux+&C~ zwP+b8Ttes%eUgFmp|rPLuF6v}=Pykpo(p|5{?5LXxbJmLS#}WQ_Hc`+g4s1Xz3rW+ znE~5SeUghPJa1IM_F&}pF3~pT&S4XA_UhbU?8aL@uJ2|bCrl^%Qxe{$fv5M?PcOhU zEgp@;v~t|PQvNr=L6N>)Bkzoz_NM^P501|M$5vu1PP3KN;kw2~c8{E_kM~g~+S38y zA{}8rU|Td@$*T|py0ub31ze!)p^DJ+5`Q#vc&B3*B>ZZa`<9UgP2cCYTh9kiDpZHk zYHkej>J<^dsN3H?H?`6j)`zkOepsO&$R?iC4<;+0i4@`JVqzpL4MX)PD>2%0o3u=q zmznfIe>p_J<<#9Ps{e5#zoeFbNic5V zHld$e_EHv%lizeqeo9g&L8x9b$bObers-(xb$c*D`{%g>oZ$eq+cTU9u1$VJR>v04 zeEy`yuK1UAaMhzKz>%2bmlA4w-K{=|@GCTgKAW$Se~=0x^J5;v3>`UAlh}bQH>S}} zr3X97EOw&3jL!qoOJF8UK4(g2N!cc;%0Jl%*P~ntC1}_qd=Ja79iw?DNli<1Qza<; zaJBJ+p2lsK&W)2Xv*PQ{pY=Ftn*p38zpVgH0FK1zo;VM5oTsNGk@ZGUnmul#f&)&U zHn*zivsv|r9d933W^DMQOSMSg1MGOU;gCZ`2v=sQrqlSLFr0jy&$wx!h!l_ce2GGP z8n}8i$lgIIy8aRBV94GMlb3icoLY(xe?XSJ7KZutN!sc+{L{c;{ht~*AW1EU zG>Uxtc44j9zMejwrOzU_Uh{Uj-6RT(TQDZ?$1>lnc~INM8ofTwn)+(#kVXf%peG;Z zrkY9TI-mhf?Amm$gB5nJDmBNM=5C10EZrCMyCJy5yg#z_ZNxG)hYb$cUt;E=K;k|6 zHMaaEvin-o_xs4*+kmE#j8S&W_{=J*VYN_7;ureq+PJj z{8SP?$oQPtH&WYdDbrAntdzBb)#))cb9g}vwK&cUD12)-OUB<%VZ;@P}fUQZndd{#eow0ahLL2vE$vht{|smt87oZM9hmoJO= zr$OuuKhsM$XZ|G$RJM(QItNIsCrGKuGOk^sC1nv|EPhstn|}{r_h<9fC5*9I(g=0Y z9rEbPw|f?gpW@N_tg?zYCVu<3OxiSv&B!)X-i<(zld z{7+fnUz~>OeL{4s?^v;R3tvlFg5cJk9hT+sna$%oIEg(?g~7D7+6G!oso3vaFXV7} zWJdlJXA|Bd6AZ^;K=?err-Yl}Ww_|C~u`C9B0)J4z%HtDK zZq?uLG`MF6?qaD)TrlACaF!NJS#=9~>I@2`c{zyjzNEtoRx?A*C*`=Ap>M>^+9+Z1 zaOQU8Tm5e`9M1Nfqh?brb%`2Mc`jB_#VG`)&da?W^+DZ zx2w?&e|X?P^A?^Vh1{u9KZSJMuX^s9=(jk@sE{E`8fItW!DnQ1QlB-)PQQz903&eb z$^f3y<(QP%y~u@pno(t0T_^@E>J$An5mZXm@aI)+A&S4hCJ$Uv8FOp=@IQF6OcOS;W&{iXJOs~-4PWlR zJ2?vLIP!xEB75#BS;wl4n=PFc0wBIcG0@<_pxa(p-&7BtKp_Rb2ndsn_%mbM=6cY`C{kD5`dQi~ zkmcYah1Oe*qEvUbI6kfiXJQ^4V_%CyJuemL!wZTNbO&CWUUBbI&-q*&aoJxAtm5z` zG(iVn2j2-kZu%-_IG>2U_K$eFK?-KrcMv#t_~KM`ag^LAEYT6fCn-fYF+_+d)D-3b zN5X!F^v7|pwUZD9vFa{9%U94MW!;}EJo}${s0=Xuri)V!_Zknb=zmt=(Gg9BI>s01 zA8Raue6-hssKT0HEUP%fW%iZ)DJf~71e-ZF2#S(YWMVdgK20RVDrFKZ+5-^<*W$L z*ed~INHIJ}J#dv^Kg3Ye!ym<_KNF+xTgzs>CkDlAeJDdYy6@yb=1U#mNImxS%MzFZ zm|X(a+Fm~H^j=$S@wDmgHnnFo*rTR5NzFMD-#p0|LqapNu}Z7pFUjv%LtdPJtyW!m z#i{{++g&kPkn=M?+wO=MQz+;jv>C{*Ra6&L#TeZ*GiZww%^=Emw zu8uoknbmo(3_mc+vBxjlDa&rHnJj{>HY$nAyx)bU6*n-I`?q9%=1_3E^O$cZ^rrY& zd<^d`N3*V5I0n7W+rLq1y{?PzaF zjW2$;yZF2}dSY$QuwfFPp_ItQ?8)XeS!!@7hyedLWy)3iQB5n4InVY>oT0eZ1hX?c zs5%~jpv?ci^9{aB@QIa}Ce%P3{|WE>t4d>3Q!@lS0*EpUdxNnPpB}CUVr<3oFeioA zM)8cWRe@RB#NgmM5ACP?XEa3>0~2f}_&ijbmhh$E8THgY1ouSTHIw0Liu1h8qnTFZ z2C(*zX&YzI=BYSp7A>xBdU@TAEP)Ze=QfB-+EqtzJUc{nPew`52(1~<=-BH2R~i%p z8I2f}9(OW|%GL>reoQ_7jM%>KJ6cN*h45P)f;JlExq)Rr$jrR;bgbI(Y-+PnZ}R?jR z94E$QP+p(a-KE=OvB12VQpt($#M7?I@Y64F`imXjiz!(B@GYc?@%K!=-`c>4^x+SSN)A+?Pqxfuv4p zJ&k(ma$B9HUW&?l)WDYA(1*3Tgu6KjWo0-a?tNi`2H9QXexV3-gUWHduJOVRm6+tP z+>AWDHeHrV1QVw2B;Bb&0y@HcZ! zEfI0Bi&+Hc9@@H~EQk>Ar@Jb{e$r_iBMRiww0v%ZbSvK^oUr!-j;OLlZGu||5RvVX z?DpNS?!+k9m*C+gF7S1I?InYU@f{;Ut}o}OMy+-XznU6)b?RtIL$=Mc?*#AflbE-K z$h?QNLE+h{$C9WtA6_L2Xmp73jWtM+XdzrG2xWMYS%O?HD(gW&Rq5vVBI2UJc!Q-W z6>U)5CbFrFH|6oG;Z`*`GkO*xJ;t$DtNWbO#&z~m=Zps zN~?W{jeW2d*`|dIq|+XZpR#3u38dNWDgY2L3yiG6K67)VH)FEp7%!!MUuzYf-1jnK-a7laH>y8tdNQMrKU z>X8-qOMA8oLIpxr_kFWvGDI+{ET?jV*YRejtD5jwA60*W8&%;1?lI>Oi+I)(Yb^x` z;gbhQH#GgV;HtmJS`_|!LMRTUsg7`xn{Ex{@mdWMZW9^oUW+SXZF=-lOGMQiiJw~G zj&T&qpC<;eMNhM(7|G&YU$L~L{qe=opRvIa|HggcLKqW7(nzuz!ycp!8oO_krL@HtN9%h& zQSE~$2vt804^FDluK|HmV=bfeTdzZ#XSs476(f7Mb~D;TxdX8 z?Es#!XV0Su1}3pZY_CDHG|M~dxNvm0zCb14?s0$02B}{+OKMgNNE^c#e<+L~mAw+W zI-sNpZqQOS5bsm4OD#8c-swwtCn{-)LLB`j(Q`>zFXR^Pj-H{R(1WU~IKV2ZdOSg@ zOVdAaS%nH4D`TjaGwZVgDG?Pa`23$-P!=OgTF9WtOe!kQ=L2`Zy%MtzM^$f}`v7s= zUuq1suXNq}!QM*2oJ%Gjs}%ID{D&O(dE7Dfg>9Q2_|pLzw??)Xf|5@k7z)1obBKNw z#|A|*<}ozNo#fRW>Y8Hdzk=9f65sSR5F|$CtU#__nTtY+~-iWn97S|)KO{1cyXO_oVU9>vEwc1#D7v`ZdG>F+qTkl1`nyuhBTtdQiES*|n z2U|m5JAmJVa4d(rt@FN_MMn~%F+qGUR`C9W-|}&(Sxon!NF;ve zWw?H%6B*N)f!~{_&Ku*;=Ta^dByV0RD7>E`DK5(8MDHBiBz8d!zDk-d2L-fPO#FA65|)1$X#CkBJ4AfF=&XE4BDCq>}h z&3+hwe9l)opQG_8RV?Z$@v(0K=v+DbIJbW!lRaw>e8^cq$s(S=;gxisUg&Dw z=YculL)$$*Y=uo&_Eb<0O{)5SFKR;}4{nQZ9RRqdbNeYiMEM8|{?=#S(l?AU0|NaO zMuv*0FlC6#GbO71yK(cBmkF0qpZU(r%xk%K&#uvF9D{BD<@Cj_S()ZUPBxGH`lX+H zFgJsPdvp6O2`$k5z^#(%1E?f2@U#3n{k8_Rw!VTcCYaE7VV{yMUSZgOm|~eAfwz}2 z_7iD$VS6;Na0zdZ8x%JpQGoZz!*{L>)T?p+P|U4e{(lvPz}VNuW9ue{69S|R4)(V> zh8Y4YTv=`E22Wyeef%x>@2n7vE#Nsk(Ew@c&GLNJxSBcV)9Uw$qBfN|fl-PHtTgY= zEtb z@s*B99VbQP@+$7iJ4i>uUZK0d={94pJbB$1LEuWY<{7Xi1m!u$o^qMFsv*Y5ZVCIk z^u_NOZD36VFnD51@c8n`g0Isj=JfnHn}BT?f#IR~%c8DxGXyV`t@2*e$ScnGN%=b{ z?1Pj^C^PIS{n4 zv^NFQ#6c40;6eP3x7ejQ`RUs|?b)-N(DN&p;uNNWq8~t5SgCh$M3DlR- z*gqH@xpT(#dmBu}8GjfnbNora+|J?%jy_|C zMnQTo2*kV-P>+1}Xb7+msAf3BnU;B3%U$UTl}WFGn?z0(z-0HiEHnnwMH^4Gqi2U= zsEaWa*@Zane|>%e;6JZTHB8R^m4$@ETFR8L~-kmUS zs2#4>+-WX@HP(>Q8O42=9Q(R(BU#nmu;eUCvOztU%B6EKLbiS{!wY{i*LOuf$d&xy zka&8EvLILU>AV0DnaIBIe&=B0ObKHX4{+*nqJqT;9!WJ27;tBQD5YtnBN5;?OE%LI zWXra?AeI|Wc2_Z{AMAMkKG-3WkYV>|e@0?>@W)Huo(Wd7eHp}DYHFNaUwfHy13#vn zRGfE4m3`!n!|2gimSZS6)^0}dd0qkV;JdZ2uE{<3$QL0obfb@r%1Vp}l+h$9!7x?7 z&Bt8NFExQrvdx@YZ>rORrV)R=gSkQiPZq_DLK81~B#>@tf3ktJ*huTv&v|vZ>y7J{ zF$iC2I?;U2mRb8ivJLG8KlG^x*x=HLNs@`U))7elT-7l5*B7p>X^#ly@uJD z1sZj)Bjr3f3Y*ZI^o@~z|NhU()KSQ61s@pyAt)wgU-lH&mfCZVl9(u&4S`roS>`x+ zyx;c}q^oB(oP$93_Be3gl8{GB2zTh$>WInMI*Wuvhye9I>APdq1<;1F^ntAv|ByGa zj|-@mvB#*2)P_GL7C8XKdp z`jz#%mD?hh-R)>=(7b%G{6p_P0=00%V({Oa2E)PGGOVV0x;tgMMbnWx)alr2Ln{qT ze-(%ww0P%x>>7GLRvWTYRkGsHZcHGE20l9_t`11~LXCqpk zaQ9w^n+%${+~AjpwZ3kSv3E1r`e|lZ)4%;@W3O_@Uj-!kuX^)=uL^tP4)({_HD@aw z%e@H5vy5gj+$+5XhlU6~RE?Ca%vpgiH76NFfoWFLA7?&ze=ef7da{FNJn3ug>YkG& zat8}R&?ZsEws_gYuX)|$-@%^?zmo>vn&k}^<&!GE=AR8trM6;j(?29DhNA3u1cWwb ztqlpc_$%Avd14lfo{efs^<|3B&2!87@?T;<(VPF(>j1CpUFImqs`pZ9Ff)C7#JK6M zFulM}z8#NOTXz15w1Xm)e^%>U-PHt5A?cl7mr)D3J01tmWzn%4fK#ciH!Vl&x*_S9 zbHuKVHA|itNou^iOe*^j7#1KO!8Fjx=@Q@gQdTdjX5VUA@_vckTjcb6h$eRXm}Ywq z!+!LfPqc@b{C|zpe=_0^bXiU@j+~;#@5B9WC7Tnp?8NMsi-cQ%BovFWVHfB8+UrIc zaF)*qq{y>P|F}zZnyV4%SwdiJTXdnxVER!B1uN-RU@2X!--Zu_?oPxbq zfsY|C6vKYqOdcE{?)^gy*MtAomA7y0B}qD51V~T7;$k?}ReWv1%0!%YtNPqnSMNWV zP35N?P83G=&`DRe%!2*suMnj*?!m9C^=kZDO?J3ISMiN*%xX#b!XWy-JZ z?i@V*hRTJAf4#0b zmDtg6jeAYLX6T`YrL!Vg{_~aQv*}i{_DquuqxK_+7DbJu+a_j%=f<3`OT3yYjn~|z z=%H+g+CSO1KiR9@GAAkkRjPW3(5jHrH}DKkJMb`_)+*_6VnCmv0{-E5FG!%FeKr>J z!M6S8MgH63tEo73Qcep5i`j*$G_Y>ty8tKaOAuvqe=rAGG~TpQ$$u?lIVX95P@~u^ z7W)FciMezDxBFYiTx@DVt@*z;Fx|#UGMz}w`I%hXQ8>X8^q`pYQ0JNBX4XRbDa<#^ za_5aSom8NxU}>gWrQLgC(jUI<=94!F{<>=04MRvggc+XFa)2DQ&%_i!-Qp9i6=mZ% z@%)7IO~qSHNoVg}-eQ16o*hf-!7tHI%39;4Ooiz69}W* z$n5rS2n$-hbw|H}`-xyILJ{egRngnj_(A?JxdQgHFdrX_$Ucvf4wsIBw zE^&MzLu?$5@F?Ro!?If^B6>>w;%GXLe}1Pn>=0rf&zGhZ6WAjh?<>4K@Y`b<==qo` zF{%}}UePNjQs0nF$_^4siWg!m0K!67aTV;{sXp>MWE?$=n@-up8f1mt2iW=jI zjApXL!v>%wz!WM$)n(b${60;pS03`&d?Z5P?pG8#wJ#F{Y6c-YpRLe=niyqac0p_i z!kmQ-s7e2INJ}<5$h$EHqP$NoxXR7f!eY;~Bq>nG(E202S4C0iTAbb0{2uLh#CGOrimC&dGsX=RWqz|aM(P5e(BLsxOlK}s=H|6sg@geS? z=XauKsrDhPj3Os&3{~w)rT5*v=X*Mk=S^=o@wEk+;YmlO`XD1_0V$#tQD`!gc zZobr*&HA0Fad)-JZE^dwt2l26ezIe?hc4R^6#i-+I)*NkPtvI+)H2^Cu=L(KW6^D0 zz%9R+&P=S$NU<-6W^*_1gklAnAy7t5!?EYt{83$GW`)Q=SM6BMpksikYM7I-9ZeX* z!E*Dv`n|f90k8qo((L47*V}%snUU*!`ZqKul@*%%)^i)8i7;BNu8)$S-i)KKHzM8u z2W<5#a^^tF_9rr~fI;koE38dMs?XLsQ9Y5pf-Jc^0B4GE2 z=Tdgm&N<#ogA=*KW85-a1zN_%nz8RWG)&={obwqeU#PkKM-T}`kYXzX-LM-{=fCdt z=;QbWimgYZYi{eDQf~si))71zy?Rt`?as%_V1pg@afZIyI5Bz_R*a#bRvCI5L&EC? znW5LV8tl3Kr(~FjzAzw*IVyaj4{>5jx%fd+jIuM}I~-GWMbM5z!4)O)u-6M<$8Z-H zzRhlCkWFwf!@9a=@op|RKCPYQ1rtEc*-A_xcjqqlgs!-zdr@=^AMfSnkuvsM!P3^) zljl}Lk0Xx3q{@rtdBl2Kqy&)l$?^31PxrQs3a!87^J)$KfnH({@jp!9Uiz_KBj_?V zv9MDKQ_zNI+jZ+tbQ7tH|K3UVn3cy1j@}z>Bz`3@W<^;{z9C(1fHS4F!soqKZFFU> z2~Bh)`3?duZIQN!lSdY3$QpHN+^0*_9BDJyA=YYQ-$4v_z+!pin%9ARG!^k;=A`m_ zBFfvL2y*P6UIZ8b8c(qpC)@O|Aw3x9eY{)8DyD+5pMM8oFYrS>x<%|N-p-~Wuw8;0 z6lphfTpT0)W#H%baAcd1@vwBPV%|%TcX}KZ-~n_hGGa<~SeY@2J;M_u%d#DhyCOk3 zqTJfqnOYVj?Qtxfkb#l1LyvfcaFk;2LwEwJ&aPx=6%~*_G7ddOqZo&y>_PLi@LvPZ zapv@Y2A)U=0UUTL>&wL*^spFxrv+E$3U86o*{2M6MI0Rg+Y#3XM@U0uCC>Ebk8DbN z&Zw5=RS{vEs5ILfbeZ4~^By1pex4G_$CsNm+}35-ASg zX#?~LZVW;;Pu4ng|8)3+p1?9rv3jMvrnR*QqU0PZ7lEGV1m)8*ZdAiR;hzm0=FzT} z4$~w1-YSFIlB<8MChB&Pg{>!>lY^Vg*>>Acx{xgi)z2$j-MO4 zKb=uyenr!uFT2_%K`W=gY)~~2(D~reU$NRziGD{Yy|!*eo5ebDs59;{cvzHkU`{57 ze68VC@dLIDyWH@tlj`5*|`PJSG5Q#7E}NFooIt40oZ< zSurb{@%3R$4<>}Kfhl!Mv3P;7^2(0f?^f7loRDNx{5SA-32YA(=(cG{vLVxlQ^Xr` zyPOq9HdhXv@G=s@3Woe(K3(+ARna^7wV#c@F1y7LQSgwH;RfL3lbId?(x69xG_;tm zg|FJOI}3NrX=>&xO63rnvKa(cr$W9VcU?G`Q-H~NHSvj;( z%#71Tc$_tUf4TFWbnmO|xVN^ZO;^KF&(f;rW1U$_vU9+{Ac6_ZFrgq&jG_@V5d38n zxS4jc(`)pld3@01?+2~3P4+e*{i1y4iex@s$|2zucS#0_s7u_f0JLbP;U#Al-sTvb zB;OAW%!=pvwAlW_j%bw2NacGXe6+6&Aq{5v#nWbg7`>NoOMqFFcm z=l0>s_6%gxQ-Z{zLO|#fWs71ql2?JYZy`F>oUd+5R*1bnCN+pM}ef_t$(bde6=ZG(y;*hT5W<#T$ka z)7Gh+VU>pa6hDjAg^!5P@}l82Cdyo?ioKK4!Y*{~QX8*7(g;x1k>Sh(cCDXHqO$2g zcI$#cAa1g|o_0`kwqVs`Sh*D=92I2 zjnnpx2YEN)-gE*a_xk;fi$NS2;VVH8JDwj*y3RZP+EwwD= zh1bbo5)k=>xyS14umR>kc1Pf4_%PtjKdiOx*Y&k8d(KET4v;u~_XJHvzcdl>ckI6( zjEgh=`mxViVy>7YUZeP?wW(}qa4hcOL#IgBC{gq zzFxyPNgRGFguCAQBOjzj-pbJqHh}x&y&F-J)tIMTjm zT*QcW_z?3%nx^v6?h{P%I|KJGb-x$^YZc1cEawEemP6%LIq)mp_vB4N4%xq2KUjA{ z;e+6Glbe^NIl?quP={+phmz`kJzzEEP%o+YynI!9dfJ873ik-a?gO)wCa+U-w-m#!}Ae2uU=tDnyTi3R zsv01^jTdbx_d4$ek$4teC|*)@*neq9^?!@<)Qy3Y z7j9GFO2S)IQtPd(NWCV!WxW4yHlKt>^_>H9DUhY*mmRjt8_E;0GEjNqlXa-uX}pV; zN-X)zH+91?g5hGo!)2-`FRzEj-ps@8ey7{>v;iZ03F-XoqZ2a=Z%f&C3+JIRh=cZ0 z%}vW33j+rT-Gzhlzr#}`?^xYhCW{sY9o!M!N4jC!1p`=;l#qPGHtbI)0WSXg@lR}; zpg(rMTzB_mB4P=jk+XfM7Y}Okkh^Er9{2?M;-V+jZ3IKyQsvka_yhZdk~H|88A4bb zQ~7+}XTxG$G3#F$;dYIo>=y&p$!f7KQ@`hDXN$QVz}l|vVCu*h`L(ra>cywl#%EM_ zw*}(434;{fs6yRc_HF{GiEoRNzY`nk;DK`kH2FoUH>Dhkb}Z zEmW?Q7rCPal+g@eJm9%BhcF zskOTPY-*Br0~`m4*A~}O?Zc6X@nBS^hisO7zp>FYL#?`{S8g-%dw=d?zLqQbF)dCQ z?$w!VBVhWR%=vYvV5*pK=OEze63Lx!>7xT3y$CxlzCPa+f-y626ild5nP|n%d<9p(p=ZjQ-i?O1g?Wsd)EtM49H5WO6m{(q0cgVFTgzEtDku# z~)k$0~I?F81 zuzZ=si3`vFrO`x8PR+m`e}r*$kysj%gOXy9%ypNBMQCgdu)u@%gf9rP8^C3-7_&be zlQAGbf3eqA4GF~B2pzPJY zF<=80xfN+E4DZ-ELWbe4igFQ*2jfU(3;=PtCFBMOi)bv*Nw<3NkfC8*^=TS|n4Ngf zGpjg6EogvLYY~uJ!Qh%k?StxvtOQ9@4ZhBDPQg=`KtNVzJj1ZB z{YIe27u2@=E6~$I=R(?=552Wgr`n%xkbnTJs6z;oAHFwj2h)r5J_dXb;k_kr6oWO! zcs{rJ@tc#rnNOH-RGX1PUfZKlRxCdd!u@1J-4bh$^@?V?h(TN{D+^}8%U)bww_=v~ zi-?D?Zp{=gM1WZyXZp3sXrJP@8=2>y$D_4bcheUINT}9vBRM4PD|l4nl?DHDPG&e+ zk`N7loGoHJ7LUOqYS#Q<1T1S1`@7N^kDRgcYuLIM$r>q<;@GZ)sDCPN)|U82Hm*O^ zX99RvUCwy4wzO$k$4dt82QBM^B$VW{TDc5mKNY@Wa<*Ab9A>B zqt+GWu=k3TWQ7VYd(+~zr&6mw@O5QL!JrMcvY?8$Q1X%H8*KQle8H%tzxzuI%q9;qxDge)Z$i(P7c< zn7(X#lT0<21~-= zeB+5eny1CrwbS-{eOtqv`YOcTH}Ae61w{Yc<94H@S|P?c+H)GKUXKqzoV%Q|GDOSWO*I5h$;Vo zI>|Sc9Ay|X)6T2_!krBz%=Y3P85%oiK#`fnynD5l#*qZU3j-)A2(mlA zUgd;Xxh|L9eOQXHgz2dTPBu05W|oi1uhzoi4NvnR>z%e9A?PJwuI;JU`A$(1(1ZK2 zqQV)w%EHT)ra(FkZWK^I8T(|^TmQz95>o~CwWxF?lAbB=J$9q2Q#S$P`{~i>0Ju;< zc~&SP-)|^`KWxbtk8nm6GO(k&(+(x?j3=;xn*`RQUk}fBt@eC4)iduZ5W0FW1OCt( zs^I!&I73DK!C>8?#Ji)-J~n(Y7oWv;Tyrm@eCn18elZ_dD6n=Ka{p6!%Z}%)xg^9Z zb8pjt{ZFz2sCQt<=XRz{WCh*W#a_RQQ7*#&E zQ?qtJC6n9Or^=RKij-Sh@*2t!a8f$tdMtXO4^seJ-%DS`1-?wB92^<@(S_fWd8Ow& z^i0x&za*aE2lvKXVNq&gHbJ)iB!n~aC9a_h54;sz6yojgf?^v8Tn4wxX?Xy>kyn}1~&X*`;p5pW)IH|TRz62u1Q~1g28E-7j;ySI@e84W4liGTq z`N0LUD8F|v_c(Oko%OT$DL%lJ@Y|h3TCcr9=i;(3c+?W%VAv@{;0wUg=lDk@MW6jf zpnC%&(Qb<%qn9%auEy3?ub$Uv<$b;C?+k~xgv?iw;>Wb9@rkP6DFFYIaTE1QK3JzK z3CgR!utTut{rv1q$$4&R8=cFNlJ8jL#ktOurRc2~9Fpg?IxpZ0bVdR883~dXo(8onUuARo%Xwu zLL>vREVZzVt5K#e&wb0i9P8>S*vTN&q%JUcQLhMA2&iRIM75SQG+hU312BxXry~&Y zBV-5Zl_NErgfm`G+2s$AcLz9igT%f^$s?bAG|{KVGq2=N$F&NY6L_(GO?qV2D@{SP zYcyK3Lxl15$>g-`>gYEsqsaM8Jo3#8kV+}pAe@Ep@ZI1*{_>|MXo7e%6NzzOnZ103 z4JP}qf6CyjYx4|3AiN~r+c!L;7E(zc#)omk5>g`UoE&ypcmFV;BPs(H%(}No7fk~$ zvR>ofyGVN^MI&erUm&&$KQfdaf7 z>`{rql?5(o=FMF%9cuP@bI=zccr^sd8GK$jf4nx0IkAm=Aw|myB=OR^ zbHB0e8}K|&UF^L_Y1$(#*j7nhKAm;w|1Sja71SV5?~4=%)|?%&|}9#oCyX zFC7Rtb5_k&M((5FP(DN41v1Mup(^<9(fqGT@{s}P{&yaZv~Q1dxv!NnquL3`(OmmA z3_UZMm^S3EzsHpZTwU>K7KiN$pSe_kG~Gv>KVwY1HTm0v($ws48&@Czm3ijW%W^#e z&U0%L=WM2hvMme}$_}xaM%&}lR>{r1OLxi4k9XR?nyKYM<(bR$BA1qM%VNxKe^!|2 zYjD7??dji!ccz)gZE46i;tAskupsG5&;Rtd;%k_JzyzeT9h6>B*G;R%iTvVR&t18UL-l%MJUplqTrA}3wGTG{6H z{-Yj0IvD>%rp*xC$4~;Uy(UU;pDM>EPbrZuSW8;Pqok`ue0;$F;HRyXCv))_ zRa`KyD97RA$($v1mDhI`xzC)`FQzd&{jDBv{RfBQ%L@~kik9PU29PiLA;=&0ZW#ZY z0^P4>Dw<>9DE|o46y8f|_RX%>3J6Tj$E5Cc9BuGk9!Y5vJ}?RdAHA5?*vXvttx-;> zL@Q{I2JX@tHSe!;tMVm2bPw|_x|Ifh7_O)RA~M~2^7jKmYurX16zP2+h=)HWIZ-Mp zxLe%#RRN+w_(gF<#T}@MaOvZ?s*-#}&734hThjT?0pe`TuWc%ie30G<0%zNsSo8lR zrXf3kgiIo(?lcN8z6J3P(n^&I@aQabjn!{cF+MI8Or*gvIe<=Obs?`C7wiHN6q4t$ z_vyrIqIrzVvbLNwJEs~qbu@CG|Gz#O#~gQ;CjqddkAh1n#N9TpX+(h-COa%%1p&>@ zb|LCdPq?~)M)KbX=w~}IwB_YRbHCSZ@aIpRZ7?O^Ih7v?H9Wq9mpNJOvZP;o_(|ej zjgSgKgn5_A*+ZOy7F~>8$sgTLJ^v3*Mr<2=+Tdg)#oeeciT71<7oN+*JT7Ge;L3q}5$ak#nlww;WAb3EoKj-K7c0<<#FSviCdKGRBgy>9 zM@~Hnh--AktAuKZCcuJgV9;72zi*=tm6KEgw0i85Xsl96k_g!?N` z3BA8HuAsv*w#?8jJS%abx{Bw+OH06xPgpefUF@XI1SNYv+YL3L+FpB^WapZIv^}CP9$r=bIR<>~By9)hT z;oi9tO>8WWdUcW>jn^rrHf=Llw(ZH-v~^CR;$O?mT1l zCq+NE6|Wu|rKJAUb}&c=3{#yB?hjbe?S>+n(jm1`6_~3)19$z!PHUm zi?TRzYAxqWekzTw}Kp!H-G?l!M4D6 zg1-hST@x3}WZ7Z0ASDxO0DfED<++fZqj^0d_`UNtVx!7GniTkl57B_-$%t$P8iw;Lf3p3_h+LJ z`B=Z1*E^L|0y2|8&&>Km2QAo21YfQ1%vTsy>hdR=_riDYIjIm=i_{UNvL1;OCg%Q_ z>L=@GD!~{1pJ|36!m036=QLn-Oorh>hzFm_wLNac6>OJ+;FZKW0Dm1|uF{?&!5tSDQMPd*ma>ZC~L5r3N3}aB;>y-mZgz@BY$n)+cRbU9B zxbjGd4XN%d3v+=_e4jJz z)1=yb4GGkd+Sa{G#tez9=~?6oi7Oa`s|aex`%f|(6;2z~crfTY2~ z@}Jl`T-Wyl%I=n|=_4nFQvuc5q{^a|3!l4P#~yhwAXqcv_mn*?UP&at?A9!o))rgL zLCd!^I4{ncKT71e-0<{S)(~`5`n9`>V_j8n^UVgs-1CqN`Lx}6g=GN=MkGYARr%&( zVRM_WFy|YmjZP3gxpKWaAd4=SiP=;?F2;#469k}|*KKW#e^&NHKn3y8!ArK)2zl8>NRk*c04TZSW^qqEndYPu?JJ168;+`^hve}Tm z78HD|tMu<1*=V^V(4O9L_Uoj!kb)hBigIq7en^Z9wCn+cISA5}(m@&-|t;9qW;+dT4e=-jD#<|rtF4{UONnW`VeZc8Gs3R}<|jV)IH5W5xN7cEHa zZk)?D&*07=ozAj+63bDQ;QeLv#h~y@G>BiEU<`@?iWX9BxHxg5f21Ib+Zbi-5jE+2tGH9{!)%;XR+dO|iB?$!`_{npI>dvNJ$)}0LBd&aZ z=@vu%_qh0=&lX7YT{6jPok&uQRNM8&u7Z&t)rGim&=VO#sR+KKkHKi1ZfYb$WPfyA zKxFLVdKkX$MuEoa|75D|%>4;JOQX+@oh?y*uSnOKQWvtl)qIqp0zdSK0>_&lLV^lH zt7ARZj#6_JKem+i&bW2%Ocft&x77f*5M_9>4#V~^_|_YP`aa4}wE0I~&L7T4)L%7gI=@ z8yS|bnHc64E$oyC#yP7*2WN#eWfP`h@>kHt(D)}HT@&jX4jPsqs!*%_i|NSGN;BVE z@RgV!+<~NRItc6!L%6r6EFfyb)c${HdlP6VwlC+}55;2xYh_pzy5rvSk#9++)FV%fN_kI7K=Q-#9KmXr3IgM@3 z%r&mLzTfxf{eHc90lpiHDR0$8e_2Rg$Qs+r50QYf;ZPxokyc&4hdJWT2CF-yCM+1O z&7gpPLTCP24CLz;noGzdFwU@6|C??sdDt|)mp38(ux_8x=W?fiix?gPi`}10dAzJK z)P`;Yn#;*i;#Vgv2cL3mU;NjMAz0n{DU42_TyKW3cP}~oP8do;2F#T~-FRHM!iu~X zhy<-S(SABh7Xxk5i3Ch2hcY<~Ie?%F%k96}O61UgK;>Dr3$`(U&Da_K&K*Ms#AM*`{+5Mu) z{g?a6-=5_|rUyF{HF{nwwtRVf>-6+iH6Jv#!~j|yiHw5lA}+D*b*0oE*A0wl{%gRw za|v(?rTv)lI<{-UxvYozde9L?Vn0ZZ&j}v@d)*Tj&(;GYE52`GEq7lpV;SMSY$>9T z;bEjU!3kt8MG4A=dhd2xQl=(rDGi!X!+Zp%zNg)ZOO+8|A+x^SBMPBId@FJnOC7*k zQr80<7UTw#^31y}Uls@xKWZTIrk~(})9t7IhLG2-+e?WjzmdLAQJ3nUeNdV_)fJ;f z%3L$(;mLNL18X}U|0@!AcQyXUq`q78F3THNvNkC<72{S692|L4J3;1p-79+__({aO zB%OA0Q|Sab&1d>-3pH!y_>9sUD_=pyD=QH*T+!Yf;5^~z!xALt9yZAPVeIiu69;kTnIakl?}%s?%3?=v7v7HOh)iIU_? zJG3y=Or19+4Qx`CE4Kp3S6^T&dby>!k4EdxxVIh@wDBUuxzJ7;__?W|)g$XI|3=Gx zZ(`xhe0xm@u0N5io0N)HjOspiIpC*78rrzB=k|j@MMGk`ectYZ#WmfxY1oHa0FuKQ&pa z?N_Sr(U91WWku_&JM$dT>XXl263(0UPjvGs7i|Sd#RMEh*y1IDwN8tp`ij~*g15y+ znzezci>P6`3l(_3`9?y2iQKb#T$pp5Xr~SMF2mzFA1iEem=2Y# zs%+V8>v)&MLkU#%f}cP)eMxsSoF~8#u5%I&ns9F3ddNu5CP_MaJ(|T@$Ve9o9O=HI zpVbf!?T?!}`c`YWeR2jt7#O_rAcK*+FcXY4JO+K7oa)cn9qIk0cqg}-OY^efc*Eou z$-djdt_B8=kK7WU4DO(GDQ1*!x<--_`)f!~s+;bDY#9;D`>3AV>vM9-WVNeX zMahm540YJcKiO3Ry>qH4C`MMWuIC&j!JW}EUmYJ|qV;9|yNAb9!C-MLV58{u`s4|z zd$ku1)NFD&ye$*o7ziga&Dp{3mEjlwTr<19Tq5Gap3M6oiCRA%vOgvAVX26rAFDw1 zBmfQAVmG{b4O6LFd87w_rpII^wdoao3?|N31E)fe3)?~s3;_AO-C^2Hu)0He&j<;- zaV9&nC~UJigDJi>63{XV+CTYt=YT4a9hLsE<fQAscDUQ;h?>hR$smVy7S;%Ko^ z)+~A=;{0pZ)CLCGoheLl2g357*cA;#>sN>#-Vejf0K~{Xwc%>j+@jKh21^DX?DPig z=h4VtYi`Kb4ppUwDa~u!<9XB>d>~%_*R!3v^{)_NRBW7~X4ioO#al;$i0Mp?T&LUY zvyo4H2u}!hUtgo69lUG_bfK0juWkiIBZ78){~Li_YBaOEV+I?ehOf{rIJqm$bBu&Z z6|fPNj@hP~ElrBIfJrBiH1UVpmc3M*1#;=N)j%4fA@4cAmZ-_TcRRJLZhpB$>0%@2 zw7gq5>1`-ck;zu_f|UUcXg|-r@4?46va>uPsrARy2yPc(+QDu-#0r)KG%0std6L8Y z4*k2OM#MQC>le=eFVYo4=N+0kiu_>Au+X*p+*ty>-CgUXP5;+0);j6M{t2<|H&~fz z>d4$L$keW(W{-f3<{tpdW&N3u7IeV)NinB)-!i_n{7h3`X<-{MXL`yEh6gx_Ea!fA zBmE8!a8DA=E*D1Vc1>?y3J4s-gQg(}_;&X@K#;v8^;lrUX0bX2G(T*1Ih6PznF2P- zb0G!^<(FIHo-TDS4u|ob^^4yB?mg_!UMOG`R6=zWqCtUvKMJm=mPIRS;u;l&j6IXA zI+r6S4>DI`Q+|^+Aqk<4umpp!;%G1~FdYtC8vC~0w9^i4e>KYg+eEVxW)TOF;Q$&) z=gQ=w1)upgAQgO*z?^5+MulJ9_Nl?Kpmx(x?Uapqm$ zMXmH-VX(K#?6x4m>a8ajNQrUA-P0Y?PyWZ9P+FNEHhQ&uD}w$fOR)=|{Jl)hTyuH5 zVvtjXGZyOPQUQCRAUM9&g9%~rp%-Z<^3ZIwj6Nf`eY2rp7t%ldG~IV^#Ij*!_d?8$ zM7>yT?-d6u*E5z{oTdFChP%v_S6fyv+ColqLuHh2#NbTP{rQKl$)8Ao6 zela+9d!&Yw?V;SzT<5kb*4k=c;7f!A_rJMGODx=T{dq~+tRmIr^`Hf>;2 zk`FqzyZe^L=7AA7UrQHr9#}3d%@wC z@;`cGcs8-%Nh9-Dxon(WQXr7X(kyM3IB4A^f0paygg5&0&Hl^3qM1Jb-cG5BUmV;I zLihiHXW`Y;um?vPpK>NomnrIJo(g#v`M>89j+1)MJses6PXC=t_&+$EAa;L|0EG${ zc=${zwl!axT)d`z!mO03QroDSC~>AsWz_>6NR#)U?YBiE&dtwH5V>3)hLj{c=@Sy) z&Se0_u9so;rYB3-YyNJjP9}K-qf96h3zT_5(@^wT?>K;DI45802JD#s=e@^S?w zE#_pz`6^=dxWh@VXK%lc8u~EvXCGDdh4!zcmWIF5X6D)n^`=_hY?-(%m+si&SZG@{ zLhVwb1(l;g)}^Uv9Op6(FQc=3aku5@B>tm4sTi4VMr8Y@Bb>!oDw9hLcNbTZTn9?7 zd@XXGe9m^UWs=*NA=U=D$G-$z5S3Y;#mvMv6+OCh{d5hj1upRpt^ACi2DQ3r*r>j6 z*|pN;fRRaG$RVHR<-!Ko@%!1WuT81x8t9iNzOAvwCV0OL5?(a=w-6&l{IAjlo(&R& zWs)T>0a}&rjpV0XU$cDB{+^H=8Ff|)3t$}H(JJvrm@al-Y=4s@cC6|9VK0fR2QW<< zDBNF8%VcP^-q7zY6q~*Qpwfs<+EaBN$FZqx&6V)F#9E!nLz+8v6<@1xS+WHT0KY}7 ziUZ1b#FBRdz)l`7Cr!xzi}z-SE8u4A(l$7IJN1EGmlO?MlVnQ}fcME$CVmksffSJA z*(BXC!NIXO{s{|ipJH!Ocm+%S>tYT7$-*Ny^^c!dC-L4sYb7@MRpV)t%HoFu0_Sq# zSDg#P*pE=3%B17;%KVee{l!m)u`Dq_*#6%a_&3%QJVd|K42=U3d(1*rIG`MWVBL-@ ze_UnrAdAIp1ae^snY9>zXAM`W3eS1Kx!a{gx?>6{ZhS#LbiOLyc&Xs)=qv&q3nZM@ zb{7cUeyFE9?nJ*d=}0XuAj#cIzFU>1R{We1vwE>Lc1}H-XX0Vp_3iMYocCga?1eEX zvTQm>$~*W;jV7C1G)!s*Y*u<8Yjr97wT5q6jLrgxZJ{I@RJ~`NB(a}jQM`lRk##Tn zcp`Jorx{#tMZIQu#KKyicjELMrb|Cc#?`-xlM$EQtzZ7i5+lHqC=G}0rh%7^Co`F$ zzIEzSu0JfR9d5U0jXy=ZGW@Fc;T?|2m-SQhLS242b4ed;a&V^!;{?j}`9Jp)pjQca z`VWasg@Kv>?1*A=he3J4Ei77y$Kt33MeM!xTxmLsxhT|OBZTR~^wX7yN)rc4UbP1| zLZv;N(e55Z-N7*h=y(TFu0K{(Y05&d>8ZxKjA}ioOac4JgAUk~M`Ov*V%~%7*?_&> zl$$J&OO_WZGrz%DqWwp!(w{EXwC=TZvUX|~2y{`LaT6`-dofP{ifC9Si3=PFbH6E(mC1Ja?UD*9)v-OGdLZ zq-@=w_8sqDJyZM%Wunj2#AR4i-4;B4{FnEX&px_;99jId8}nqRPb%EtcaxIu6y?lw zoX{xblaxpQm34~h-yS6w#Wv>$-}y#2^;N2qvC=Inxg7;LO0FQYB@1j(`YuKzl-RR* z3JJR2Yv%InAPzuviSkN#WHj81xeubD{PoEqWZ_rwTCk+zBxO-8C!fuZrDf$YTK79+0Outt zPK166H}^W;R+7&;4j9F`Tr(DI2yfgzD`t}Sl~0ay=qci80Rw0}-A@w{5xgZgv@}2a zujrlKs=7Zz*njcYSp1OhBj7v_)hkDLhd?dXWFUV$;5;yoYvVx2oVw-9imr44*)`1N zn}lJ#k>Z~n6i*&zbQiHyr;rp%OT)u9-DLa=2vnwn^7=ZfRp39}nGoYQT7a?6 zPklNxMum|ixcl|x)$Na~l-z$N|G;<*u>DtqOL!D^rKdJuzZTOZeStl5K0vjE0zg8vsvfU~G6{ zT%gvrZ6$Ic!27K=-0!(mgTjGKZr~JF0-s=LBC$WbixXt&^Y@dD1|)d(Hq!HcMsoda z<%H>hYYZ^i`)4{@!=`OOOlOEPZjdoc^CR>PSHakvzySw*hvnn5gWT;Gzftc50_g(W zlaE~hlh9J#((Ui6&b@}k`XN7d&frR38wH$c25!$C1UZ1ISm5a5;lZ7NM8cXl2UAGk zr;WHZh88hl*FYl)TX7I@vlo?cpA=t*jZ1wXojzLE(@1v@l9e7a`mNpP@$_LWH~}}o z=>oz}%yY(TzSFpYkQrYZ%JJ$y)~D@k`jo=@fpo?e2rQtmMhTgFu5Pyq=7mv`{0v89 z?tN*ItNmh~$%ifWk^O1J@CPD(y&eoZAM4J=C2c(LEThlnzZLB@Z2bS-OEdHjF%M+O zc*()=`AF?hDQ|C_4j7)sG1}EZ5CJu z*i~b^pyPVt^drZU>*-3IQF*Mpm|_nW z{7Hf6&vE8RiXT{bh0=Ky<<}nK{~}LMXxB4i>isO&<^SNod+xmZTgtg<3V+&4eO12L zn)8wO)SHQ7971@A4r&=?Nx-{ER#0Zlj20 ziT4ru40b=S9(-CbfmE>87p|DQQ?A6s<7PE=gRXvDhFi#vED?Eo9CI(mf!X?iqfYz! z(;exyg-w0wQinl{Gp}VguNwT7<8MU#o4LF3pRTEO?(9onMlM)1$xa?c$)T7H0bL#! zdsz?N%QojtS&xuGD={TexR}N}cMY#A^jn+{{NyjFzu{hk$OZxMZ&rn+W(L^Cr{9Nt z7cBF6*4-8AAG3|d?-p@>Lx%5}nPh!9!MPI${Y+&#F3fpa$mi0qzCDZ4ea>D!)+{nx z;f#b%o!D>qyWNE+S-!YBp;0AlNE^^2foC$P zI{$&c|9`Q?nEfegLSbP^^Ma+O%V_h*VxAMAVRIYnK1YQ_48xBc5Az{j>27n&RCcfU zjr{BSgZy);{+GI@8#u^=y?#}G^5y><@=x|~z|F*ob^=YxohW*h^n|&ZsK8X}AG=)@ zH+L(SJ1>6x8g6ck9`8-t%#NH9CE)NlSWL}vT} z)!&NPb!C(}*}DgEUG?(1)@5w)zsF%Y|KWTpiN=``f7m=T8)z^#rqh;?1&f?_1cI0? z)%NIpATgcOaS;^xsRvPV**Br}s$qalj|xF|2DIT;HylDvH`Os9DksIZ^`N1j-(01x zDr~z_4YZU55&8eMVq6G0qj`}{vS9+a6wPA)d}Prb=k<|!6di;X1O0iAa%RX%Yk z90^q8P6my1G*b*j$IRMeEV7STaH@-+oL(Q%zBp?oheZeeI%GMyAQQOmWA0->vWigB zmUpaWX8w_K#%9j(EwAkk*gRZ7_-%{%rwozks#TSIomW{8tq0$GCDtCz9t-i&i_8oQ z);@Br2Ea)*AMfMlr;sx%^`8}6Y!q4|3w5}euvO7k);r;trKjl5j&E9l@s)nE%|%z; zSjfR|XC}Gm(tFA4$Y?auF>`2J?mk{9Kf0t4PC?@>nL9$##;Q>fQwY}0pTq*X*HhC>b)zGN{T@?kl7!UG9OQ>D!0TIHvy>c&(2;iI1Y;W5j z&olx1v%fHd8Mjqw3<3+LAn=_HGZ`W~YO1LDA}4N;P(e{Sv70j5pG~V7J&fOVOfugynNOe?Sws9t;*Af|hvQY` zl~k8Lx_8(#@K104$FaF9xNg-Tr?wnA=bjJ>Bz~_1J7dms?DDSR0=H!a3 z{AS{Ns0qDBLPYajK=&`aJ=9#zt$Gi~VQ~$VKCK?1e#CNzge(R_R=>Q2&H~*j<4`PS zqGaxZ;m>;H9zAxK2j7W=o#^VyN1ozhy_9~=&)RK!YiRA0j8?a!VikeX>md$_to%(& zZzd*~{RzVI65eR2@6BawQGqqdXS+SI0UCHrq|j=`=3Y)_&dw0o==y zyQQa!#6qw1{Vb0NhaJ?lRV35+^kDJz7^!nMUQ6Qh#Z`kIPH>n81#NJ2nrnNeZf$C; zm8EzZd7A1y{KGC_7rRYVjM8peo%oZdtR{LGXoJA*pdgAlMZ77ENT5$%i+=T4#R+Jt zHCU{s2*yIF+^z&AfM2sW)_!6j_gW9YHsXI{A6VQvQM)q#A0s>Zm4wJyUIo zTxach_cgxPY4y>AShfev5G`;0Z#uTRXMS>VtwW{QihPl&^8U%Ni-cK|OqSz*$3&5$pb^>VDJ& zth)bOf_myJ2ddLh(Me(Z%g0^C7mempQId9(7|$ZaUS;wQ^OH?=GoJl^cdWw%M}cbP)9!gBw}x>&C+-cTyY zxETD8sAR{bjdt#TZMfehXmh7kT$(Ga=!{s?X0g5AjFD&^4nTcpY^2mhu1e-RA3R~o&=}1!r`W^ z@p|ol{W}K--MegUU49ySG`?K=Ho)$8_vRh(p>xb>yF?l4eti{E3_^Vuti9+HrNR*c zJLdSpER~bx=O5WNB;s`Q?8bjNVebAhqW9PRs}tS90Kx0b>A$PnQeFPX*yIu!Zye-z zNKe}4eS68l72i!8qWf9TSoNe4d7%!d?b4^!!8rfxp3?2V7t|q&mGPk4UqtDZI{7-e zsPr4%(J~Zdn4i!rC!G|%T9jFM7vs9%Jx;2{gl0awjy=(ob7>tO#Ip`8aJv~ey1LW=Fd{o>_CBgw)E%##(0(Kh9^fB7-||I%nrMr^BQ z8C(SVE(W#ij{_0G)^^UH?oCg4C?p-M(5S^%OG zbIACM@COStWPZ9yZ#@JvjxV*Ll3~8%5)xIkL)5zfnPnd}V&w4{D`RGo4qm1y)O`DH^Zi%PaLu ztuBNZoiRjZcsRTWja~~8!GC|kNy27A9;J$(56r%Go(>>14P`E_ zWtqMoNH}dZK(1LC@!GdY>Hy|{mP`Wp6R~gr&r^Mj<8}_9`eJX%t9orwDez|MHLvKb zfFR$M_|N`Cfu@`1FE>G#7Ks4S4e-flv&BuKGT^eZ=d?v+xxO23Xx~g3xxGVN;@5?ZDx~BIo0_ozTr#7eT?4GH=-oA zk%-f?Tur2HOjOCcrtK&umgi*k#7O@r?1N+Sn?FOSY?%T$VrniN!ttcqgnQpZ*2Z)H6KgbNU95cA*Ngm9D#A~q~$kQ6BfFG$&Qh)Q{y4XSM+wVv< zn&M!Xh}BSl0zXEpTZUE!aKb7swpUynG}qC}5f$!9aGsdli5?i>NPe785rPF&%*5=O z(RwNvtK^hO;#tV3-ylK=Ci%Yzj0`EuxW`XA;IG_UO+5B3G$YuY*D&J2#;f-dmAk*9HEP7D+7CgV;(^FApV-^Om38X!QbGGt;MG za6Fm`?>6ud8SsTfC$sw!IZjrFek(zSihM!@EkLaxV(wq1_Vr&Y1MlRZfpnC>X5aO6 z00}dTvX#QJ(>J`eW>1&tT6+#w%b?TXV45USH1SWb2Zk z{dW6!mtVyo*(Ru{&N5X&bkX6TP?P&+U4(kU*kiTMEB!DwlH+4p+T!ZBk&gsUOMoVH zdfW@OtP|E2&4fY{i6!YUffcfa$2YrEl-ZsDpi}P^k zO9O}c?V&NU4paDbpkTku&q~p33r(qI`vhCl=Uk*HDG@A&r}k?Q%WCt-AOhy6%uM)r z%;;!ndprdqmvDUW7QtXh5B}vmwG42R^q!i{^hNl=7z9Gcs>pzbLr%z3(RZw@iioGGhXqJ zbCO^Wo#RyTOcv+juo^1fM~7d;GN7^m8ynggb}a-}K>B2N^H(t$G1vl(Ul`FPZ_u=& z#4}4s@7+GYo6%rxIu`2gh>^mP`A-{Q>?K!10zQWFv39RE`#%-Eo1c!=-8078OwfiN z{$Vh-daY5tg3L7hInMIOj+@FyNpC&ZYWVl0C?Xz9-1UfGFe&2}20}sfILiroL;%;WODP&0}a> z%FHYzXIm~cB>-s!K)Hx@B_nW*8(P4?y@J(7 z_1D(6ddhDA@yOxVCSMtFNQ2)}KimZoJoL`v1Z_D<(`JCs$bcZ{RO9X|cRT&~@aSzs zT@#M03CEp-)wL=J75y9{$f~`kC@fVabnf1)=*twX>jMN_>uipjyg%E(%i`{@;mjwN zxmGu!#DQ%7i=&E-qHX=`q`AExW7;}M0?cb(#!ar#n%gB9^`?UtziqdQ{raT7(Z4vW z>!2gLCYr2LYPI==T@VK8}g8Ww(BoNPN(UD(e|C{1bU z6=!^&g{PgX4T(5G7Pvo{$I7W2-Xpf!adk|qEn}ncLJ)ybJyBEyScNURe&fWkN64lf z+H_wkU~C)g;rt*Q0$AiOdq*%@D{aTiBI{wM@23U?_q7T;XDmkoARbjGjB;c3`0$vglnkT;ck$S;PkifwF3g+&%MVQp z^NKYb4k5q>2&jr+c~Q@$QNodOCaC?0I#ukbH*Nf}!5XWKnV>Jl*;l;$RPeqOI@7V$ z<%Q_+k~eQOU!~y)n+w`fM71mBD+ukkP7vgicN?YXTUAdjwD&PpZNU%|U~up;q++LMPM#MdPQ{i*OT5X(gL z?b7}}#yCxv9Be;VKa5Yt@GQzOdj>9NUBsFo z)*T;21lb0gYMO8f`+Rj0sP02Tuo4QhDHUJB5S2MH;)%^q+xRbvg(NA)IijY-45(Ms za;0n;-~|#=f;gpa1iTps-eH{!lR6R-!Bfw32vRaMKaK?0q3L>9l!N`p@XziL<72?q z`VHg~{CglXnez-WQo}q;PLC1IZgM#r!2uDp{t!X|FSO)C5jZ;+1bOToals>@cK2Fp z0xsN~X}w7~B=_^~HGTIR;zV|pves(k=~I7oTE}OQRIWFnT7?=>H}OKB!Z+SN73Ol^qe@vb8YPkvRmlLBUETR+ z@(@<(Y;ujC$E9&`;^7QL`3@XlY8}_Way5{cr%zj-!Ha%^jTPX2G(=rHX2pJzm4rA_ zo-X9z?KDCfQ7#ud$VasLdS z#?h`{nPu!nodMm)ta+|Zngzvx&c zRPe=|6KZ+ZO?+E=fKdUoHv0aK5Y>KmUEWrK;VnDV)Vsj_B^nwvVtpn zENL>zgj5!A|F)0G32BVg7h9tS9D#v6^S1Ez|3Bl;U@ z;0p%~CKdraLnLPnnR7B|0i=Qi9v>)yu3+^*U&f6)ivX$bq1G}v?r|%xMPz|b&MwD9{0{* zguZRXcd`I**>jm@KwvvOk@+QK4tt!6r<)7Ig^|~Jtln-eZ-6UIYHpE|R7N$U;tB_f0cO(ta)e-0O z4Z2Udm?xsp+PP|kJkqCme@4r{n&Pc-5V0=lz_Qliq+SF(5;k(!*n6-@KTRSXht5}q ztZQc8$+M&^Y^t@oDT%WkyK$=b3h~?%uUy7wMPy!G1pzINK8!hd{&Z< z|Aa7Hk_efN2AI(h=3WEFz**Hv%z3SukFLrTJ}8aT(sfKg%v7b9MxgOtpJ~E!7fu4m z#Sj8npON6)KE_xR;sHtqyst$PNK%UoH-aR9eUn>ufH}je6kK5Ummal^maAIWN28-1 zX>s+2Jo`5L^o9&#G0*9_NU5P$N6t;cEqCIY(WfGfP4;!{MVsCy?0<|tShXCO^=ke9 z%5M9A+rCr4@qqDfV}MQz6hIrJWqh^Nb^toym_3G>7cg`#nq$4lDh_@Vvfy1>xfON8?ujFIjtH}X9ASfA|i z3T0M%ap{?q6G!W|?|g5lW)@&xSXE02oEQy9JXYZKEny2Tl8y+AdG)nuk>JBTHZx;? zg_1;(H~K~g_J>aMxXv*8NJe|K#O?}Agm|t`ZCnUC_{<}!vjrPHQ z2v^NhH%CM~xhw-I-WSjKtjvdyJJ>!kRH8M-e}HGSgC&e&c`;K#sXWPQeuEt}AHO6Y zxz>ithHrD=^jSkLmMEq^XJ5Q>rR4zgGp^*av?LDQFFZKiwPxCNcc=p-@3Z=Aq0cAy z@AxSS95GbG6cs^%J<+kj0T%4~5R}IWai(i-id`#LEu-7ux9~Dj?j&GCUFz(n@RVse z>KDf>Fly__xG@yqF5Am&ZXKbgGZ7j-LfDDxnxTif84Ww^^g*x7UGSIHr)qH-b?tnk zIJW##2P^@l&#m7E3!Rp{akvU0@@n>pFsmt9ay;3xh$~WC6Ghp1n(yRK;pS_TWY%?v zz7Fx@B8mBK&QVdEKTd@V{Td$J>?jNcY(?O6KQ_8A_OBtPM5jcD;Ng<4^VOzA?xQ9|%I0?2(qpKzk)S13b;eD^j_up3 z!4~ZrY0pqWY`aS6y;ZMO34FPvBQ#1bWaB&MnV5l&o8rIP9MY1Mz;E}2 zRxXXDok*6}lm(Q`Sh};~PCeP94VXk$6%JZZPT#UWI^Xi42cG0#aRHsHEHW|0Su$&F zp3(So=J0vV@=S{p@g3RH!s|<>vJms@#XCZ9a;B@y^??!}t&sKeRg1~Z% zfM56eMrvD0^2!5m*Ky!BiZ{;8hkk3d`FS7f<%7A*Y$2gonAn93G2r!_IA!$U ziGqHxR`;yM{^R+PpCO-I_-CxsNPK~f(yL@Qk(7x^jVTI&0z)40FMJi|CBWyFBW<4* zEw|!>yS$Tba(VjA3pWVS|Kqv%PV@cGv+HgFr@s*2kGC*;Z5@gvL}~QJCF*3(FsRo# ziAL`bS+{v<3tS>BTzVpV0naR==Z(V-sqOv5`rS_u4#Asl$MaUFCOwFd4&(!9brz)S z?)`!sIy|_0?v0c(#OPwwL z9#8g^k%&!%?9yE^;OplfDXh35Jw2*m*gkuenX5gEl!xf(O8DWMLsX=d>0!bjpK#ospFYb zT6@orz64)zMAuwI7#GCq7zgx5vu zYArM;CH?-3{qje}hqi~O$$YgkBW8fI2CXJzI_2ByDVY(JP&?*Q|3Nkry#rlIC%TI} zv$Q!nZS>N@G3=aykRO=yCN+=u1x`m!x$e64_74{U7F$&h4#O4}WSrLTtLnM^VO<;Y^c0=2iY1Ip!0g|%_20i6n8Yr7;{9(vu6kGVjZ}LT zO1T{+@8R27qb&72=z|oXp@wG0Bz{ThqO$Di+-B41ycL#JMw0pBPr^d_-tpj?kHFWM%VnIdzQuqLC5(%~dh18n4U7bJh{|@+fqR;>(UmM+ ztCW(Pz@+U^0@o3I*;e|7>4K)wnL7-iiTmR6Wye5?++G#U@&|$%okHoaf~)9k`_+VN zU$UJ~UwcQo=lxPp7Hnbm@J$du<3rqQeKxgbL5%I?w<`T6$^9I=i6GT@v%URGarc*U z>teD}@1744ig`4rJiy<Yg{D^r5oqM{EyLIVn2#X_mi$~ykgX4 zVJnfsqq-`k0jY6vqS1=UgW(cwDewAE92XPtkXV;ztcoue39(W+G)^bcw!TjkYtlBN z(3FqY(8b%n;Uf&%iL!9lwvdV3rKtn1X`7J-->8h-X;6p!OSjT#;r@gq+o7O_w$Lv} zW_?15h?bLwz92>doS-JIB(APAo*%-`1oy73z8C%q#cH1@uLeKrVy<1af`K2QR%f1p{d`4_s@YWAl6SVB+b6cJ;y)3u( zYv;}jV1^i)wrhZ{JV(!LAK?tKh~wo4$FH}-YWq0bx7nE%kHkkX_X)QZWFC60_So`x z_qfXIv&fy-;lInp z#Yb#57RI$k{U6n-)YO|7pGd$IvKh9b;ggO9OW%Ht7HnN?ce7`jwq>phUYqEOQulE~ zBhH$Pi02bW%|c>c_$82t3PdHC@=D}w^6JK82=`s@$LFQs!P|JQU z#9y;=_0VpyGl__)w|Z2NMl@PFI!6>6|}4= zfA4NRNeU@=xFX_A<`W~~ZRycA55C>Q#rba67Z%#WASZBv`(@=wZ2$!^10XQH|8BVT zXXN#NZ@ul$pzdV}fVi2l+Bv$RgD+)m!&%kGfqk>3X-Ze7;#?2WE|}1wAOcI(KxMhk z$830jlM3PIvDkY`hEBPCE13r93)isysWfP!=jX<<;z=UJ&pZZu%+CyUHwA+ZOJkz@ z(eLWx7KE`v^w!AHbx2wd`Q5PornA|;;k_KJv!O+MByPoGE|H{&f(3E0!PoSY%D(#- zFn*eHP=R>+2^j_*U>ip5xB8s$psD@ltdCNOEAJkq+^Tl^tNJHu|xc6*tV{b zMk=2O7Q9PN*nYP?I>1d&u8lqhSUJa%Q#fmO@V)Q8f?}Jegi7Ym%Ak~EvJ>-+z&G@K zn~H}Ye1;%%h?M|sG*^S)$FqRQl4ExdUVgU_5M)JEV%X0KQp}}m_kVXDdS0|8xd0x{ zXzc;@hY(Hgvd(S^NxSciz>i)rnAq8t@a$u_`-Iq zg_LmSXZXZ?eDz!;fFB$#e!3PPLxylXYPKS4U2t=_uMg9lklNSBxF{zQ1&W+r6TiYO z5hW!JA-}w19yNHfhjSo;6z!$x{#!E|@otWN`*SCcGuTe5%S8(X&d-ETcl!4k!@?7d9 zM6gcdMs8=G9`YoP!q0IDu{O>Lz@FwL0}=PJN%<0_YnFTfvo{ekOa?B?1ER5La!tu? zmWzSCFe`EB(6eC79t+NJm^cTX+59J=72^n z+`(=!zSU+s+=hXcSiodD0br9)3YAZlQ9}3tZYDhxF(Z?=JOGNs%$@`*^tuZSZVJ@v z9eu2Zt`q*`pJC7mwhkkc+-cxnnm!ru`H%?Z_3W<5Vd-yKE2FZKK?-aNVQ5B1iZp1f(v#Z#{_4su{YhrCYb=kR$B?ky>jr7r+7yN zq#RRxn^hehf@*4KhaL)Ir|%rD3@?A-$NW%x-5z0?ct4}%=#?lctM%u1lJ~^1JUHNa zS-VA;9qWJzE3v&=AK-8Z2QI#rzC-*e8>L7)tg)&^V`Kv^(H(n%@2{Brs~7;PUh?`S zxa#8Z;jlbgfRtD$;ReLPoY+L&CcDtRe#2<}7e0@2^335vLwdt*&C@rlAU2tWD`vCDc|daH5Og3#o-vgyJ!_p1|RlxVZ(@ z?jpD?TmXsU?f}yCqLID{W^M5bin+LMwyeq5I)HM(z7dijsR@P@v(jl>T-c0fpQX9* zB4|&WpD%GvSxI&^VJTl;r_Q%IK#?2+JOK;7RMHCX+g0hKAE<$4ij9rMTQgMXz4Byl zC6dPDF)`*Za4a}&o+Blid>oIiZ4dCZi(kKy>9m8VL7j#H!c`yzqB5D z+$m-vPTKkM(b4<5E+L&{Cee+=hct-tH;r_U%$qf}ORYVZHYf577&WaCXF^pei2HM0 zOj07k@dK+sqsQKp9l2ti!HxtTPi;!D8?Sbfb2WXyY!97+-U5SFnr87S+MUf!4GmuhD$uXX1&l%*?r5;vk5gD_52(yZPIRNK1u|P;L z!xZYC{c|I9t(D11Z?}E93 zi_gZ*a8eb3UyIX8$H((~aL(Kp;JPKUxIvvcW9$IV`mctu1(|6Zw{zvcy)_eJj>(mE z8DQTZ!^V2)hfQz7O+1V`NZbp5O6i;XATZXPB@NxD`b2aB1VdbcAK{{2nwg>N#L5h_ zq&YfLDTX2$L~Jee37~5)+H`8T2FO$H=MOT@gZa~AOyBm9q4l?{jlmqxuP{2Am6zE2 zYk*~2^E6hjkeb@Bm2fqpi{~7{EY@3(liAo zoM{FQ?KmCY($kN9vLm*6*_a0IA2roY2TIuAR7{Pn`uA-i@TzTGzH2!l7H7P3#T3G8 zL9gF0oWwn+p}M8b*r1w3En9(mgjJZr53h9TG$I<|m-Ui@a(QWh4M}b{Tz<1b<$69# zk??5Vd zW_FBS!*whY?BB<4g2NDIU|5y7LsV;jHTlk~UmU;{SIdZvO#+bgejYTd!V?N7r;@F( z5c8eZ8i#;@gHh%KN^ffzaDjYVd;po(BO(nP+PH9Ef<1;J;1}(yfigP0y#lQ?9RJ3dVnG@t$*MN8&4-2lKeWAhIF$eU z|9#DZvG4mXYh>TDjxDk)mC7z5*;*`FW-zv_k?dQcg`$$BFk=uxL`9St*;2{a2gCd> z)%){#f4}$fyZ^Y4Z(bM5Erd_B*{LqiV9KTlgp0Spwf%;_Fj^RLp*Nah&4U!>Ma zqWFtmwo!?;o=c}BQdG?e%M4QuqoVt<#?)-*T9c1tN!nEQ$7|5%J@Lg;ja1)|ne@!1 zXv3s(@5=~b>4S~03vKr=u+zO^mu+NvLD+|wVG=+UG#A_*9oLIQ6!OlUf@$JnQrPZ_ z$0jIzmOP~d7-Qjg)gA8`yg6D+@QY3)DaF23*!q%uk_cQbSd^;2xLYG|>KNp(wDyn0 z+_R`)pUt0mz!u@o)-;hLyb$?XFgHkd`@t_?1)g)XLJ6mNeHo-> zA1GAhW%O^iznlEYoA(4@N{suUPs8w$wAxWnFA+F|q6)}E)dX2laSm)Ze3K>%B}`af zui=27Fehi-GH7d20eD$M9A(A0P0kx&*e-Cxagqh55RB;}qwRDv`#E(^i0|YNmnjiB z_k%0w<*f;RC&NG23keM|`)kfJ_fVjzC$kQpi$liX&;ZF83I${n843l)Anc!+l;L$y z_Zme^Mu(3-1%Aoo+b4~p_gGuNcGs&b6(Hx_`y3M_z_=nz~F zvQHczV*P=p(JqQZp*8av52d-k3mj6zBQec&%gVG3L_yRy13-<3 z9V79%(y(mpTRCu_#rP|88Ae%I8DKvm`3z`)pr6YzbwBH6>u#3%&_{nq&cc?Kw)t^5 z^v;FEr{DAfN|qwSO|Ko5moHnHD*m?B`Dpph6z_tKAw}TkCo7I=hWG?Y_J#Z#6J2~` zqWdC)_H^U*fIPJAZA#Cj>sy;t+`Iq=;AC^ZX$nxrX}m0TySfGId6}057i&M+rxqWV z>@mv?LUI=D=r*Ia&?->YliKhB{a5FVf<>D8Z?+lk(I|IG#dR`z1!e-=^aRb@-4twN zx3iA>g52i*ZNmnTxfX|J4JOPm|lq~b&$4C?s%2j}x;h^Yp)-6-_*#HCta5w2lW8oiLUMCw;NpWLq zx3L5I)E#C7wD08=Ld4P z)n$ky{$ObPCi&LlmK~*&0Hy=VUFPcg!)@1NRr=MiPLr!ac!Z3Eov}V6IfTv-gpHHo z?R01RsVqu4q5fJ_3Deq^X|5Aga&M^0^Z&o{p#QfWDzFDq`g@>BbqCQZMlm#bg=^$h z&H$|5ouw1rsobNeF+ljv0!V82H164#>#K^bv3xs0T1Ai_qhcG22};S-U9_2-QIFk@ zn>U*@)@(0M^kYISPMVQ63M!s{OVox0)#c)O5(Y}P3SRb=zUoM1Yn+0VW5tb3Bfs}+ zB{@aMjnfKTd=M2x_n0M#qLR7_Ct81@l##{B;+G=A+#G#Fo1Xp@<02wFr*F=_0Ocj; zGl9%#QCM6cM_ed-?h!fpGNr^=Z85mJ7!nEj46m2Pv29lEuWcws8hz4nt0gQA({|Rg z3vYh<3*abH!k-9&lV5IQKZ?3HIMK}xy?K1&XF-BZ3nOdk^GH$5TbExMD@q+E%y2Xl zqW8;3d+#3Av(t4SN9p_>uxrfJ{a7dGaM!-TmrpKvVeY;56;X2=Xy_=G75uD$);jj6 zQU4diwmYj{K_?FKs~Xfrd2EO1>@iJ0k_vI<<*`Tu@)uN zoJbQU8YOilDQA|N-S9Zs7&I+I^n$;hqA3v_5Mf#ZWuhiO^uK0?zuP+!hPK#?WYw8V zgRs266WLMqTp++7g?HotBZhLz7ksA)3I6q#9 zLU=`ENCS6NIY;Vhm}$gi`Fk$hU^|z@KaS++%13F6(}}#aCk!UOM{^jC1VHtPLiu(I zD-VW#)q&!MYG%`vm!@T&U$*ttGeFDesnqqXtgdbY(MnMBT9f=fpXQ{n-1~qk#cb{D zVvN{%VZVk#D~g9qpY?v* z%IPXBGle)REy6Z{a--7RxX=UWC)_<;@-OhXnf&XY8HVN3Cv9$6t08SB<~oz2MCXoE7FF8mr?BZu#HY0l@UrLCPS{Q zJaq0bkh~?CdFv!zT5lWs+7Q{mo;iMk(8X8*SQPq_g!SmI`ZbE*xSD|G?x<-YA0rKa z)BbA{eXRZ3x^3Tsx|gNAP666~#>qZvYryHwPAebhte55b1383_SB>AKz(+c@1qY&l z#@jb8|VYr8O}ZGut!7V?#2wc5o8Nv z3WaGH008ozk)EjoNlxRon*_i!1H4CnbVDY z$ik(jV+CO@O^YfQSfH_G9f!W8(L(iyzfiYtF=SN*>p@B`Yq_~;CHDKpiuG6@xqW~g zKUCbQZeC1+of#INOHE_7DKJ2>j4a9T-K>Ocmo}#hW zS6d|xa2vX5Cu398JIyWa0>mMljKD)Q=EQWt;U28aggHl?XNR99=lmV$Ui3r1?3ng# z{Ewu=Sj5ZWfwG$3&q&g1{>a3Q>+J3D)Rye%N`3foh#HrmEKqy@HO?BMguCvTEq8{R zL}VadZ{Pn&8#QfE_lkNn0rg{6a(_~#VO+nY(tX+|S;N%DnEk@5l$)gO9tpK+ycQIcXi{pV&AoO%#*%N5!Vhj1GSm%7O3Ge zHAP-e-BI$|#%?dUm*t`$THp28fNQ&vGiRz%!j+!6>+j2Pea)64w+B!N;WgAZJ~ft1 z9K_#1Qtj}xy>-GeAa0^$T#@#<-DU4R9Js}Ake!e)ev2*Zn?TMa1%VaxjBTjg^X_)( z;GC%2C$CY9f1^9Tza*Rd1#r!w!FzV%_h^z%$p-k*0kSS2ehh{~5Pc2%!yy43dVEHr zIKGsIlthrO{T7o-&U(TrCd1p2#y{&OU7l)u?ZrRn4q9ab%k$GvK_7GuQsAm8Spn`f zJ}?^Tnpg~6c)fs57A7P>4RigG`vRTAStA!SJ8CT3eL;4I@8MtGTQe+Y42N~_LM1r4 z`@G}y=jRFANmL3q9VRD=^pt}~DPnx1WM+s`MMPYD60%HU<3I2?-fIS`A0~a^(Dnb# znL`0yFToi@Ofv#;^6%jt=pnd%4;<+X#|hPRrWWl6>D?>#v3vUB+i``s*p7O}RY`-! zy`#hiV#7_3ggbhYYF5x1Nf)J$Mc^ilH)*mh>Fdca#X5JC;MY3Kg+Ci6MlV!uT@4XZ z;9sCF5;brlEo-O9=4%JmMsUiI(-kKf&N}5^)ria?iDE>N5vWkNS3_hE_vf;Ih7A`r zq2-(qV(8u*DwZdtDbJ?a{EZf~(bW9z`K5aBgTlEHwVC4B>0wzi1u(fpjl_$`nS%3% z)p%8FaNsba@~pWi{=>wIAQj;xXz2uca#nHY{^iMG{D1M}NU|A4j6@qy+3MAh;CTTD z(!hd5XLa+?%+V?K7|CD>Zf1Re5U@eG{A~MXjJq|P%*wq0&_c^IoI6TTIiJ?Ow7Sh? z#2#k^$i`hB86t;_>^@;<{_Dhngws5J6tNc0z@it7w$I*P}OCR6NSp=ORI<$9g#13qqrg*Y;P0 zNjqnuy5!mr3eoAI_P@-HA~89h@ByO_D^aDBm%1E0>DOBfS{V0QVIt1yGL7TMBwwen zt;xJGVKN_eIM39eq_u0XJ8t~FZW;3rSIr5$```S|b*YqLGWHUkf{WR|bkCG*f=mxw zEVXR4j$U{*(ofk^gvPxR5ll2KhSL?)9VXL^N@mY2vQgY;+Lh6?Mdx z)R4|$^R-Ge*zDwnva>N9x^nwE7H3{$H34MBNJp;*K^{F)M#(hU#S_IK7Z?(6j}Nsc zK`hzt<|je#y2zl;%pZ_66HKcAao}h{WW>ZDIBJxH|8L$l_rc>ly8IuO-W~9&()^AW z{Vp>rB{h|SJ0QQKclT8bO?%*ho{_fs;xlZkNat6Re4ggAeEo^v)uucb)JaI6kzvcy$O6|tBuoDWK@qZFN$z9 zJM2GA{!56%J<9)#MQ8d^e0dlqW>hD9pwa&)6Ur6UdA-g?ajP_&An+U{U! zRc}pXGv6t;)7B;KrfdH-*1P|@H$$Cfe9LXMU7;>bM*Y-gsJ(O%a_X4JqW(#%s-GyC zMJ^pdHt0z@&lD05Pcq^h3pj#!Shi~_=#ui0+r*N60-_p|vCCl?BiSy6TmyeO2!sTY z$U1e(d}$z9WLD*kXjIOr3kNBvbBLY}OiR#L8wBGazXqY?;n`!2g~_g%Y0fBdaCt46 z#5_LWIz>Jm8xF!c7Lju>3!V<8&WOOwBl`nl=eb_}-&ol(K)?(?)L;XjTXj)*bM_y_ zqFAcN?-6AL@%Ocr?bYy)8jI}=~4Ebry-8luygUGNWUYwi{O-yF^S8;-hyx!4`62UK% z2q=8mzZpy*M*P55uQNO=gdok_3b!CFuV1u(UDw7~)M=HVi=(iA~ zKP8YCf9N8o+csdObO$T*p(FX3QLi=}iOw?nZa9!!!}Wv?E#oQhjBo3yLpcb^{`R!h zV0U)C$*Y5rL(B)qErN*jVMF^_jm*A&>Cy`4j0?{)an8go2UWS3HQiN-yYhTVO@1?n66blse_ElV<++SHL~(n{BEvpK?0V`;BSU|C>#Z%&raFL)gopk2m>V_cbw-n*MgSW5CXRcxL#DS=F5(r1I^#OK z^_tEL6Vq(f%iHwtI|SPFyWerNPMZTpLxhde9cSng72G00Xy2N3I#TQ93X~u8Nu}!& zQJF#!G|#D`rCqN3KQXyF;ThkQSy zL=UEPfTVCZ~ zySg~AmR}xzUbrM<7B0V4tDvDX(;T;1=qY}vnTEUp|3G!Sw0_cu3-VYOB@o}SD#@6LqnRIt za?D10n*S)Lb39(KjQs7hF?{!r&t^`}B9#brGkY@`1MqAgDbw#c*mI}iFMs`hyPokM zn+>?4{kP3#Xn=tZfQtXLo=N1?M4^joRUhw*u14hdwt~bfXCc??)R95bL=G?yrn}+P00Kr{Zj)K`gber)ZGZ+6ST1P_G8`gkkc^bm2vL zQf%emlF=$NFQBCIUh`}6CN9tG;dv_Rdt@vM;@;{1(3h6}J;vv1Mb{?jCX<}lDN{ST zG`V}L4sQ7=@D>#E3Dj$+>Aim-Nv1$r=KHH(2t3>Ect@!Gyue{VmD)6t!UorNItEMj z0q7MVk6yPKWh{CB5!#F(e^9H61uU#Mye4xtN--RLbJo!-`@t8lVbApM|JOEZ0lwaQ z{x*W>l~v*Z3soUgYXGl)&wo2U)fF1d&!Z9O#N!mOv_?un@fgzM=VpwG4ZvEUyDpKM zpk+Y125+QWsYY|GoYpwxics616^f48Yb93P^&-Qbm0hICj3y!qO2)-mKBLpBKHj)) zuqfB_lQMh&ed9*2aa2c34xcfOlB6(*g%22rQg~?O9u|tJ*Xb#kCZtY<;aNYHOlL9L z2K|OObDd;;B-v_1MMuI#tAU>DIk^0Ugnvq>a`27x$B=%Iyn;rY&AjLB>?*RmbYJ~$ zsfI27YVdMB*w2}HiX2x;qTjL?Ug4^4Z&ER!l$P8|dwMak7xQk=o|*qH^!3n~!1CfV zaj|4^>1mPuV0M?rcEn;5Qnz^>DzY{b*^Kv3h?k)ftFOe0d$gx4z8xt8!Lh(PoOU)aFVpI*_cF2&{W z-k*{b3uIg!kP_&>+ZSatRAGcG(D!uIh8tskrOvY#TVxE=E=lqW(zA;CB?S_SKzhU#137k&b@8dY zUJiM7)L7|_&~vSl%rFl<73rmr-7?Ja%~CNtF$sRr)b>$d6R~TA^E)vX@BsY^n(N>g z6RHtk$pdxbA%`j+qd#kr&$N6i(Nu7ZLdDcA58?X3LjpCb2ecN#xObdM@Xv^V1I4*& zH8ydv2sE7kK-cswRwY9CajfktvRoi9(#1nk#$}4S7B6{ z4bHk3aY>ljy<{&&2!?MdtNbQ+5RAw!k6b`;sY2cI`{Uy5=lS<7NBGEon@DqXXCWINdll-lMpAPQ~ zMVPnx?*Esx%ujd8b#v(w$9a|N4`Jk7_%jfLSBLJul<8iSxrVwiebR{Oz;u4I?SGoi zPx}31I+xi>!gb7c*A(cM^Eo9t4R(hL@gdo#2|E1?SsYq@TE^ptzVOkx{dPuzrt|#~ z4z3Iu&3U%3;iUCcDtywGX~I%kuL@_pXWlAdXW7z1k2V|7aVTZUmUX%90CPY^bv-3q zxpCb1X^RpXdA!kK{b@w^gB_5}hO&A=K0|akxUZ{!cZhVIY#qjQqiZGYu=I4nxY6)E z$;}nx6?MGcHRBj|!aaLF;(12XQ##MXM`x^69cqD6Tfs(!bxyg=U;|K>l8CnFCJS#- z2Mce!6}0b>-)EQE$mgDBt1o|Fe(sJX-v&cL`0xo%BNR?EfQ_yGf_=*Nftv=M3N}%< zZaM%>^dAv+%%g?@_K|WOx_clzjT5FUF+4l}O2meoHy5mj1Ai&li3Fi5V7FEXE=GI+ zw8ZoTyyq5^) z#V^*cx$Nh_8dTx8C^ig*`X|i{;WgH1wl=RQJk3+9r`$jO#ZE3b5YWuO*~H(p4Tc5r z^|Eh0;c9)H6#XA<`9V#+5p0B4Bs1$1D_K0)+&QFNBMGF@z*RCsIpQ@Bop$NQOQx-< zDwSK@m+Es`Rr+?EkbHcXJD7x_8H%tkD6MF_hJmlY6W`F5M|i+T7QXShCexu-t2Tw zko&H+fi{1EHA={(;lEoqw&(MrYz*=8EtiZw74(!g(Ls$DQfklYH$0~I|E0=-{jZql zJ$N!eG0{P@1Dv|i_|>lJ;e;e6Ov{9$>t*KQJyI{*VFQ-=5AsoJN?bN~wUll0UjvTsq~RAIqB~QS$@S{tt%f zfOrRI{N4J{YQXd=!#v}6-YW|FzU>a8>b z;p&wVrnt*7r|zeyMHbkgsM{y|)mUT75UFvo#lWkRKX!KnNw8V!N^f>iN`rP&az;Ly zN&2zevg_{d3x@d8guMq?7W$b69xcqZqB&B1ltU7u?5#=wX?HurJQGEj{Pc7DoUHq+ z&6yfnJ_s{7bZsrRaZT9wTXq1!9M4`oGu6eg9~03?1l05}k1*UCZ(T~wAc2-w^43lj zyl9(Tmv>vGoMcJp=FwCD{G4(o0Ou3e>6pqb$$HFUteFgL!|gJ$q|qxH!Ru z(bUo~9`Zi3s+hW?l)|ZvyXfvI%D#SqD5}Nnnv7&u7-tRWb^IbDmjxMFcyyWQaisKU ze52W;e*3|Yp`F*NH1Wg0`o|u%ynIVG;l4#zT`F2EX3^~H-F`3eqy+tR?jsw7H~hBG zsWMehXA-^+D2Ex&$R#tN?4-`BZ0nUa+#Am)x*{l81#AsRQgV7`(EHDEnt{!u;(pvAA1&u_WXA^6enG?=}n*qKZiDn){}ra*-D(}zCSGQMYq5##2R zxr6zHPrscEV~C%6(fxxh*<%)>I%hc93D8KEexLjdnEeWEpW@nuQJ0fQ^p_ht+Xh!D z6#0}og0d1l*8huPhsN}<0AgLf=TCP0o_LIUCe~(KN|ghi|J;bZw#|*4yo1bWs%3)NUOX}y^YJP2yzz-?{4l-EPpbBSme*!)(RxaZA%cZwY%*(q{GQ}O z|6Z8{Nb#Pj-4*Ry{3P-8uJ|)r^E;Q&z5~gOf`+MyGy8S{eae=I*j`YlTu%;|BHd~u z2R?(n^0jSyg!=87QDp1T+>AR$_v>OYCXMwSEADF4tGAJfJR;t48}*F+Ui&$0P+3mM zxYX1uy_W%-(0Byd4PZCih_XpRyT`52cRvRpKr#t_f5EpG53WNnnApOe{jraFm;I8kOsQfAFp-@ zj~@^QIsUpf0gI>2Frd0mllmDZf8B-v?YrGk?zG^K{iD2xz{ZwGH1nARE;^8k)qOQ- zlu273z6&CV>WD72vuOF>;O-QC^%ZCYv{Oxm^?X@PLFN{l_SE|ckL5SiAn0SeXDA!Y z06Rw6|62}mq(htv+sia(N(0@uJBv=hF|LHFh z#wAUX~EhI}20H109?od+@~UuCo{~Yh1ZH@PGzG6k7}3j)Jth-R_T!Qhf|> zy#1R$Xou%Bn?k@OS^+ml`Hx(wB);0BctJn4{8v`iQJ0}~jRU282ModiAYkIfrk=oz zOFL7*3Ofd55VGUlANf`mpp;R8XdbqTVA!Fiix*Mg4gBI(te_I!adO;75u9jXtv@G8 zGirF)e^om8VUxJW+DG>5`HXNe6&IIN(oK#=*{$)duT62kl!Z9*k^uX@3|F=Bq15XGTPWca0cwCb7O?$dj_K#h#RArz7A zMRlp3{6C^jOdYewzr8Y2r5<~Y_8Q6X3c``$QeOD&+(tA2;^J6SQJju`5mqN8+MChtl``AoNA2Vf@gKx8vENFGbI`3X$}IO z*_<-zNh`lj@7~0${%8N^0eB_3es`C^6%PUi=2L)%yhhcV#=;vcrnbLGU)1KQe0$L0 zV@9KH`NI_)HtM3q^^`dZDBxrS1)OKDlG3Luh8g62(%u3_QSvrP1z|hZEcR%G@)oCY zb*AGx^1wHG(Z|?5a-hZEwGWxTDlu3qAN+R7uD?0RrD&dMPgRGIx$Ai^S0LX{~J5}pk>q;fl9MR#iBE0-f zA?{j0wztl&q&rH%S0oOyD0u&%G#$}sX@x}QG%Cb^93>ntmdXnzQn zAm%%xP@|0e^K$wM&7|F8Zwm)7ka7YM7TpHYN32HHghyrpO{(cKa$xbE1op#<H3Q zFO-fNKW(iO~$Dd9VHhE(uhXF6bG>Iw8V7w_=K%)1n&)>OJK?6KM-=%31qXLg7tPD4D zHng9o^Dy?rI|%uHSy-(jjXUof{qN{8^S)u4c=|IrWB)UlGWxssbaYsXt^#L;L);k5_L=3#2?tIcVjg~NoRKR( zyHN)ncVfgz!oX;X*N3(v>-1|gC!-`krO=|`*UU5;-s-TurM``(PHQck zKcJ1h555%Z1{w8J%itTPHRjtAz+F@MrGeH_{p{a)@5t-+AnK+Nt%Eg41oI_rh7`u! zv9RtLqz=hz3E#gG4}= zwu-z8``3YPiu)5#E{n9XS_Q?fQVt;|{!_=#P|5?mw>`VF&oF;LMMY4=V)K2DZ$x2# zD01zPt$x3>4i=%n;y-HANo(XI>v-LKL}a++FeC}Wx2dK+HCAyS;8$rOO3;N(BQxjD z4I9RG9f)HdPy`xk=9562WPMHTeaU>6mYgO-J$uqPM>;e`H?n4r{A>@G{(cmH>>zkD?GBaM zuS+nCetbfBkK{nLq#*zuhn zzF;RVB!l5>#nkrn^j8aj^K|Gvf_-$!w1^1?XGXMmVP_D8ND>Nm<&xgd9%5qXtW?lD zwEwSuIm4ie^mk=&E{5?B1v?5V*r!fyJ~l=bJJ(k~96ofQl=+=LX_d=dNR|*L6~C(x zUnu?Ulo5b?a@T?cY~#Zb%b-*S*_;N(P8=Ma(0N}u^%x#q*56ak#HHvr_TZ&uZnUuf z5z4@`?@Cxvcd5ARho4`LSf*kg@BUt&0Pp{_=SnCnvRy=zZ;-u4@FDMbNjRuMGqw%J zn4u0tDfDHr6a%2+m0DX}+2Qh2S1bIATD(uJ&!zNO`ZxCxx~B06a-u)^p{&#AHvkY(#2ruXR9 z^P~o$ot=|)Sj4D`#4W}4BhUYM3*9IES0$@0eYOpX;J_(#7F>fNv3{q_%eCX_2ykg6 z)G4mhg8IGU(B8kTDF>JLAm_|W0ej~ML1*EHFE3jUx6>Dxw}lPv8`L9T0i07=+n(ZE zp_b1Z37A@(bbNd`0z$&VjVqC^~sBDPTl9$e41f%^ACWi`TAwR zMk(^0f9Hfx5ru%iD}K_Mmhw-(9Qr8aB>`=$@mMeX^cY)#Up~89;3g?&l~vq*C1|2x)KlW5ntYD8STdniP&PMh$Oeot8)Bb$vX;I#rTHx7Y>L$~RQy5Y zM3yH}uJljjfGcG|XV8sGd(ryU$n6BD`~v-9JS|XL4{eIKwWe z!7KWu486wGzdM3|<3l=iLhy1hjP{d~7>q^@`tK<*j~WE6Bn=;ddwpIE`U*T_mkiKM z%Dy9F`MY19(#}SW!&%HEt`zKkSz(i!o_E>5&CI4Adzm{*>&~~;-csadYCqM=nnofh^;#MB|9X{a9V>S|{0z0Ko@; zkKJua`n9lufgq5anAn`@qc6!mtyV+@K-|e)GXZTx8XUb8ba*%)kmJs-Ct#;geO<9mV*ddUkfJ{sEomXy*yyyK9he&U$+1H+@LK#9W$>B5>HibU_TIySr0 ztioY&lnzK{W6v^s6hx9Vb2^AJ>#}{w?`gZ44xJ>t?QTWc<&5-a!d1(w7`O?5a{LG) zEN}{!nA>ul?^m7}y@*W&a$%+~h4se@t$NwduyrjLuyAZe07NAclwp-CEJ!p__wIP) zGAQul1rljg+`F913*q0N?t*P}cRok#Qah6&@PcwD)Xwi|zK^ky65dTS*tzOJF*rlK zo@dM;h$!3W`4z){JcYs5D0i`_Q}u>lhop*k+^!tZsTw~PG5L59H12A~4L_fD{!x{f z({$*D%IGaa@`b~UFMV*=p+7FK5vT|L!N1!>+kcx5U^swIjfhwYY=yKty6 z7mNhCs=>&`^G0{2^U(523+F1F#;Y9%DX-*R{_3uBXx8e+WB8(i$5dundvX?aU9db< zyP=5)Z{e%0y!tdsSsM^CMySFc%*D=MQuehd`5ewjHGDW^t@}o7_qnfzjuDY>lDq!r z&r-@!e8k3wJUW^d+BB!1iQ!1&Z8Ikb%P;0M*Vw%rGV)x6wSYzzGoTunje4~@u ztBf>#?2dze+&eW?8pM4deo}_U(%A%=$E2LZC6VMu7S?wALN<<{OUWvVGVK#JTXLcF&Z z*wPQ145fz=fe_~~>^Uf#$R|2a#q8Hd$0=l{TTFc5e?==B&fgE@Pml8L(+Eg#K*kBE zk9((mBSHwlv7-z-P9(vBR>z0SSe(!)gh-I*FlzA}PlRI$V{hgzEnGeQLRhsMg_iv% zcwU0HhUpiAecxti5cUi@d`qJc-J$QMA*5%*9TvD=9}1mex76ahr{6x zA)1r>04t;LjbAV>`fIu1`#SdIIU_40gEbm95J>yHXb*wl``f=Q;U1DSv}EgxZ8X>}#Tjh+nNEX3ncyPb45=nAaFwY;uM+$qcl zd+tZ~;wHmBH7|Eu8$a1FKpj0BE+#F93u2eV^W})V4BtXg5;~KN?ICuaACz@$b%SZE zL})E&L((pFc{5>QXov!X#O(S%XNhCEv`;`HG7ct0Q(56!)5sNm*jsHsU-X?7+WYu9P8h4Zm6Gok z2E*s1V=uMIKYln?UU7&m|CbnCQg6Ew%xk`FRr%%zK|*{7@s}4)ux}E%9yy$ZsRot# z>4_-hFkPcv@uYpq82&DJt_WrDUA1}yRG(g!P(`gHloPj zdv}Cyt(6H0+O*GSB$(lBk1aGQ^=9i{LlhT6)c24owk|1yXU*Bb2{5!1j+>(6^e$=q)hGf85C)G9Od z-q9=n@$AKwqqq9MJBUdL5zvE~9QZ;IzyTj^_$7$C$NjEga|%{2KTm=?KT24VWl52l zRlo1Eu8#zROPO%Mq!q0nlx1|7u66ll#6l~@uoITV0us~BFuLC*@3BSz^VR?#R5}KB zi#mF#%Xep6uM7W0KE(nV?i9!;%MOI|zs};I2SV(+YeL zErM`sc_9{M;)la1RjX%M6L;d?rKIYBJw=BOY+7nx+=#AbS?J+Uj zl4CzB_4LEOMz%W=Xgk419O`wdi(d$uwrxI}L!}HucyU<~K3GrBBXOU=uqsN^_{T#c zuD`@6fUT;1AB^5{nA5D@l*zK4Ord#MvrlGe@5r6WGTy`x`=dxSzW&K8v%A%Bn_DW+ zD;Q$-pXhQbmS((@eG#V&yg9C78h_@l3)c{WDE#`f=8fvY$L}8;6Jx#c2=Bg7Jn*d! zSk2UUIKjQM&x&ONgj3UfYe&9K86`=t_}1YVtjQKNNjMc}%bs^!eBLqBXfecXo5H5E znHx+Mv-k>TRA?N)9H`{EE0SQ0W4UGPL~m!O3hGtAu~Mi)(de+(%irmjv4t3Srx;H2 zO@1O7u<77B|3EzR(!&IR2~mLO1Dp_N%kH3IHT7OKnx|-hwM?|1# zH-#CDp7$^BLQFJHsC}A34A|eL3{~+FK0Y=-x&=PCu__2uGnAzJ0YXiZ&C~D>-7398d zK1ZLvy!$i~MaT!PUU?Y1QcNAEr@l%vy((T}HhZR&mAoW&$qGw82}zS9BLoHJpS>z` zKyuw*C%%d4<{q6K=&t*|y$}5GAKJSRB2Bz`r4Fb$=J9Q#P3`qfY41xfxJF?x*iV0d zecmBG5?>7IIX#uSH};tVaf?N~Tfk0JLBWp0h!2i^phYMWCk=St>U{3gQW2kI2fY#V zyf^EKW)POT-x=|uVF;k-H_Y+7g<3*BqI3Dqw;hhz|7u>lMWycQO^q6wR7TVSB5AIa z+j@lF78slU*_f6~Fq?<^; z_4vip>7jMuDrnJU&rSV?b?Dfl0_oBn0cJ+2vhkT~UU54^k@8B^pn6PH_o(3>xVOCT zIZ~3BG|*KtqQ4S>XnAIJo=V*m?8{s|`zai%pxMGG5=-K`o9+AFUj; zM_UeQfQu{{pUQD9prV-wJg`Scu8<%-tOI16-Tgn~AZhKXzZW#q8h_5p6d#*ztKixVE zjTlPSiC?C!s&>XThkS#qP%4tgn`!cxuL0Mh84owN!4Lof6C!3AuZF5~Hy+C(BrshH zGVE;;N<5(iK&Mi3>j`K^UJt4BB5j%)=cji8mVol~o5GT8D=Im=IEeJFu`h8^yAw$t zV>Ln8D^@e?ZLVueTH!rYL;^#|FtPJYA2~@CX^l+EoS1r*(^S@N{j~mmN-z$t3hvek zrtMYPZ=atzY)zs~snp0kHg|fa!$NYDU39cuOYa&d!!C7u&gW~J+BUWwxZF2*_9t~W z^6RgHZDO@`>dT9WH5QzWiL=l15r5GYYl#x;e$pNfcF_@GI^V-f^F{3&ff0H$;o?wi z&P#yX>^04PtCwM2<%4g-e zz?h|!^P86$7HmlBZEw66jV9}Lf2)u@GM~)|G{&79#lTdev0wlF^M@4S%{8laI&wV3 zeXcnw)w0TNZ>ap;k(=_*clSP7tH=f67<9#tTh4mJz-5ZNx-i4eMk9Y*kG6(>mFr6Z z9fWqxW=VSERaGUR|FATZ;)g;DpGyV>q}xUNlP~RiseheyJVcTd&Ak|ldEI#Ap^~j9;rN#Z1O`B-rO4q(zsGVn4Y^TtrA2GQn z%AF;eDw&pO8IX{;Bky?n?u>4W93&FZDJ32{BA`TyOuYZJ<;?CBpBIw(Ue?6+lX(K# zME1nZmCu1>_!It1ZvsZQ=)~Tz_?8-Wa9$wxRvx2O&g9T^rPVZi9$hWc=^c9m_!>8n zwQK>>dX{6M4GWrARzb{T1|I6Fi*K#6h{+u`ESEvo^n78AB>ZP{vgBcv}HUhEA#D@!2cW)Gj@VkNNcLr_y^9 z*nqtTP9Mf!S8ysA#y1Wh^f!lk{|{?#9u4*XzyCjH48}h8CCk{?vKHB9Y#~Hi5ZSYo zENyl(c0xoU3L#XAHd2(bk^AFm!cl9m5ySu1so&uekuxk-<`Wj$e(XT`(#bEhe z;#`a(X-B5zXS<4=k)Ed#HHmx+>cGjY1AO;OeT*J_&7?v!rEXl==)HL+F1(q;rhbs> zQ+vrAH5kLvuX!qtqbKDHVBqhYA~KA-wfGBdj1`v*Nm;>yN z0959oF95S}qgo;WPL?b{s)JrOp!@MF&e#mc+6p}<&K&PxozX)mGX&9oN~2QbQ#Nbr zbmBdb5d#H~Ug%KXW3h2``$YPi2bldf)aU|Q;$be%N7HUyaRiTUCJOpik2$0a;LY_6 z3uSGbt>3zH>^xP}v0K-OwmW9lLmfpQ5_(eA?6G(ngvH2p(S#4sTYr^cs8A31oxIMc zI1HVEiP5GQBRY=GktMjErabI@D^EQk%o_-!zj^qK{-!2&ZDHPf(41t8BV7=o6P&u} zL_Uf{g@Hen(PQztfEYT6e%xLXVa_X0pPhU7^8c?NGAJyAdjt7|=MseoPahbIDEyF( zCye*Ofm2lOpePD!!Wh>0f;?Ai!;3}?n=nPOHGogRxJp#lg{3IzjLxn1j`w>+%Q*cg z?>yXr2zdNgii7OB(^DQ|n9ptL$`4YB$FIkZMIcI{3~n;_YeMSGTHLopu@JqjI8!GLW< z6)*)Nw5Uqzs4dvK4Ec%plhe-3+s9s?z)UN}FjmwMd6Ob*^g~uBZ>~q;OP8-)g`Q0v zHg=P#b zmNQV$!{zbn9V|OWYCPT;ug4k^)qug{tpvJumS@xwq!pC>1d29GdU>Ou01a->7ATgj zQ&^Z0m@27h4GlA01it!3ivU5uHR@ny3S3l;ALhzDbs0>Rq`hDSw?`ixrGxADcuzw! z)h@`HCm1R+l^-|t+YtR&|Nm@?ZN0$G%E1Ww?ktXGclKwvQo>s=#TjuiLA>p+`$3PS zsLjc{5&W>uk;s};ELag&Qz!eF_U>+Xf_kM1yjyOMM8%?t3xUTPV2i7;#;}N3(2Ma7 z5t$ku3hH3Aq*^x8W8qm7B!qWrhayMp8HL&nu&8)Y2OUq}sInHOz;rA7X+)OeKQ@1g zAMh%pFrwNnQHJmn3!@U6RC20djG|7!o`48U?LK}K)(xIJ{ybhX0o(N@+4mbEwaJJEtyBIn>Lno83wI5%U*l!-7}2Qy%eDcw1A{IcM&6`w zO!~>|M#~H&n%?`}v5w7vC}Ex7xR& zDe6SH!-KH*Ho%@dc%w<03%?dm1gzfj+Ntaf2NCoMq?{;J;O&fZc0{NR$%YIhQ7_$g zBX_Ciypeqo)3Wsv7&cADn_v3510M4AJkUkHR@@qRewq$Kk3J$LI!mu#!X5BB5^UNw zLlSoG`^Z?Jskwtp7mzSycV4~HlwXElKX56w0S;8bqms>BhT@;dwW9%~s9Hk_M6G}T z?n}wX<@eMPAzqo?y7X4v8FB)%cI5_P=W4I+tkW1t6h>>T^zN8l;5uz5in12ZBE`q1 z(HoigrJp^gAk`3ZZ}&-AybSr_Ot&OgV6c$Bl*@wBU!}1Ro$-iyYyZ+9F))BK*hrN( zQ6tB34zjo&D~^jHz?}{j!96*zFKJ%H#o<*t-=-0MK{!tIcO-wI!C<=k+WT9bQtE%V z-c+sVOBfKBc1GJh=|(m5uslLvGoU#trA+;<@14$VY-IGtwzx+)ss8~4*_HM?Ib=Na z7J~G1=U=|cYi<4{Lvgp(w7s>`0kvHBw`|R)a7X^TC$?dGfyM}#d?JqYK1)hpBO!kY z2?cc@YAP95a*tB7)XYn!8JHRV!vzZe6#c8sn@i~j5w^7Wg4gCd)85V=>NHD$)=DS+ zlEDJ4eg_N$w0yPfpts7=oT{Mqob@9(h>ytX6q9%Dy@q^w^NBeCEc z8oXpw@SbH@u)eWlIj+xV_2?S>$Tk0}OKJNqlyI2bC)Y^xJ-aXd{kgVlp!@2_lO8^| zxEa!}HWMXg!6$G10c5k_L;Ug{x?*LSS{VjAhCP69kWIf`VHkM(h~=Lo_tC$IKw4G6 zUdM(v(QPe*|3P96mA=-_PCC-Q_=@76%3g419r=G2epVZRhP>P%!Hjdeo$_r(Wmz-5!pE1A@xXO_kC93n>|clJf0>EPtB{nXp<8#cD1J*+`_fupqb#` zKl#t%>tw}mp;r4277Nb!U4i>(M0vGVnN91p1AE$t_USY+>-1{Hp#;~%zwDc2h4#UT2&4tkC6521o7v~VqI`n3+mii68=;4nnZ1E8Y;48!p zp_qdkg?5%;O0>9Mvz?54OrZvH^ncD<)7i&{zW^lai6t@v2DZa6JlIh>b@a7UA}T_Q z24ut!t&vCB)<9%la4$&;W?}`*J34c-W)Bu4_zw$|CCB{KQ)*LsqD}AoJst){%5J@( z&uoxX|MeI?2LL8;!3SDebR$Az1ZS_h7lIxvNiDZ^Oel&C3TZ)O*`9<~J)`k|aJ?0A zR@;`d*LnF0bL>9jAHDP&+juM)_a5_!+GA7#8ML_S0h#4u-InK#_IkhpStFt@P*uiM zJ+YdRp$LdQeLbs9^CV!Et!ZIK)TL7`t*jAgvuO~ar>U>$FAvL)@AG&jAQj0MB8tE6YZY z5M;uF>3cujHGgxy%#^+CfXgXQ6mQ&ecnH0K-p#tpKz^=7qWy`lPlSnAdHeeEQrF_6 z&;x4Dx5wlj?6wT2&{wPLn0#f5A_$xr9u^5zZP$JL zwzHH@zLdiqL|7s-AM73Ilv;?77gDeE@kUflk{Hgz=nLQYLI z*pRuE@ExMN8XW$S^i#2*GI~l)u%2fBEM6SVCbFAPLgTy1%VjfKBnPwnbqw^(Z9z&~wCfZgCySTc^54X?-u24RlzXa)yCTc?;72w( z$-iBx`nZ40B#>a^<#h;_I37XvH5=l(I(bjNpanpXkHYi>p>KfG`F;~H%vPx9Hxr{r zlcD6ARu{==BO)ravfec*xcMw+_mSX_A$;TO#A!m3TPg6OY|)m@BKx| z(hGF*Q^aL2HLlojNb*s)kWO;ye}0zm;7ji7j#b={Lt`f-a!CVjq0qnSAv7k`lGFsz z*$`$i_CDHDf>eaGzLtNk=dsf~vV}J}nBBRhORcMy=7?wJkok$s$b@FI`PG*!`x0i9w#Y%g$fN@vM8vj@-+E5!sfK{`bwA^*>tRP)4bN_#yZqvu zy_dKg70JbX{sl7s`q0(#@r;wg*2nAe`XA-B-r?oSLEDKo*93e(2<^i>+)L>9O^2CD z>qbSKm9M8BlxpE=Aqqrltf<~JNI5%m_d{z-3Ci9Gg;kB$Yg#6dWdAUvP%LA?6z>~$lBRv?bglPulpeya{5wsH%V)@m$_huLp=@OyiT zAe&6Xg79EnwIM`#{fm}HqI`mvaa+sEH=e?bYhl#g_AlN3NtA#KP_Q~==kx(a+WGiV zjJmZT_3Zv~qG_MBpy66h;jcJ8II?NhxD=D-ELsL$eh^Lr+Pm~TR2Lyq7}2DR^^VX* z7PN=mMU}7Nh2^9k2%_v}ZL^nPA%x6}KX_B`kVtQBiin6XV7761^hsNX#W2uGh?IS9 z6neFZne~dEdY(t+la{A9M5i9KY@Qp2j`I%`G6{cb?1G&y%)1Clx1krk4`TPrfo1H% zYOqHt5H_)wzk0+bCMqYQo4^wY)O9Kq76F%hz4;l9{^XdQM5-{US58fB4xu);1enJa z3Pa^yIQ6m@M=p20a=j3bFReQlK6Gzuoj;Tnli1jSMCOX{&|k=4L!YO9EHJQ)*; zTN4oF>MG-bet!neS>3wz)C)oPZcrM)# z_%}RKwS7=w@J$y5I-=!=vV>>PG(j!rh9ig6JmHrrpAcT55^el+z6{cnYUE3JT5{{P zzSNE`Pg6{vAMG>y$N2|2ehAE};HA%;h#1V8b;>5pW*H=5xAq&M%)3Ah^}AGM zVgC86VR=&X3YomTHLzC?2qRR26PrFQ{a@P;o%N9re4-VO4w5<7x!cxw|)`AjgY&Vtk@pVmM{r z2~(k#QOFM0c93W43Gz&@YJ(_((b9+qKg!KnZwp6U{hBWIv#s7{A%o`8iZXt!=`+2M zc@2Gb(~?u%<-0%3{1>AMQDkNgRbJaZ(x1uA3%8-~A^xzlUxe{~iHhL8XJomU{u!q|tg<>Fecb#O}){ z)9OH5Z+#ETvJ|lUj^zJSY<{DM-(_K)-l|^zoc)96Pv~h*ys{kU$*T*W;?sDrdw@u& zcZ)~k-6P2!ZRu*h7ANYO*a4)pFd05*KZZ6(!c3GjxJ+*dCq*jx)0bmpL+bw%8u|5I z?zaBlGcLmj$*^rdT{0_yvOe6rNV=!q=XhAKBinQ;b;M72xk-j9!)7{}adhc)yoi)a z^+_JJ*MP=V+gA@qrpD-bTgC_EP(u@(fvDky@4?kEGWK(` zrjt~t*5Mnx8nIa<54UHxz(I%!h*5aM^4(U;?me$ZH|MT}@OV1;(~Yy2Z)!g>Eq2#4d=H1N{w_Rda`GR`EdyH!R?9A$EBj!LZ}D!+&yc7`w^h= z52TtJB`uFWp;%C0-349^95^hjKPDaZ5HWjI@j--8E8Yd9golL|6y=3lih&+qsmF;+54NrXA3Zl_(=U2KoNds zXbbw)??(Pf2nySI$1k) z1Wsk^g#X1bZFmdaiH>ya7l@_zdPD^m@op7N)9GF{p?i{LO53cWOJbH2j#O@JQ43n7{#bC; zz&r2N4zuAqn=y+9+AHV8Pft!+r4dxce2XmzB?YuTE-CPWM57BJ%!sLVf+DkCeBL;c z|1y02^L4knbyVnnNG;+rG*qkw0%bz#zWBtVZFL9JeJx<)qd`>`KN|j)`~6c>`ePGr z@mDq4;vZhdJ%^RBB{bBj(2h~>FA(p;2cY?4!X3@qd62C)tgq_ym+SPuQzHpWS$IUx ztL!+UoY5Q3TaiPzBGxxhY_U@R;uVPCyHt9|0sd;C;j+r)R^>jIJ0HN<@uDmUMB)dF z@Inp~cn_Z0s#X)a#+zeJ&KxX+3v0<;oLkCJton`473a2q$+P&oN5bOxV{~00U!Tg< zoxW+>=2hx_1N#Fprt)U+3yqf;`e6yDC{u>@hJCpN@Jc0LccAu$Omh6Hf$&n4ex*(W zTD#d*DwbJ(H}l7KOSN$@XVmWyk~(K~^kB$5DEdg!E6K%Y`=}yb{IL&y4~N!6@)oYI z(cAC6H96Qs1>OvOP?F;0lTUE4*vFgemn~q>?S43iCR9!6r)sktt!LdPkiPR>$psE0 zmGOdUvV{_bCI%We^4Ok;qi8M89;m;F4Bgo4)?)OQ(LS>uZyqlk0iv@y$h zk^&{?5fh@n52nyCbJ}Ln)xp8r6Dl)v+w#IM_W8GOcycL|2rY3rUYN3t5`3V-{YhJ! z5O%?7wN?M73RE3xa=IjD94gx(jucRM-RbES?|dOSH3r{hU(;W&8#J8 zYpjt3h7;eJ^ldtUiOl1t)l7^(*^MRBKu&_J^?UcE@+ER z)Q`Wf?bC~)%41>}tZW9$UXjMis=dyE)2@;bhw?f%W zM71P_jITjFQvneTc4RU;k@^v98Q{`}aw0dI4BS#LW(eGupt6l;Z_q(_Zoe#apGVT2 zCWQjykk!=T-F(p5(%hoW%YK6UCe@6iS{29+^fH%H=W}YfB-{81ID6_N`qT23YbyM^ z#B8{-PPN|6daM&0_CG&B(zZWUb30n9DdX~4GW-EoV|Z!uWj&Qy` z@Mf{SiA7g_h2$VqmL!xda^9}89{H%nDZ~S4^eX`bi*BW9^yAX#A1wk2+B7dRNXV~q zGzKIJmNbuBuvvEC42RciOmW>QVk@XbYg!my0}yPiFQV=`=5Osd_+ zcof=ht#e;laO`ayBSrFX@9yhh0_Td5_l>0(BVpEA<)78tlqK0CELCohvmzHBH8_%L zjZgHh?QY82nvMfjk@9wn_0jU)mYES-t6icBMtX)*FUwGk?>p0BV5{r@YWm$ z?A5i|1e&qhkva=KUPVlP{doo(3eKqiIa-=h2|QcL(2tjWu*VJ;M%f?#)M?}xx-O9r zW=`SDFo&Iq82;6`HPN7$GPJZ*_t`v+$8`6i3_R|1WUP6be@H~Cs?I%Yj}J`U;4RI$ z!>KH$Q#9OU0G-JXEF2`W7-<>ZWbD|2F6A4jf$ue$+dY~FAZoV3OYe%D&nXm?+CSpx zzbOYiYk%)Y#Chf`i(o8578yIv%Zsl`_BhN)8{I&d1L>Dgl(!^2T1#;#+|SsuEv`pyGNSCZ-w?fXlOh<$?kXRr_BBFp9Vjg<>#RJ?(J1)Inb?uTLKEY zpKaI%va%fDr^va9gCS(uuRQebw7cw1OnCUu;V`GVCRJ@cZ!b$%4(r+Ajs#)7-Uvty z6|wZ@GgQLH=F2a)aYh6=yzK164fWNSWBPkL@agkW-%eIz;B`!d9&Ew0PC z^2CA@B^2wc$l~2D&Tsk@<&F3@=V>iZKihgDeu|uZ^JhuFk33ta5PMwM#49#=xyo1g z^~Gx)zFRS-ede9;$}0lpoY_@plFUnr0uUNyX@$FMwPAd+@k`mHy#9lHDcqL}o<1gD z-!j~83fS67t1m}UI+MMUcDaWq9Y=5_K>})DN!?*>YWDYo$s`i1r^u{B7gAdk1J{_& z-UpkByJq;ps=2b6zwI?qw2f|}G4DB#x0xfL!oOeZB@f$y{7k$ce)d*xt2~tyv+Erq zMdq_b2wRo!b$-3I!;<1^Ztw#AgP8UQ+OkRyU1_k3{rkDtJ}0#dh-oH#Bjl}oGeg$$ zARSpNb`4OIuZ1y{x3UxUoF%53wg7`4;`8 z_FU<2$#g9T)8*qMJL((OB6|*>CG790?w>k{7 zoV49=UdF7Ya0F;Nj$Nt1cyG2i$H*kc%vP)8Fip%&%F#;6Cd;9*`1AHp)KPQq)=CDD zXEcAC%ujQD?LlqP7wJUS({GPBYOYdHVE6gt5h?Rc$K_!Bp)s-!u|UXxB-OxB4zsJhH6Qo!?F5U-&7gK(f>0l-w{U%eUX z1;3u^Dbws#UdE)p8LM;^FiTGI)JqA4+`;a39;(s&TKni)`|YyihFn%BGmxF(_;^B2 zE=$oKW-sa(RpXlWUPkm_$mZtN|A0)>*XVzC^R10FPR%%gFOvE^ z=sq1HtrP35?{YB!=*;ScAm9uAI*15(4Mps=6Qf(2*~>{Gu;YoLcH0WKMn*08$)a&U zb5^xe)t|JsTRFd;i3`t;D@zKNOr@{tuLN(mN9zItpEWkhEd#g9qbW=hgZ7FMU{lF| zLfUBX6)m(a-~0tK&A=a<6dnzp5yaS50OP zRs7p_VtQtnO+@PX!hYcDLgHp$EM&$neD*AzQ;tK}^K}q(X_%h(DF6uttm6@ittVsb zndzcrwFfA+2)Fv}aupSgo8k^lXkC|*x4yFI#% zK$KdAHVj+9+6|@8zDA8m=e&dc_k1pQEAH<6x~t> zttj8EhagUQ{Wd(%dPf-2QJgu60<{~t^^7btTXJ8NkiviA$!HLN0?%77zSwcSI02YU z6VrvoBT$8Y_o<~QVw%_$7!u12;OubUl{~(l zbK#dULv&B{YUVWdV@AMtWsBQw9rp zp+k6)5>Rw@zc%g)<-aC!^U^^iKM7G*HsDZTC!xY)KKiNaZ9?Bm4jOQZu77%Vff!&R z&1dxeo$LA0+-Z;wTMr+l=I2o-Ybn*VviAF5^AvMvb{CmPH(+_ zOsDv&pZr9-y+$Da7tUH_N3q!^rZN~ovJsY9&G*^Oyj4%#`F-{j{kFpl_t(;hz~S|A zUPVHRv9Ka3BN}olV@y1)>g3Q_GH=W_E-0b(8wwgsTtS{j(Y4^)W4h>I+r`!8h@gf- zKA65&Q02w28NeCK?F zzMM9fc|vItL8-ii+tJZlnMfr{9+SA&&c}Q4rjlJ0N2y{}5iC!C%+ZFkK>Ox;-;$+}-^Owg7I zeMc7GiL(x3O0UmmGJQH!a=W%U%wLKli&=Je=C1Z$BEQv^#D#u;Q^?*Imqs_3Nng&8 z>ThhtYJk7j|2#R}curD$iCIIW;C-DDm!Datw9W~%GTIqp%dGJU)3EuL%!1;4cX1Sf zHQD-hd@A$Z2RA`u?qUWr^^p`wxl8bHDlJ3zAWh z1p^S_L=RlHm*MZ9G~OjCU)2>JT<1F3!ksOlMJ7Zle2nQr3$Ce&#mYgW%S)2T#b5T?@Em=*BXwYgyGN%UW_Ct7S)PXn z-!hz$e>{8_jjXLaJA|UsX&fIPH>hQAt-ysWwUqA0K?4?ViA_ZQlyT+)aSxIZ!$9HMW!}Lk(gVDg9>BJ18|y8<){nyJ^`C zN&0-pX#VczGtR`^Qf?FUT2_fer2%{0ZIMQrUuu3z+Ch?-3)%YW5G~XPFWh|t54jf( zbX^T)f(rw>In=i?sLR6~B3dwu+yX-t<;%kv(e?YLUrnC82Ucg63%P1cQbYug4cG?I zLjw%iYPdun)n=Y?7IyvQ_bE){Sfp_gGf7FBGr1j_v*qBe`bY%0P$YO>sw^4*n2^_f zL+n7)GRNm3A73Uw2+jNKLp|LnONz6j4aOAiW+DL$pUFSKLO;ldLrtzaV4Vb{S~SnK zu0oa14d%@x6|gk?T#xQR+m!P?xJWO%SA;ZslG zZ7nuG1MYrX!1TSlo2zd!zii!N|*|bt!QFUp=0o9ds67a>#%!Lge3~P zIE5{rkMp9yo=prnI+MVh;})2iRXvXyHE@j;A@M> z{Hl7bH2&JPw6wcC*=wmp;FpCG*MaLV9qrB)oPUt&siJH=SYH10J|UDT^;GAmkTFfl z#e;mK>&~)wZM*k*Q=UoVsd^({{yV52udcSh+)uO8=BWr9~lfpFMxDc#V={l2rQq*ak+h7eH~4G zqszb953Ugvnkxt+M)F9(3=NbLzu9Ytj;2cm?^zse?-tg*p#-SA9)j#aJn+XYGb^F} zE{Z+$>JmG(xBxSmjl6g-JA}2SJ+j8~6M+KxW@g9zJ(}nk84xBM$Nnbpo#v~S4-#Su zsRUwL$ywW)H7XM3wC56>-;)(~eL`gT{!hT%?iiD{4Z%4p46|=fKW$-Z3J6LOzKb1P zXD|P84h4wR`n$YwEs>%Io_2;9TR5NM&qqSeU$Ed5?$&6IKbkP-_Q2fWGoRA+E3a3O zd)`$G?}K%KtlX@0mOCHm_M`xa=!;3-Zk1vz1T}< zf~$^re24q~x2XsMnu_cZ{9IgAAUeKkg!~Tw9%^&@%vaTVM>^f)P&`aJA1O-+0^$_j z#B#$DL!OM5RO6_?1orS;Ab~bm!GO%#sPjJ)mSQuNm%C#}r{^HD3zr@3KbcKRY)(*h zIAW|6_m=_%_}KL8j*;|Qf%G;*8V^=rlRj*6X4`2*IM0%-S(N&&L}QbM{zJ8#r2a=X z1ADB%RxU;fk^y+M)JVSRA zrSs-FvC-MpO6KD=*pSZ9=leJl;U9SDBc>OhF3?NcM~L@De_T7bfnDFR5$#8WDgW^i;SAnxvM0n!#Y)Li zgtamB18~!uKsg8jlb;BoG7TfQG*}F3OAakYYLf^4nHkr>QA=e<$7R51MUVS@A8`uD zS`%DAOHuEalU4f|INHrOOxTsqnHW9U#&sw)o##Pwvp*qk^zm<PyqKxgo8bfprvsR>8NQc9Va@vhXp6#3`+AeYv{eW2teO^7qW08{)Xau#Io zvAvloq3c4p2Lq1L!TW6DS>fZL^pD zkWUv|w%EbEK53IrQ!%lQOp;& z>ofwa*lv&Xd(zt;d7cwiQYng`<4kecGW*?6ylhy4+$*$C~2+wo22ye9U`q_ zLot!UO?)VhO*?+bu#$XQFTI$X(%Dd|U_ z7gtWg=CYP4@%+5WyLEIEYv8IwhBVw9Y=U4P5kA5KY3#PgA0MHI&3b5?IrS2>6~X$Y(A(k* zg8!+myGHU;&dA}7DW0mVPFD^cyXpn{i16a)xeHQfWwZUIr8Jd|5M05#zCwj^xeZ2tueut2=b$`CcA-LJzr@E1Rwn(Le&z8xok5TU3B zVv%9a$-i zkF6Uo=MZl%kzPuEX00D-TZmd6^rg3$>IIf=h^)N*w9}8ARn@o1rDkYm^X2rPhUB|rRF7i34A|%{ z>;9LU=vh4&htObw(0w_LP=NX?pyES^?VM_()#r(*6hIMe8ACKtV-?ea4y;y_?*4_< z2rZ>yUlsX9I$3g<^Zc-gE@7PY zci($4E4ZNYF*54=fZ%tFAqZFA=pp855rm$bz?C9*wC4FF_lrXIb`?;#^TE)bqYzad z+(vGO4CV|>Tt1FK@`yhG{^>9O2#ecD+BUc}SapI9IIP%d%=9HNWA-SrOdv-eRv&}H ztA@*$c5d9X?#N)SXem@7jXtCbd5OEysQZLb+5LbMQx)hudpW_d7kU1%7u8S0Cf2kk zH>_m10F}@LbFOQ^@gv_f_yHU85eo~2Iy#;JX38*1=mVzug#uSPa+Sp1b}a>Pdg>a-`RFhv>hWisV!RL zfS|e8b=Yya>vv1lDMF^`?;IvrTlm^A(1W=`&9tK*d;U1|<8K0Il#h!ikCfQY4^rMO zj;iNzaJ|VFonS+#4J80J9M>83IqMM1VgR93sdo9Ie3Y|*pca6CedM>qas{x^3C(crzy zAhDLH^{51LJe$XVm;I-Y7+pHb6I_zCXm<{EL+C+4aeJfu!Hvm{IAC&&FZCXy?v0>J zi%-<}P6dRXOqgjs6okEVCqo6aR#Zejbamkx%3}CrPq$|!r2-nq9Pi<%-bb7DD31>w znz*snQM#a~t#4mP_*dv;IF815yl#79Xm_7BQWtjWkcD1}usu2b@p-Lls4KH0nMEd+ zgVBYI&wa!6(bJM6gD7xpCWPA%W_eeOJEyNWbI)ylh4soww|mPeTEN?236t0ZlD$wn zKrC7xMP+m%kNz*6$gD#8d}43$IDRe z8rocqGx^jA70S_=6?e1#Jac8ddgIh0NxH~c(1rH`?nIESL#Uto2iUAD5 z%;Ke!Os`VOmg7+amK-c$8{nWRaRGiH+h~?>Hjei>i>_kBICIXfvPv!iK2EP;{TRF_ z??SdSgV;NYB&CC{Z3rBuo6WDza9E~HI zYGHesv5TB_YJ8*r3Co(=q_bU>)}{_)wo+OtTl#xoyP>>CdL!Ac%#e@?96fonYh-Oa z_>_XeHE34XpMWY#Ho;fxQ1rNQJ`gv{8On6>^~bF{l=1+4p$I?O=IJ2db(Za`(K1s} zqg|dyRJC#SY7(cC)*k3apr2%DA1vcq;4hS$%q}kvI(h9hR2_K6K+UqVfL+Ij`BrR9 zu-3l*1(Ir!L99)d*YG}$ja{!wNiJ3Yb{)%ayNuu=a$taVd#N$8PmJe^6AmxmTo`H@ z&vA0orwUbqOfn$tuP`<1McpS4+XK&eD^omBO}sZ!aqy~kwlq-It39BAl&2*1N@E%m zjNT1`D-3hPd$W*eIW18TG^-+qqthV+TrS0u(R7lef&CV_;LrUHLjD;mj2$E?XN$BR zY<~QV)@UTLtYv%5#F$#flzeeGB+l$v3s=(NRm7W253a}XX$v}oZFbqQ_x0`1HvLxL zvj!ikOoHGY#IqnA9_n!yj+XX(VvZ+kLqg4&ZrFBf;Tq`bu-80$#!=ryRIJha6E`nF z>XSLJq7tw6`BNcR=3GR0A5-NO$VF~{4C)+JaYu(HZAse^+FF?}Es^O=<}c^A{(;bj zOf{GPCqsLWk)Z|G7WFze6l4Gh(0S@9na#JE(S?!lNE?%lWlqu70BMv`l+*ukO&QZQ zL+k#_q5ju|`Jwg0`-PUy**KVpW`eCW{hiSlUx(|LA!_2g)Uo_ELAX8TWTCT{HbPCI zNrEW{IQQpyABPF)ogW=am1H_K6Utf?xHb~#h3B^!UpYZuwOz)5Bc^Mz-6hcwyr}A= z_x-rdfPc`mV7Gztv-iGLo-+Qr{zBZ8ElktbIVwR&tD zL&20O!%oB4Nd8~;BB~O@UPNd&93UyPui&)mwF2;&Mo|9Fk0b&IzZlB z%bc7uP0yipTQc_W)7QAeGG@bw+FPnx9|d zUXu8mJrMkG2*S$E^J;O+b?Z~NPjk)zHo{@NM0qYHcyB&165w|EWaG^}I}40|p|y-f zozjlX&}Skd+Zvo zA6{`z9m`^QjxkY6iE15qi4#1O6-Jhcc7F~QCo>F2`~Ec;QCgli6f;P*e2K&(LY!}E z6p}*+{g4$uhzy4jo@R$1O~?5D&J{GXdjei@_at76}jP|cMLpl z)06JK{9D0i#Jm{QfXkQW_^sbPzZ(QZ$o}vx{Oy*w7o2*OWjq@06<{lOpk!^6K;+V?)0_@~qdpX^Z5#;USj?mhq*^e74 zaGL-+@j1qh%At3tz@;PIAXaS%zoim9-qP!67csB<6ylowj~z*lwkREh#`b*&sO6zY z^-CqLt3|zePrKQT6k-=ulJ+p*1_#=hUi!D>vQrC-bz#20mk)Z`z}zukL;v|ww3dbf z0QAAO8nM5C1_RRglMApMIn;Sq_lp4Etk%eAj=Xo}iv1Zr9P84$3Y&CZispRd+!-2h zZh(VdVFhM+MkJ{aS8?^;41#e!w-(vv2J8|j#UH*)j&-j<@U#NOZK z6VZcK=w<|04jC(p><2^xSL`h4Jg@Cm>0$|Id#uQD0AEOM;fBo1TSf`h!{XUAQvS>Z z8a?!6d4!RDxD!PdnN@js_nF)`V+wwAgmtrgTw7Be@h}q*E%hl%HOHWm+%B5GCy|Ug zF$_uilmR?Zki!;;ICGX(bDg&o^;Fw0AoP*po&Pj52th^sR`3pO_3I_`Ur#xPYopmKHl`5Mm>B`r=|h?)k) z@IY-FZ<8gKH#^RxiGQ3))Dj}-OL~=$RZ?{1yU&xb?vhk$VlyZSdEZo0Y(l&w!3RZf zAfG#+`{YJ9tA4$pLBOEtGl|_|3Ro?Z|BtXY4TN%!|NgI8F!r(U`di^h0osf2(F6WU;g zlip8&=slu&loe<<&!Zvpa#(#U1-XfFP!+)=;6Qh3tc#I+!cER zyPw0m9P^e#*F5b}oVx&=z-UetLlZfIuJY$^Q+e&s_TK+d7!bF{HuJB{@SW`cpBbbO zZ+}V{{~La@wYyuwAvwm9s;uu)E6qtJuD*7FJLPrB^A7ZS(m58!kKt_dU?NHGl8Z`8 zFRauDkR+aM`nueKK$@LHGQMHSn_R@hVXt*RZ3k!EcuZVFo70ub86lPBNHD0|;7%e5 zb=qHTHCf4;`t5NxXF)k)lE5f1`&$%YpPmpmbbX1)h_K*;^b3$UR#1o;!DV_lALDSe+xbhE5 zyaEM#GnnI`aT7HLDQIS+Q)cl+S?j*xEjzt-;%q z3U;RbcA5hB{%Hz8!Y#>F!}HAw0bTZyKe1Oaxt}J^=W_Esnx80+PNUc5hV#_o= z&brmsHKeECNq99lPMhlucZvd)5)(47+UvoyvqbvS7`P2E{W{*qX;}4+J*ur6)Rr|XN*hRXy0KFZekw@e zB!0(e9(qt726qKd3uI80wik88NxsUk9pRl9w6s>Mi*X7z_@)O#F#6!hCz zb`sxn?*FHCdQ>m$O!eEx0L5U5yymR8 zUbtm0(YmORxaS!eRIK^7J5Yo*jtPFpWipz31Q~cMVAlPEx52V_M>v#5|fnfg*&sJ>2E$^i@j(t1CqAxl^MC;Fj#L>ZX*Q3ozMAcR*1SMg9lvi2>k8p<>lD_=9B6kwzquxKNSg<4Wt!ZBn!B^?n+E7!2wfF<~CGibqQ(E z-34L;5pD<8xyCE-iH6ihu8=?)x+;7Wh2eb6vSA234EDZ*$%tw`5|UV-cAb_~Dv%Sh zYnWljbC!0w=o?mAeeWmzXK4&k+TGz~|Db|D81x@DnQXGQbD$%`5){6

2FpI-(@l~6@%J_hx#2ja zdrGvPLCws7gW5Z!tzBpdUMV`OFVl3}1=ZX`1`%h~cY!JfOE75{dV?92v?pI_Q2X(P zDb=I7gODj`5}iF`OgUL*J)OW3Er6V>mjGh7UOfU;&xJJAv(`L%dbwQL+KweOEqlYz zQkn-5XQKsqr$P_Z`s4j}I|q{Bz8dwxR?;P|9|eAYqDy{ranSXWvM4gVdfs_v!Hl1W@)2W}Lw(L;HtfP3mKS@4@!b+tfCP z*_k?=fCjKhssBs?91VK94&QXiG5mDuXKDiM6L7BUH-Lxx7<#hnDv6>e{OlCJ=2nO4 zq3kw;W_l3^)A5EB>ZMzUmV~%w4l8ZOza&CVsy<^BdD}$Aj0*b5`%bs%S2F(%I1r5>b5iY0m49h^SWy!aOSJ-#j7b- zUEa9lYNJ8+;-oL#UEhY}Jz=l*-rLwP`2ba!iGY<8NeH!31>wAR3gRxtL z3S7TYNWmj|PCxh&3ok!r-Y&SmLF~?uJ+bW7)Uh{Oeevut!x;;Mysp~y8z@|O=) zF_#W)y_t*IzEhnMwj3mT1NMx=``k@J7Rk5PAjnYOWT@E0MQ*6}7QDuogA*w%IvXu; z+%WOk-pg%{SNSK0l`Skmty`eRGd)QPPVqRAtikuSBKP2W!$u@{jm#FOVlRIdV0s&V zkncgdT->P1XXE?TTVw&%4mNHqYsHdhV%jM&LVfS@NeKk?XLM_gP0dp+yJri?E8P`x z1a1H5YL}%4Ip4TV`)9L$Mnl!=Kb1G2OY)}Pz>!v*DqL}7yZV`}%(2y^bJ+OH%7AEo zQEGUAq)A}j)q8&Tr}v!-tf01hXzr8!`TV$+Pt5{pic&;ziD^nKO|umJ;wFj=@gYMc zbp@;Nr<2HB? z&>sn?vHu*Npr2;$8PuPOkOJ2MQ$UtDJdHOQ!GB40Nkfgiow|>Ft^`xKnGrbvqI^iY z^#zkDUQsG`cU`rLjO~~AfMK7Fwx8*<6c+WDp9oZ*dFKRrI zyqfr!a#2=jmQH%TA&v!#ZYcWFykFxRqqTa*9WTH0OH}1Fvv1yRYNP{pW70Rrn@!1QVm&vKED6M88Dfu;O3IxS94l5~^VG=2SC;)59b*!)V%n zNfX5RbX_^7Te3V}cqwA?e$&?l0#(Gpr`7C%T87gkE6j);>ZgaeGTIfJZcib~iSh`M zfCkqgf9d^Uh*G^=SI?3~;=T)hNvn%no7)QwhTC)p;K&4f&?9+Bs|KpZ%yXQZe{4y& zzDi$)e!moTGznf?E`SiuE4DU2L?-4Y$QBE&!&$j672oGwl9xz0RzzKobVha|QS~^E z*>!6wLS^8dplHzs*DEGB>N{1D6*9VKnX24L#)++vYrtXQ>F#pW)r}oIJApN8=+Pgu zPiF${!Lt*O1)kG7v&FR6DxWi&4w#W6BHlF|{}{1Ae}F4d5Y#?jfSFygIRKrJ6+a05 zH9q)0ihE)a7%ehuTZ+0OXan-87*l=6Hw(4iY-YvhN*X@Zu3hJp($=Z59cNCbT<}Iv}_H0kqxPA)?lNK z0w3&RyXDz`9M2Fwj5+1Wudh5MbxrT0}}Yfr{?eJ)0vq@Z*g(JW*A4m+o&&uA49)XCfI z?tb&@B(n+0uE&bv{MZRsY1ioK<}Xmw7WO4niK{SdqN%^p)$FfsubvSDdO#0^OiWYz zSk#Cd&kMsW+DM3>ThacOFgRb5l~O){fSY1u40R75Mtat8^SOS!1fqHp^D-s_Lf5D| z<+K!yV0saC60SS3HXnw)Ht>HX^>84>7Y-QYxNHS1Ck@?|aP`K3FA?u=CSA}(0|@Ie z4W6V&1r`XL-4n$ma|`Oao^?=NZ7Kf*&^F5W`Nb+vU9WP`>0>3Q4sW}`SlCiAM^=h9 z``O(At?y@9>v2xfK@g+qtIS_sl5@kfvZeH%HW~&x0*-B0vH|zaQyZ>VFH3^RP#I;4 z-yW4cg{Um$e~>+nE%?V?mKw}g=Ozf8l%12)nXR^bN*HQr7usV}s;3Y3s}cX{S93;$ z8q-ZlT+2T%x7h){cL7h6F1FoW9XvXbD3=dgy3^?7*>1Q{Q;107$PDswV5b(%XLfml zN2z3G>e4?~A+p8e)={{3Q-5ojrQj}IBq!h4Ia!e<=TvwRDEH?UKXx5`gtkIW(Kpy~amyPt3G}8v z5^^%e9{KKoVEd1#^oZZl8$V&_8Ef>wT1V+v3#Z|KM0F7UojvI85vp`Y{XE+IR=N5z zc!UDY&$uV(jEBg5c=&qx0sEw=nc)B&W7tK!;H~$AdV8ApK3ipo)3pe0J|wzg-t0@s zZNf`Ozev1!;T4d0&O(1%j4=2yUF#`sQi0JYj_64%c${wd-bdaWe-y3)$!a;Qu)Z`x zcUtGI5EY1jq_I4C85aX#?W@%wUY~S1K>Rmq6#3XAZ>v#=1!|(ZsrYObdU!*279KuL zJ4CrT;%HYSgJxg=r-U(5Uy{1-n61_^f<*M~agLB)OJMqR;_Le(c~R2AMf(xx{G8$} zo3txgQnC8!zanwAa=%L+K8VVw=l}HEzrb1?DuuF7|x5BNbm@SG5hwGUTc1mTQWLK51U*PrWtCm zY)jAR`gpWo0aWy^aZd70s;FPqn-DJ+)hC_RclyEA6GKBOGwrr&cL1aa48!YRZ&;?! zzuPYvdX%ENNmrT{c7Y+6BJFDgI{f0M4^BG@m~=@oLI-e zz1#0KjxT=&q~sA6oU9suU9W4++%~k16s>zF=AIHj|@Hm9exT}zCFw_ ze%^zKCk_+MYFz!+YmA?%#bRL6=7g?8sYX7dio@PXgE{QPVA@^e=}0;}`@A@Fu%-Qp z(0A9rL4z)_GkI|F=Kfe6$ZmlNnbQNKio7f&_s6GwQPNkYKkUhl+8Wh?*%2VHPE4am zWtZiVXW?U$x_>+LAgz-20jF)(o_}ErgXe+r7iYm+n-Aq}Mv@OdtZV6eh+9)YUv9VR z1amjUBpK!`#j{`DLnIyau!#q9t!q0^N>VXaB&M#XLrFs(=VBOM0mO0Q!#! zTIZJFwFePz#5gVL_#D;EFV~zoYkfz)#*xWrIYKv3LGN|7^920BnR&mLF0xKIXa40I zyuDKB1&Z0Lrq;%r?5#J68S&jDxaVy(NioxTdRFc$9zb%8s?h179x=Jm7>rOHF@N%s ztbp80>QlOoZWCvpKr_dQ`vC}Sn!ZW#a}^Z51B)a+$8uE ztC=i+Zte7e{2iNTQLSarG-K_f;Y z1t{YKx`chF>iy z+zmb>7a#LT==37RI-2bW3I#1U6Nm->g@eTPyx!g@FIx#kUFJ}t)>$( ztUo6)XMoUY)f`{1=({BIC&)My^nhgHs9O|MH1!AQg%hYudTcLOz( znrbgR&j|j34D_6@W=n8PkDQ>+>#&slv<4m=O{`6yb?;`{mWP&MP8?Kj>LbzVvy3#S zw%5IW*Q;u&Kz-ea0{NV%*8EG+0Q2c(i2^&OSWo3J2$R4S9v1H(D@$KVA`;lg2<+zD z%R%IIVTR#hj9V=Ya9ws&?)?h2`u5*|0(i3vB<@DSXuu!ja)MEi2Ot=5M#u#Z0)Kcd z@chXuviuv#L(n6=oR}Ukck_yc7|bDB-o*`nchUuVVw@qr3JqlUs)-%n^R9=;luj2y zXh&qf*Ab(xb927{DLvuCreUkNuYWDhi}IdxZ<^;i``?apQf0Y*-;dLz)DWrNy5~T5 zYJ06mz-!&3ce;O+q+^L$$C9{N(=kEj3S&dL%tx5JAuZo^bj-YSp>(~;B3H`v z;xZD46SCU_*Lo@<2=cSwC|PF^Bj)!mv#Zix4Lv-xF(cKh9}gyFkY8>`R(E&RVBEQ! z2Y@89;{C*L5omFj5ELS#)%22~3gnuv?MbnG?We?|MOO+x@84E%eJdaU2fc|>kEW?I z)8dQ3@#wYd{ft5jLG|tN7?zUAY8*x8lp52??*#gNEoV_A*K3NLv3qtm^5gC+X^F(A z29%P?e6>3modmmF=%)m0b8$K-R9NI2gE!Lp31fjufhy>7=80b=A?px_to6Uh>Xu-u zpuptC^35nR3lV(Brgv9!|0`f)i&AbVTX%NP5|g8aN47zoGj=ic8^>wPB^CnQnMKRM zMc5USG@Te@0{@o%WL(rrK*^WSg$Dt&~@LAbKV`>mUon6Qt3xwvIGjd9NpZQi%3$f|)M0ttfmMHf=3{yA+ zSYOs$Fre(D{eYF-joZyFmM2`;=7NRidffctU@V;JuMWxzf0nj6S5 zTPK}sD5<-HTj%cnK;H1oH&L)D9l3>!rUx+u1^k%;ZGw$?0tm{WUS!8GDLd zsTuuB^8J7F(l8>gAp5lT9SVZr!%<12Ps}Ow|7!%xm{zY?iJlczw$=V{1L>ji*XS-Y_ zX(a6;9phW|9ubXx)3=zSP~dj}vAZ_AxgJwv#tV;C#n46U?c+2E4HaJxvOGuH=50L}>1rKdJ|4Icu;gs6f8p>{jf4fWL62d_{$62brW&ik*> z%A<7MM5x?q0f$eHl1r2=|D#a&qLpVm9vUF(m5SvD%3xI@WJ$Xt%fHE z-k1A2?DBK|)$gSt>AeC{*5kPnb^pwS7OzJ_$J+lr65g`nvehMlL{WbgScN?biG`S% zDPgy&|FC%KA!~9ktmCYzpC*|FcykiC6-ydpCIK0`NlYL&p|sEJ%?9h9qNRk-HKHmR zxvaVF3)Fq{7mO~J%SG<}eS<)|CX(3Q6VP%o_?HSd%gbHURB?ovAl)|Et%I|Nh4Hg~ zzGXdT;*9S_l7ktdWUTa(G z7*1Y_G}!vG_ISE|@q8{Ho<-^&T(=!{eOt-o_JjWq?*`)RokgvP&gQ}=w4?=f!u++B+Y7A$}zi&bNDtt(|7XIzN-&KoPo8sFO3wXNcK zp~P7%f+*p~9;t0z(g4-inl4}y+)#5uE*Ap4hyBMy}#Y!3?E~3z;~+Kk`-mRNH>OY3|sjEl*aD zx|Pl%>Q6}q`t@K)cpV=5Omw7da|W2HF}82$*Cn%v!(YiWlr6Z{Vh2JC5ABIeY5`={ z&Nv3)p%c=p-wQm{J8=Lzh0BNUL^%dv#~}O<@w2|VNPq@W zy|^22@x8PaL0GEm@6<)URBOpUYY8S?V#Ai@i+D(=LGRp-xG$`!7{2@;LgzaoTrFzf zJ)+_^^zn-PM?;kW8>@0D9;-yIu{L@B86I1%)@deRa*o|MNh9hS6G7JSK@`Z{fre+f zqlcqj$s@7lBAAqogcJ-5ZefMW$%Z#_d&|!zaRWH(%6dxk2aC@+Xvtu|o8=CGCwJ6L z1ifZ^oFoRA2Liqq$AH8Ad&y2EQsgZn0h>xW_>UK;%XQavgNAZhMx?}7IFc3N%mthWK)6o! z(8WXW+c90GSh*ow$@fZ+fzRGMeaH8PIci`u09?vGvq7oCKQ2H`G27ps*LQJ7!-#P+ z>;~K8Xck4@eXSSjA>sa@%Dx^6LBIhdDwFGLTkn&gQ*d?!>HmS#$#89cAu1o)AzYTk z5dWwl>@Kxk#mfRX4<^%L<$Y9Qtgr>e#iN5+@&BGo--m1i-v;Z72|V~>(4MxmXgV%$ zFKHZvM4DJBQ{<)>x=afB=yd>!DS80pVZQjm(*yNf61JdRuKy-(w~h}@~E0Q zg?G;aW-S0pU{-emkh!u(j`83XWVZs-=+~=hftDW?Lx#o3siw)5^Tyv2ONePSos*oK zP*R+J7_^yQPV50Owb`gur+YED8G6#;6)x{0Li;HbD0IrB_5;)$Ch#7gBUwVyL|@1# zm8Eyn7Zt>k;BTGrULX9?sa~3kq4j%*cegSVBbnXl2x>)rn?ziz5nSx&F!{ch%RqJ& zv{UYGE|Mj-Mh2QWpePHsoOn&LaI+BVCtuFft{>S0F9@Qx@tc%{US*m@%~V6)ODI4@ z7q#bGvS6T9PTE9*h6Z;8D;n9=bk*<6aeI_!G3K z3L8U!8q`i&)95W-Gi!>aVf!YX+p+ny{igFX?lF|O?V+RfUp51wr(#%*%O1*ke9)X1 z5)r3=BZNw`LRmwAoS_%AjD4G{k~Yfi)EFztEJdrv#Co)EFfETi1QMyvtbjOJLw z4O*S??=}^xjF{E#6{XS8J52_by5D2oQXH0mYn#7BLwfk3BKH*6|HDGR4$jN>ht5-i zushpS`Xd|s&nIxMJf71gL1ZXz9jI;c|FccKW@ybG6W5&@=(&h-b7!5FKJyJrbQSAe|$+4r5vtG77IcDX!@B=d1y>Q0HyQ!#5Q_NM252tvT)omGvl{VCg# zpgZ$4jx;yhWQ_Onruo7&-IQ;cDC}uwb?4c90)xGS-h>1q_Z)AaPtuAl!zrEARfoTMg;<9(AZ;i zPOiUq4qG596)3AoKC&}JG!gbaj-G;oGc=?W3Kd7v8L-^9P<#NU*)FF;1ci=pG<@0} zrC*M1Hz`xWBt=^!JMv$aCkWT>Y6P@ALHNfatI?EZ{dJng_N@7%B zC?@7A2VamZ2tCt)KSZ2~T8Xkp;EgXq5iH_|7@>@qb|nNZt;DSF={RsR>0Fn`_{+mF z0pC|2Os-FWTy#;y=`Qs!=qV$1|L5Z3g2&cgRDJzOfKR+tUx>@Nn|7U2-N8SIesYHO z9nJOh1<~3o!LRR5=isl`aLU`j`YBQf9H?cIOOHZBoCJF_W7l^QCnX!`xY6zUc(-fd zO#!KKpY0y$dmtJo92RnQXkL22%Fb}EZ3LU~sTaY2UY2*@0}X7~&{9euAg89TttK(nj>d$Vb_0&=g^6(V<7Jyp zNdKCZa)74scCiR3Msn(95xok`gC0kXn3xfh+g-7YWz04Qui!A|pNh8#OcUm*R95Wj zkc%b6iLHPZf|-ktjIqX>t=83HLNLXU6sXNv-Js?mz=PPEc%~Ks7aP~qR`fo6j&P57 zX{?r-@hbC$zLV;>nl(5)n`qIg*uY_l(3c|PHy%&`-96vH@i`A~erywmpDQYbJAz)Q z-$+XXR5{R{>?+JIcDIAwR)aP=!(!7wk|oJ&se7x|OCamTFyrXoSp>W%p$E5R;4izD zAxN=|B|!RaAGs=QMFAKRNLRke-D7B?uqi`Q%dQ)SAu+iUX|j$hpUs`#rZBlgzdV&~ zWteR&pAS9jbArRj#(`SI{?OWju7+=Z&ssyc>Q@3@^rXR~OaACF@b@}Hnw|g+tWJk; zk3?vXbBH(M*!zRONXSTSOl?R#5#-Bcy8Tjhiv4@PXpAWssS<@OR6#sl*1LR;kX=er z!(JUw9M{f6)Mu|h_)7Viu%6B;Hjrk~h9U6BwpL)6a=zQlV`EdE(IqN+Em$y9qtOqj z%_@-FVlx~G%?}+9DH$5Tn`|IjQ<>)OF2Ba(Pp!tm>QAFv=_zEoo|orW&)mA?P5>{P z3JqQ2sJEV0Jk?G6P}XpR#!Yf?w4f2k+kl<*!LvxGM=-g4S9VzV`=ezfI6hv zKRdo9V0(p7$T|OzA?O7Dfj*D*X^f ztTV?i|M04LyuMv+!OWq=70p9jg(@6Jzo;e``ae9zIbF@I&`zZRphN~ zz^QQ-mxR<7^!E6L?zMU6R)mQ?Dpago?1~R@z5M4xr&R_Jx%1(ZS#z5vZzTA zRRHr=A&81{Q-P$(>jsLb=6-$E%tCJ(e{({W`mOeI&YdoyR^dYF;k)2qxW#t?UbtS+sJ-cYWXNrav?W_G z0r)-_%Lp?}erZzL047|Iyh>lJ^N^a8U&9G64SaKda*!fmZ_HLdWC#XZM$UCyCBbF& z+OyE6;PAb&897q?;B_<5y%ubZ`>}Oz|J%5v3)VH53{V(>h+(>(84?NAeQuDWZ=_ds zZONQo%{bb3k~(rRw*=r|*nBh*(LQqXtLV?)z#e-L*mF!8nGdFTw4vnf8#Q)!qi_(- zpQ0Py2@=148Ny6Ped08geOUKo3LP!Y)jzK4vLVUKV1`J#1j?ee?xMtxW$2kGMYa*_EUFBz{t+4edMRy4mFmvzb56@lz-G|I(|4o zTQVJdufDHuB5lod_WBLZ(X*P5M8-#my5u@M_X8>@2qA-ekLH38Z8=?=7Nlkm2WmJR zq8C$VuvBv-@H=~To&Si_7Q9cTzJo;$a0UbB4NeUo$eK^RNt0X@L?p2PyVYK7#?lX! z_&tnC`Gr%O1Vpx=RPz;fA)oN-AjH*!gV&s>SJ#GaPp~~`aSU_0`ix3AxA)_j0c4jj ze3B$<6H(&q~VNzy9gC0Vy7rE% zOP=3I_}r%&EswNe!YUU{>cEKLB0&70MCbOz;YXc$u6N{b#=pnqO$onRl(dDXJ4 z!X-L)Cj8zN;Z@C=S*lbOWbZEINB?h$BXWsvUM}`jBJQGL%thL<7Au3N)3h|Gyf(VS z_@MwEKBv{JmL>VB{SX)bwKK*#TBY5BVJMe%OD22ApRVIrAcD(i36e+qn8X5;4$7dyYh!I z*HUI!0l2u{zqzDM3mE;Nr%!GJ!?&+Bbj@=2ROprO1mz;W zyMtA18sDeUpKgQ$<(e401DGwT*Axh%98G^D=9Bj^l~Nr$g$+jTiBg*6rBybJ7Z;pQ zUx*0kND@(@N^NOsCJtgH_A;3u35 zyvQLOX7ldIg+W`DMCRzO#28huI{5vtjvdYdN{@bWT*wyG&Z#2`WD`@!{ z7S(ll9hLT&cr&^`dt$^Nb;NcY(9SMva_@qF*65#A>4Q8u+kJC8C~o^y*}sfp8{~ZV zeVyFC=;=?I?q6KWP(s&_c9xnJv4`tB=URBwlHaeO-6!8joa_bE9D~#LE+qf5)tqIx z*rs?^)l~TYVpLseAoin+#{uw5qWFQr?=`HD*p+OfmRogZD4L z8yql#nIy2!uHG#tF!a52a?=xZS~PeIC5k%Z)#8ywJ4X)~Fen-@>|kc?LCkDZ2{s7i z>)Sf&c?Uz8Cmlva{cwY>m$86RY?W;MQPF$1iPvucoY5`)Jt{H&$L0^oVG1qzOaI?3 z4uxZUkboMR4gz<&%}<|dNILYH7h!tp`8d6>nKF0AV{IIX5%Xx~X=+mKCjJC)7~=|z z!(YB31 zUuA+D$@L6Y*Oz3G4hVr&ZUeG7WAnbF&%Fr}YF?y&3GaU=zJ~C7nPY_fD$d<_z-3C-8vXM}P&b$X%fy zXHv5}w^7%}yc&48$%?{p5-gEG1mt^@;=k&BYLsPGZE)8Zm8*z~fY2N1UfPcK_H`$jcKQo-$E93Y-j9r_BOG zJ1frp1O7YCF)^XNPlFZ$e*n6&0nEzO^`-7PXS$kF9>9nmqK<*9iacF9f_0UnIN#7J zfgR3&_Xwk^sBMkC_(4PT=u-mC9U#kw+hjq=8W3mdKMX5n3{a6&tE(whJO1Egas9?rtb&6V&{azRY@Xz zmMhkKfk1}+pX7G_3%jlKs`-H0CqEi96y;@;Ph_eCFUrSrk5UdS_)OkW-$LV$Zf1lP z_Izak;q@|nVigFHRrCzMI$H)F;%6YOt}tn18NUQb98@+gOZ$Y|M;XOnIHits+%S_A zxv;N4Vf&-u>GLKzCV~B1!{CQ8pBmm;Fc=k0;rSg6+7Jgnnrl1j-TfP_3RG6Ys4j{B zAU>1-pay`DtSWNBzb*>4X5b{kl*A<6Xocg0y@nWm%}^ZfnDRWwR4d8p21jInq%e&Z zBr8|GpExe`@E=%EP+I)YNf2L;XW=8CocH!zSTCyp1XQ09BpE^{Q5jzy1`K0{L>O7+ zY)P7D?Rv$29so9NmCK}w+6ZS_Yw5YvQFkG)EA-gfT zBf`ZwN&L<~ZR7O>aMauI+d9DAdx`Hkb^Wv{ka;8;^gwy8I+?{M84@}Fv-e}z+2I}- zh`YQ6M(d^PIOz{_KyvP-tbL8Mmr~h}==*(BL#YEB3NVSePJ%Hx@3`vhdZrgob?gDR z0k%c4c7xTyh-c3l?bUBarxK4lF;+jBm=x>Vg;FMQ`Od>LAX|MQ0iY1gkeR(yuWvs% zxK3jK4z7cibSO#q?S@6W?U~vZ2x3Y4d6?ORUsS!YB49#&zs!4Ah>j^V3{VYOJ;IW} zc&t@kvIxF0NDfv5ly!&f>PT9cQ3oHF}l4cADROqYX&4 z%Yj8vWultGubQFBkcNB#Q`Qb%p8Pft$1 z2IxOTnguk2wPcAlS4pC@Lq&-;_8{oUW#U3hKY2yxHpsWV5ly6{F@|Kb~K>B${eaEMM{P8%Rtdg;5XZ&jn?l#{v;jWTm z#t)2S4jf(jCjv#I1_5{XsHS?eKAV57G7lW7(YqNa_ODMV@9rM)*)RYXhjws%@ZJXIvK>v|o6P|L z7|+L}VerQ;H0edFeE|+61+sX%;V9snTtd?MPe(v-XQ>N@<9|=78e=sKj#Z2WrqN4I zemvWgZW7Dl*>EL_(c+LK_90%DW+PK#eQ`A%TGX0C3&%S+#=k;5{AC_8eQ5K)w>hiI zi+}tFD=A<+emT_zlKWm1Pt)5v|JB<*+WPfZZ~O0}vCJt!MSV+N!dKHWx=LZyUh%4t z54?6;{-u5@GPD2`xAuFXAiIfImm@^noa*fsBqYoTj?35A?uEPZE)X*iS1H%(oDbYR zaw6h{#D}D}txM?CW;vH9U)GmfAHx|r2(bNDH1#cg(0+~ajRfD605$aI*@F_e?{{I9 zFoqB@F)G5PXc7d(IlKy^J1N9&{-f}W65o0XOlJkmM=|ng7^Ten9*OncvEC{X&n-qx z<(LP5R^RoM>6tBdWc2(DNghaiyir?H2>w4T!Suj?|Hf{>tr|(!j==D)cBz`({K09f zxqG+6kwM2S(-KJw$;V8YyG@yg*Nq{cKeXb|j)!eS@#er}lR%k83s0#tLqX`K&3@D% zUCo(y*UW>hS6^7qx6##FJh@I{yps^Dolk-U$gjOufjro!wReo0D^cgqtl1Q(*$L9 zgV?6MjKNI2px>5=;e^rrwl`ZX3ltw$SDw3}wS>YO8`x_(@&)}`Oie-7YX05X(+*%d zzY}e=Oq6hug`II`z+dXLc9L0^#Y`{@>~ z1^=*ver5Z9VQL*PL2?-743pI^^GH}szU>CV_2JEo77jx^;F#C0>&gayG zw(!}%Wn$&;EQBf)RyD+1rcs7?fPsw*hO}WWt07(GeBpz}pV9LEYI5+7UhmOg?5`FL zw;jYJO^foBEO2tO{IVR-Ffsf?X`9G$;A_$!ZCNX{*p@??K|d_?>QGyMqh{3apj0Yx ze`Z`MWW1ZH&E}+`|M`20ciUTKICryBstLzGmVBpJ2ff*|4v(-ZS%?O|H4}g1p?DAx z^mJ##v748|w1xq7wGU4{dbSv?U;_=V9QaZk7i2ih)+4E0bT#zn0L3Z(aJgFBV%<7H zIK!C9L9_`>J13X;i3U-Kt$}eoio+{qd!1I7=-i0Ou;1b`#%6_ww|GqZK9@fw?(1zv z&$xsy7}Gxy^AsI-{rqW~Izbhq0GA(nX-bK?#E=0=ZsoMrgG>xVRhU(f3Tl%*73$xP#8au97{UM;B{E(;V&!9F~yZ=7yA8>G+~Cr zOhjmlw6{m|TEw6aapFi}0W^3&2TfXLRbH4kL)L_ILJnJqeI*#3$V0C(zZC2FrupPm zYWHMS6D_w7YRkk4?;l{ypm@FSIt^X)Feqj-rEcH6ByWd zchLDO{p<{Q7!~{R<@-IZfABzkJ9wbR`kYe3sP)a0(b29pIsgZ|yN|F+!4oq4tK0P; zA~n1FS6L&9u2>L4&q5E#-WJkHe8YAw^A?+f0h8Tsaw>alh915Q6J=WKsbCuahClh18rIdD>pLJbDgn3sesX`12@^^ z8n8C1p8s{0QBhS8RotUBzd$0x=Gn6Xo%BfTLtO~ZDk~2lfF4_7a1~Dro{2#Ls6Z9~ zCVmOfNx0BM|3KZRJ3j=ygG4#BhRB z!uxl6Y7OZyL_HJ9QUgBr2X=#wSN7%*rSY#25OHI*1VCf-DcCfa8jBr4$~?yNlt{W~ zqvW= zgHSwhMpG5Tl4%T~hn;U9SMlgcy_yJk7M0#6O0sC}@GXfxpI_?F`0`+4hEa3Y$%gsj ziM{DM(L&Y?>=tm1U>IKY=rOzmLl)nJ^|ze)PHby+Uu6D(S60f{^5=#G zqr|Yiv){bgDQBSC$F2V-Ip}}e%W9mRGq`tY@=xoRxF<-)_|X%nDFF*bx`ze-LI-)8 zStc`J}+*}_FT>->OJA(S>EM$^Hsm^-k?U@h_c95$UG4<@WQ z{WcVdSv1-wdqs~cb6Ccn7}g`>FL3DIeLLk>1sC#%W9JIW86`;&zR=~t&ET2G>_={M~&d;Mp-n;v}(e}bP1U6_B@-V#c&E^B-2)}%)X(koX^#t5?+ADyZ`)|?BeGBz3iP;Z1p>Lhf0B(L;diM8y_NUg>b-u!*RtEwpD3({_*(&g> z*Q$M&t2D<5uO>M7ueOlfb&$V_@(q@aNC=S^RmnB^!~3|0!OuzLM-vQ>Lb*Zhicx2E zN+=oZw95Ny(lc5eiMDqyK@S1>bjGg!0g75$xy!Y6H6x>r@9$b!Qsst%IW?G3Rb>Oi z@TEi#=hoUm;N0Nl)5TskjBe%VO**4%5>`TwPHEJ|eMH^uF)-S}#^$uh8!dcQJQ~Oy2IyS$Hs)k@ItPx3 za2T={wO_Dt$Jvm78-PzK@}lV-UcVeLxRrAN>@k-Wpdka)B3FrS%`}& zj1>2h&sGAwH)WS9H_@~+UC6fHzj#u>?VT0X|IB6G-N|LqPo2evNpEUTimjc4j0`;3 zm6)X){C}Lic{r5)|M!2+7|dA5k~RC5EoR3~F2WGi_)zF}{hL=08A$XDvU4Hp+|axWb(M#Li55>4bcx2!i0JwxtoadVMg) zeQQb=NN0Ho@_?pxAElj_Ghm7~SMvGQV))!H$}PSc6&K0U7-SJ2O#pv|!3UTjpJD{D z%Gj`Cu148@kbCWI{8BiH+_ieH~kN*CRP3sz^;X5ysGcVrmmcUmP>< z$507QTfYsJxY&yr*p2rk>#CBsGd=ZbR*QyPnJY==CPDeY{?)rQl1g=0Y$ku#i`gcq zN@b!6IqMtV6v}fO0%N8~#YMyL?&e3!ZE3=_Gj(%h;85!xZw>O{7g)xmzSU)@9qu!> zmltLU7Cx>AnS?K98*$~GG7;)IwE>9IZv{#Qc&1v8H2KJ<`JSNM4VT`4lhEvR*z0wp z+|T-_j9#d|D@bqPgs8AdH=p2mm-wRx9=R2~il*atWVUBxBwHux-phr;yTU!BO>klv zkMXkEIdbDst4A(}s?ZWR;!e67iQ7cz6&G4ol@YincZ^^6U~19R zbM7g*=LSDM*;!BY9biT}?KPQtJn-1zGxDV;l_~5(4PBLEq){7wQ>5htvSyF>yRo0b`OQ?ft%A9=Xe%KYz7<|O@_S$k0lNAIvt$XCwS?g z=>-TlVgbCh>9KtkI4=6~vNRHE<#@{Bt;G3fkJ)?5jvH@(b57 z*oip{SOz&M#1Zb-(bNE^-kg0A7*W821qLXvE5gnVgD0GNjKYo!J#+ex$RzF^n=Sgf zsuK~<_j!(#n*0pu$w!s{Nd^2KJiGfc zj7)a+zdJF!>(Jl{+nYi-u8?|GjP&fsd8z?(=_7d_E@b>rR^Q_GbzTrl6*`fstM3IGEOQLxFtyR`R&%c5gt)0 zfgUUe^|ag^qNU<~Haugr+M6%|$?jK^#-y0$g4=|iw*D)fWv|_S1Uv|6`BbpDJ0uLn zz5h!e_=oF<`_I@c#KP_}8Li?Z()9Gh??T-smH{5FxUO$LyEX!hS?ywYRb$i&&UXb4U^|&tU zLaGQFtyZ+$tbHm$V0*NOy zvx#)@65v5}%Og_vjGJmy)c4YuJ&`g4KTFmfL(&w3wS9xBqqK*Azl=!WHx+(+VfYI} zS}9{nB3e;KQMufb=_Hn8`?l@`e2vX$2+DO>QG}-dG2@$Ai}*q2zI9goaTo#0*Nv!M z4}t~14dotVQs~zRZYr7dLczYVEBS3bym^`Zn(uDKV^!Xej9PxcvFX^R)@V zL8wB0xFJ=A?Xp9nlZMpRuD|++L!&f}IhDa7wg1f_#TC+lWw;?&EA?g^Bx*YM!H-6p zAbwLOGr+GJP=onTPs6A0$z%0Ko@auiw%Lv+vW9IDd}Q)Y&UlYzFVq;T3vx!K|haU1lm1dx}995L`YYl&$Y*uaV6B{+YG;8^7PA5&2 zV^bf!C!l6SHZars1XzJaJRM=I|GOGLBMc!_BST30c)jkJx{BWG-vJ6;vcT8M_rAUi7iv=lJKG9!SRjZ zK>oi0NWuF&3nS)f%f)r7F!=LjXfU^H8(~uVO~G+i)XXtGc!Ig9wv?dLUYE#Sxv7Zg z#Hp*SKi_vN0UkR_iz>+Z6=mu#anBchC7dTYz=qMzC`;j`UT!WsfX{L1a~f$HV=)em zZQm)_nLh7A8nI5De^1(Ebe;JI^O*$u>$+eUt9j3rYA8l6xL7{$$&gJ4sXG2yftz@< za}`8)7ls~rCrFaETJ>lahp7gW*}PUKu;>Lf1mS$?Fn=%6X`(6(f|jx5XbLgg0+O1R zobHR(GZ9V*Yqz;6bY%R-OxRUFj*ttQlk$dOcVkDKb%4IKD@C#P>XM;%f{B!Dwy9+l zJ&MXzdZv4LfkoBt5FRk(tg;94bTWR9GpgoC$>r6hDNmu}-=@OuS!Rx|3*mJdCG*Uq-72=WFy^j&v z$fC3UeMbg{z#;tGBrQGgy5N!QUUhia_n~+*is>owC8D5kgWEVvDBR*A$4WjZ894bg z>hJEyFOm*;S&)|WDEQV%%-c=XV64Sv82A3ER0!8#Zb%+w8%erq#!w|UpIMJpec*Nh zWa&^|ZpB*uQ{#02_XTVezxEaR`e6}v_@GH(G?ZXy=_8SPC zwZ89nwkf(oc_x8?I{0+$%xy(95@%0_zxW~#oPX3Zb)6vSuF3o>2-46;s-<7u? z{1L-nJwPQUuM`xn-#?^kK0s$&f$tvF`m+)P%6G=b1_t|mmw@PRt#qnsAHBVL z;^B@{_Q1KL`^2NgF=3tGMx38&Xh|q6Hd}a`a+Jz3N#lUbi>5-A)gJ@bUzxGQ9KRUi z^zC-sO~Fs7&&CT5?^QVC`5t>n@ZK_2vHjPooMU@o^oys%o->>OhVRDWbf?1Rwk25; z{?zT0iLq>zH3sH@Nl(l`e;5AK!3s_UV;_;m|?cV zsWzWAyht7)?R}i1**O{Z|Jz`-SW+ZkO>BwUkp5X3F%CltdLZ3Vc)>Zfmvl=Amb)1% z6~o(1Bp%F*7TnMMVnQ&S*~hjY$?O0LYK}v>BxH9vVMCL}z3@D~6d-!CS)!b)Unk0S z+&;j~<0yuDlb!Ehb!wGuau$QA1Ne-tx(TKQkC>DzA&tMD^xV={{n%~IRTCwiaUzCk zR$ed5y5aHY_fP1x!+7_Yw>VPf*=lTaf*buy_@)nF*l}J!I<4%LzLqtbAbo!0lfa;0 zWrU&`_A!*w0kd;`W%DYp;OI)-kv(#yPwrf4vVI=XUf^E7G14s^*f4+gy5Rab$b*sK zSF6ourrviwEF_RxDDch$-lhiW!yF>J7TX|v(8GJh*PNpiMzHoURv=Z&*j-a0N23=a zr{*>;t|vk1FHoq>@5t!Z7ZAZ39hD+QqWAZn-8{<0W-PnbcuS|Kc=Qy^`gkrP-38YG zR;te+6JTJaIu4_7mnFpLF4H%SflR|YjhceJr2X-uC3DgO@|%@^KRZ8b~QUPM#dL)o(D23y-#doV0WoxhZ+*k?hKi;-Z3N;DQ8{Wh^C0g}FKNrZ{lu zPG(Db6b3M~T4?PJAD9nP&Z#ETi6;-v;6V6J_7gCTG7>yld1?YNxn!J=v==M;8qqAgw!6jVM>Ql3Mtdk{^^Q;_PL~^&` z8nb(=qy5dCwZaMcHg$eL=9XebxnN&HFx`PXISHqAEnuRSMbbF!lu2l>a(yIh4zL9# z?xWFsc%3sR{s_5jsOWIq$}S-7@EZ=(8Hvm@qq(78#uG@E>ib}0O}e&$o7aWzjuJ&) zYHeK3yy7%qTJG*WCdUoZF$t{U;2h4;Qbqxe^(J$?u0O)}Pwb`X(;#01Cia>S}~ z0DJ2mI-LC~Y*xptei9ZANh*={0N3VPH)WzW_U;tKv+mw&>}2CgK}(&jVylIvEd5>;ioNnhOwzKXf_K!H}N%s<7yqv7knm-CfEXtw>Rko1N(ZY@X&cO zg?}sNBJ(@uVnfGGQ5bQOGQ`7MV7i{#6|h7L$d z<#ju6b&Fht5&!T3%j3oE zE-jIx>Uh9gos#68s5TPpWbHSJnebaVtx({E?V~=tv|Y}J@aBpE^*aFxRnc+GW_bSa z?6dDNm`?zURgGvU&bz93;8g=0dJFM(=O1 z_e*-==*QGUetj7Wz2T$ba?9+-UW@p89@%&|J*5B=|DnX znqXQfr)yRuEa%xq@u-JRmT26fs`5pLnPP)UX>g|5T%`)TgTDtL^9Y<}z&H%Au!dCo z{jha^X(2tAj2CVUZX_cR!=jE7W|p)E12Hz?m{j z5BR$2oq1fpGJ>i?M(4A~NHS$VniQqmQYP`aee<)EG!6NK@W1pM!X+TUj+P7_wvNfy zD0RKM@9kk<=*|%_ZzaXoY#hv~Y6DRZm>uMudAb7ohM`YQD9dcw<78ABxu52MT6|nPxXPF{YhO?v%4u=;{`x znd13$aH19X7aUTriz>pP|I}^Vig6)r2tOogj@%s002GP%D-HU2KiL`1E*9>If?5B%8Vv8PQ}{rS~B6NZ`OyM)WAqfnt+#(lS1>} zx1k5+oz3L<^Zh7X`QP6{16^syox^KNW@KgWB2CFdr&nm=W^A^WyQuGE&7H+*Zuj!R zPw4wH?(a1l3VarD+tH|W_q-w8Y_;csq#wf;C1)SQA;SvHV_L(7Ue_e(x(c;4CUs_Y zbV$+>rs`7WUk&HebLGM(0AIzvv5Y0;++19E6{i^1&X9VXME}xbSVb)Qn2u|lID)&* zXB?PFYr#IaRSY?Lz+*<=!RpQ}n%ge#{n9KKW3kT-AgVo*Z`5iW;_R-je&%Go@Ro3? ze7(&sdS`Ew;l2kGyUgseKr-|4bCK{p-m7Ea9l%-2@7^j1U4tOEHWuKQdJla=Xg3ca za=|B-nR2rUnJG%Zp9?PBh~#HC5-FvtjwS)fdngxCo0}cioiE7emDpCZmsczC?4!_Q zz&OlKC+8kEwFJ@~G-%SYjDEP)bUwZNu$f#BUfA%xZP%|oyE{of_rElqd;X^E&)14A zf7UU&kWnvC8^F-BE*2F@?}?#KBAHgAWp@^-@Uk5IkwV; z#RTTedcr;)f4Ii0J2eO9X4vBr+xUH=<>n%WXAPs(W(PfWT3fLRpYMfx892+Yus?ae zuW0uijj?Ut_xHet20s(!?F~quG5QK6zKLFDB;*NGvjxmYdB6y^VWaksa5B7bmivy- zMc|lIfF)}Niub`DHI@V2^0;{**Ns6A3KU4dWA%_oy!)sy&D;34;tB3w%XZH)RPDm* zn8s68U2<0ch*vXvkuTl`86tBFwny&H^zq&GKmg4&xb*zu+hnz+aHiAm&*G)SDu+a7 zb*W|;Bn0n9g)oP(>DHxpN{0O~QKXSa zTcH?s%gM#8pI61)QxO!0ocfR_B4yrg41w0@sXg^i7}y|R&UhmW<3XgrM)^87s&Jl2 zZa;0+MfI0&Dh~ZM?efylO>CdxCW0q5bYljY;fQ7Y+t@KGq*FhZcVE zt|w9v0wP6Crtkf}2AQIp zsY|4HE0j?L+4HiY`Nr}O8jr$*36GJTMtzV~%c>*FeBw&}F!%7>tw0Pkc8eaA^>Gko zWX6q_S}w+|K_GFJe=h%^kGHlVe-nft^KI3~p4EI4)xn0v2#+gR-Homf$6Z6*%u0~r z39a2+xxcgloyp!2*Hr~i?+2Y(Z?~LTn|WSe(i;U63F^fCep4&tmAC3I&a)ZJzFaB( z#Qs!GV&z)o<~^ec5JL$wv4*%1PQH^VNUeE&f_qYaS{7pnAojI7NSHc(F{x1=L^<$U zT{I`Ja})L}66a_;q4|;1)6^+R0iG+O8-zp^BGmS66x3OW>HU|G6VXjsZIa#9FSzlW zXYm~J*(fPGNqtuxtD|I!UJ>hg(Mu%Pyo_j?gn8h&E-G+Jv!Sjy_i11rVU?W~h;y$5 zls_Ht(d{*VDIdkTSUPlH5sJPgmAy(N-LTvfDbJI`6OA1qxBL0xmeJ;7Q4EgIr198N znRxH~vv& zQGtY3d+eC+KCB>dbNtiDVeIA#apvfcjpk@PkRQgUq2ruPCgZWzf$y5GI+B5?^4!cKvA_+6J<6T{rykIl z#mRiKdwL_ZmxHp&lq&sQw3{ZeA;7GhrDv)CYglKbUcAtYhMW6|TZK#CZH|!n>Ax{T zwop&O2^jmUMUFo3pH0~=*Zo5h0<$h|dX_f!w!?h^ zIh%V0+h^XQrTmarwgW5(M&LXs!eDyf=T;-;`}PtFmq%2XrQ2mKq`{0UP#hI?R?8nw zEh?VC=JWH0QCN1E`q+k~rWM4~aZjkNNNF(yOik=yhfBH^H|$3i1^Hz`Z3rP7)5lku zBuK{#@o{CO)41)R&@T6EGM8+14gCm9l`e#rAJ3~i_%@Oxy^+tCa*j)@C1R(Ko#~Tt zsM6bsq&@G7fdL+b>OS0Y?~kIV)hoa^HXTYb%~M(hEv}G(o8=qQWaN1hDf&3?V$&B` zIfY$WUVNi+nUaorTsv%rP)~)2g&njiq3Iv=Lq+MFau~Ix9;E&JGhzwMZts}3Hp{TI zq6$W01#3qC=qko`bk6utJ==-mYt8~FV`xSQ7nA@ynRl(O-q@{jwaj(Y-)(|J+P0w` zMkx()JdV8-%JxG$EBJYMalJgNbgX+7GX=$h>O4zfIkZ>|WDex@>RHkScFRuAo0P8~ zHosf9s{gEnDPMqzSyiBSi4?cnUJ~-^NJ3LcIF%f>598v z%Z4F{-3%%BWOrdzGwK?g96e`Sj<*KxmYUezJImdF48M0jiu0K3Ak_J^1T9*NS0Xm5 zFOy8QFponj-cWc?XVM0rY3kOJXq&^%payY`6rXjv)S*8b17g^l{$U0+Sbw!@DF)sN zJkI=dH$K>4d&+*Rt^0O=m5AYgbRkb|aH{4HoIOsnH&UTQawydc2OKQ~XKeN%w(D?r zj+}Xoqqs=CQfFHdXqZwxeK(!`?`#U+dJD;J-s_#_IS?7dQFZlIKsKjmv`+B%keQ%T zw>?rgumq{@gc+=lvf)gJpvnVeW%t;nJoXgW>O9^P49fm7*>PiS0Jj-aZ|3fhrx|K# zENw3vbD|sJ*4toso#Y12jJPBPKp_u2`!rz-Z1#XXM;6y-^oAyDO)&?{l0hiz zLq7ThZG4c80vBk+Rf$FAxHxP8b_q|&$eIT@jJkcS!I`xAiWz~ zf8{9w|G0V55iB+CrtkqWwIAA>9vks&l^PGI7-R+G7r-Hr|5rtg9ZCY>Ko>BB4~&}N z;U{bq>@iCQ?lb_&3GF+GXDWz70@6}|CkuY(lPXr#@?)p8sqvj_>(dBe8;lsp2`lAy z>=iBoVyLeEdR<_>@d8+HjH6x`vFgFg(;bQ5w-vOw|8Af?2LwzCLk*S)c{x?&y8ou9 z0&!i9#T!D=w^1nm3CTJ_#86v?BNPu60@LJG#lbDnT=dOHsKSSrFqT9h-g~p#E`txK zhv*}Pgsb*J3_H#5SKrocFk-)GZ%l0nFpRWhm@7F8L#h2yE|9 zUbOE{eJx}7)lHY6)*j8lcMXW==@>lB^a=jgh+ZN40B&A)wkz-yW1x z+`dsC1f5Nf<{MdRV-yx6xlzxQsgU@Z;MNpl=}w2}plLWXUsnrT@B%_a%3h<_POdLi zvPfXB4lZ!-xQKf*texR(O)vm5Z5>N`A$f0onySw6#`qNVN=z&wbF9F$rewPOrSGTn z(fRdOwT5ZySpx@=Nw3rG)9C$e=p4bC?FAC}4*Lc^8|>Tb5?s>KT&Cwu!Q2g`9!y1+ zj1<|CFUJ{y56LV?RxD?Y$H5ME!%+>)^{hiEJssJPu_~{v&YxOH))@}Rs0mM;2yTQ9 z&8YC`Kbm`?O8l@00)ZGIN5~1*LwkA&vg?m94juf2qe?aQ)~!d7S>jp!rJ|*~z@};v zPzu~k6R{nQn8d)W4GL7BtiQ&k-dn45%W$=AZ&}WYD%Osl`Sxg0HR=Ttg>;YPwS!e! z#eHb^p^y-1Skh30rZ)VCJamV>8)hd0xpXaB3F=^e}+#Tyu#FSX0hPTp09KP`!x3JD!776R~DTw(b zWf?(lls<5dulr}22qjY?lg3>zcfsj)|!$Svek9*jw z^Z%$YL_0HA7kwGT+x+!Rd&H28OW%Mb7HJAUjnD!7TAn{oh#|PvOI_r8ec|~;3jj4$ zlP)i0vc>336&tzg>ylYXXu>O2rojNmmKztLM-F@k) zK4Nt7XUoCcbSuehuC_v%wO;DELcnUor{XJ{u#%#z(A(MiO@#|oRxZ)2Ryw0viS3eI zYr?^bLz(ovAJYM#^$JM*Snh~X;|c8P(K96CdG}s68h<`ec& zUm6eJx&|j2YFH#cGCkyi241Rt`FfMSQHk4(A`eAG(r2PThwzy@O_hPs>?e!Z4jq^1 z&^W`Q z6ss_kca`vSX;g1oAltF#3{;oO6G$Q=pxU$hQdjX#uclO{mVuvtU6jALIq3C_AZdKZ zTg(k2@$6*}x1FuhZOkz(1Kd9PI#(D8k`eW|iMmh7)islxn-~Qe4BE|+5fJOeT}+|n zlYNX@>(B+~qwyOA(a7TVJf+1=9OL8>3Ia`qSVxIWri;CK6bJc(FV*`CupTh8D z#w`)54ms-e)q-4v4e}*O-ciF0!EWi|Rm?paSGrqYDQQQE0({3MOgwXnUBbr4iKMT> zC6A#$qZ3$Eg8;MBSx!lKJRP&)9|L0J~`M*LSg z?N-5;j0ER|pPwPrWVW@PBAiXQbD<&hY2X{gyy9-udT0V%lUIC%9GQIr7U=I(NnYQ0=cG6s@+wIiRQ&)U~#W=JZ;nke|`%wpcJ zml0{1%iK`+duZwT5E?`z>rC;-yRF`AjXWkJo$Kz-Pz&_VXgGf}5|t+Arr35y(QScK z1oQclw%>KYQ7o@HL-muWTaTV9Rq3# zzB(tRrwe$os#z8S*9@b*{)E~T{D#`JU&`tn=MiQ>-(TiBUXs!mj3U5|qaqjN|IAPEEHnL{qj)FCi#0FU8PxJ@$FJ!TH^ z>L~yLk|?md(|#QUj$CNW4?T%P>Z?i5%_Rtf>vwu5%O$_Qo^MatY5)hWUDiWA`Sicu zhgiK4WRP1w32d##!TQ%0>aVyOv;t)|-@Nu3%Jc1uGj4w4aIPehmF}grkBH?F)aJ`c zC#pN0(_)iQA2oPlsFu;H1xLV)Nw%|RFd@*EJ)sja7&h*m>TdG5Yxw48pyi;VdG)zJ zBoOh<8j><|d@AOz@@;O-#`~l04%z@LMHGu<-fKBdg(_c)Smxp==Y%fgkUv9@PbI=G z!;cet*z%FugJlysetrII9@DrukE-Mih%S80RQNl72T4O`(=G1gCoU0TiIg(uLW!Rq zEX#MiJ;<-=fg&oWt2$%Uo#J9=oX|$kYc}M+U$FYw%4#B2$Tzuks1`@b*?jb8bbMrc zM~dTq-@q%XQOUVjQI+IJu`^ctdbskd?>xb<1c6ef+j+ucCsV(R)^(w?@4 zaG}vpGCV^>4)f%g`?s#0+9>{L00Y9AGnClVlS{IPdz%s=2YD{#v%_|2oRnJ%Nu+}q zSG0$XNcw4HTxaJE?Nx(9ciGRdJ!}b8YbB@Zf4Q-MToH5nVPo^PKUbQ-`qoNQSC2CW zb$eTiRs2@%qlNwo^YuJp_#fhfXB{`yxG+pdj=eC)noWqwuf{f4FbJ-8RMCfnjfzp2}5B>@9{Hh8dkHy9*!=VD!7wC)=8Dv-RW_wFRy|3S#s|2Ge zP(18gJztMy?B}+S+7p^#X!U6pwc9iyKoi0(q7bRFt~EzV&|5-N4IG4FZ zKjzuFYY#K@^%k|Y|61e+6REd=Mofn&+XnP#k7P?QMO@zWjcwy?R3Ytfk!QY+!(z8I z84|NDZs;VLvR8biFF|#`4UwrEd{KcH8Gn}q;8?lv1Vv`U7yWf$OMpR`kz{^b_A^NG znvHshi1>lp>q)NZAXo-!!Mx*Xn=c^Qw4)pk-dm{CX&pkLk$~G}BmSeVBkp4J=zLjA zi~KXp%$~A*hZaz^ikGGTJcp&;$8sL2sCK1LE@5&1@*HGLFu%40)mI;2E){{dKj@ed znLbzl^Jt9xnn@pWvQgHZmrk8WF-)~Cnb$2YoA zkXH^&zH=PV1Ik_xcZ|L{`6pUN#HBHe)1KNOm(l8X{GtRZvY5Z=H>+Z+s0upn7R1U{|HW~!32-D3R zD3uhJeW`Z#`DF|+N>>PTZ`prA&my8}SYxa{wD04eFqy>91y9pY$7SYWkSj9eEY?1qU!l(ggW?_eJ@f{ ztgdvCWt(HUIXv>}1D)(ee`RmXS&+Pb%$&?ul3@xI$OqfKVD2RxmYt(SH^lG2e~;L# zKwtR|a|Xt*$zk=_Pabu=CbTP)zcf+)GT^^d#&ObuIGxuh{ppJByX)x|jhCHD*;x3u z?wTPBTU)UIr{ao^I?m2is>A|baHPDeWr{KgleHq=cDvJJwAm!I*!Bd^W!MsQug%9! zJo%_fZUF3D)GCg$&fMGtUm0x#j6y3GBkt7~7-^r;AO-#wU5T?n(B6LLSe9>&=3F1K z&~dA|_vS0b!Fk5j#|6kGN1i)!p zfH)c4;fF#8j;azD!uJ8|qJSak=Wm`&0D~tZ{z8BSjM}V3DGcBbTtVQECNrULj*HG< z+6Q#lYEe#Oa+&Y3iAk;=JR+WF-IVjeJ8RCR1kc75`tuHh0OiyTtZ3 zp3OW4E9M^hoOPteA?aPo9S7=|dh5kR#<&egVjOi$AJO}T&#}Jvyd}MQw83+HmM_ps zP*zK0gSe?5%bCvL$%GEAhL;+ZvmSwY45-ap<;`6&ueyOI64Q0R(EHSV#N_{r`f6%5 zc>N3%ut+T#RN4F5I4+T6$H9hGy70sKRqkC+4odIaNB!nSPB$D!`vjG^;U1X9HQB}) zY%M?;aP;Brz}Srq4k?m_CVNCaB+kjE@-w%<7=QEaMu^M2{4RzF>j0hVucL+T_*GlQQyVghTcdx8ALvYxNtJ-tjur6Y(QCS zm3~KTl0&$Kb27VNBl!*GD$34>PD|ybLd?|HZdttoqt*H`+yfvoyf&Ldp2G|af zZDC|A{Oc`MVbPg!D9xNVWdpgK?$6$SYLCrGwRD#}(UCb+`C3(e6lSu!9GKd;)}cVT zM<=D%zxfA$c>5~cxVbpw;=t-p3HwN%sG_|B<<iuDU5HwGnbcs9RYY10h)}Sm_mi z8QC83UBUU=*uzcT4Vd&4q?#bbD5CN;ZHyR_4>I!B{6bdnQEQEi{QuJpVH4!7tm3TwX3!8#^L*miVun1ekziobR~f!k z$V1By-h;hZD`E25wf~f*LbmpLTVvt2EA@k|w#9gzon8dtz|>0ft46r`A83E)Qr_m~ zCsc@10&%)6IN@Q*Avnq|rm90psNZ{Jv9Vd5^sugyOOG|T$Bt#>Eca!^9dhU~%98a$ z)Q^@4(1LX=_XLTtqrZfUcm_GD^Dz)FCBo>BKAF;VP?z@kI6J{M)8z44Ma3@6HHCXL z5eVuFB8sV4H{QJ0hv{~4A27X!B2)Py3kJuO^T7IOk%}zrp^n_5tcnBaz~W=dRcjGE z^1VlY+*jeP=!?8ukv&|X+iJJ>;dDk|GTIEHXwW3dh5r*Jsc$QL$F9V<9_TK?0 zw%59xi!ZYfDoBV5k}1=SBpMml3l+NzPUfkC>0HcEqYKvB(13`%XQ%CdvWT75_R}Y? zQK;a%iDvf|n^{(_h2`sPaqQLKwxr&d9FFiSAmcb}9jiJ5S7)%_faZ_p?euoy$DK-f z3&wsn6#B5;4vPnjAWTbtXl<_Lw+y(uBCN9%e=8jD4jk)0S!@Vdrq_vxbS2CbHykd4 zdR?#&Ii&{2@ya}nyHs>QXE=5~!Az5{vyeA+Vb(}6gK9?MQX*G@j~*`VhQ{d|SOA)JEva`yPIsqy^JpkD0W!lX$Cj*uYmnl)9<3Ux*~ zE8XM4xgbYWOVU*LbIwU}B;UVBM)B=P6T_87@H~C&V1bDUOi1D8#UcMcVlR-HlQpv9 zM!>;)gN?$X>euNVh+2j)>l>-{8sk@rXI62H|eZxF$@1bT%dE*ALn~q+>8>jEpJUk!QYDF>aXV(S)3#;+_GY zb4TP}?p_Em$T!r~AE=j@`rz`9!;t~2g8 z|AqvDU&^*l{$R|7J4W)5fGeQt6V%z-6@_QjS806LxAWEU5zS+-N)5Z#V*E}_Bvl;g zNgpY3!y8gnv!Swum~`liK(?rR#XPo4F#zC-tONaTI0Cr20D zkZGwBP`_>uB+{|?TVrC*F)H(DvDSd0=ulTn)9G(DJdtpP;)?(WDjK)v%<1z*Du%?up zr;z}6nB2=(pz=rJf0Jb`2dtfVw7!AsfB0cF8btz3^^^09{zSfXx0-QIQ75o@UP;<* zOH2G9Jkei2HQ)}`Q}rgiT3G!Zqo2Yah zt^IBfr|4FjLrYuK3ox4rj#|3EvMmXI0P;YMa2{npg%8`YPoyxHkDX<#Zlv%mCDZVc zg*oT5!}3)aE+Z_mUz@c%^XLv0gE3DTIiy4nOGghVtaHP!ML^_$q?EGuR&PP*g z#d7Vn)zBAg)Mi3VmAI&qZBo@-%L>aDF)*zVSQd zvcafi@)QBL@+0i!K5bFOH`Q5m9~IjYj0NG6ZZj)X;ZpGH39Pm=#-@LAE<&ylg$UnK z+nXn!wGl8D#U(XYSRvtlGEl+D8HLZL2DNLeAV&P$>zS+CdyTW~dm&|8SeLQ0xU7LN zX-P?z(t4R{qCVOR9mGubvpsXar#0dHT3F?lJ?n{zq)^;Y6+)b8<@&c#NlPj>0ZgQ8 zbrW|l(1e^Z4KYhq>|I`9#;6nvhseUPC5TApQ+*{Dmk0)eDu7l%lhf-|1y+7FB;!ZD&;BF5^9UF?MGqlF@phQWI9c$P^}j=1WNsv7U4m?B zv+}chBoVB5UakJqbo7=s%X+7_#Lmj7XyyL~b(!E7MU>$As;-*a7dJv&nfTJ*QOy`w zaq~}9#N~Y4^O$mKV}97$mkVoP?Gj`#Uephv7~dTPlQiC%2sw*;*XZ;OR=YhujK(FL z_#xu%zb5J*+nXI?)<-&1IIk!+{XNT2)u=}SsWdj&Fw+#wz+S>1`n)*A4efK}jCMu~ zWRWD-FH;!~Ezb4zfEctH)dZgPlY(_aun=gF(D#3hK$`|!r#2s@uWs>O2;ekS$pLf+ z%xD3!5i$mgm_K%~NNWrAquPh9aap5xn<+@_6K0cx{?8V5*fLU@^mul1jd-)ibN%Qn zr$6PM1M%UGtGVCO5JIJ=r*iaOe7D&&D2%g3xP>gfEUF_c zOaJd;RJ_QxcN^I{TSxQ?oNuN)bm>TVqS%r35q&Kx>dQ!@+NcAsnjuhpH|69 zsvWV1?9joq=hBN65-jhb_%7)XpR2-~U39E%WdqBtR?`x9<-C7-mS;08&o2by9ez4FkxPp6Iw+mntju1Vju03vOso&_{cwAPdC3)w@<$^RI3`Dx@e~MuwX_7RA z$be=}en(m)N-HYMW*ywwl8@0F#8%cSITGl_`CO&Q-Q@~&f-J2XsD#Hev)pR-R>{_w z;hQ-%X|(GkGaahyluRalwo6_m&1uT}2!d5O%xv;^r`NcfkWWQ?xX}s033Uz7vsKV> z%J}>H=Ne-mBb<6#-}UcA4FmJCjS1hvyogkkzR}*1SaNc^WNA-|ug|5)Nbw#R@RPXE z@{^&dO(2-=lcq4E8!l3=PLyWv{FS0{EM)2lUbE)vtLOa*B% z8Dpg;9EGekOW+*tee*Br7Mz+%bLYV$*_5a$yXP}*ea(F-k0y-48Jx_~IU^h6@C;+s zevGLweZ<&b9r2>?-TZ`k!)y?&&_(*0U@KXUJMO&@=q{nU?I_skF><*v&c`5@G>P+HA+M*Bew!0bdUWmYG_E?^?Z2+O*d^-LHu(!p?S|a5~ z?q000>Wm(hXEeu`cI@aRc2N{DeHXu@`5}0oD|v5s{4-mm+iBoCL=Tz`EA2<~uD5~5 z6po}zqe!e##H8c@z`G>qc5Rf@!4r&}<)KD|XwUamjla<@aui9Y2P;ftdw~@E_jT$r z-%tW=D@Mci*$N;9;i@6Qj0_E4r;Ow7Q^UI^Z=(0qN<~SoPYod=Z6DMBoVsDxw^k_o zUe5XEXTZW98UDPduIKMX#N3-HWo>vkP(dU~JYc;&!R*YSw5&d>43&xc!byd`HeBB8 zM4_$ZZ(~{rXZj76$heoz=4W($PVp+G3L_dB)psN)fW$8x5LcZ#Mu4uOwIud{7 zfpW>pC9Ph6mdhsAP~{-vUQDRp+1kD3bbz%`&s23;wXy_de zUb&f{4^)2XzI1YI0jV~n78d@2cXM+cBz!FNzwOf%@qg3$aDkFu1SC0KuOYd=Hsdi* z_4_gwSy<=1vtC|yk9X}|i?$N|QDP#J%>@`J?cvuqWh+h^5qla|>0fWzkg zDhG3Yi;<>(&i!Hz$>|04$_&Uw3R6$Q=_g9)oV=PHc_9f(tyVfxtdf_WhP=SDHK>j8 zwbMZh6aeH;Rq@2PJ~I1w344@t-qw}lH8IRfsiB%qr&;tUvFMqI-Ooo!E0&5iDh@Q~ zy|M1-smNtr@ZrDWFjqw~=v?TC@}+SB`;0ICHSu`UQ0&RhW;!lvch%G)Jo+9BGn??! z9lnwBgHPqVBt>1mA5&-Lwtb%ST#Mc)^RyfOWrwcl11kJy|B5!~dwP&LaZi8S_Cy3Y zVmB|XG}ja67t=%hJ*QU<22s53a_-M8f?95}eDC32oxRYOWr(XI*@WjsJ$3tnq}Nqb zMQRHsuAJIBHWV7EgnkwKUPz?NI>i$-X}~V3iW%SnHyZm}d>Tm{$q($bPY2@#?H{XsX&(7M zto?U5n-BQ@jo*nNF(Y=Z*wl(q)Jp63r598VAb_79TWxvuj%&)4ZO)&xlB*BYZ@JA&fpbYw%9 z^>g2_YlbzKR6hBd!uv*rtSHB|H~aT0z?oc?YsvmL6H8~YJUtuyEbpU8`{k64aS^Cn z@$_mJY`jDS7HG3eqkY4WV%FNnioHRZJ;G?Is*}AZKvoJl$Jnq%5l3}L*u)QAI_Y+8 zd>nsMJ)ii=GoaWVxS)B%u)S=)KK#luHT7HQUc=J)@hhi{soxtvKS`vY)9G!4t7w&? zCb?OZ{%e8R&+7FFVuU-3+IGMUH~4zKf!e1XJtuMu&*-!5Lld=L7*+u3Nf)09h>Xrz zi492o#F_Yh<=65j_=n4=Tw+|!|8ahvV%q!bgIwV zKf0o>aMv4O_?1r8wXr@ET=t4FQ9=r+W4M*<;PY0aUr0ymVSkCl-vF2<7$%`@x73q` ztM}V9Nby7?1Qh9eoq#%>Ke8E&si&0lfEvDKSn5>lIeNR6Y8`lVa;8h#$LAKx%h_Y4G2!jZFJEwR}>=NLZ*lESJ zd70T%{7%$h((~!AbF{HxXNVm=qW`5Hb1jcH0P}*al?&)Tg;0^BG+TH2cl&!t5+!E@I3(YU7;a zPl1EG$6HU1^`ph*oGTOT5G>NJoJW#YTdh9_yK(#s&Ks?1HtKV?lvItdamXTJPIe=O zbn%bGvep7qZDcr(GpD@E&6_yOxdXS#l02p%BOn!j*Gf&lpD8>LY^6Te5*~y{h)uf* zSrS>0SC%2NE~UeQ;1C(1bFFM zv%(89#x#QX=>q{ESVTbgE!O#XvDrgRV^b1mUP);RGeZfbXGzpCl&gVOQ}r@47CeU^ zsQ$#t*Oz@6#gFYyVGIXqWDVT-7X=>$M>oxwl;TrencFF_@CUrctT3kgq2lDu7(w|y z9-WC(j@XIVIIgV?dSFi4eT!R7iFQo;`8&G>uu_NL&C>o#(3Y4s$47011jI{QYyibn;pg?yv0&EG zJQ3f&_`JTwMqyIXRSWXqB+PI5dO}8A!wLwzDL2tY8ZC*D$RJU(z;hdU0}?f<-odHq zvX#yJ659(`5%vjAZ20LR3Y+!m?#m4D#x`gL3nU?INr>CM#T#DBoEC&0oO^Ju!(ZXxyhrX>7{;sR~y7Z`60DkHv}4d6={}(Z!u_oZpZZq zR$IGaoA^r~zR1}`8q3}Mw7;;$uvRkaQkv5@n(ff_=L3JoMP0xTLhqI!`WHnrFG7J< zu?1ypiNIl0+G@4E4kY}+9G_Ypq2$v1nyLs;HlU{EhyXJm!E58SKq<_0i!Z!8LOu$VW- zJIb}*P-@&oH3RMOgTNmXE28Jv9qv-E1^QeW_AOHO>Cxfr9&~~H~MBYH)`Z9orZeI`T#&x9&&*nQz^=R$i zgc7vishz*j5FVlc*x9t&$$Ry0?oBurKE6YOS$+JP0uyfiQ+?czgs^cmToKfXDo;7o zBHQteZ%*n1k@I-rah10qd-Jbltb9M2?ZMNU=T$fIuKs%$`#)YqCWX&czn$*x8fVS^ zmR%+zP)-5?oE1Q(7XhD?_OKVHw6WOT5ZNX4{e7(5#wIG9?B%mj4Wy$vfhq{3waC|@ zd>Ik&KFA|Mex%IC>-v%vvCjzeq7$alcl6@vQmzft}O=$=7a|qW~{iCIIKtTk0hZ=i5R! zVT!pJBe_?Ei!Tb#(Ejq4z)4TxJFYYvaVJlwol8bhxJNoTVSU1GkEaSi79d!1ei%LD z`{e+*Dst>HA8adky+7^S`Fk>pi}JL{%4BXywDL#!(r&hJYF1JQ4d!!GOGe822OGD* z;Rv!cMNqeR=5towPn=Q$3)xEaI!4ZMA8!-X&Yjd`6oH+*t(A-5Ho~{nZZxxeNBL@Z zZ%UfVEXIbUJ-AU59hA?f>3bm|Z!mZPlFqF!h3?tm-(*aTY!+_!cSuE;RiV`w_C#a3HkN>8joEPn0-ycz};~9(uKG?s53WO zPWHK*obT2Ek9BS_%m5r=I}&s3%w??IiI5vi#?5I-#vZYtctd(`-i$P57@CGt^5Yal z!JR2AH6?){<%Wh(-g#gX5B}G|^>q(ZjD(p92+VwR+f(E$p^8CgE4#W(qLs` zF%+vDsl;;Ll#gf6)2Tlko0!T5xWWLtH@8flhsn-69{U=QL4|R_$rLGXPxd(v7Dw<`&N?qvf}Z@- zs*WB(dI^`ciQGtGsSRkAw^HAm4M%F8H!{8qBEjbvglSH~;(wcLbu{_q`E9vsf*s=6 z1#C;uftD{!$+IkFlyd~oPP1#Wuk%bL=xI-ZD^2=h07SR&6VX^BfT#hL;-BQ-NgrRiw%8>7r?iOy z8W0$3pr@L^aSFU0$kt8J*sDzGkj$Apaw$X_Y-}nWYW3K9l8=GECWt=Yrow*=d2)J> z>nS*IRr=UC$_|aQ5fua895Tpqa^02Cj|+a<-onFo!5aeoVv+eA|4`SajAC}#hdN?^ ze0Gko=W|NA$R>Q<*vU63QJUp<(}eNgm7~J%{j1~%voJ!sP%;|%CdinlgIfFpFdOP! zG@*=mQS^{7baBLw;fZyEoKTOndI?Hzc|B0y737A+R9+JF_OffD122cVm87^(@(C`M zx_r5QSptS#?t9v)b(`N9Y}=CJC#a%i6V!n8oH3fZ{>oat!CF#3K9#Nb$}Z?iD1Gl+h~@>f z1MvQ+;#rR_5yv_|{>qikX)PVkY-$7S``r&KDMcnQr{~6Nlag}!f|K`ip&C%jdy$Jw z_jU+j4{FKYlt9QSIU2DT!TUE6K8&ss26cSrwU_awCU1W?+LoORXE9ccrfivRRFAir z&c9iqp=y>QkWa?%#cHok@(42LR}=`>&%iKUH@Zh<&+tVL5md;>&#aNQ`kNH%N2*am z`tr-Ur@v$ty7(I-m{p`U)TG)dofFGS$YgVcD;W&Zy>pKl#7d)t)*qzxMXDC~jm~V; zV^TdqY>gOVfN+n>#w7DvOlG;xqPH&rVZZ*b$)@)t^0kmfC z*ynr4(bF#^LmN4@NBybEcX}HGe7sbg?TopgoO^lGxtt>J12Zz((R$waAEtW{mSE2< z%eX5oOFH`3(D@sDOp9#kfd6CW+<2Gtu*L6oRfNM@j1_KS+=WFHQlbK`yhS1xFLm!bofOK*>))4DR31|*UfI8|XCK%Ad~=-7)H?D$HY8hVi`fKsEMy|D@r@nmP5E&L`fbYoYw(BoV)v(!C>*4=ymQ?otyUw@HfxI z@&s}4@z5~l=$X0H!8reXqPRv|KVW(04dE6g7 z)YFz%*&b~n0$8*d+=xEl=L~*0+(#u zMvP1_5!*y>J%TNT#LXRO5Ah990LHr)VrR?I|b z?Zz!lHCQRAV6bv^~(5((TvKU;~E@t1Jr*O@BJzHCC(mmpUU^DR2wdZbd zBPrf4l#~ifGJ(Lg;Nh}&aC`2a5A}ZLghMrDu(dq7=tFuxf8gyMDYkPTcKrM>0jJ>D z2&JOfq3k*>KECmmCE!OuvhzS4X-2k(b zm%C&nHE|$o6+dhazjaY7)vd8)lgP%l)J%T>aw?+BetrH%uU7H810L@E(N#H?mZnGJ zedC`Le!tmtH!dINO}sx^_{XTdxh*LS6AFGSzVecrhX99_4zWJ=EzMh#7l^0sZgFnw ze!*Kaxn`>HP5!auhr%A!DX(fuld=}x!6D9VVoWjQR(jpI3HCH?vpNXQkLNfNcaJ}q4fxnc+aw;w?bNPOIi`JQ|!gMx$ShP;xlEh)dV|RJswEy zLXItw4|j{dnKF11=RAO_l&o=qD5J9q-E*^(D_ zS1O@cSSi44l_Bab+(3^8q!b2Q(1fcRvdtX5^y1ehRfLQ@G-wJ*JtCJ^pJ(oyrLn7- zx;lWZN*mHCZ!$#RrLUx|Yd z#~+%BQ1DDr=M3qV^f{1LDra%x^qxdld{0bA%bePh=cs zFh*5@@-eGhb#tqg$$4}U!yC2Jg8&$l~1F5T|LE7+P>{11}lOcz3#t?dp4kj-6hJtvHQ_ z_52@7l|+`Q$(AasMXT2tSkJZ_RDO>=b8}$q6BNlC>Uu$I%~p;Rn>s(^${=zp_y^jU z;D#F@k(t+@h+Egg8YS!|)){$Y&=%rQXdf%=yP4+xZ)c2~WD+HD_fkuEMfO=w-ymtC z5cnkyiURh2tbIo9Fn?Db|7PPaO&rm#t%}bB^VS7YxY6wK$#fX5Y9I@Fp-tdcWf94U zN|YEOSk9ftF1*@@N=|SD9X2O6zl}hJpDD~Zx{3`^fQau5k!8u=1K$yqADIgpRiSn|u_vz$X7JM3HzjiKR zJecvVMX3i+zUTGZBJ<-m{2a{{?q+mtQks+c?%&e|$o6JVNKCg)q+8Za-=l3?ImgNB z!(m$Mx;2a~_IZysC#d*_l zsj`FDb9N3S@)jlLYXa2A^_$8hs@bp@&XpJWW}&6={6F|di%cT%b@t`WK68?+0^aODEHC77@N1*S6D+A;cmu?bs^) zdi?O%J|^Z|_Km0c-Y1p86N~V#$C+`*{iM|gx87^pKrN|kkP;Ad-l|JlWfz$&qkWF1 zBixK7q3o4$zxU8T!Ofec6a{P|Ptaw#iMj+_)h5n*V9A@dI-D14fJjGS1U9pS-Zz$~Yqa&N%WC zh~OX%o9f62^;WJfjpc#ng9sX%5QDncd@rxPbx9a!d$|ir-oNv~zdMuOnfXljF2w3V zRM5z+(j0w7g6JG3`mm2nVTuvtp4u^4vJCaZ(Z5vPJ#%u!ud=>99*4;O{$VuJDFT(atGf6z z(cVvIWRO9ukT2kEx$?g;H0S;YhNfl{2Gi4hG0b=Hl zH5^O5PAVS%$76FhOMtb+?WPs>X&43&GCqVf&Rrd~mDA=(s^qr>(_{ z{QJBvt?Ew`T_LY(c?z>0U<0uI)~Fscq*~D>dC93JsK@x1S{gz^)_v&JZJiT)6oqci zFsPSeh5uGaap1?JZX0Rt>OAr_!lE<|#WNXSF4}V7Ti)nP&OJIUK1QU1C}EoHongI+ zhZ!7I^_F|A-I_u><{Bu&iFW!|f$>^RUl3{Dbal?CO-D3pXk%mofA8IY!8LC2?tI)F z+%|7@Z|4%l?()yrzewnN#<>YQUnx43X$c4QU49uqs0QZ~6OSDHDYS^Mz9Rlft41s3 z6zuTn!bk1JM|)??w)FsTS%?Kc))4M(>4Vv&B+EfS3bk{bdHUY#(AkM8-m-7j<9*;fm`CmdGrEP=A&K7?^Ym^NsehL~B(2-L3Sm!MlFD zTgizpoP2b8g{m6AghqfFbN*kAud?ka>Hz+qcBS()FK4aodL;;|V?EUikb{&#bv^sK z;+N>RXFeAkSapNo%*_4mc8I{OJAuo`f85{I%wHiS?fi$^2U4xU7Fec8VzAAtk@7J6 z`f~D)_tywZ8Z}N>4#HFDbZ8oMx-ULHa&wDgu9rqHJqWD`sR0PAo^(Dag3$87gLY)+ zwT9-2|I{g+*Whj5a=P=qNsfWNF!lY26zR~7L>zVnMi&BlSV(tX&!fSH5zSkS6A!uH z&4FbSLJ(b6L=$|`YX&^9pXHDtCu{JteD*$~g*-G%1D7C>|;BNLss#>Ld0kDSrQS{!g0MD z#d?>x990TX*B(f1;b%J5tWsL^Injm}L`0PSajS2&m6nuv6yV?u5?E4}ml2cAsPW0% zI9nM|DTM#nzp)l*By@;5OSh$acap%Vdgh4|o$?pB| zZ0IQ7jQg|OJuW?uo-B`ExVbqp~m_x91*4@n%uF_wNq$cFq@Y^@b z&g&dJ-)@5aOhE)*Jv9gyl$X0IvZo{5xVX7I0{Ao!Rv2Zuf5hZ?zNxu>t@T=@WNGK; z{GVlJ9M@|h1Y^0ELFy{u6K@!SNRR1G;FpEll{*n~%{x?`i+ej22dcwi(x`NaUfPFV zRORHH?QGwN>Bty#P{|pip-T()odO87_6i{2l+B zyOKi1;tjXP!8*?2u>TlgVxCIpf~5kf&{P6{$U!+1ufF!ClFg9wG2W_zGdb>;buhe7 zn%O|D`!DZ&v8ho+zT-u@M{)wD1Lr{jC=?oh&=HO8&hlfwqNgL3Lx-PwS6aKL9iQ0c zwSfs&py(?amgD4_tG^gQc|_K{;))>fhlxCBqC|`X0s6_|n;`q`^i6~)Oys7E_nj+- z5V=b?V<`{du6_a;QQVckVz}husyrgfjoA1w3<-_H$Ec@#_c;bJmVEm`3=6ldZW9FM zZE-HkbSiLe*Uw45zUfm#Y?Fey zj{WlpXXa(cwsk=x4$Rj2!RdN|fVsG*25$|@`Sn~(Ie&ZofR!drBj`ZeQvKuTshOOB zPiczFtQ7eaD+rF0QVqk%uWUw`SKQvDz#C^o#lm6_>o@|Ur`XRO=9^nqf-RU1mAzD9 ze7fAmiQDWiq#Af&2CuPO+TK4o z057I5w0S_7V^VPvILVPD+Pv(t$LZQTmpLCb%l-rR7dmG8IwqeaEO^fn!VcQUx4b$7 zF*j!%4Iq{Gl%@I<6K?j$S+{&$hzhZGJj(@|GEGMkfn#3WvDYLm~t5qn_EEtpE*i=h&016+rp=g=71Cx>K?h1z(^d}P zIYXoR6QAmZ|7#3DB_1~!c55wmQ+kUW2-yx~8juQ#qrowZbU~u6<@#0VfoI9zH1VHl zx6hbTQflVyFHgilP{d!IUwFQXCX~MPPWLP_+x?M@z>di2MSo36zJUftPsjzWNExsyr+(5UazdymCQq~(0f73CtJ1#aw=BQdBHgZTT}-o1Fb zJU(U%hq|(@B~Cmcf2too?W!bztUdJm65h<2q8J+OkGlwmoK%KYQB@TH|AV!LBQ*Jj zz2KG-$)57~(WvKDWF(kNfXBOfkU38YQ*S*Yh}`inJ6qQsAiH_|r<&$`RbqGLPO8fm zjRhim3tUuoOdV_H3YzCjot-0Mrd#&Ewbj~mK0U!srU|}m8=D~PdYqS~43HNlwkw!$ zhWoJcL3nnK;tr=gDVuE=*gceH(vEue@=prHp#Y`T+k7=24G zl6B{ZS^t?|n1xGBO1&_Bt8wWjAThK2omx!;8<&P+C%vTS(RpzE0`K|D0`il+;DPm! z4He#`@^q0s5$sy}q+HSuRxQP)9iyPI?rl9!{Rk+TFZ*C9PA5#q=`L0Nz*FlL(JUW%vG{% zD#_h5f6vCXC`yQta^mjIQ}-_OZ;*Xkok$NRA0sA8|F-9Vml9xGM*Pc?!W``|?no{U zs@{vF(Br?Sm#JkZLZKm9SenWJ*ZgoFPgR}ezD#Bm;D;`{Ka&c%ddEEU_!YqFU-*{C z&Ac6JjAV0suLHXaTzDUd*5o&D-<+)Y#G4bRo4^u!|I82QLtRPQtEK9|^Vqz#1mw3= zA+jBiEl7h~`JbY*k8aNAz)N;HOYWoS3xt+?34did;oaSAGk1l*GakgwKzROum6%A) zR7fcG-7n8lzInOMw)VS=?9?ryrWKAqZ$gs{#3R|t{2`q?aiP5uM(1<}oTQ_|k_dt= zcgN_m5gJ?WlP=JGGF`y7&+AL$h61}Px0lJSi}nfDmtCO2zkl#z;sf{ou#AKHd;N71 z&?*OZ`F3CWnIv$P!Zxm%EjxEqIr7N=Y<?SAGEe+2vChf44+LsW7FC6_4Vx$*4fAg zi)Q`@qti<@4OH`;95(822FR%A@Gp%YAwYlOZR*be=9aSSE9C3I=Mn{}RB%c0CNbl< zAhyS&;%F(s%1&EGfw#IzWj6E57KA<&T7k02gq=rRKUT7bD{NRqZ(^LCK|Zn&cYZ`L z*;D|=Vs|eByJ99TGm8?C4j9mRdq!?4H^KH~O(=x@uyTcqgVnkIHrx5W(A()fqJUC_ zT08iF`}g?|Xx%m?k&1_^>QUjT+#C`umz-F-GBh_Ux}XK@=mL1G47Kahk?Hk=XD0d3 zS9fx?#_62?%xLopqitZo9goRyv3rv$(rUzCa_=~YRGV{%j6_%8BgWJw3en>OwkV0< z?8^kSSTF7{Mf{iK!a@cA{{%kZn?e*{oSY2kFu76)cXyBL?LT)o8`dL}kF2~#h$t8B zoMbRShl#sUzc7JuyAmgmF25A_r(H&1odCY1-?oIM|9_Y+94uw3Ak*ax1tL;9^?au$ zhEb@m+q=f~0wlVqiOptbzbac!U9L~lP0+*ACup$=lnGe$k0WH5@VyDypO&3N)c6=V zSP>RPxe$C#9wBhQs|opK*bJz3M0~h5*V!{4x#P2fap`P@xcDgzrQGZHAmctrCd(x_ z5kUQL6hHDgmTW4r5?M8P=JxE%J$o}cwtACZZvHWx;1kJh?Rzs-vfr$IoL=A(wx93} zkUicTzFZ}I!#b%w!qMk*08-*y=NEBCN*-?x@2Hb~tkoDB{!9%8u}9sld89%IUj>?=1w-Z|j)1GL3G)1Xh#mur_9!z4oS zZ^>2Pg~Sgck}fEA2a?>~PTEW8|87c>jwZuhI{PZT^)xz3A8|`^R?dS$LN}aR&6Bwg zoS@C(VnX9QtUtD!DGp&lip!VB6O#DFMD1H^8yi?5r(49oKEAHtWBB8?A?h!m39c6n zm))-il}$1WU5a(PqdO&TsU&lP{hMJXQfz-)z5E3HfCjf##v zRXmMnbv4hcU{%%8$cpt+i5X>R)9_SR$x?4*IV~IX6KH_P{e=uNvZpZ%Pat$NHbmq_ z$*j8^Oe%6lYVj1w7IrE#oeHDDxd+D-sdu(LCM)1C2rk=9V{~7l`2DuD;#HH;xiS|6 zPdAg82@v!xjF4}|^&NESI{!oT*x^lQr+Izq3*lTFidU`l?|1s3Gg=2b#NEE3dp#S6 zY!puQdNo?T4UMt(gk4!1XwnK_VF?US31@V2G@&^;_*?80e#jIf6#`2} z!`kH<52}(YZ5N`@) zR5G=0*=FauDyjx6`UF^LBu7Cn2E1uT@LtT=lp2o)W2CkP_(?es&hjAj$-7cL z{jBj+ZAgd(5PIpVSK%7|+T_l}&S3m2%>I0M=>Mj(ya(MOX#uQXxW$o&tbd?fR?=p zec#@uXa&i~vu1KMMp4t2SXLwZSVsI)PF(KyAlOF7I4nyJ7)=c7O)T;z&0bfoG~+1& zw);1!g8MQC=}^9hI`fl`kJ{w4p$b9cHL#P2ws2UGZqy zO0jbTu5p9-TbX>v%`CVc^*&n8vp{503bngUj?LG!+4HyV_xR5jXY;oAXRD@YSukJJ ztGTcytVyN{2dl#IycD7$aCVqnM+1EP^;bl36 zm8}OM?Q{O5T-4+E67V?#I@y>Bz+wgsb5sVD z;M81Ua~JxEKqH@f6~8?fC0LUR9oh5kO%d?kZd7oNm)(_MY`sHDJW)O&A}h)WlG#c zre~k$isyWXe`PH!ZMP5sxfZBD`@WL9pd%h_em7C;t>W#v_JrLo`zSUr<7XBymi^B) zQUVT>*(NSj>T{i7&$*B_`!mt7koU0Iqn=GZcNh=|^7BpI%`$&ZQQOnJ=C+%NCUv=w zK~HMz$D%Ynx?s5;v!{jiv4rKio>8-^*UB{euV5+RF{NC)%J^0C0^9WJS+s>ro>E1w zka=9=LbQKAKZaaUq%jSJWrc|TXp&u=e3^bllyM^k+5j`_kuj;tsx@g_NT$e*3?=*+ zkipx3ik0P2CNV7U+Y-8dKiAyfS*;`#((gO+LL+u`D;Y{``5ykBLliv(ZkMC<-jAB!#We7 zNT1!z;RDA>pR&msXG6Ox$>>;QxJ<0SmS0Jid@FXcaxp4!%Kth~{$iKea|}K}TPh)v(ny3 zz1S*kkNyTRu%IN~{kQNT3L)gGU1k<`aw1j0%MEL@@jDO*KZRNVehGghARzR znP3gkL(z9!VC#_94-;}$Azd(~4KpU{DBirWNwp+a+~i~LE{NQhs@~OvAJ#3|EgcKL0YRr9ocN@)4^GZF|0(rVGgUsZtO$<&9ab6xjN8$V^EBFk zn3jhG5l1D0Iio$^vcaGl<~B_+OdYL+E;SK(scU?sh@U(g64AZel$ICBst~b%VOnfU z+f_{~_wI#FT9_*@lG?@##~fc^GLaGb3=LqP?M`DxVOPM3G|q^wi3hoRdq|a2U?Wx0RVIiDvD&rhTzQXq`hz)#=v zvjGSd!ku~(($EtOXpq*MyGiz!O7Vqj2coeUC2;_rlB3O^%&&_lTz#PRa8qg_(&U{6 z9C+MHMz;{iuwk*9WRs9Ew~Ofe)@_m#<}#Nyvc9B%GwqaZ=@W`V^Ud+DR*{s^VLG?_ z{c6*rrnFgX|Qu#xad3o8H;F7L{=w$=aWsw%r9Ox{$rgu0sg!2 zm;0{2Sf*a&iiF;ii7@hVl*+wGe_hx z4CzH;71H&r6-(*~V23Nqfo&&A_V`dRy*mHJ^|HJmIiA|hcSmE0qFlNA8I0uYqLEC0 z*rc#RDfMIC`V^hgH4|4^xZ&}+75`@tkpmy}Z~oA<;Z#*3NYh3<$dE6yu08aT7S!SZ zN6{fVtNd&x$Ip`U9_YrD+OZPk6AEAy)dVO^UY|7@b{A&;QiF~_+%z}pn*KdXVNo;v zXoqrVumUAE21}xsw1bTsuRs{f9IdBot~ysWhB}SWOp|BV$NA2Y!^<2Cn9^;P_01Q5 zv9qh^BwHjl9}|yx`a@pFAFRbQtl*Ah4&{{hD0hYbP!8c9$(fwwb11`qKZPKy+hMWB zx%!JcXY1QPMxhiZE{I-aYl#_!N~z^|q~1E;T&roavD>rmdJT_ctG3fH`Dw1TJL!$u zi^dJTR2Yjgg#_g4WpH9d<%%omR!1%S!vB?4V?dW6hjjWTNkrVG7T?_h`KIB_^~aIL86rbxMzhtW^Azf|I87 zS7Xqg3HpbTaN8!oO6ofcz)Ux1)Z-D~Vj(ZD^|tLg9#J`6B`#N^SCA#%OcnxBhtM6D zo=3+qiVl8}`)Ia}Y!Lu$*SvsDukD=;vgPT@=9X8g{|ni|BN9Ei`^Ozv3!m^C^Cu1WHgm7pcPcC6r)}<Zf)F z6BOIPCuOj-ch*6Agx?25uxS|lX@cITJADn1oY7i8JlJ?!_nKU+(YiPIze&M3iylGU zX;qV`R`q2gKHP^}WG;2~ucziYsNNa5@#jw}bJ>h(DFdD_wZ43Ss zithI2N_?yljlU*E+0G7b3AZG+10h-?_jT#3&B#ZBI!Lmp%JlL3aT|mKc^Q19F{sev zI~g#uzte*|T%5796>hxvDZc3-02(Q%&0+3Fs{ayCB(uhK5Lh+;i7?oZIIs zI=j{jv7n#3rQ&Is@x_l@wW7x_Q;$$f5OS7$&n7x6dd(Nf%D@Ax214BWORxK^>QuN#Q;iyd%axIRY5JCeo3Hw(A&8 zdBs=L*T=ygCq%=p);ij@%7Jx1Dy`C9u2pWF@?23CYkTL*ZmB0Q2p6v0QzRwkm??fu zd~I{N$esIGZ_`=R_|u#ZkR=CJPt~D7dc1W|Z5F<`H~tIwQiAgPHgg-!0+t{Fb(Mjq z&pe&jpR4d|{(H>C6l96hR2hi%rF*(u0NvYIR#hyk#wTzhZ`DhVmxEsXFr`gEdTEWK^A}$VWK*Qq}+h~>(kg&W7at(VGLAfgX$mCoMvqbbL zKyL*|u;Bxnw<^M;@h$a6XU`p%L)^0H*1#!@-6LSza3qs4pf8lIz7UW zGk5Bthk8FRny~(dy1llku@LLZaork+jz7s~ibSWl*tl{g(FNZg8aVNN?wA`hHI0C}Mk64Ik@vjn+|qPJ_IhlU_tA!cmaB7x9IoguHI zCpAjh<*1>#xw$0_3Fw=Vb0tG-4{%!gRt@cOeCMtznZ93Y(pJ2c3)?%8AbDtQz@=zE0=K!zeg$y zSHTB&>EGc&+l`aRRp^yZYen@3Zb3L94lFPjr9Z-cPK+!<*ODFzG=s3OWE?5bmX#0L zPcsO5fS;PbrQv*tE4*+O8yG^BPXJV*=1B=JlTS#_GXRPFMNfXfo+5WQs*-A~FZLvU za4pW5xHwu%vu;7|1q}BegplW}=8g{>hn`Y61$T=fa~NRWM61xXR;E|F_%a2suvjOq zUk&zu`@BKdk-$mc)ObLVkM|+~ZJ8$nHXQl@T(skV{~J1X?*H`$W8+2z|n5Am#j6J^pMx<^wSpfc!=v<6>w6Sb)8nkWwVMJzi(<_FA{$9 z>)Z`F>;~I6iA*&$8bsYnMOplZ2Nw^(j!fW+-?`f}@=E#+lw!Cfl+pV=Y=CDW)#S$r zw^Mcmo9@d%LqkOpPe@7ZIp3C+)226t45dqu$mTr<0rSR0Z{ae$PnUX+->w11dVvHL zD75Qd@L^iL}&FXZ}|0#T-KTH&Mx zTPi1B9_yT+o@)MK@lzG^`R?=mp$;lDz7%@i)iKCUh26JAvPmYSRsbeTjK4|% zLL*)VV}D5jr>FW4P6Ow~nJf)9p!(qcrjMFAj9D1KN=PX|_0xdM{WKk}0X@B->PH|T z4hkIuMAHhxurPSzrvM|Hu!(f(y8IkQ3jlFp5kYX640|+S3D+Vo7N&YJ7-fg~70$4k z@mmc9aM*Bl{MOpD_CUO8L%Lsr3%(9 zs=ywNUu+vz!;%R;4DY*1@AhE4P}(6GgPwPj=srK9Nt=hndv-p%Al7-MUdBdPk$KgQjw}_byySw{r+M zrs`~&{SWP`1JHxVN~AT%aB!Q*MO#ON#I*?TzJ4eH`nH((q34$DPqOm<8|7?16DIu; zMs5ls-?&3|?CW}b^Uw-=eOt@a&ijWX32~>(A&3L+eF*|OQ~}3Wh8J=74`6WwmAW^r zgh%a)II9wZhxI9*3|v3ru(#dIcqP8VdiJvWale%&m3s4xkzX2T$yd*`Y1NLeMw5+; zE6B*Vt_3L+)?hj&K~KD);Cbs(h9q1Z9)T(IN+z4ax*wA{b0cco(Lku4!K+6>Cxza` z(W`(kX}xxT2INIkg3^J#yz1-;1dbTh&kw9azLr}NLj~hJcb_*QX4b^VKs|>NM26bf zH2m%As$_7Ggj9RZq9B*S7*TzK0I~Npxl)blpL--l0pQX3bhhcrWUb`ULy;-o>7RX0 z+#hVbu=gl~vA`R%>6X92h!F9E$i?`N#jH_-@1)$q1rQygyI#4VX3*X(qS?nf3iY4WfbQrYLh&%pcx(q9oo7z8{*l~xtDe$KUI7eJ0P|mOY zoqE4T#d8WjmxKc;kwDZ0I$=L=lsfFKSgPNCutaJSj#g`(Ij_k5G%S^!0!>ftG?8U6Uhv0v z!e!)djt6{QpUYyCV#&$*TphqY-?wS?jSeHESahw~*z(}x2{2_J?5yBZ zDj~upq|V99_n}eX+c?(?GD~_Ff%qzImP-W~_W>AVGKJ3Lgfuj_>S4LwS}Zg{o`96- zuX*jC{1ak$be6NWvKK~H4xnBwT)}%*nrd>3bYZD#1gRUyOZx`r;@cl05PQF?DQ?iw z5K$KuPc}`N)R06-H~K7EOP8yNfLIZuX{a8;ZSbaONBYFy$tVv|%GO)|$P78w9%pUv@a05!%XltBgD_4(SL-MDK1 zVX*c@QWqH@cU;v0kc2EQ3D1zd7N~jGHJR9F{txpU4e$wH6tTlt& zRa8JAV%I^huM@n=x%MfU1YUKCU86W}$W@4zXM=6S(!hM?1klF&{1)Rq8%K)TkE3_2 zHmM6_ztuEJDtF#bf?us>8^RMHV36tTQ$;L4IX_bR1|>ZL;O z-ah%N6_|Q|yH}f-D^_YCm3ZX!+ZoP0NgKpzpW5K2{0LEn2Q=NHx08mK8M zFSo6H0i@qMNb#j@#Fviw$Onjio)M?w=SN&0u4{65Y9?VJEZ#>44~2a}!0s$j-rU)5 zrTJz2-6oyoh#TWNPH8I2ff-5=p^qO!^5j7|+&A z2`W_S9Y!m3ETj74DFX)@ba$a_Rs@X9Ril4Ca770bGDC589*jf@zUp3KFouJ5>n~Fv zvWg2qS{fS_g1Fh|=29B}4{L884rTxUf1k5p#yWN)TlOVHD6;QMh(d|66p~O#wi){# zB3orCX%DGLn6VT>L`B&~mJ%|S7~7opIdom0>-v5__wPQA`@WCE(H|X0{V{WndA(on z=kxKv6c3yJE`r`PuNz;zegtJ4#3MeWj$I?XD+Xf&B|f;AghroHja&EhouhNkbt7oQu;>Jv_P+fSY&o-ds&1(xh+w|a;!zK z)U$e1@IqREtJA`nGvNFxCL_Pj3nV~*rmmBA&&ccf*>xt3ilV$~X1-7ZrR9n;)k0Gd zFiIE@_2|`x=h!|zA=vlCDQe$P53ZM<1uXdpsNrKr?wddJ?bjj0>Q}NPgeoG$5##MK z%zQjb0&;q_K?T%(4>iZZIUDCtK*c*7`XS{%e@CNCsrlCt<{{3aAIMM(C1P@_OXwM z3Pg;ho3H3X9l!_Ser-ML%eCO^L{oh27o+^*H3`uJsv`!oINa5B3y~I}+Ucl9}mm{7=xlzTB2!FR^U zcBv(bj+wtoxiE7I*8}H6d^peSW7F3xvZ_i|xQAOMM>9Lz`fmBL3y<)KWrp1{qSOjg zR}A}6x$zhWZNDL8FVf?uZwCMUevBhzN|q%woRYfLV{fxcL?PA#;32-0I_W3!vZ=={R`Ga8X&vRbGJ`*xYOo8IJJO)ul#(@j!5AMxe z)B(3HeSLqLqhKp70{D_$SlwL=`bX>?vfTQ`c+B&(PyW8a5coNkK%pKEU*Sbdv0Ij% z3|~8DJ#jm|5Kr9JK9Km&|%XnmcG&5nHM1~8RwXMl`y?>4I{`#WmtWJX!2i-%>)kb%P^I|HViBz(q z9?bZ;;7z6d_E^{xEQ}k6X5BWr>hW-$S8(Pw$1%<>D>I4!<840MiwTnh?E-0EE$xr$ z;AVfW5b!La@ZW@^U!6vllgW1>GT-hK>Aq9;_w9u@+tqhcYghA3?lDXy^D03I6X=2 zWybVM860XZ^lCcQk>x@yXQIP^Z!urWI%Z zPNnRng7Z{;0A5mR2*0EL)ew96*3$h<vytzBW9a zT^|s%|NcwCAU+$!rNjqtJfI7AWFJrN{PpI-NmLNioPrzSo}0QpvLHYIlQWS~I-APUIWGLQW0Sn;_ot-n=W|(Niw*ts?1po%a&?8RX&*CyVG!8d>_LlhUO8P8WIbT@{a% zZsp=N`RY&P@&v{3mGuOhip$#pfO>fb5BFj4D?B(h*03$2hL5euR3b0nmFS~|g$4gh z;5$JT6GOwWC>$PXv}C82P4`kyRr=6}&EM(Yr(#mBZj-_>bQ5G=ANSPeEBicdY%2Gq znUw3@kvyz$Vg+`HU~(BjW_>C5%4w)q=Edb<)A@j!Q$3*pnlXIR3JD{qSmXfbYqcrY zneG7F`;~EWlYwyqc?l;b+sD96gD5eUlX$dh*cpN4g-M{WbE#vtXQ^0O@u+iO69Tq} z`7Lb!5}9uBqnqrjRh6$Jon&Nd)LFS%?Z78<3lThd9;X&rpDc*Egi=__-QR8PQ~C6wcb7Rdv0ZhZl7;cN%yG^PXWO_o)~(>IsS&2 z2uG2l7a^#B;jP5hN#4VIO7uhsOeJm9jYd}x$Rp1459v%~KbQ5uFqc^q!*ytLGo~1 zAWLec$dX&1JMaB8iF3v8Ej&8)uHpb2Akh(VxZAPie1w=cOXM93N&tFl&^_4y+^`Rx zhPZ+&$q^WlI=6gvwUbyG8_@8wZsF+T<$2vy;X!XHl|!JG#rv&=^-=a9dAbmPkRr>7 z;P7%9cNdp;S#G?XHi?er#JvM4qT|U@Rr^S1Y4Jl*bN~zj)jbps*=_9Ol}9|6F2~u6 ze*32$LrSmEO!p~+gF8!=;8M!fEVy6dp!Q{mcYlM6B^@ud$aQsKaw$dJ@h0yz*q3+V zM{9DXGp1tGKEOP7sxSq|a?1E#2eKA8kC9|YRukh+hex1Xrb--A1qd(`LOa7{wzsF2 zqw%*yf}eJacW*cHFfVRgnSrDXwA07KmtUzI>g~_uQ~$np?LNe+M=>A^j20R7*;rt05_A0cOiweLUR2;vQ;rQ~SlIUoWVz)(&W55z{f z@?~ZIAURAtsAZq6X0yCd8wM57mTuLrz9(nZOG86`L?P|4Q`X+2aDiUKu*L19oL5d|;$OI%EsEu-Ykb8CRme0YJ3ITF71FvHs)5gl6) zdXzJro>(5W(O}>vNFU9Y;HyLz%J@)eZJZ-=RAd`2nkg0bW$l;S+qK@uH^a$mi3B41 z*om#FyD!=GRFGuM%hBQ~&@;h61giBL=7DP<{wMwJb*$XxPOYEzLeL-&V}oZs0t@Hs z$u_#gS8O}V;w`!hP|}eoL5DTgD@oRXNw}W%9U{F*=JOxr3!F_qg^fE%@qm;Wi%rhb zdy!PwC$a<9WL|dZ3-0XxzJ6f=lu#JUSUat8`lrwTkD5%9qzav#k$C5N>}C+qu)zx) z&LqY8Q{7h-z8H%|T#cF@V*eqM+NpZS<9a-Nc$$$qnqHfEdcYMYo^m1j56-prV zdtyJc%pKdgALjbVj%Hdg@?{gi)x>6V-&fd*_~n|r2!LVEJ!K8#S}ZKPffPATbqWP= z^iY9x_gUL_|GuK4#Uz3M+`>KVF_y zuN+T5Xs5sb*)tvnmw0X7vRk5tBBy+58oTuCR_O1crr%hWqu;9h4!9oq&!{L+@#kjs zsBItVOV5k<TXm_n4;!)Oq zU2m95h4n>f#yT36$Nfw)y?8}tNC2$!5hwZ(i>J4L}8l(ycm zDs3)w3@FcAWcoleWSG&Qth8E8^GxM3q^dI`ZVN;Y(+~3erOEi7v*W4bD*B(bn78j% zn^UZbEcG5DCZn~-W_D{acg2Y{XZujqC&y@V41&=UtSuvyY>a0oTye-FIs#A!N})A( z?_~&-)kv27T~{x@fbW9Bk4$ku52 zE#&7&U0mz_e+rF(?cIyj7o_1sBu;@Ks`fx44@kRN4ea>gTs^jf-PPp{buNxpTX`nr z*wECT@@aO6Bt{9+-mrAyV>iad_)~j{89_S#1)K%ntMu|1q{Se`Cu3C3K)iC37@@%e zJ)S}reeSz>dho}Mc7f1xi)~lB@?L`4+(pQT@u+!n3x2@1fSsx1NOk-bUjFA}PE_j` z2pjh1^CBp+6?5_{L-odJ1P&J=4DPXnsxXOW0QSH`2c6&c`%rbQ@u*V}*tG8`TB78p z#K$Y`Qt$I-YMl(vq&5{JGuT3WkgWVU+NX|2aS+bc?{xiM|G7E6;o#;mx#15%Z8KQl zfy3@M846U18KbODN1k7m10LYxj*S<{E-rMema;=0za~d}{5|{_hbR0FW^Y8MzPc7>9&iRG1(S>4l^Hu(r{nYCuF>ZA@82bmw_v=8$27>Q zHZ2F)FH7C7;{^2iByv@31%xvgb z0L#ya428{@UKO&g2h=M(jn}5i>!0<0VA44NUbJHOXHZ8*x!){d`GWL3Wc)oN7Jv_N zdhzsD)UxbD?<3eEPH>7iw`_`U1^TxCK^g>&>k`v5l zc4{x28t3rHprgJ%SC8$}1ce$2q^k{CpNAnY@j*duTav~RCzT|KTF?PM(zL}$`vdsV z6EHRYp=i8w8YItYFyC_`rT9Njf4;52yNp{|)ltzN`y(&T(V3rfIT+@ZcC4`=3YZ+0 zU_<^d!m1S0D4?I<5^uo&D&qAfNwmaQBn5e^^`39A+0Wa9L%9YBI`iYl!MwLTww~AD zKGRP2F)FT59BSz;yIY3{k;JU<9I%GQsk;gxSph(?B@{ECo;fa>%aFk$rV+0?Hg z-AX`5dJhbv3C)=}+0U_Ljp|ZSXv&N|aXq4UO9zq`Ke;FTdjO(Ar4!{uOC!Q(VLL4s z5R54yU%Rs0yyIW<7`ip_9?ZkIkv*4a+yACP}Q8?pw=yd`IT>-Y?JbY;o%|Gxu!oDHEyw_8^Gyb z4>euLo)6GvazvE~*d%Kpth(lxC>#$;b>W^H#)7qcp*-i4Y4Wv+K^4L%IsS_FBQAkH zRs=xLL#TdRGJBw{AvBe0-G>C`IN_D{sKC9@De-I9CfFrBR6-Xg?F_`P&UNn$js-k$ zCx2R)@Ah|c()oLU{KL$Rw)QK9lzX_IW>u!HJ-1n_UDY<;a)Mnt(18@4xHNWHOq||H z_A4?g0qU#cCEsHsx|SZ=Dmzq(w7LBYJ22E&fnv8J$IQajT!Z08MI$i zsBK}t8@NU-n*w8JUS1^%`LtC+gSw1s!;gGgv1U_=qJLY)&J{)hLR{P5oMwYR^tecc zAGx18;v(^d!I1o~IFIrgo2_^O$c%A#S86VLf?AE9{77~NaWcU#@ zb~EYq zGgZ6jT@-M6Z1{Mnr#hsC4F;lvm363?`;W)iwiDn3dqU}s^Cy=5w%UI;`;%D9x4jHT zoFsE5L!|H1wqU{n_pwRaxl;F=$c-7?#JjI&*)J#Wy~m+-r`?mT@LJT8Vk3LMVh5rN zdV*JWNt?U4RY3^1%I}`uk4uY+_TDD~Q&?LPDf3f{Zhu}mdD69Yzjg51dk(+>Q4XQ~ zZ;Z38Fu`qD1*!@UU2c9(N4k=SyNh_vB63Q&wL|FChpBtS8)2PYMDlbpEs=Eb2=@ogU#wd{45HN!ONlPDvN{3BL^yZ z089xVpdqX|-o&dz&I4{kFn_o{V9E4Drqs@Uv{U|3LQW5vu^xy%_J$>ok;{1LS1dA) zf=2y={0(E=O=S1#F~GGX6(q*%9OfnV{qWapmMOu@alnZ-9&|v`x#d~4nQT{C>qoKd zp0NSvQPD6_o(I_!)8v%zv!^=&Dfd0k_|~dyOVma$zdzNo&}ePpmx0_Ln0aPMdKCER zCY(8_$8KlQtZ7kAr1#in2Xz;IO&zcvr92Gs&4}jw`upwcqZAW3AkR%kNOXISeJ>4L z{-*u&ebxo>O&d?7jdUu#`!J_onD8@IkNOZ9#ZCWMww4T!uiJl=Y6dp+*K+RXh3aSs zIsG6E#UaV*g3^2BM|v(NoRDl=3iB&5ZN4gr+S<2l^Q~j%F52mX?Y6`LDTo@nQt@}% zK4AAWv9lH^tjcC2imi~rs|2*X2rml0=(wU7!xFL-*&B1UlEMqjX^sm^C4IoH-;??% zCjaTeaPgJal7g0Tn`0RAe48h(Cd?YANd0FF&tj7^nnyRTG!*Ij+%tP#1-#vz~- z-^HBDhHhn=sZ0nX6wcJaBV4X$zXc~1@xdaP#JE>N zgIOCtfcusD&P)-@Ph)rZs^r8-Jr8urf@+FudnyU;YV_&l7ND?Xt$ig|MJt>Pfa7X` z!RDp_Kmih3ZSlii>UiF6WKH^` zE`GburKBySL_+TC@8Zg*j_=%Udi96Q5RXc!InJagG^QmiR76NLX-sNHR8_O~f;IS` zRt%EoIrw+|j|hEIpZ{6cpp=vnpe6pWrAn53Yr}$;t|t_^jXm8Hv3^y9bCc24Fh)e zEkBcQmG5+6NPlrv<1mUVn_D~Q)#+V~=Iezz>HFxKv&0hX>`w&L@IYc@T=LpCV>iHC zj#%95U1$Cx@(`&zrcb7=(je|^RSbIp``h2tXW>U{OGwJdCY0n*5uEqukuyOQ(Si{C zudn+cqUuxe12~O}jZm{1;Ci$wgS4qK3q_J7w%HF$h47q8`+ztGVi+p}IqzBL5D@Qg zSQqt+{c?=RNi-8a%jwAv<5*;jM~M5*?V*$CVJDgO2R&GIy zn_8yu{#PgQ;n5Z2Ya(L&$q8E;8a2C`t&q?)fZn9x=-`onjGMKgVLCS;HF27f zi@rO}j+MRdNZ?fNssGrqC_8ci=?A!FC$nVBe(_WiW;EM+6Q45T8X223=&gOo1q5<8 z+?s^gw=bQD{hlPsN;&G?>#V8;5nuBL70^(@on)9NyFPB`58MvYTAM|^ZWXlYIMs~H z{^dqbQxh*Y?wv47hic=N`;N+_^KYrR4R@&&6*rrKuV=q2ZyNnqdJd-~x0Q!9( zmEfbn;?Kvo(T7Pg7sJf3PB0Xs-lPT-iv2P}!et?fnB5V1FWh)rh31f7dMA#GfhZ>R z0oIHRMxltl7b&%3eg}WKN|j~q0c>HR%rPx|8AO)qFl!jcbE^eP=bqOQP1|*V>+NkO zJpbO;Dk{)vE%Pr+yF1gToo$y&0G7>VCN7)ZdT8`UY&~N$v7$T*bF>uu)P~S{~ zya4{NO>N%kv%=sH?zrUxEg72_UQ;D)C*AeHw}pN+QvFyw<6}l*LTT@3VY@lsLAArW z$R~>D3JYG@+mCSQYzXD&2wWy-W<31^XyMwxL$89u&PE2Bj9FrIcSKk+*QXyCkGw8f z^I|%v*vLA}lgyUPij5~gW@3q>UkHCMQenLDm$k8EUyFdM4_ul*#Yg)#PA&jh8>>RW z{~McH#MTt=fKYf??cZ}_oN>lZj~RBY(O7nEVUW&AJ-A17{tXYZa?GwLZp`d{>ESVpLtgn5Fm zAClYs*JtoQVep^sI2wXdNv2seTJL_TgtSY^O7cqCSoS8yttXoCDHe8ZD9+9Gy!Er> z3R6wW3AKFbiR-6(8VY~giXnPa7bW}S&SM^1Wn)4PEW`vOo+)MZ?RS3G zjk2U0h+Mnef_!(A|qa3$ldkf2fFU+Br-XRb{<@ zTXAhk@RdTdt-$oIh}Zfk) z@xniMm$9FH(U`p)_c@%3Bd6A@((fg;GPxVTL|)wW$1Rp|L52=8Gav{LytRJ(dm1Q* zfz($J^QI97bZq8h;-c~Vc+uO4XqM>Oqa3pd!LcyZy0`x`hO~WCvB&dYXX!H|Wzpfv7Wa|kNq3g95L~_Dn6s#|6F`i}C<3=YF(_xr(7ZmrGEc>QtWx{ukj z`(DVfbBZfDuJhaRZ8L;s`$u`swC^_fNRqTV%5^&C zd!wg$n!M3`#n(fBB*ZE_Q0Q1o=1>(27_{e((^%bF0;0nlb)djs%;n9N^9J|u4H`$S9URHq_Z!;T? zI4h4Hu%5<-KAoPQyJ8^Fd2@DqlxbI1&@vVsQy%8wia744(&mF7gq*CQJY`vP!2{$W z^n!bcjtN*aQrx^F&oaXbGUlzqbYa^3J9}LYMz@^RiQmV-$<@^qkr%UZ4fLkc|2S45 zd3P2f>h;992&E`M{z;hEJ8QNfGTqKM&@*&i`{ zss7w01Ij{;foKsoMIchBpoW4zDWVzigV(RnaN<)!o2WJ!d*JoaP1h}Yx**-vW7Igf zPv-Sg6yh-f-fi)ouV)T|;P%wC(6&3N#0%i{<86?{burcempHf1AKGZy!L;7)m>vc` z9QUyfzqk1!cIAq{fKDkNfi-lVDb&QQ(Uk>mYs`eO6&0;S(%(EGer%~`%eDGTwHh1y zS*q4&Yzx3tJg+OSbkW^0Ioo3hDuRmDcxjZUaf8b)khUc?TYx z`$jTq7+NJvEul1m)MVZ^2ZS!($b1?^Z&Xv-xcKZ`BV{vp&locxkeYlh`0>ai2w5Ly z5T#!?d>n6)EdErks#1ro#4N`{ISTZH2vvs`8Hk`4wa2;#4d=_vJZjBx9Cob^=$pKWG>7(+hto z;oGtI2h+zX{GfqJhQY_~3|!vacRx601!x=TdNIb-S~EReB>bDmp%$Vy`fB_%N7pCK zCJFKf_lVIbn+&TczS&0Wd#SaesB}I^RQvPN4ji_9{}p6PlX~|?VC>~7a`cnhs?ayG zEMIvv&0SNX`04Zl8vL|EZYbQA%iLGjZk?}zdtO8cd76&{=$n^Irq^5;Q2h802U$Eu z*_jO(%Y^*bMp0{DsvdX+U7Zzd*SnbMNQMbSeY!H=&lofM!ttgYCdq9Q*$tJo01=0u zFT;rv^C68tRTpN!hioKfi_@B4*Q27iTRX=S(K_DyanVAdVXEvuE@$im$Sa$L^D0GP zT*NZGnOp8c1wLcAp_|RdTDC0wOR+0WS9XL9wCfDGMhK)SDw?h(LqLnQB)BP_BjAK2 z#CEMwhi`4C%5y*Oxj{i!++XWv+hmA1?NeN&Y`)>~JX64`q)5wL@(pe>)iIkT9aV5* z^4`$z4Iiu)!Z6V^KPb*;U-NC>rh z=E@n$!`z$q5oZdzMj56D?ywxAVOlTw64@nHO+r_M)ZQ<>$fJj!J zlLqPXgM0aKD_lP?60a;1eoe9`SGgKQiww=Ke!o{t4d8js*nV+zXww$RF*RgoPONKu z7L|v=ayFMyk*?{_iyj_o7d0m({yYyZq@G+tViYP`!y@~^NTQXXE!_lgYiz=QU7Mc9 zz=Fh6(2XTDA2E`5>8#;=Fr=?-0dD77;Nd^61wbUl3W2^ceouZj_JOuE1ZrH0>gC7h z?&U%fm19JsndygaLAJHq*FhLld&i4G^@u{XC&1b09s`@=axVB4kw?8=hF`vZq+JOZ zaz42yQJk@q1nA$olz|J{z#Hy(fMXS1|Ko`m=N&J+=@bi{WD@_vUHx?p5S-mXG0)d% zmEZX-FTA_t+Xb+m?agv9B5_>4TU;ak*khHw*>H3DY8wLED9HZe1!6|FKe!l_x|ik^ zYb!5;YDeiGlmPTjw{L>mJ}SAWgwTDyld#vC7EU0W#xUJpTqY|d0M=d}LK}z{XY|89 zqKq?+ELK#Hjnh04oq9m4ROQ~CQhzr;+?p7Lks4$Wj#|)3;1T+()^Db32M6>u!^S~U ziwp1}Tktj1!UWgq9IsWv(>?7)Mdid>aJkTFs=s*5v&R@ zO|1N=#XLtD{mGX2KjqVKrg?z>$&Z3TFVRk=6T`kXKQ2ZM9M;myyw=`97tl7;bK$^5XqHn#kW}yms$b{f_Ku2=MckTnZ2?8F?AAh&kWe|G&&IL0o;n+s zPLkFN{69rZlsPVxD9b=+Agg4{J|HUsVzG9pfy2lXKR4$D3oQ50rG*fP5?hs|3>ad7 z5O$v$&{Td#7~NtVi~VyypuqxHX8s&WO6xiTVNgZmjnB9OzC}3?N9!z3pHWIWkq=6} z{32l=Izb<1_Il;?W&D#xg6c)U~-97G{m*lBKcbfDNOxfFv(0NG*f2U(57m1-L!7a6*p|i|dsIFXGEVh`)sB^Mrij4aDOXEo1>Mp0%;QYzgbbyLL zm?e?puvNH8df?MBdNoQ?Yw%hNr{ON96-ylf{N;`?;gz0zDbRrq>?b|3R(a#H{+0iC z2dG&k9+WP#gIT1D8%T|Ibmp@&zVii>lX9koTW1v^kj1k%+4=o)TQXD=zBy ztAa-6dVE2iyAz5{?1TJmQc^8_ihZ^Ra%%nS-FTf_iAGB6;a8uO<>v-u2`fvrD?;A3 zh;s#v$f2(EmFn>c#L7 z4yLIT3`)bQWk`q4Pf6r~?E>TT^gW4o7A?)eo7&bmK>-onES^x9)=hP9rynqZ_g3nS zZiSLJj#@7KHu=ti=Ylgn@B*796GXwJ%; ziO?7fS+Qw+uAQ?I3eWUtNI6GJ^XE0g5p_z-kHe_8Ypk7-jlcGla+sBi?A6#yiJy7T z12{kcuyKJFgMXfuATF0AgS0M^k182&CDeDcLa79;crSeY|FbDL=(BYcTDK32mulyu zSl9i;I|Ec09{z)qXYb`clTQ&TrTgFYK*(ec%i@pMdOLsI83~o8if;10 zFpCl)KKC;TdTtkG!Yypm95x0Wj%aiKy$smIL$3p7cimMt$r=hNF4v{rK%nkTQ)%bh zsx29%EBnKCyZ_cNng9jzE4h2I4>SjvR^k=4IWB-001jzmU`3MiB#W1*bN@$9~L6HOY)#)k4=PT}wpSCE%Z|H9+X<=vfM zQ!GNgHYsTO5I45fcvfN0`&WH-gt+4u>Hg?}mAKZ53rUUxzM4?|pB}it=@ESd?&I`K zH2Sk%Y~(Mp4)yq^)XV(#%=$wdrZD`+>(;mx*_aooy7yciGcTi+dgFOG_9ko%jnAF1 z_EW=rJu-&cnv007keS&ZEncxx%gTtW;rCB(sNA<=|{ z92wp4QGC<%LoZ`KYKn6Tg13gQO>Wwy>M3JeWm$0lBdwxXpH0uKrJUe0o#U<^tUrjjn2a9d`XH=&Ug`Z)_3`ny*Y7XehO%uqt@}hsUf*#V!(QwxxeoP`FA5^- zflHs}C8^VVsrP}0#=-_3kHNKKsV6~nnRpJs2tu`5eFWa)u0Dkf!4F5WG`u&zw+Q8b zc7*i|Ubw}q5~9lRuITfK5LM}M$ih#$UXp*zkyWKez~ob--dcKbZ<>g;c{E_?*6h)= zgKI^9g!*jX17JT-c^VgYT3reB_Kv55c@2HuR`q+U__jJ5Z7#I7wn+~!lCkg;tsmYz zm-_{`^GWnTR+&D%!7UYhe~!7*x8^TB@J4ks+YYVu>&6zpf+hXn3HmAlo^V3;%v7{2 zJjfK2rWq4#_8`KXHxT0#L}6Sa#iau>%xS+lTDGV782nn&w|!Vr&sF6~z|6o*GYab7=nGcvgsJ zDQcjoUz#>t|9Ue@^TR{R^7eP+J+t4N>uk+Bf4*wOp~tRuH!1ZInGv0af$L?SoWmm7 zpBQ&i_*4DhgYq%jK&y3WKwFo2L2uR(2LzTEJ1N`zjY4;F8ON%{E>zaRS9prmg;b?El9?d7hhv8>^T5k775k#Z!eMXO{dY=RgW2*-_Se#8oTk?YGlWzEJt0KTT z?)cMw8a+Me@s064_-u{(%Il4OAc-5J#K`7S51|%k->;8i{${S0bb{X!j?(@<0(|;6 zE|_8mxr(8n=8m7{^@7xp3+Q$zUfV_q!g-6I<)DwLmwH=r$fDvNG^1p_!7_U4R`sB_uA5!gxrBmT9KNPVD{_JK+cq1}ecDn@blVgp>&T zo9mab@O|WG4}}Znx1u9I0b)9IdwaKt^hTvd_EFf;foA_#u@pCKRS45(qM||uwD(H{ z@EllERDj9VPPn?A^$)Yp7zXKZF9gQ4yNVkJI@&6LM{+K> zmBp-g98uzd2#$9^%TTbZpW>VS(IS?&@*ZH>895;Es_|L(p5#bz&jT8wEm6$}r3W69 z7h3`5ymNj(w*!*=;&EWh$bD2j{PQQR^?Eu6z81Q1eV=uSqCHOhQ@BR48_o>%COJfp zV>O+%Vw)K85o2yes;`W)Od;e1My9P4;)c;K4LTxD=?SrKHC;*OogYa015txB8Q&A= zh0g2(rIy{c8k@W=qw;y-;;$Tf7;l8qah853IMQM$n4qI88du+ytqz%8OT}0}&%P{* ztBDq>;RyGO`_L|WvuEacjTMS*JhPj5=6vppFE2pUr`7H4g9u1h4vg(C<91oCQ#m&J z-LB0h5yd`kCFYE}{cP}NES=1LkMJ*Ki-0l?Cuw@!L@eR&{$1 zGQ4l??d?~B;qxMn!U!eaINd`zT`iYa$9`e%*ZECQm2^Ebn|5+1TfF)tdXo#?1t8#2 z_t_YEo`AM<8CQL^jC-uzm8*(iDf@*eQUm*lvL!V*YwV&y{Vz1{aS%c z@y@hpY03j*(Jy^G+jKU!X+i`piRBodUD)9KpJ0Dzt4N5@P z4+Tzq8~qm(>R88!$h9(U$E3)SqWK!=Qfh&NzLGQwoYe}OyPPl!ZPvYfF7RkzQ#=|t zX5Xf+{85t4<|-jIk2x*S=XUwLcmkqrEVP7UW&g~JL_RlXS#MGNe;XM8R+4eAO;hZ) zW13suC@4P<<9g=B8^k&}oPvn(X*>^S)rn_O?>~&kt2p3X=1^<+i*8!g#%a_~AjFFz z%G}=0FZQrIjgup;D#FvMnvAu1ex?xR}X2dZOPtAOm|oiNW!t*n>8wde6000Z}wNiGDr5BXthE>QjAf+@_x{qL3)qw zOUBy5Jr+4xkBC;U8(p_|11b%I$iBaUQs*GvYn}l2d;HAlwDYR)?XDnp`LDM&94;ub*hVGO!BW;Fqi8+=D8Hh>0k2dnU2y$i_#y^x{K)0g zi&@AQ9IaH@7s0WA4y)vr2Ntj&<9f<~S9y{!J3CGO;-@6eHxvKtRL5Vg;DaQzag5OE zAet*U)a2qE8KJz*PI$>uZ+i`N=)yy`V6Nem*CCgi<%oEe7?6mPYquS#kAm8fo6s;x zhd1ZMb~)n<={mO2X_i~!Y^*-Kb z!icH7)f2RI89He<*)j7t((td5(^na8SRG8{W2ajCiF2hK;)+7$epV{t6z-gwVv>xF z-aLUBmy4?9FM+-u;JdqrZ^(^Ro@NV-stA)2=>L;-%A?c^wPWzX^Vy~q z>|MoWbi_KXx%9c-)2g5&m z?b~lzvt0=v=0;5x-EmltyfeUR!LVNY9cRm>lPA*75~T8mYl8~wxG!pJszZn;x@)T_QpqIqy`?y`vJSc9ABgU{Bwig@0BSEFRtbg&Ie?pV&B}M{%sfbw5rFeziS%oD zrtWg2MEmL+wgFw%``Id^(Q!b28~oIdh5Pbus(YuiF6MX|kztCrr_PVz5n~dKmw!|h zOpM_fKy-EL!(+ON0A?^nNg!>S4BrG_&ke1-a#~x*-F2v5hVMpOG{)n)i%C*)%#U!1 zTSaHZS^^Z?n31mq^~%*Nayp7>2lT46l}cu#=c1e&k}N%1OuY3(;gxr7OBIUCxE=26 z>mIgz1hr+1_oUZA>_NGi*hnP-lV!*;*5x&hFe^M|W0C3oKPAFuzv$Lr*k<1c-t_2? zabADWukz8y*|mg}$}>8QqTKg!K;u18QvG*h!MW`f7`5=EabQ!Ns0;&Etl^JE_y;Ob z4Bku!)pKi=0Osgk;2VFZ{GP|%MVn3@GRX#d$4o1|Zn15+>x)-OYDxH*pnco!UW}?9 zx4bR-N(ZDGZS65xZz|~9c2(RUbjDHt{GNjXK>!3Urfr85Y3D;`{DJSueK$GQWYsyD zpal6dSG;7gKB=wiXg)`9!h3zP#j6ps-@4xLK?!WTEF2{i$HMxw%ofuyH8ru9Cr zA`>Bg=m*raX^jy)v}WUl9J;o%8>Z!3azm}zisMeZjqV^{WiDw1U;1MY7J8#2wC#$n z1*dOC?bw5V{jmp+b%XeDq%Z{1e0D_#jdG3qXO;{mx?3#!+a64@C!;m{dWLe2H-!vt zHd{CAwma-w6tQ?y^FHXlgxm`uYkwJM!Rrap{4kn8m}^ZG2Y$7jiV@AK?5AbLd#!u# zgCwyR^AUe7iPe@rmXBk5gzpvoFH4v3O=Jda^Sw{|MYd*P{Pg;3buNmV+qb!Yh=jMq ziFl5w&JyFFK3n-F%~N=KznXXJwsE9y@!w!|U8_pKAf)Je!q1F3;3$DS9ka9&TDr`B z@v2VzqZi-QshCQ&>llrMW1YY^=(CFwZCzN8%)rQBjr(_y{2$VUbT8IhQUeP=OYh{< zmche=_89N({R1 z=^h-7L>mZ1x*?Es$cqu|{240SNpSYbtD{l1rjRqCO;A*lVCEHYPG8@`>4%)_&p$XF7Ze?}FoH68#(9Mf9#7T>K!A)kb4p-wK0a}3hAI`v}J{>}Rr8ITjABbUY%KVQtdgi_CzlN8#jSS1fH z`&Fi(lEQ+O?`T61SUvIkDanc;NDM}t@XI&?Nn_WKED`?Z{y~vLC`Y}k6@CFnNg$Hd z2G52{b0MMb!q&qxuD#ihA#qX1j0D`-+vk+I3oGshl9@#dzZ)kMI#_ z!P)e{1}Wi#b@r$$)O&E-+f>@e(9=@&?+?F_wWb@B05sY_dOY~KY+iOcOF~bc9L0S7KUCQ3|Ah+syuU5}>)-NWDw)DnpP%rm zBN!!bAiq!g$+PIkHd3sh;@L3E`uqD-n)5Sgd*O$^E~T_+`85rv6nCg75XPoRz5$B= zJ}Omzml(gk9}3LnAH*wEv*s%9*oN(@V~%eRjD@ict9lWf~IzyZJQj4U-MMzvQj;E)~7JCpy1=Cm0ZDDldB0pV~T9 zDEr_Z^Y%cw4&n5at z_U34P#W&F{Rnr41>&_D7e=<;^F`jlIL|X|HAvWyoQyx!kxu(q6)h{Q^6suF(e(=N` z0~q1Y*3%geK*EL_xq`!lB$u1xB6I=gpq%;W9<;9XlOh!j7#;cPd96+YRAYEXFI0@@ z9mzD}c6gc35OGry&2dqJW6+DvU7Yji@=oHM@L%IJx~~86H~ay__Cs-+XFJu!^=98A zpbi9w1@Jq<;W-gT@(vtU%}#<0h0Y%UC9YvYyW5<)W~SQ*l9Ud* zmIlu)pa?>2&69Z1zH=7|B1Gl|Z8n8tgrd2`QIZH`@HsH1 zPIlw`_G!p>p71!~$eg`5&nWJ2P2yNYQEtBwYD&)n=7>&;>8ukmxHjA5>U>d5#+i4JOgT2D=?nZ-UF^obE`k_O|n{I@ipY6+H=mEDV7j^6itDXMW_NxJ_2 zO7T>Y8J3L&XjPnvf58nex^GFn^CYx_<@uBNOKY)*@)F%`W~8gKd-_J3zjNOUN4viG z*Flz+D%{DWC;gsN;E`1`-9q7D=uk5Xsa=YwznVL=g}j?@=<4IS`XeCLu~)h?F4wvO zp1X2uDRR)zkzCN?MwX1%@VbmkxL=DL`@dLw^Ju6a_x=AlV=%*D>^oy8gcP!kt?W@+ zNLdq#XtkTMQ?h5xR%oFti5ARQvP2PuQjBcbGRQt=zR%I}>h*qqKA%5+=XXxWUv*B* zbIg5T_jNt4$K9T?+_h5W6GeCykOTb3Vq-O{Pet3Day+Wpq4SUj>|KWPvFQ7c7Llda zZW2*#nrA^QzX){L&^r2EECH}P*qtV7D9 zA-cydo@3RtwlE6iZ%phFa}X2zz4~Kx3g?ccW~}hJ`6M=HPv{`Q0qwrhv~TV2=L9CV zBk`#F`<}XXs~VB&FXHliiHgHd^E)na@gwL6mzQF=XSsC%t!Pon+d%WF#q*3a7?I?`UxSaQR18DJ!d+ExHP z7d!j%{qO?>NRGIL&$9SBBfvn9YS)Eyvf(a~8C=zioN5%8ud%kaw19u-v}D&Oo@4s+ zSKiTIdCX%j#S6CiJ>km*MW?n=sOXsy)VIz}p>x7~ZAxjNk|-UphzC9<`!5PD^gjNKC~Se5)W z+)I~T7A@QyBFk22q^XqmWVIa(fZhg5$;j5Y7IjLi|{^KtSa z!Xo`)`DIj}^34MKt2gY9H!A+4E6%a_w@Llb{I2sHkTgYyo49$!w?8j8mRw zGy?3tM`6k~%)IBtTN@-*sLtsTi3UpLcQb}Hl{0odqST4-UG&T8x~e2TW|iEfY32Et zIt;7uei!X&Vx_Y0)ql8Xgkp-tpHqdWOYV-amNwY?W7=#iKyvC6xy9Y6BIF&oKc^kh zu)p7k>s%XXr00%_g)Ksqdq#XA-x+e;n!t`2q-dsa;6&5P@?c=c+KJ(@iowp*6RlogHwq71NEIrY6-TUm?rFn*X5bk?-d{)^W&7vP1P&al zfA=5%3J1If4K~O6&aaCI`r6YUA;J2-WvVQ5mLN}lg*u_|>(pH76_s_36GasoC#q|= z8=LB-8jjGsH_(ExoZLJO$62-qVS%2&HLD?L5=Zl0;5Nga=x|uff%kVysT{_)kjq!H z)pr4cuUTj31<+vY98*1mA~ydG8)*xsfAV#}HNGY#BD)$#*=(1tD4ECoy$csv7!j+< z$y>LO`*j=Uig!c4qHH)4p65_EmCbm5MR4an;z?{y5i}@rf&%s%Eb1X^#bnt&e8>-CK6)4dbLUN=tfH?=A4^z3Bt;!RrCSSE&v z-L-}>XK`q*Y#hjs^V{@_Z5&Ox0ROb%IwA(ziebB`XyLcQ&ERG=Y5QO8$45~}<0*&) zA#^$Wl28OGa-H$z>Cy+i;5 zKSk0Vhm9CD$otMaO%5zX>m^$_?kJnSJ{lPvxTl1Q+v8U}j;^_cYPMYM@vd+|;<;(g znz2#6Z!#p|lN|o=wTpPS?aY_v7QtRn#+t7D9jr?iaK`b@!WCd|>k7%$CpKQ9yn!!~ z^C#Cu=LIPkhE@o(mJzj>?b~meo_n0ZOPuDNv1YnHt+k2&hu$(Tj>_7vT9Pl*=gUzI zKPSxMI{o|tq_P)~@*K~rKkMa=pE)S0QX4Ej@Mm#M0bg$T&tjaNrej*nKwt&rX>eay zmv$2#Y1qjaz%rSGtlD)R?UDVx8xh(4LDni8!?pBL*TR*A&36m`1#9u&3w9kp@>w?v zwAOTKTR{&VWT56{&I#P)=Jp~Jeau+uUkK%2(H0WwAJWRu#Wh)l=j4K_$O0m zUV9_L)##;u22W{w=G27!zI|(-&opDeEh_P*jXrCkN_jB$DktK|%5Al~_0+#TM8MM> zr4w9;E`hg>4;`ysl4LXwH%=wB%*={#wL`UIt67jdMm+(C<<_!@j08 zzmg&w{0Nrt_u%-m2t86`%mT+f)^})Uwu?J)0wE%2&ZmQ0Px{;-zuVDX8Pn{b1z}ijd&W)I{fp7~V5g3_=B;o+o%P9?PGPGW&%6kA6GQ7e)g! zrOx1!IQ(H5rI?}4f+F_V?EHwrtGnF&jq)8VM=u$a9UD#QekX220!}%i2=)EKnm&6; zMx^C#0Om>+#}4k_96xhx+mZXUz(tb#>Ey?K4eZByezhHo1z4&14nSMea~76Dh)xWJ zYLa3oX?D&lhmo6&5h2^eHtJ}xZt5qCv)X!Q3P~syxuYa(>dGQSm;GuiJgN4{N$;0lL+E;WbRiw zXqjPYtUXm48%cn$!)_N*XszUGaT)fk0+jCNv%CfxG$cESE#IBJBPf_zS zq0fX>pRXSn;D40uJQ}}etyRLG8X0~$OQzSbv4H+Ks*6X~6DC7~{6@V)ss`EPd z?|kr2;r_;OOIyP2fOgZ zf8+oo-8ZX@>NgL}-H2}93RaoE>4vkN^hDhq%nV8H1Bow}`Hs8O!gxDf$MeGgy8ig4 z?qa1*?@qp!!;r4YiNMQnkp3AklYTqIj{r9nk-mJfEkKj!i0jBEdHb|TLqtwEM&*z- z!<>=yeuK-#jX1)|>(`P8h@7Dwlh`(KuFnb6(zCP2&wr8hnfI?_M9@(@-1G zZ$a>_w52OM_$p6_oPP=?BrXs~XYK2USlqkt)hjr!K~d!3E^B3(#UiUwhS@_Ump0-$ z1*F4DJ`0h~eM2b|9I1bRFJRAcHo*RltG|!=o1qrA2ur%2)S zg}E{xmZ(W&iC>z|k{&o`f)6DPKJ|<565cQF1bgvR(4J1kyU~l=oWKeCXWEe$BT1o5n;@yamOkoPd(|Cme1dN`^L;Ns#WixM?2zUybg`@qEhKd9IdU) zy0e=5!~)pkdYNFvy3iCR`ub@BmM$*$zNcnlW2sq#N2uta|E^iNsZmz>XY`U_nQ&JW7!XfBt7f3!rFNii8XvFztC>odY;=5z&(CbrNaXcaj4p_rT#_QWgZ#rA)yGa{Z6z{S5G2x{&s zfU;L7423>3(rCg{N58*^IY7?;ZZ_tPLfo5HK<=$lFWp}5wPgckdR%Le*iFfM?0rMSZ58Aa=vk#oGS~WSd=YL}Z z0uw*Axm+^KGH2u|_5(Hic}z$+W|b1PixQczp|iJwq)4X+ZzM>EOA=8*7e1}iKR&a+ zfW=d%EgHV|DQ$Yl={9@F4%J0S_#F#N2ZjEX$$~De5IKY$n6yzvme1q6+NDTK^J5fM z{S-q+T1T52s?e8CqW0`x6>Ud{InDFcH=E~p;viSLUuTo!ZtwDLw+&v2w6|4Kk-T%V z@987Tjvd=V*R8=Qt;2%46JB-EtAL;5W^rB}`iJQ9;D0dJuO-U1{bI*Ci(3?b5R{Dzhp;Hoo@6tuxk3Bj7S*Mc)(EDH_^BKPgYUUO|@W*ilmS z_uMX;D3*ec)hL@j`IJvESrk}K@M3vmdEoZRpLT2lxM9*HcG~pu55>g^2Y0yvxXARL zA;VmzrQT2$Wro@5Ki_XgoL;52!PLpuGUq%%3yq9T!V~|Fg*i2JZ$iQz5`^Eh=X26S z;NWtqyP_VV-!i)`+vh+*wve<&V;AeUAe*zAI=Q4lJ|7>=3NR+L&X>YDNv^C zG6dU`XtCoFFGkj`XLB@Nty(JoVBjGIuU?d>{%V{S>e#ZieE)Ys_5W%`9s?!zefqPC zL$LtrzMh?+Wnp`^?Ir1qe5*?4zUU@nGUOC%)@QP~&nT5XOcwb1qSfPYusVG_D7N>8 zJ!D8yOq|nxaQC5yrxIj$9aVVBZpVZzr^fo9big+|C2V!TQ0pF8$ZV97yz__;E9z*` z?q5)sZFfZ38ksuE8_dXBffIv6eUt1+c`w#4WGUe)fM{nNHf~ua%otyO9%a&Bity#) z2c0raz(Hg|g&036vP~-e*t)wNA@rRB1h?arX)oPZNhhW?>iBE>qg~c`eu@M=VGu$h zeCwG5;99!5f0IvAjqf2BALINZrETWCy1jG33-F?F^lQcfs~YRBI&03W^P(pyb~+`m z58f7qHA3hr43a`mo;9XG#CL4husOryh9axG_A>ima(|*;u4$v5H>D|jBr+vJMLxcU zLW(kqC$);(fgG~Mmea`BETxs;W19Qg2yyd)W2awgtsCLjIiO)!09`I-d~LB-D)!NN zurK+s>-cH~{2LR>WTL_bS@Zk>nPO@ZyG;eToj&^Q)GkWLbP;K*ClOTIx3%R`%uG+Q zy=4OJG6sxE)iY|*2K2)}=OMm{OvwO5!^ zMZiuOG830`TEiH{>RP*ko`l3bK~Bd3gyWxmkpMblI(B4%Uz`_Z2SB&-q1_SPS%TzR zUz6{B6TiH>K5XCh2H4tN;>vRp{90d#b|#%+c#d3rC2G0ODA5z19)7}!T{KyB9`uI{ z^WkasnDu4VHP=b1GN!^_cjX!V0q;OSY{ahKO_S>j8ZosY~u^rm9$K zSR=1VOJjlET(C=@#;Gq|n)`oDUhJ}Fj;j1P_+8HcAK27vQ??rOUj`X}AI2ByG=oet zAnnn>t^e`xjq^IG1zb0@^HXPV5nP-tP}F)kApiB?S*>m#o1gv|;qF{A@8gB?ti;p- z1xHkqI;&VFRk#4Y3q1KKW%hqIsdGs>f%RrqDqdg4ZkZG|))S%2o?(bfI+cbiJ#-Hx zyVeSv0cquenQh?}`grMxy58MK#FBXlh!EZYd@dleYPx)bz$Z?iqegyw^+C?5G9L%` zI>5)$df6WmLjCexu~?REB!qIyF+Y=w6@VEIX0;)uy{M4=wr=)h%sAPJzquI@wD3Z^ zY%%Ujx+87e-Yc0dUZr1?i+)ub8gB2gD_d?^W!aDtU`xSJK>A^baeWYZ7_z$7_aNVu zR*fuRqYTD0({&R5Z5$s;nygspP9cy8zTpf^dP}< zTSy1Cv43dkj&*Kl*Y00*P_c)04lA0To#!jJv)OeH|=bpI=Gih^S!K zf5*ovb{p_?VmZEV2I+T>V_@HGzIW9`e2EkbOyQG>@M*TCKvU)oF>$AR;bQNKux0sW z&*tukm3-OWun`T$-saC$0%!12@-wSnO3*kC{HUt@X?6>gPa~lTO(L)`_-j5o`1?;- z<5#ux%63ZNhgN&$&KR!Q>`s4R@-QJ|Xkz0;S$++SC>cG-4S@Y)bOsI^eY;*$AS?p@ zV^~YUAU&qWk0F9l&yoydcF!PZHs5E9j;``By?E_M#pp%AU$iY_V!#gx3xB>_nMsu# zJW2s0ybLO5?BFlJ1Hrp+Yv*72$&a8nNu-f+9Fj0AlUgS!78qS{7W_|xXU}XCdS4aM z1kzw|)_^V;T_d825bZ~Kaq37V8cJYwg5B4uB7q|m#Ss3SoFrRZJG1v%hv_Ei1l^kIA%laA-(raS8%|Gt&8LGXAO6R}9u9SAYe_k)Qo8sgX`9-1f)Bl~}NWO5tBnRC&!pAa~F?npy;6uZOPVy5Xv8$*->V03)w*!)KqYUiSP zCMVRuiGgQS{$7KNn<{VZXjwF$FfZg}d_ex39{v8+~V@m29b$2)Tti%k0?%C=5ls~gJ8AQhz9xm#2V!z|^oYR@Uj$z$p zn3{QQW~0NcdU3psAk`59 z;&!O?E@!Et05kHeGoHf13;XdHW!D=*VekNd8ge^2k4k=ICxsD$KEff$2lV&NUiIJg zg=FzsYb0>YwtSK*YKu0+Ar?%6D^Xj6zs22A%h9Um%Zw3VDzfq&cft?z^8Z`hbr~S& zH0XrYPQ4+^M_Iy@p;Cb=S4S{T+-Js&e8{vuUqZp2t9gO z_0mLfAq9lUfd2NSAUh01;4g@b$4$f16+8u^+b~DJdw+pWtb7JlrYO0o%SKnT=UmUJ zm^(x&f3cKy@ovGCR`#o17LYdOX@Beijj!%2_plU1{I}B}t2@&5Xhu8Z(@$$H-S16z z&@qy;n}0t#z_T4GNz3-o;Xx4Btsavs4#NIlF*ieB`S-Fh)Jtwv7;%$`Vb$}FWXQbz zLGraQ`dx|k(V16M57FJD)@g$flI`dgSg|mXZvUa^@mKdP?(Lgaegk;|dfm5uB32yu zS*SY7!g}b_7FHm;d;2W?Gb3$8^O3!l56%=qQj&GkuUUQPXDKAugLtB-P>A9i^jjHx z)UHm_0Oe)tv1Q$FGs#Abg}h(&-VH9F*$R*d`KG@Rs>zrMzR+O!mo|if(k}$wR6xJ_ ziNEQnjj5^S=q(gZn#54e|!muVs=UPIuHu=RCWogYa=jw8sFXJM0fo7V7dQc4aWa+ zztHNDJz;i_e2R*Y&b*;d>k#PACbp7BRXP+OGkQQ9AVBJ5m|jjFi^lkySAp{32qZ3b zwF_>bM_>U^ANZ5h5oU`DRppJGp9;Z|+(W_>V+i4|YOET)c4C4?k=Xz#G7Z$obrCVE zUo$$`dJAm)lwClP7bQ_p48KtbPUEQyO`^;x$3{yF_3T{M7{%o>t_}smPBs^=^}4hx z>{cZvduV7xz}dgYP$!N4rzj+d?6&Y1yBt5tk_YvO_$Z7rI@3!^n0P~^!~U=wN4lTN zlK)Dg;|8qM6R;FVpE{)m zDv9yJkH;{9ZR+=XF+&EG#L`jqINwuuj+ojsuCEK5Z3b6`Hpogffqs|USrcp~6D8;? zDye-Ydg7Vi?o;mCac-V?%a1PHa;0!o1^Uxm>c8a`e9k~cbyEeJ49f%6rbt92gin%$ zxRGr=m-ofwywl-?rE-3SV4kWAq#;jy(N;xlCFoRdcG8ER42O=Sjd%`%=C*vuq@^lZ zjnmOGL>YXj+%J>jFps&H=rO>J<@od@)(TF7w4ND@j5p|JL5A|9W^2TNh^^K~o&3q! z&vpe1tIhpgdhAb<2nTjSjbP}Fv!CU#w8~>;1Wt-XI2KZ&)$7`Y2Tp_ytS!#T(D*P? zWLxYJdNlpjuUeX+i#D-{Z0Vn{McHP#`L@xFde3SFBaZdY`Izs|%zo*>J3%&j&mDP1 z9mApU)l5mSZJ1ZkDWWX|5H#S{KCAd`pA*DCxf`9Cb5Dy638qQxN=e)W1tvMeGC>q- z8DV5N6p|vu=M;4oesT~J^X8KkMf%{>n?yG5{cY>4Cgs3>ma;qAA2^fMY1^=w7;HQ0p$y(jwtoisdw>1nf}_LO?`pd*#UtFk}W$id}swP>Wt8$x8u z7T4>;^_FZ9w&%5Fr??oN0UOn|MLy(+P+-z(v0!SJfx7M>zDFSs^WC}To&*26?;S9w zTK|u3!a_`(VK48o-&l@v>6)7*zhP5&gSyqu>Jx5}fM1Rffo`N~0Q(LR`7iAToS{U9 zCDF|8m_>VtD}!Ea)sd<2`ZMj5`Tl|zGlCC%DmUR25OaINWEB>cGjLet?sj7VQOC|h zdHG0eb4jCC&9~*FU-{gQy*cU3z(~2la3Ty)xKo@Eef<)~o|=!vK_?#9txAS-@-bgk zpZA;mxLh8w4)FLE`EL3~kF3){q_p=u&S7XKi@2@r!DR-7Vl$e60R+TIoCTIXr(`X` z)1SJ%7B3UC#5TFyWK;R$T`qoGrDpS_CZki?#}T11oK)4vQU@frQJhk+vvCP^Mds2v zWQwJw__o)1A$0c)zuz^-`XWSg5Byqu8innS6TQ`kX&z1;D6F{MlK@tdC?PK|Yy`Is-QZ0noWS}B z7c0H;2aWO`P;h4aQMZ99P^MFE*W-dF6LFr}NW|OYY%{X=oxn0p=FHH8J`dA!ltu_g zl2LaKFK!k_1FYjmaGyQxIFh=(mHbKWHm&$f$YHsJk~s!OLd%!%S4s8x5vQI}`D-Wn zO83bWGE&zR!)C=&Zcs{}3+*bWKE%V zm?=Dk?k=}nrk?nvS4L;2N3(9{@p;wQijozqiF|t%pE@-=eUyplzc560(h^|+QmJ*{ z4uk`M-sQy*D3G+@Y409+m!jQ?QV#((t;Il^H)mDbMj;}P{q`~xZBYHqZQ(Cw4VTMU zzUnfTS}`TyN`#`R$7UD&gV=`-FXXoF#-`32K_vAMnIMu``J4WWWka9t^RS6qSjfH= zk&VLGkov@d0#XQZpy;|U!#i@fh?FY#I-Uh~-g7IbCx}dtJIJYe|9WZL{uFf)l95P8 zuHw-kf1QI8^9E`e>tK0~DeKcrdYSYXc0b~y)9orR8{cZ~%@)Omiw8VaF$toepcgZ= zU;r~NT}4QYOHFDDVCOuh*WTB64KOr6vX%4FYQk@638&^F`XCIs!E|RViA;uEZ@qf^ z*z-|p>!)I=Ie{W4Oi;28SFfc#@Q0Stj^QPBBioCuaQp5nkjCv)(3}B=hvuTCuOVo=dd^i-jv!R0?)Tt z=hHkRal+%W&mD-GF3<#~Ry-tl`zA=&NmqzKM^ryL#%{`d-`pVXUNl+MC~E^_DiY34 z?;Df$lG>outXJCt-s?z+-~(~Djs#Ha5aO4ciqgw@1~FT3#ZZa9@A+GHlN!aJ-}?o9 z&tEx(B!M3`lRFZxMxa)zHq#C=)QtIbJYZUXTCJXu=QCGhWF63H+@5I+hAC9LFp1CE zw;9S48P8Qd5CucJFs5jJJdV%D^l9nf=CtHV#D}KB)Kx+qtl~2Q=Pc`sHZdR3cK)!B z>UG!nK4883A;l&?vbQzDAFe*jCsY!{M#M6 zD(v$>ERa@t>X$p{V~gY;chI0l>lUK>-P*e)-GY;}9w;fMpFL30*Stp787uT@bGuA7 zjIS^L~Z4cs>>s9P*ii;^bXg1EQ?l1%RC5UnZ3GDVSJh95277% za*n=1oAMIiG)_Nl-HeF$?KyR+o&sNfBsQ->_U5@iK?nGb$N zcRK*(khr!PviMLX^dPd;YTZq`Ui&2`@}Bv3rw0vko-qx*18w*w9cXEMCe=IAI#v7O zw*>cX=cIPYl-TSg;p}rjI1>=~!+BL!R?a>=}MV;d}k+xxwlXJvx;XO(Vy~qDjzCQT<%E z`ttPnO0qpf-8RlfCT`?ZSGTni^csvO>$rd}?`c&)@k8Rc|Gw6j!F)qsCD;c>5I0dy z4?T*qurjq)VSp&)3{&{%6y~*;`-mZ~82+M*KAa2s@PD%jdBNgwznG-8z~D5%QN3id z=RppO1oeTK#J2Bm&poZwNpeT&{mmlXIqX>NHKDw;w*Ss7=KVv|2Z8t*qA>iNb)&{- zREgD}?&!%E#_>ulx4JX6`9Il5eU)7+%4tpf_8)QSZ`6MUrs1Vw^D8-_!6W|wc24{o zu*3AH(dl8cZIJUJ?swnx&#|J)&V5i?0WBMj*Hq%^gl3w5&%hc&b=iL2`tK?tU+)(pkQFZ>B~|bePb@js`Kz zyFD4^x}PK)$owjRYMSq^bEz7A;WqqU5B=Kr5Y;ErF^bS*>E`I#kum!yJ5ncOJaXx0 zk=d`zYX+5>4o!>&QtaEzCe;hX&R0rFQ8QxB>-sFl^eDny8$GHn182%wyGLGF$ytXs*X_ZM@A#A%Ks`lx_U{^99| z;7WPQ>qL#L4684l4_`a`+GDOq^2!UfVol6xe|E}#-|TK|HyA0oN0NC@e~_dQ(-IY~ zkIP8LFUgkC<6z1RdPtms?NPt?w>ib&?_d@GnJ@Uggpd$~JOwet-4Ij)napu) z?Ipo#*%%RoWzbw$?Rm(O0ysT5=18~l?k3m_1v5E$aX2_H$J3BLE*uO|P=(JtHzxI2 z-;KKbI93YdkK#BKBZ^L%q}!3USVK4jOIGJ zOP!yLCFtDMm^7V9ZX_5bar*9#Cel6CsgQ;!;TnrlZeiC$fycZ-TeiIZ#vM4;_tyy; zA{bLWixki!RGy0y)CCKn?uLps?UsFta)7-3Xj2bZE8n{EhjFrF5t`nS1ouxdiV@5S z4BA`$`Spviq%tDl$+s!UePMg8a~pC7^gG?>gEgv~0B?QTPN;HXKU`3_eP+uiT1Ta< zf{|}eu>rz=2oQ*$#okx-VVR>4%~=`NB}Uwcun_xix{Fn7FRjCZmDyE5gAgCX!6?um zbn@cnePBglQT1MeR!7rwlPLVV?QOKHK*# z=dv-=K91|RuB1)2vM1ckpIpBHSycl>zu%)1*{Ov(QL~^~)OG4}1#mUF(*0>n$Bznk zMijS;UY+y%!i9^<@x;ZHmi$|}P27$mi!K^70iBaloje@v4^waZmgMRl=@!6{{Dkw|ASI1@Bc;bAGBAEJS@qXVpcyyi1Jg zEo8Qf1KFw!-s? zS`-K1+}q~~Y*^g&opDt7*O_A|_@8k!OcyEv_C;aJBO7*t%%ILi!=cd(>$~cMWFBHi zd}`W0H$7=7a7xxCo0NgoQU2_kRcb{KXMFn7k%JQGCH8DvZaelXb$2@EHQ$AyR9RqB z45K2TvM17Kw$^+#NqER$*XjeyQ4y#-t#R~vI9~{aNEr`NYP0Kjlwti!B$5LGlVNZG4zHRS2d>40X-TF7ERSa2|6n^M z(e9fGuS4)Wn0hmc8cRSiabhK(w9-5G@@{X0lIUstp6Fs9hY@_2#8bZ1t9(cC8*yn_ z+$?BQMgp8pM<$2}D|g6GQaI>bus#t)Mx6ZNkE$Jh7^1oX8q8=(U`g%eP4M1L5`ejI zlL_3!U43k!?3S^d?5RWEYVw>Y4zhuJa)a>b^GO;GQrVDw?cH5W^yTyVrZ)9+N$qDK zKr#Dasb5p+M^GL>)t3HPn;K>N>)o*YQxOGGKC&&NnT+!lpDV1LD|0rvN;f&Q#((sJ zpg5?W05Ot>6Q_KkYvDZc`dAPDNHjau{O#%xjCg}|G4hBWfuRM=k>>_4K74U;p*qYd z7)dw<8jg;i6~xz2S+$`Dr$c10=l2%<0_cbA@blGvT|p34WGU%?`1$k`s!J~&t4P0S zJ|!*(#7_s?|3djRbvhUe_lQJbHxq zGMH`fJsiRRgyvI$s7Ib-6)%5z+Oh1B9KN~%x^)vvyzI}t&*v1xja1??G<^ynmxvdvCY1oE&|^j5rhN?4MR5K095B+-r>Ew`d(VZqSpSj_aOwIVY(3_2V1oq>*J1Cku&q zk(fx0-2EgNvns@VNP)!kP)($DZ|}4RKGV2k`-Xm#KkDHmz_0i$jA_dm>vI0RFv+*% zHyA%z$Z9fVaXIv%q+TG{B_))wc~RmuMrK6vwAWzJNWzY%9kf!?JnjEqa6QN3(j+lf zk(Oi(u|nz(vgdG2mfr>rLuuy=32n=(_~azKIDHWag9MF8p9**Z4B!OR zz%;Ion2H{wL_VYEREmXzO{J2%luf$BtBbDXH)|63On(&=F*CMDF0D zs2=lXQtqEc>@)a$%l;H4QfC@qmC%SV5v>D622K3k{DNWztwP@^)-O|ED*7tHQPrnf zH_aKjPtx^z#O?7{B-qSN^TwR6FWqQ_&)`kJj(N3-0}-P{T-e~AGWseEA(<(u*jF2( zh5C@xR)75_bfkNXG{V-fp`$oR8thAQ$4Lpm1Ki$)3uPrjX_lmRa%w#TTlavp*;eVK zo=0Ee^$Q11-wPIVsDlH8N+c-L5|^KkX!L%!>Je<}kTqyWVvm*eRZ_M@f^rfCE14pW z!46`Ht961NXSK1N1Hg+Evm?($Glhlk^*k_8B1;&<8KNyeul4_|ozh40NHYfjVG=zY z{cX4FPM+iPecS?0s|n$e>l<5h?D0y*TgkDv!XnHD=>=gY z>NlGBc%J1aK*Tr4LcI6!|I4K$=3+E+U9=t5E)S$o*nA{4R@l!yP$PD^2GjfSsJ(p;wDEnZ`VJzMvyKUpg?AsV#l-ZoLCoq%u(t3 zYH364zIX)ZjfjvBPd?J%J)N>3@4Nz;(9gbcQq_}xVPq|gOP4=-l&dcTyHF0CZ#27q zha2i@{rWbWpViY;y1010!CNc)pB}e13FaS6k=z-Cy|*W=ejH zNL>5`gclp*mo{#Cw}!{(G4;O$Pq2%VREqT}H9$!%6O|z`#DO^taPz>;!+i3t_Ut&5 zM2-Ld>7_z-9pbb2NP%9ecwM`W?HJ#({)~opvp~pvNWk)-+C{e8LLbD8gsOuXj$M7f zN6xXUtz+RmT*3_nzvz&~J)N7)$2c^?TF;1&SP(6`mdSE={f5YW$IF*R;Q|(~j|gM;VTCWtohfPPcqLxiIX!srZ3A3$GM;feI;y!j3|l0gm~Quvlf8}^Ala^h?^ zyp8f@*^s)*)buoM?1RDlE13(SO?(FiCfBi~9vl1=9Y>vsZ5)V5nhO+KfWPSedsxr< z_+-bEL}Jh?%R59$iu%QL=lYoy{6{xl08;A}wi|{-X&(Dw91-!#JZAA~iC*vGo~!Cx zGPQ30XLtoTB>gK#4JO0AvZYRcF(&7w9xO;oGLjX6$(3L+jo6$0P+onWK2s3j=F~wI zy|>6~aNaWR)znYDnCCzw9V&a3U_uhDo63qolf^KQkHKGZt_LGwVHO3yyIoBPN1TqZ zLWQIzt@dh#F}+_0W2Kz{a>(b_(p^O3E9Mrut66hSkP4{H^2t4X=ra{&@EYdMcVA<= z4$x-z#{*!iI_haywE@9D`b0W(_^;VL_M3@C93p?RnL4M&+cy2qSIh%-Juj%;0wiw4 z+6th-*K+w6$UXmpxK;d=|AF=7#zLEMSiGTdcs5wax^cZf%#7ouQYL19 z=HW#(3O!yg0#jUjm~TPx4@WITPToYY zX;XYi|9gK`dr0ZKM%9ppNtBPYjfKvJivTa zlt0($8SvX4`KcuBL`TJ)oYcOEDBw&fo76(HI>}kwBaq4yb_V7o2bI)dHi2KO6LD#4 zKwRL8tz8{*z0^%MhNpgCY}A$&<|eY4%^hpx^eh)PpWNNsCn^Y`>(+m{@srDr;JxEM zoXC(l+<^36WRIO)h?WRrU@Ez8nz0mgmADQE?4YT+0Rw%u{1rDE*ja@5?kjUVt7^zb zSPc{U`D-vcRjy1GT`%q&G5)0cW$(}hs}iEr8Q4Ci=!)D#+kpzND>#Ab+;kvaz?f=d zaEb}_TOFniC9FT;TE8NsV27*yp?M$H8{rbNQ*T#VD;P(0%-q}|4!0GVH$WBE07gK{4@beE3c|K&9LqYjs|IL|fR*1Fph{$5DTRu5Hm!Eyc!C_H3}isETc-9pk9iWujdl4x>Ay5!&`2b3co^`pxX@GI&al%*g?xAH z(-X$AJ)4;i;ynqx^qi?10hI>;(|&G#3_gk4V3EhW)^?`4Y&8 z3?kelizCiUHN27oaWA02p6eyMBQD$4oh|@GIrS!5(kiRQTnbhiwVI|2E=f_vmfaGKbR*J9(e& zXSaCyc!(%YtEtj0gE^fs1q>j;@ULO89+*QhWfwWe*AJ%}Z#Z|WzLQ&kzPx*EfL8iy zbq(1lG|BJT1$h@P@}UXXkKh5vKrHRjK*yfN~NwFn^CYAdc+lQ^@W%VQ3=3Qm-pPr7syly(Q z(t>AIon{Nw%|Yk#H6EmmFX(Z z*8wY7$8s7~=lKO&s?2;_WFx35h#5eZnpG41sW{fx0TnbGl3Y>gf>R(C5wL(0Ctlsg zh%^PveRY%9|Uh)|S{)}bZ0mrKi7y`4qWdMA+E<~4|mzM|=+T6l4 z;(;SFTN-&U+twm7sKP412`L?^+%i$|NuwPvcH48n%x=*=pj1QM_#q3=yiLt_5vFb}zh{eDSHf zwgG%ueg#>P7p~9tVrY;+Oq=*d`o@747}Xq<5iKT?nBd@opWwO%#jhn;mr)T#W`j@^!quXw4v8YdJL zc_@y~Pa+M8W!y+X0RDbO-TJ+*xYYycwFh3$0_+$+2?3In$*Hw|N-`34ZuX6QW(#J! z`=vBQ&UwabJjuTKhV)IDiMkMK=)>CgGsenybg>rK>max*HB*wM`0mcRdr%J<1RtW2 z8n(52;gWYmgSL-LT9fN@PABMe+_Sax-ZFPAUB7Pe zLmpo#Llj3`?C3WoPRQ_Fm5{NXJKjmlup&`}guR?fzk$tVYcPcEYcDAJx_Y!M;O9IVEz86m8Z${0+nPu z%=&`$C(|`h*AH`+GMdNMbrp(8-wxYM5*vmjR@PHu#2emK0SAVjXsz^|L*&V{#>p zph&@D6shp?_(#@$dWgOJu^=0#4@%`XqS(L!I50=WB|u-oyy?S}HrE|#qX@aghkpBe zxdf(9P|jZPbSVCuKe}LyXB0H&Q0 zWlm~z0$Y+wpGMj&6T%gWXWys7}ERpw9^8!2A=Fcsr;j~g^bsyCm_<>qp za%d{x^5f*H(+%CWtYXfCj&yRD)iF)HoFjnY@JW3_-B41Y6$V=J94`M!$yp^MvTlVb za*1;hEOl3?*R}Wz@QTjjaRqufXcIzFs+1b94?=P>_^;OoD$=>m)O`T=2FFGDp7Z*j z*4EBWq|S=Vb$+iEFioMvW;~nP2DC%RF#~3E zy8n#5>bJXQ^ru6oT*qAyK7ls#fQQy%CZ03t>(-ehMEzU;s}f-*E_>I;I4^99r>y;& zq##H%<~Ry;Ux3Azky4lzUvLH*uEchtFJ$S;zjCP|6KVDHo>uy-n~j%2Ykpa{whC!O z#jBh8wr=BQb99$m2}XyLu>5isG^n6y8TgcXf9@r}6R*zZbAZortMiCTDN|_ip2wzUGs6PEDShd8>-|LwH#& za>Z2g8L_oa2j+NSWDYt{NUbO8uphQ6Yc&YU@_jBJ^e z0_{@HxZNT8a}ujvVW8deYX+#7I!|;lqhC#oeKI!`Wb3VWW^*$kwmDq=h0D49J;NRK z@?Qh*eiMjT0gZGdrDjMFaK8ztGo(X@(q(1}U5h+C+?K%A*p4Vu#4D<&P3cm072ondSwo^A|! zPCoYZyj=JZAzGKK%(mCgieYRQ&)G*e*-@j8YW%-}IqbL2e{s0_SIgR>379$$aAs$a~8$sn&~aUh5FVO zMY??Pdtz)kN!GlVWp5$9Ri1z5=p(`W7Y{9iVA0Nao+aujkLcAp+0zdqkbg~rH!E3r zu@v5>)EC*iNmb?j;SB3XFhHCAV+Yg@-YPeIgo{pUX=bogQ=gXm#rQ>HWy}FJ@tY+S zX8xe*n}B?@qqSmDADm1+vF&M5w$FY6*WT3tM)uxo>9%g_5fM2U-ilg9P^R`DYR;3N z*;SUGaB4dJf*ZMV2!=Bs(bZJCc`ucsSCr9ws~>+9#C)}=-mKyH(CIlJUYz13vqLo6 zFz(QC-cbY9PwUK9=OEfTIICb$Xd6COuXU;&#!}nGF5fv4H%!<^?@9eCO`$+zzn}#* zBL!&xApH;THc8pe9R117SrpJiu0oSx3i5c0?YoQT!{zv4abI;34jVOJge<(P{V~dH zP27Iu%RQ>p;-g7uO7w;-6H>5|LhWJ6rgVI$nL0`D4s%n1zbr3)^jzpk{{bDe-3mD@ z2*sd8?hm3CUQ{_`y_Wd+Jf`On&9z_RIUpQD^DlQ5&6tvTFx^Oy(~+Pgg(uu)8K$l- zD)t&9McVdsL}DGbiVIU9AC!u&c9jt6Y$Ys0&IGP0@qD%L=umm_ma{y6^KB!%OIFgB zm$Mz>1T3mF1O0EWK;#({RWT{Z@?4=4r{wp=C|$HCYPSaPR8_(j6Fh&_U)pE)c4lx3 zQh7;SZoZy(omWUxa%_hkE<`PthQu~CyMUOSM=mbTz$x>{FNpIrEVwLIYO&0muh{y) z2yugM@Eakg1AtaSw(?o|sx?O&L@enusY%~nuM(MqUabub)46WLJ!;`C?M}t|lyNmK zf%><%!GA3A6uw$HRTnu|xqPvIvBvQY#GtYQf6P@~Rc1w1o%&R*l)=lSU}v+K*p`e7 z;8ehFPCCrb!oal?CnGZw4QQ6 z9cuW@s|+e-w>qr|}QeX<&x^V0aU5SrgdWxO;Mi0fM;6)d&DV+tLlD4T; zo_zh;v8$-wkT`1zJR9Vj>4GNd&k}g)oDfNHCp)9$#xhTJ z^t}41TVb6LSalU}o5q@CHqKgo7d$C;wP48TGuhmE3_ECpUmG%r``f5>(_8u5(V zXqP-*(<2ToVF1|h?*mKIz1XXeK}wWjKQSk0XU;5zJ){OX(SPi4oRI`)E^}D%;@dGP z!>U{F12}X9utAZ%?hqCIuohMJW8-=5&7Eskl}>1J734QQ>>i0|Fa98)fysc!_wHxk z?)->?xc6zBQ3=URw#$jUpE2qii{8w@@0Ix|+vMU!8&(TpW059c`dvg;w*=$wO9^&n zQsjZPA52no8P`1-N$FeFB>Q%2a||2*Vb5f-WW(LnAME^xDo~)WmQ|AegC7B=qpT2Z zFfJehekJQEMYf{iGV{s;;vvp_l?+^?$egYix#(z=7Ke(A;C7SpbwcntC|+FY7PXq} zR&<;NC8mVl`$4NjxuA-uFDdV4dA48yEB|Wa_p>uCF??K=xlG#SM-Vhg#aDUa1w~1x zT~w7rKxE!l)LdOVElF_39x}`KSxt1{@A(;yVbW$_rR+X9+`VZG7S=+oh%3k;<|p*7 z3@=^RM~vUN^{w0@VTwC7QkPY;X zutIW=C3h!EFe6TV8)8OP%q&pV!FL!IO_3F&<*ad5j_H`Tq`bWm!W!(V8BJ8I+APY2 zbbc*_)jRPe3i83RmDxbQ1FN6He`=v1h-IM`q$J z5RMUVQBr?62_aiHBC%hG#R7n1+2)RX*jMPNM&$lNZ3;NbJeT*K4p@g8e~yd&@a}Xi zUCw%T4y$nWsyh`XdL%ErbYUIm_wb)4O5Uv76v@k=u$+pLs&JlgsKQGR-R$`juDBic zep-vZidQ4oAMZ5=#I}EODZR3eKarZqN2DT8^;=5{HU2s|N{m@AZ`q-Hv|qw3-$Ehq z+=Hg=A7@M<&Eo!zgeoA3J8QCf;=bIK#2S@Iy;t~PCRJfw<4pB02EAt|mF|#RT%8Nm zzS&4tR*E#Xm4o}+AJ|&{<>9vo^DPR2@`_?IM-M38cqRcS>Q6EFgr8@@f{q=jyd55( zfdzl{^*?J#YpAY$5_`Tsah4my&@k*S*SOYRHt{j%t^HAK0}5yqGSz_g9gM}lsqh`2 zdNICcYm8Z$cj{gSXp!=eOnqHb zJx|cQ1pP!qqfOvD5K%|@G)DA|OuA3$vJ6sxfd;7)8GDd_@ykjtf4!T1DM2n~;izLu zZ5^3jnfp)IKLC81fwDLjc>e#Vkh1BIa;oIVvJ1V@FuFEo`z|)?tCIHKKEe=-hx5_v z_^YWq$}bN;4)4a;?@IUnPZTcU5vmvsAA1S-j*CI{m&ob2ehb2f4293xe>DJ6qYiM( zype!2P}PJ8@Dqr{XV>_X#$8|&_ zE73}3@C&W?b#nFsDbq<#`SHyZgMkbo9E9BhG0`HPeZBwPJ^ufM;b0Yol?n73IVAyE zFSCQ&;|*_2I?y&zI9cC$3PpoVH|r0L z&|;d*V!Ou`EEt;`T#jaPNitgz&lSMUrR9NXjtFqIm-QO zM&?N{D($ig4)J1-3Zk%txoqvbD@8gGDr2ZR!VNhnFLzrPJvOPW*9*3;_@URNopP8x zR<|(Y#pfw2YrvjbsM7z$1dYc(NHN`f3u_KjzG=r_v+_s?`JW0Vo!+YHou!Zuc zjdyJ`DyZ00m11JZ7D#p@pyuSQ=~l`4@K+hn;TS(?uL70t(fOC2{S)xof|2U*&jP4; zo@hfQV*;`;mbj(evu6*KstC$jwFC?%ihy!<%b6>@7025@A&tN8Le@tkjO;d zt14pO6h?6^tL0&eK^|VOeV^=Hcpu?JfA&oxp)|fIuv`7&bE4wc10w90OVH$$miaOt zePFxtTn3nm(=eX56x=CmE5*DG)af6fIu|($9h*+u5HBuvlVZ@{d5AY@X09mO6R;KjUqXW+?X!)G)ZzOV8=X%Yt+EDi3FbJe(tnLqE_$Zm$q@ zkq|XL!*8Jteiei(2d{`?%j&OEwRfkH5E3udM441kI1!{DA-sZXwwkwx>Y`s=g0oo) z7}d>+-{)#1o%`OjVmV>q-Ry|&GHM}(VKhh_w3N&n3$JG7y3V?xNT1A<7l^S>4(e4$ z1;ILrkzJNb9!vAIRG+zfxMAzmPSqWkh|E;BR;OP)9NDE_$PuTgdg0ZH(+FOu>lWBE zmCJ_wQGFqIOqIjpngNT+Mqm0QP*-g~QGtDsgaaa|Svn1cptTeS#Izm34|^KmMMl?0 zJw^+=dWg^0w>{Zp;u!shi38qVJe1%sMIi`I1fY=Y_j1?5)r91G+{?2udOySjE55jX ziKQ=B&Z;w@=ce@59T@(Mkq(O2-Aqc6EQcL*x7Nk zj=}u20#rIb8m@uCr;Id8dOu#qnZkszf0i~Tu@v?IRqBC!7yIcT)67-KNX^YX^MlL91(EMxKv|5I1UQ2{CVea`bWT73)J!tzBMlCA04-o}hTW;1$-2 zSmElR-_0sH0wWCzao&g^Yx^tszj4xr*Rf+me37L?4>VqiIq2V`%lW6c*$MM9=a+9{^@mF?~9k#66b26Q0NHS*w*d*2-ok%iB5ZAdY0ek2>o>TzppFIi?dy_|0$ zorlM40ms3^7lVG5IH!VxgI*}FIoIF4P;f^VcvkU|4dNt!W)V14 z!s0wPY>1@W6=no<_|$`bgS(qs#r%NY1qPpCWhNc64>@ciHVqcScj>G=dZ&mTuge9X?cyhyBQ4SG>aRx*!uM*B{_%B6R^Ml-7*R3ot}eS_jTblfTH_4R;_ zLpI3$VZ}H^R5RsP`0U>UIT>vyX)Z+jA+xM-Q;r8=NHh$4mXnaCt!!q` z*t*=}0Nh?7f0+HzY~!yOLs*ZfV}gUkd?!0-UK98s$uU>`rOoDvbj#D7kS%r}ga8?v zLF%4ZS_HOidw5!ppU%xZr?6_m{P=ZilcfgG=!)gI^MAEZF!kP2>*kWufoPjCIOo|> zD(gte%B#R*8F=L8hGNS=fI0u-#HkUSg@pOyQFQ#q*rqL!Rbf&eh-(|GA za4F3K+C|zv>(5}jJ0DyL;_Q{s%FZ0^2xmMo{>|44GC|5nxya~fL=i-;_)OlCjD<)% zV(fwl9r^u~2F=S5q21Ny3wZ<$FMQ*mA>hA;=ms55!(U_q^j3SzKys~`t0N_)z({5@LKcA)?4_L z&)U6WY6PG5({U9f$C$(FTY%bItZ=rr$9&9Wj0UN@?xW%F;OY*#oSp^5$2@J7oorZN z%+22RaCCtgb^7ZpR7a0r9L1Kh{W3EVQwRg3z-sph{N28RbmN-kDtO}A<~CiKS$uov zS_W?vAz2)d`N9UVBGk*9Ure*J89y$He36Eam`umdMTJ$CxO^+!{Q-hQXVMPVZ<4Jy z)!aOrxk>62Q?8wobk;xb0SjnDl;kFVAq-R;@{<0Ngb}Gt@Tgyj5o9n5o20j7Q z3_Untq~oPx5#mTP+JOQ_5ipzg1{Y)+NgIdeAI%eV8ON6NYB+}NJQ&qpAX>#Ciw|vV z7d3IM%Cpbu?}~b}dFLMMPe)Zd|N2hB&;W$VfZEU5!t}kPAs8qC1Pufc1Rwwca{Bup z@qt&szx)C7e)7Mb@{a_38)OsfyFP&1|IbrsfE5~+_7?Q=j^>0mmPUVS37P1b2$>lf zxfnT_nF%RXEL@!IOl?dIseV1|KR)#rP`ZVk>o+g2(#L>5&-yk>dDA>sPJu8^bd04Pc6Zv?UPFfd zz@&yTqc3U^^+Nv4@uInidkLvcbEb?bkz`7#obeJwA49u47dEU|vEX`*as@t$5hDRB zItC1A(VzqU1*%T}Pg6(78Iho%!o%r&Z><`V6n5aV-vt+SUow}iOd8nZEj8q`d4>O0xj?g zG{6in{W2g`xqyH`mWhszO{V<(ZhPSU0fC9iew)aK(`+tan?y#+1!8l~lL0Kw5E!B8 z-Du!Dt{+lDRDyf2DImpMnf^}`5s_kCE-(=Z8vZi5iiW?7xqq&|tNzOiGLhlAkdTld zkzfGvFKZZp0yIK`=f6t-eG)__3bk0N{H-0}l9OAVGhZ zAff*nXb>+w9cOR7l_P$J$|`I#3a?*8~9Tbta&g%I4StZty%HD+_ zn1Rk?Jeia+!}_u}QKd>>A3h)s@`PEY>PA+BGsKC9lquMleD!fWF;W+=bEkm0QI!yk z*ewB?%Dw=W#Hqj~-os|1j-ff@_Zj>Vr(aPn8Xqa}3h^iRltlVK59Z926|BF#r6Ur* z_V++Ls~%}35jaus6wh=_xBXD14nZ9S{f+b`QncI=u}Op{UH^p05(mCFDThN&YFpvv zJ$L+-N)q%1r(9C`0zF3rvaWxD|KRt~R+se`lfLr>DyZ6yx%O`xt8ATE>G(zutnW!2fy#IV1W4ws7YS(;RekuWe9a zPo6C6+zZ&1`>877M>>DF(k4fqV)bUM)(~Ze1CHhme=okck9}!;BE)2-Nl(6ha8l&p z;O8ar%qAzKP=^y6f*-b`l+cy-y@#5jNwK8*%O8l?XS_c}b?5Tmn>1iYD3AncYPMV) zOYZtC1&K6Q?Q5Cb$iaQOjT?7CSE4P~r}X~mw-o*|U+5-A{L!=(5Pz-e!bF8u>^rFbYHezoA*2>bteg{jIW{LDdCyHYP zyE)`KA!(s+gJk&z$^q28PMRW9rHF-Mg3hoBk%t|Y{92RP`pxkkO|O~3&Wwji(@Shb ziB=cL{WT-%_KNiqeMT2;g%e~3ao zbnw+ZUg7F$sJRCnk5q3c5i7hYOwnWw_7#U}cB||DCO${QWKOURbMjt6Q&;K(%n1qj zXnl$#b8x5cH-zA~n@j64GDgn;RSII6PsZDjCx}LMF6Wp|VMBn1T1)y5l~1Ndr4njw z*^W?%`S|otrsksOuG@xTthVKgL-~}!Dvf}2v8A1;MsFCf(BLC9+1rR-OCD~mYiF-8 zYNZViCLF85LT5u?SDak6`gc7RE%?%e=`YPth-|Cxb}2|@i$fq?BB@m4oP>)ES!+BA z_7=1VknXy1MjH8f#J{ja(&$+HKq61Ee3uWJ7PV2Q^$l!~pfTeO8VX87y1rM}hB&6z zj;5)UMy(69*D$OqK}!h02_I)p)6xy4(6&5HJewkB@?D<&{edcO&6{6US$)r^uHj-n zc!pieup4&9@ZX`v@01nl;kRm+AdMx{t!Y!azt!}v;bLt>yzAS3soa4OB{X55Ws%v* zjlpY)sOjOyCwUitgAqMZfm!^Pb!1sbLzdqHeL-0va;t=kApXJmJtw*ncYDw-);V7t zQGWXb{3PU3fh>L8&JR=5H9M-6i{N$uhQcaf==7s3jji(-FF~uZpsC4Ek7A`;BMJ6d z8p+zBFzqIneIG+?nn!hm?4+_*L4~!?j8N8j8;wP4VbX)}qxDi#HlH?MLaAoNYO33$ z6i$&ZN%cA-i5g1M%o(0Lxa3*_*2~u{Hwn2p5^KwuuScjj~#`%RzCrRBU5He z!^y}bCtY<69-I#j%@aL?Oog`fNn$Vz;zMa+h!n~ok@I0rM{(`h$}KRJ&=l%xp`|FvrEIxCzB!OQjUkTMvjq#WB#E$>0hNeYb37sx7mJ zFvd5J*wB^yqBJ$OdMTpwRSP;BWA|nB!~v z)KqTYyV&gFAA`{X-3E!m{Oq~m?akwC4o_rm=fxi!^V_9q+^I{&&fSw@5>X0Ui5Homrx_Uz%CAbP0}!VxDL#wo6OUmF%;N0Vt<3 z(=4{8Lt>o5--mj?e!J9N#3ML?GYNo8uG0v62pBO;&oF^l)W5EhAXwT_@ysY1xY`Kk%{g>Aj_u5x|cs^aYqQWI4Zx z#$=9O?_m>)WaCmrzYB6?$C|4mF-+kJbp%{VSgOuh!1d|=4Qj)1LjC|(4v6{wat0*`RD z{gDmMDLr2C>1t?TgdfU{@fQvV3X81n+01JSi{YNpoP` z8tCGzXQ)KT!wBC@V%y-9Ng3Tg8eEWan+E&GyO%>1pA~C0>-j&U3)Rkc^|ri$EK)Rx zwp^Z}K|F8)UpN#LrczDf>|D~m^J+>eRYB3}AFSG!Tuy>>T6zQac&8_sq>a8$bcyfi z56S7+u2`&;`y_OBE0oYEP$HMF;ByD5Zy=>+`AYM#^ z`$XkDfnvJPpNXklH$$saNDyzA$itGW(DZ(9opi`sYpmu7W?CUn{o>m1Hgva5>A@Lg zzwtIyD_EM*RW~8aq7cCwpDTD(sYtV&CW&fTq#cZFwj0Gv&kl=Fw?91uI?d2Nu8_x(8>UHhBJEk;1qF@q+iiu~ zb|H1g#c^WM{dVy3sJ%Giy@HBC;ej^PwMVJ=i`Cm;YKNy;23V$8k!yQ7{y21tAUXa? zL{Jh~=}Y|}{mEFBBC?xjCTe?qA4q}Zh;E25ad4ClBQ>nl9$F@Owh%aZHh%_ht!Ta~ zQNHp-S=%t0w~WnUA6T*cb5Jmt#k0>8Gq1`wqb>MJPSdLjJwFl(Z?huSmyd%4mkXMx zcdqoXf{~p18h~+l8}-0jA@ML`>=Fr3;?~y&fz&sp&EJCX!r*&^$>0*1gS$uMR99HN zSzDPlK+@wn7{#+M<9RQ!=f;`)R>;}D3(vSLG2z_|+MJWASu=(MBa@0Z6I*$KL_Bd; z!rR-N-VD-v5x1>F$<3ZE;(<_!Y)R$>wu6z51F}w;g1iu}FD`_6p`YrE_S$sJmW{+a z&9G@m4BOBKF*HO2#=7*j9i-lG8VL12ZrxMGB`Wl5{>T+IP&siY8Dp`zoSUkZI6=D5 z^qfwYa=WpNLlPOHTb7Ari5p&B6-1UYDK2s`ag9h=E{WUOg)WF>4N$4*S-{#*jcHVb z7LrU96@(qNwlJ;z-#h7BOYfhA2_)Sx9rkgfLZc~RIEdwD@ceKgoLk-vO@S}LU4p&}dQ zz{JEj*i#y$erc8W`O~sSvf=Yf^z-M1eEuzCHU+=-dND*A?8@0r>HAq492`_(R1_lf zvuGHVK9Rli=vF~BB7^fn)*OaMERy(~7eTiYETP->*_6aDM{r7noA|E85TB3~V)u?f z97&$n#6(P>G0>n1!ruD|(2yEEeSS~d@iFWN#bulzEO_>#yUtsPV9O*MWozS#!K`|6 z%M-7r#E_2ul5`mpmlfv`T$5y)^iB|WU1^@v;sqh)NkfMo6zea8vz+c zGPu--kYh^VXpX6naubq7O7)sbQ6eEmlzIDk!@)C|Ukbw&gz~19HtdE&>+zlk4vgW@-&+~rs5b-;Y0Qq*5|eX%@WTNc z_TxbxS!&2dcQ?SnnBk}gT_F3u&(njYqSketsG>Gqjqw1xBo(p1o{|ous11`DX~|Yq zca3BD;Cx8GHdo%ul3!Fpr?}IU$z@!%(=QdT!1Z}ZM_;94f(KSh8$*f$Pe5MxNF*U0 zLqwYFyGQbj9BRFxVYhDnFh;jc--QjGvY9Kt)67qtXww4i?`i|G_5IdS2j1$X;-_oN`W@xjzn-#aZMK7F8@Esc)px8vVNj;Sps z4#Ac#)_ePPa)%GszCoa?>dWZy)KrD9X)5YS>Wf8bNv)mDV&#M40cRNq2%&+&2fFWO zCTjwJ242Qjcp!jzVkXO7K+7vUe)jKNH?Ffz#sOm#ACjFNPYph`)Nq^?#7+IMN`ZoA zYV_IDMXn3poM;18;}T~Zq4S8D^|m|qH_j12BK&cy{^-f$u0rt9-Ap!YXE=o{plg!j z<8n$+RCl;{!?GQd78;~4js)eIN*4v!E()nc9I^Bng9>VF^&?oZ=Z;EO96kj>_p|oP zj3G#(BNu3cg<`Uj<*iT4VWlYoqO*H{YU-!V))wpBLrK1STWdarKdb~^v4RBVMMH*0 z0pUPa5)S+zYJ49yvT*M_xjl~Fts(m2B})&Hrt01>Yzwt}dl@2qVYJ_^T$hXfptEw- z0RDB6GIF=8(ZcF5ekE#M+RccJ{!_^T+{Vjs`&oz435En0<<+UUoxSrPkP5FrLILy4*6JvLkw2~n z>H7up?N!8H!MT@#{VjqbXQ5ILL+@p5wCm#vf2Op9CM{xh= z?-R`1Nq4yd<)wQvHX}v!qw%Cv-yN{rhQGa&_t^%)Kl!nU==4@z=jB^9ult8^o~*1( zhsag3ICEO!$Ut-@$7vbwo69x+-RI|fU&daVvMa}Vkbv$*3Rkl5i9b9IUh#wm<~<{f z!~vPFx|l!3RGXJ~ZubUXzfH<0Oi@O-l91`qstj6caiZs&!!61m!-!E_wQ9SV8@!Nb z&WWLFz09}$3G=F|?Kt!;0XU0dnVA=WLR>u2zG35Ai{Wgh=t#9L#Ikv=uLr#D*c#8;%zX;B1KWwnrtwW4pqvJe#s$LFO z+QE@7PNyHEH!-=2Ar}HS`&Un)YGyIU^Zf6nTR2P@Z8%ig!}Yejik-p8Liw!v*0=f5 zA;+u=3NAWorGLEW_X-RwFduPXJr79w2bdq$-10hx+gv_U@OxuGN1WS0gMZ zR3@KvcfgnWQ&D~-z><#EaHnZDw+gpY{!s1@ilAuPZdGFFN5JFIt*p$jvNcgixOon? z9EAi!z<8>tW=bq<{%M3t9eKq^W8=wDs#VWnH%m-Kw_wTv^K%w?B96nzHFfhs3|CD> zpeU&)#OUAchmWrS!vXUZsFgwg1k5m8*j;y(fiHaMN`AzY8WjQ{Y}PhOznnH3lGUs= z&FU(%!U!744Vtc`O~Iy%Z26gsy4PCU&jWr#hy3LFv&Y2tncX`^SK=;|G|&1>Tu?I+ z%EQQVt(EN3OY^%Ewg_6S+9>ZaH+JzUeF@fWy?BWu-i-16~ifq6pufA>&8Aktc%S zFZ8pF2rN7X`;aVi&Uhe=9&j1yA~eJ}%_mYY5Yk~z`@&i#>a*ejH#Rm`-SW3oMKN6L z;ED|m-?X$s2qaw6h7?;Uwa^z0{r&)|dIjhWFwd6{PYB2X0#a8#1yA<+*@58r2>tFP zuI^sX$eW=%KK^={N5A#`#Y@M4Hz!{kJZB_KX~aiLP`LAVlu&K@>)qBbU6!k?F=VO6 zagA0XcWR=nLBdu$M?cSRr(^e~IxY}-yQ%xsP*E1`x)V0?j!03mq^*xp=wv&pSqsz; zSS|n^7b&fnC*Q;4H#cR-){K2>mkA)5u)J(Qg~u&rDc9NW6>a`Hv*Q(Z1Yn-fMq>|P z^V*rA^P%rTv)E2?vy!R29HBQ*AiuAV{#^fvqn11yDWcNd{KB!RRdPPBMXXij5tcOK z+R8KW4sPOGjtvej{a7)PmJ`1lD$jX4zWuXn#$~?88d1A!g*Ow3`jYK#uVvcbUO4dz z2O=;Z?*?}KS6BxAUlNu+RqGSPzWFc{i%?q?Hq&n%{Z#z16?xtX&CKDRj)iqZhv=N( z4L~jI&(Zs$Pb3&{=y;FVqINmmO_NTevYaQCA=2VO3d=b6MK<|>7$*rDAs|`rFWF(; zjulD8#X`^c)Y)Y`e5w!)9L}cop;c5hVBPH7@P&!_(yB@|UQ)gZ8L7-8n9Jr{9r4i> zyRboH;DF6vA{6ik@RlC5 zD%f*$Y|^l$K{%LB8;VWQwe_vuf8&iYy!{`vWO*usaBWY+G} zjIcscw;c8Vm6{|L2}dDS#Z`#+MNt$*&zYco@I@*3dgDVRmEr3m-4$g#`7Q%Bc3V`7 z2sQRnxFf79{t0svlU_OU9fqPSy1_SmVku-AQNw^9k^mS3Ch{V*3k`$13k{T;+2VP+ zlsS~}ifRaBa!e+K-9RK(P@z7Fi)U(OzWcr)ur!f?7VqS-!7t)C^%GCvobLeWB6iC zBuRyjZ@;HumF+3u>C}A*1b0*+*k?c|f!4>ouQ^Y8^0yMfB^m1xs0BsPB|a_9EqkfT z5qK2#ya#BKU>?)Bn}G+3OE62E|A-eU=m?ZH)H2mZTUt1DG_R0M^US6vBdTIrwX+{dLhAc4_?{~Z3rRITILeN9 zmPdXHZUAZAe93Els5Qb9Co$6zTd2RCY_dpM4Mr7|u4E`iiCY}Mes3YaYd04-8EjQ;ev_$ziX;Q-OhcXvYH%o8Me>`F#pvAy zZStripS|g?(Wb}Ynzq?J@v_Gmu1#ZwE~qReB^46e@i(?>yR318B+XjjC`ObD{_1Tn ze}|`ySHlw$F#l6)K@Sl1YMAu1C(LlZ8FGi~+~$%ZyY{$u!GDNv^!75DWFvD*f=(>R zQ&%S2-76S2MAy@{)R-r{c7C6#6Yb&M^>*$(67l)PD0{qs6o~o|s|TONBlVku1VGi5 zC&3C9qrV}a0$4Mo9r(-3o(jR#^9YB!gWEb<6I3N{434{6hF$J0BAYPvpQ*^{E1bx{ zd^_|zn145ipFi~LIGwlYlY(gOF#$zs}hvF{6e7=`-P*Z!%KFD{hp22q$E`{;@Yn8dc=;1JDcsW zE!sa%kJMRV6I?4jG3{puA2}bMmQO%S=Fi*rF#}2B7dzybR^yiq+(87bf&To(O(}cp z5p*)%U(B+BJ@Sq}Ye7Jb_@jW})u}SSThBKWB@~iF^P?1}JM$ywxJ)U^&K-k+2mI08 zWupG;h?#V4dD!n8>F>?1mFrHZ1aZ-enk`AT>@fw2L_d13KDFu*nK7z-fJg&Z9<$L} zD5WAVWt4|_FlA?aOX#ro{%^NJdc_(Q$eJgf))e6Ls$2O}NPyxt7Z!bHy~Oj07gd#K z_cb^#8|3PhboL`7F0~$*td)(pOT*CGu`?Qk15d%BNDOhA|Fr!fDN^R3twKurP3Z%j zY$Q6;`@9GjZv=dpB%XN;s!tB<2wdBdp?jBY$~@>#s3Y%<`jL-eU(_N8tN$V+e1!}R zh%6zw@%Fbe|F`vzAMfifzRGnc+#M%=YcVUY7--z{QMd3hClODGxJ?L5@uR!%mk#4J z_|mRR5W}vPVr;G|p*gX=IF|hRjS5YMObCG%H4dYl&E$1J7s*L_y3H4hpLH(-=kg6R z$rE@t4D1FvH7072ATaEw&nlWq7AFlM>J5P%J>pB3Ie&UP<13KpK#(?vw&;M)KkoaZ z%q1@ls*ZWH-z;wM4Qy3B5JY>PjH~4Lp5(WV?vf@JNNaYlJ{|7nU>ttJ^KG;-`dP#^ za?E7k=j_!|y$qGQ+rPk_ynpVmsroSAU5)wZGHsz)x%)HKN~}M}$VYcM{ju61I|mdY z(Tp{0y)`2U7cPWk@vhK$t%XZ zsYwDNqI-Owxn9aZ99o>HolR8msTg9ei@#R>At&&P90rga-$)%7>c@|p zn;$rH5iaX-O-%QyxgXfOVDp&{h@(UrwDl?B{Rryd{b|^=EPOlm)f^ojG~G2*DBBH3 zskK0Fj8I^m>uT5YqUD&?9$g$)7$5B)QGG>8>Q(00n`;uMhY* z)5@k5McI7W9h=ek15x1>L`)z=Sb~=>&=+JNMxN0}09iKAsm$X3k@{Ef@*u?A?-Wyy z{B)#BPYy#C{GlJO-%~a5#uN!8Hs?$Bi+M8WIAk@sx^AA~>hODbnSi$c?C*mI-G#my zN&xtGAgQkm)@X+Mt6%P}PRp3%0%$*Vs^fP+SM5NV*TV0ZqU;xithL>D+A)gw3~z7` zsY$C^8{S_bYw(%)ID%YdP2fI+#B!ND+r~f6%G$fE55^>@wO#4r)RjPV>_4ONV_xz` z^6{;wIH-tM4xi}RU9hT)#f&xz-(?5BTNsnWi;Lm2fjDG))s|y z{O08TX>%4~*X^t|5FoiQ)|jf@yvSP6@yQeZji{cHUf)49B) zfZ)IFN&agYNpf)>fx_~Vd({hy%{g}^14Qy7Q}iNI^ise~TaAnf1$Kvf#(Or_{vk8= zYzw#aVU%@+b%#BVz1YBe69e-beoJ6UU`Nn5K2<<~%<%3#Td(@?m_ZFbJk0C! zEhtDzu$SFS%;ak`SE$%XR;01XJ0ed5+Fn^dL>A?q#Hw7+i%XOe-tnDhO+*gsraMI5)je=T#t;k&9`b1pIHZ-5i*s z3`tX0agr!L%Fb z`IvY!PHNkg#ek97N@V2TCVFU7-DGC&Xahw)1f13+Ks^GkE2Tp*j3qATF+y*5bv0`H zyYZu+D$&<&6juM41PwpRSXoBp5m!CkEB=QHbz$!DqLca9xhohr^6^Kq0rNPU-xWR^ zoI1?}e^;@ZN0UaQV9v||Epi2qN3h|OTuwTk1*Iu45t5_ zxB@A>|DI?=#8A>F@-%`*vnyUql~^>AmVj7PUW*1Eg9sN%8W3KWZU9U2uZnaIdip?( z6uV22t%0!Iq-&RGWx@#3PeNl5-?vxn!(43$Th3!_mt9xtiGcq%VSxuN9))*%ZI|c` z^E*(v`wzbT_?YS+Sw76s3iRcI)dK8{&_Ml%wK)agw8JZW{lGfn_KLfqP(^UI?fGjL zrzt@Ie8>DGp zZEuc@nb=MpbdDI<$n{TCCRry(=QIhmf{?z?*bE_WRF~*|t6gD3(^CQNRvtKQu_2&a z#yWB<%^gj0P&t|?ht>2L%Wb?h6&oANQ9m0BuPLdc+0vW+?>9Wd5k7b7F6u(lhK)$G z*Nz|Cm&ItP!uS)&v=7n_)+ic5D#J(xH3UHkb#Qi)7PB?MZ=o0nc2$;l`kR3ULeaP- zP1=ITqtmD+QT9lf5l7HR&^GBxF0B`aRtzoG@%)sp%adv{nkAm4ZNW~nB(1H;vHtL% zE8B?>LBo-+f>mrOAg(m2^|nIP=N;^H#dgJN?rWaGqBabcqN27u$nUFKZ2irq>zt1% z(lMs24UwUar^{PCwVG-Xhim{h#!JONRwbQh+--G>PP$X@s3iqOxQCNs=-_&U|4zoR@hYNO8Gf`)SQKm~#zF?t(MUvBBlSg6k_zH8 zS@TaA9?ndIae?m|Eczg{lSa*7fr}^%f;$GKYZT>g{Q?B~bB}bN(zv(0=DPxLq7GT;0=QT?0GaWp{EqX{rqS_Ra6M&H1Z2L$BlUsAO z?Oj?Kw2R+_S5+MW(o#b%0Lf<55sg^jPnN;iJIVqM>GUpA41GzfdU{RQe`K2CTgf~7 zUQ6ML>vzFvXjOl=y{caE#sl&;NWgIhc)XhS{L*0PI&#y~ll$CHq>YncBTlM{hmcIf zKR~1`ThUWnVd&6Xc~258q!$VZ(>V7?2>EVH=buG9V$2HDYLACeP$4&_nzD z^5>AJL*ODU6qjhib1$qqCeJuaBQ7UBCf#k>R*w>0km1=as^J^_ z;V|)v0|AhOaT~7=;OHM5#tR?hH9LQ1$em;fDdKspJ}r#3R9tgnSbprkZ^VE;orE@8 zMj4f*DKRO#;>iZaGj6LLDZzuZ-Zj53Ed>QGWW~4pCs0M&{ndFHYrVlEv=Lia91^j@;)~yNf<^h^e+h$U`4dcpj367iQ#kD^K&xJ_A~(<*?S2_1rP5mJuUvd_f_gS?Ux&>-^}bih{qe)bD?bnd{c!ekk@=rHY$4&} z@>=Gf*-o=w_+Ch8oy20LsVCD47cwP9)xSlnn&q=;Mi75Pu_I(TqPw<~rpBS8s!I*G z?Sf4U65-I}K&0Zh7LA8}&*e0?;Pi1iNLR%n?IRIZJCSVc&rod>J)evR8(ztTVApzb zC;%!VRxAg*Yzzud;(;^Q>HU*6b(rqzx6)5v&R5j`06u*Mmj_)pKZGYLOW&`er=FF)bI%lH^R;!oK{Wph|n7s$G@{uxW!NxR8pExk&b(p^bQ z&sO!@$XDk^OFHNw5zW*Nj0Y>aB`BKS%sTY)#fWGI8pth-;kdYOPTa8!YUn{|5M|Ie zJ{2^VUP%4tVLPj~y6Do>bb_vkVN_h3ASNy@`1vQNf*~m;=Z`t2tm?ov-@&TP2{r2gH=Es-VW~=yzH$Q`b)MSx%tBHkdtrj zk++XH4raR5?rm3Xx8E+(5sNM2b^0*kHmzy7xp3*OU?#p4NiX-By)~10W)8bym?0z-G0bk>rD8^=daJG5d(dWgj)p;hyl7BEmOV&Mf0K^ ze6B6wusi&4->HuPW`nEOEOY(sn+`?k9z~%xqe*1a{2Y(VOoY}bd^e>!2yIsV1&6i; z86NtMnoH%Jr{0~N>qEMybTb#%5x|bxWyIV9R*Ft-{bgXl_d!jR%gHwx1@AdnvO>{# zvJCH%NS-$aE|yh5=;gWj8>Ldd;Eh6MeqmylkarXv9&bw@s;1dRVenx@}@4jd@R z>wk1yo$*1*xrcsi<%QxzNq@OP+~}sNN#RQNgXbB>bKZN)vgggI?1QDwhY)>m6oB?g zvzPXY8@ePWt)AuBvO&kj85$HE#S=bLj1c{8EhfWkAo6euy);B{eJ0hl z_cmh6vTef_Iwg`SOzw<4v3=aH?G5PLGT7bsr_|UHq5W&f-<^Ig`iBXh1=cl?#P!$H z?Ky>)V;@#F$BvQ9 zW)gj?U*KDkwE{VUvSTQM`jmxDLM>$6;{#(N?}@Xrsx8=7M3Zan`epGpA+O>o4x3&K zZw+2S?5b!2No-x<4++LsB*=gy@+0e|0i=IP{0e3AGoLC&th-9*g)A*?SEbf(CgTSq z$3m0=`E$R(tNY1;_oEuE;Qwy#e_INi8WW!{ncm={IM3c;yHH-$XT1|h{n8R8>VaQ) zgcn%l3aT_DXm+9*Wy5doD2eNKJDWIzON-MMdk@zuJu#MJ6H{dtAltS;4DHg^@AAYM<|U#r3l<+$Y9wi?|`?+ zQOl8$1Qsm`%lKAb;joHmVZg#idUZ6lY0XG*{6L0D2Di3lR=>6?`|f$ST(FN&a;%vZ zygQaUQVgc;`Rgi$S5zs0RF9aY{QoWmeEmOI3Q+dzs}XjxhM+8+7lb#7s8^NRo8n~> z)45N6lq=#dy$3`YS@!zSIldqbx~&XK z2efRR7+YkaW{;(ke@e|xtk7^b*k{HzE@aj1J_W-qg+sCr)R&c_@;0tXqb7+wjJwh$ zQFUFZa(CK^y@KYTz&-VvK`CO-)cQ0ezrvI_A+?!*8YtSj93|Rs7?ZSUOj0}tfx5BT z+N^-1u-R`EitU#i*Bvu5L)X{2xb)`sEiUD8-24zu~){cjclT105n zD!C++)D`X#xda07Y`)A`p%wcoeDy&p=+99pQY`k;poj=3SHrY~k}gX7A4fK0Eb!=$ z>Z_G+YL*{1QOF8~>yIyieJ4n}l0M8y5#9&jczCszIG;v$j zz(pNiGS$7w!2bij9TrlFGEPvq%;+~tbTP#bc@%JJ*XEPNCnAyOtz?tJ>)VK7}XC&g@(J+N+uIJJ;+W=#kFZBb|#GD4=9A`w%m!i#)d&4n($RyoQ z9)*%PpAS-kvHJ5oIVlJRBI<-F2vp~gBRnXI<2)Gl`%9JMA6~GMKp95WLNStw)qV#y zLj-igOLe1ECI$Xo05H(k>BjapsBBfGOj|}$V>Wa`IDTE3o}AFi(=^ zAh3+p*iEhv>tKg;+y#OyV^OnGG(+Z1a~g1R`74Gwhsl3{1m8a42l7^I1w|-oR3xjv zb_QvxWZJc6#0KsZh(A3j{C_L)p@opDUpSv5Oia<3<~%GEHPE)QelCheRq!qTsQ7Fa zw?edAb5q2gcy=;POcfuoV! zJ%Hf)zd#<)*2+onU;i_D`FX8tJYpjn^6<8z}H?$ZeTYhvv+r;a`dS zby!wlZ~^;YgP5HKmaVP}8(`f06gCyL;g%E?wdH!W zZFms6*^#t=#W8zI_o%4icULu9@-8$a-~j9KiVS6K=%=rL%<1o6lU0F_x0S|ZUl*Ux zas>+@A8|QM6=W}YqED2nUEp>pavp#>_awwBg(XY(3`oPkv2=58yBqzM_Q82ZBS${l ziadSYIM%e+$;@frtHL>cMKhahYMG(^ie+}vnk)Fw+PoZ(EwOV|Au(c92TMAlkgNH3 z2sd~&u2BNVwXLh3p5ODBUz5vUQ#OkFqwLS+Ki=783CDi`cJnRy(UnStkad=9&_56mC9=Z)bv}$H6Fba=Dd9MzQbEP;tg~-lPA3CWBm# zF$}GC-!npd;Sy~vKpwZVJQ=3$wxXx~GY_$UMdH`bCrmH$cm58^{#OzW=knRIp_Y4Y zyrCSn4IH-7V0U>iZ;&FG00G%DXH{kMwpa54IJHWdj7A9B$>zF-dy1gP^BkMC!h}#b zaop*JaxEmWtEpb`halExA4w_>@Fv2#4aIt2;1cWCQ=2wrLyYCQTIl{x7W`h}p$6hn z5QAI%y+!&OPl_Fbj6yN`(T06BUL8?EPZj^2<7)k*g;e+7mjCz)pV1q=)D6~S<2`;pb| z`G7EVWG-Lvn=ei(1c ziFtDqX@?vVZC7`feCu6x0F&Pxt_?u)?#E}=!o)KtsiyOW1;0OiBj*)OS|H8$V0Np3 zfWPYLcL#5{xcjbhwHNIL#hMuJeQpo&xc-DBdX3u2g#jm{($!SX?aVu2jt+|=iZ?AH zn*J%o_(^BDieBtEt}mPQayr+pru!+_kd=3-f{u{mY=7o1JgTD5bUiVzv~bING@TXk zgHQ8QNypc#DiGk-8pMfCAd)57#vgQ5uh7u}(aDp4NBA8DLCzr8j*) zj#tGv@vT#VQT!s|git<`AX~i>M|QR!=yw6V7CV#JCgLwr8vNne@roxskf-lgwG@EcKU(2*!}CDN z{T%ZEcd23ZDeId^hp|}GR7y1Zd60-G;6YjGT0HLSI?nw$wq+@`jmIVEPxwRM-oXp6 z5>5SvDwrve&no2Gs^-2E?(u2jSMRUKb`kTg4_4!C_>x*aE#bsQH_OLu^=*w+;Qsvp zOuWLx0K{|=TaXIq`X{FGa$|3bl98*?^~@NG1kG~-jB_d)WM6 zR$S#;nvo0DDY8x-2$`lHL&f!H#vk&Z0D=A=56w;uw(|2qJo=mt$PWX?RnXyEa7~H>V0p@y zsz#|>Znmv;Vdbav9pdnh^b&*0zV>haXHOSVD3p;REs@H6kyY(8!rjo00!X+xGz zx7~#l&qNh8cB^Ue`@FSkjWk(rNDz2Qz^ z&VXgir^ye99q^9Dw1Qo4yxAx}U&Rbr6vr@BiqASnt1dfs?u;k%V^Ee>VcT!n^9S{- z|4^l}xZ=p5A?9?Xm1AKGBj`nAeScIPH)9PNermtEQv9aaeydtIT0mN2v){}LW6R*^ z7{_iB2P%~HY+f}B;XlSR1J9(yjL7%l4<(R5xe^e&qn1O3R8hxRekT{A$l8Xe6!4s= zXBLJ^g+yc)F4W+2PyAmVla-w!(yDhDk|}Koop2ul$8ss2p;jqVXcj)qbUd%VeQ=AQ z(}yMB{~w1k_ckERU#QQPajIE!pTJC7R16>LD;3XEbEi1hKO^_TspY!DN7guvqIHhv z_cOM7TYaKat1&T%PJMkQ7MxlI7{?ru!1CQ+=YO<)yw)ZXjyhF~6`XmG(){~eR`CT3 zIC_uA(UJ}_QvS<-8pK?B2;KV*bq08{_D>MA`OHSKn!uy0Mx7cKtq>oVzl$}`ba?Pz>=@r}eRO{Vc5G_}Rfqp}vO4XS1b7u<%}#Su`2hptcJ56In(+4qD5Wssp{>N4##{ ziMI05n`pmdt1F-43F4j8yWE}1dbeaEg3KK0I!%njj8+}}sjfUJlIy5nG>12y zk`(2?6NkUzmA`Y2bE=_EJ1axP<(G;Q!G=}Y2;)Tw(?DdX#S5c|Gp8DhqMk|crW(D3 zKj)4_zdVyu+;)x(WbdzUssxq!6{ll;H!?Cz2v?1cetv$AzLQF>_VpF%>3Km>&8Xfu zXLQ$?b*+TepDX5ESV+VAe`tHlsJgbS2^4pC2=1=Io#5{7?!h$)?gV!W5Foe&3zFat z!3iFm;K3!x+XU`y?(Occd-Qwn{2^mx98S%(_hGHtvu0IFEIi!cFu)#vyaRO0=;)5@ zVYNQ^7~%#O%n}sBxBiF9%t41fB}_C1)7YMK%*5-7U{E0XU0`wcgYa+=$eo-m*_d%G zZ^r7Ad@Ol2+IjR?LHw(Vnafzq!tHEb8`!4u2A{`FDtO|aM;AA7D4DOU9+KJE zV0~nQqu!9il9J|lqE^mBC12KhrZu?+OtYpG4-3{hsjDllsg-n?L%e3aBd@0H6D3vT zD^^n00Gfaac=HAuER;x?#P1>NFbmN%7!Uu})@7_M3bc||9-4z=&}P&h3**s1(9YA& zIjb$h`bc)*J@qeUS<^kEb)+A}$}C`#!jMZ)t=taK#trG}6Qt##&+POz?6f%Y|Iya9 ztK8*9m=?Zgf|aL^6>bc9-5r%fAy(7o9hJMJKMm^TKMt9?xZKrBBqjV7E%SSZW)=XF zWzV-1GLZ@LJieK1?aJiIVKJhke)NiXD~YA_I*8TJhAL+%d~v70AKB3{W5^%9t;HMQ zuZfkdBEP$5e#YkP?CeGOQ?*4*ZVLzGQ3l!*Zx`BY;PMm|a||9gOX4Sc&~so9dY-n@ z4VrwvSpvsSa2(*tuZ@1+@dbfuqec7*74jDe8O-n8KIjf=g`tw8DJSUSv@95+kYPOD z(Bf2ZWG)Lw*3xS5v-&rAV!C;;o!K@V>kKRPMcvoy(rsPl>G=&)nZtlnUV|f(l2M_2 zc1R9WiR%H~_xE4>T>95g-UiLY`*U<8X<^yU$zN1{CRcH)Szk!;>zNSwVA21p5tQQUgOd} zPbS!3a;e~#Bb3ltXTtYDoM_kNRHQSs9*!@bZt%6T3)h6wq~a;T#0j{}Gwe-*AH+~Uki2IF zlHGT7Onum`9bt|Ru2W?3Y7g|D)r-XF!bP_xm-q7lvO+$-Thw7peTIp>H5fws%iMxs z3h}oYI=wVk`%Vsvy*-4w6~{7QhLwI!qE|Tc_qsx5i_K$312&d-++PbFkJ$)0i9Z$O z?b@fC~qz`01kyYNdWe2;WU9Id5@4n7aQB|)B0ErwCo1_50XG7Cb_RYS6O zPY0CBYHP3#ebNx7e=F=_c+Ap`^Cz_$U+!T?<&H@5K+e2*%E%pqU?yNG>5 z{N*iBeTD>MOsmkeJx@@`=}eBf?<$(zEDOD|+5qoaCSNtvYn_@|r4-n@l3y)jTjMZ& zxMvNYl*R>=W_)sk2rBuw_z&C@U_Dz0Jx#!DK;44IG@9B$MI9#q+Yr$HzkbGWsRn;Y$-qvU z6EB7eKNRnweOGs~UZ2EEJ?SIo!A$CJ8<1ik{xGX%fgsF+NB%O%Cl^M7>m5;Zo6{<~ zKY4g4u`_UoOY`fOxBYXXcMeO*UI~1^)KusH)v^5{3R*)2g*VIJ-j(cp>l%_D`=GiK zTCOw>Q4-9fETo}*%n=;DD&SfCbx)st+rZ!;C1tvyno*wznu?)OO6&20FfuRMN1RZx z=iJaQXd*vPdGCJd9qgn$BV+HHB@-=SeppH0CspzQRjxVhPk^TWrOJCYL!^If06NsU zQ+Kig!(Xk_QtkRY(Ua##Si$`API*XXdLK!igG*s;oD#hdxV^LgDBDH@>8El(Uu;lR z%@{;!qC7KW&<5+*qk)#kL#3NxdT9d166gdj&QOce=Bfrq{Vl-1T0$uG7dgfBf#nJORxMfJPWNUHS*{mkkR{x^GmOL1~Nup`77zb0ks-X^$75s$kjTh=rDDWMn-`ZvCqZGqJG#5go= z)53O57ou%u6PL(z)RZ*1En7eG>>LI4j}^(xW-We*1nJ{Mp>H-~893Ipx7avYJ}hMR z6HI&nCQxeK>OY&w54R++km}WWr;Qg#R)Y9a#5*6T*FNmLaV!3KmrylTJa{4i8}gbP zT-_9xBcXIZHpvlI`fQ2W{xr`IntvC05qVC>VJE0ZZw*ZEsPN5UAjI7{8(5MBESdrf zSNSMLa+ZOY^ycg5YS$4}k&%76B(Q}X>Jl&>0lOh|Oh0t+&*tb_ACOi)LCOyx)%1`) z1Eu`iCBJ{Dx5M=c>Z-W7`1Or-UcdM{IfxC!!*6JP@*4zz-@pV#vHx(>{PCBC<47U7 zbL$}CBm}x6-CJA4+@ydLRfxh^zGf>Ro=})5cS>JYBb7oVNy$`ILj*FODE{sD9;9HU zZH=Y)K2?T8|MstJ5-HIg-AO4}bP6z7es9g<4#vj>UY>{3V2wCleio&Qf=fZC3-ejH zbEhU=zV?HXsAeA28*;RSrH$Xv&v)lO$n@>*`qi>|yz~Hi!X?ga>cP=P#uApCl64mB9&vxZEO`PbS&u|1iR+LU3`k*Fj zMs;Y)YDqDV$4bLc;_ONwgC=*Fc zVfk|a_U+scsr}dZ32QPx*@{0I%MJ{6K)`1p@o4k(UCOcyV{?$)O%$&vIx9)hrf)DtwYqXDS zS)yU6arG3)q$d*J|E=hF3a$;yNCP`M&_E#Kie+1M?aN&^g*?321uocw?idR$R?}FW z#3U={oC#t#Lxw>SUqx;k3m8xvNA`+i8dl^e)=_Uf+v`6(m0t9=REr0#-jo~0yDi3k%~V{ z_MLrqg(^geku5G9XXEpPe>kD>XhhbjW4c`!5oC&G>D%BF6>=>jEO=hn!9h`TbFt{l z%bpVzGJu;_j}eE{f%UxnzpRzQ4(gf~oA*a}0?n#7I1xVX5GpOKK?Mez9v z*hg`uS@omgeRWX6AO}G~1oR7P5+P;>byF>vz#8eKi(AM!YZgHfFxC^Cs> zp4)P)!7kWRy@Q`ts!7?f#KhD+Zz?X?!+N1vNojwkpq>m|#|@@aV5;Ux#k8-`)G=0K zwi?$e+Bo{8bf$2r=gz^?uM-PP(8Rd;OTi@;_a_*Wv!RM%i(#pl;!z00r7JJ<&p4eW zNR54x&QX=}F9-gqIMHC$F!V3lmG5YWb#ytZWpzb%abZ1*=*%+H$Le|VAHr_?+THlrySsSV!UXTN$8)!K!MmCT zL%Zfq^dhpIO(NDC1}6UHD^qh$eevk`kM z32Rtp#K#EsA<AbWzeqK zHoVo|^wDt%luTFWxB$IFTle6c6E%T~N_(wn z!P%ZOXh?b*S}<>Ml%l!0?xeOh8T%_PUq(_fY~P54hr0mf38ohSCUN~Re9%2$P5+$z z#XXItlJ`bd`OxYVCR(RR&hmc1H*X5jnBt4I;22cpG6K$#_3J1d=B|iVS}>+O`4TIo z*X=tk8qn0s0b zyXF$KU?^dDB7&&s@V-^c51Dm23VxXmZ`<^L*KDlCnF}n`b@cTH!ph}wN>fa%PfsaEIeD}vd8;e=m`k% z`}$q_XFFCeyTc#(MlN)FgCS*TQO-Zou(@ScyQqA3_m?yt`bbvQSJ9I9LLOW+lC zmIgXDe$km$mSsw>9fN>*CRq{uAvyuNdB++FFD<&C%RwvmEh`cc8AqpwFxD*ck0W{t zQqh<@Q1}|z8ri@KZ-)o+Cien zU~S9uD}EeHP<&E=1W*96HMb9F*3$xh+cF(D1GY?OM?018h96$-W**yz+fB#EDPlewIFvR)1IOjIF)BAS}e&E1M~1Nmt+*!Fl7 z+tgE~W-zIR_~Gkp_yoBmfLw?)jsw)@DRQcT`U-)pVUqJ5g?)5B#IESEGVq)_6inRW zA#v+!3}IxW5M=vjBNa{(tNkIzQ6KX3_p$`u@ZHc0^;U`+)BCb?Rb_1d_!{2hh~omc z7%M7hu|}-idckZ<5ej>E75V_f;Ry^W0EQpdbRy_`K=}}megP%}%-cc=g1MWE9Dk_e z2s?a`J>-3^yJ+C}zIo>td*|@_4UQw4iW({k3Iz6smm-o^Q=@fgx8_^`{UqW>MlPa2 zQQq@NzgLX)WV~wL2f6e}%bRhF7CrsSCHY(hUknCzxQC&A-@4Rl>lwEd@sR%tLE{aA zoKaz^4SjbPmYH7=H=YL~@a1MhwvRLj1(%G{yd2|Hpiutqaij5l0$&<{FJ^+p2>R+T zt7xIiy~}qP-|FPk_o1(s%}+8uMDF;V6j`*`i8!>X1_O%<#Cl_`Qrqg}?fD^E#L@2LPz-;1 zw?&PM-lYZt@B6Tz5tCJtj!|}KOZv=*#CL)*PC!%(flKn|( z=WQD<;oOO@BbIUoyT*A0!9`{NZces4kP`tA%GO)Hou{e z-PrAI6Z%XsIa-b^(A$h_9&yu;t+D$@ZhcO<7{$ z9mAD5xM~dF|BBBUzJ4Tr!NpmN)mk)q z@^56-2evnYv{{iZGWS4K9;owrNDMhv*n}X^i(EhAqd|hw z44YXVG7qE}W=dBkJnspG)4c(um{J!k*&zjnk~SjPaQz{z%&_|kMp4hXYBO~=Kl)4? z*R7~pE-Kemn$CUlTpIE_GIDHPgm)kz5g$#$ChiUKyZVq>tOY)XW0mU{+ad+lZ{v~?R9 zs*fz^Q}SGbdlE*2mAV_fDv75-ifuty&VobTCe{KSd@YPE7OqW=Qki^k>T5z6nlUp= z)WdUY`KMZ0!8DzyNQ<#oV=bxC*R}WVO<$#{P14Sl;ix?$#2LLOyY1@8Utt;Le&l#I zDjRDSs7ZglVNS}%MhYBqR%+|!Y+?fxZlezV-5{*!`JCQ?zPs$tQ0%d8J4%Lnj?YyU z7To9QB6Mk_iFA$}P+XWMWfLMOab~EBBGuZnIJ-G8CMcEg7t+XvCusmFrAbXq4gNI& zCbaNRgRpM-u8fGN+T01l`x%3LA^))(%0Ad69i-iLbAt{T0n3dnMH>Fazlpi8gObFk zfFc<8xle3=XXm_J>>}Lve{O2D<)DTm%%Cd(g(_(BeNI8pvP`Z-m9$}!)8)1%!vn8MXZuffS`1*;t2ho_f4mFQt1@dQ82{&pp|7g+{=Ey zx+m7NG6+n;MxXuG%)afSi=brUt@?*%b|TFTJ{LYOPC_;DzFGQU{p-_LDlbGw?T-2n z*{qthXet6Dso&aKu5^Ho-({p!K#(;<<;On%Ik+jIxTeV(G)dJmb=CK%Bq`z4jnp60 ziN_LhB1~q6{}_TrGc2hVD-B=Lj%c#CMYgK1Tx}|fq*wb~tbWAQER7_T8o-+ z9?AjraS5r*8A2_B%{{f&xG?*PRCf2iL7J7BcWgW>yUS)Y?S>yc_d&~J{|vfTY5aDQ zQ2Xs~N$kg2sG|_$Moif`s|P=)wCPy#xI@7i>J0WSI&(*=ic(vSLAyJS_NlIL%f)UB z(o^2Sw`Suti7D;Fs9C(a7AokO8|J@Br~d8dA@V56g~k1NP>~>Zwuc=o`^gR_3+!MM zgU|t>u}^kZUx(+bMc<;`1A3jB={8PJJjsWZq!&&PlcnAisTaayVnseH*g`iRATo6_YT@w68c?@}Z&j|=CDB#eX; z+=9v7<%JrwK=P^XorYT1D*u2XgK5+=J0JOsl7@-G9q8E)^~H~esmdo{}vkzpxa04BmWK~FEGb_Bt#x(731bXt*iqw)G#Jym8>_b_$ z4Cmq}rcNu{+2=g&Zx-1c?5a3fHX(46WaZpuSlHuD^XqMzyJ$YY7(MN?8x}Q9nd5}M z9zWcWGCqy{p278x%5!($dhsvfN~iGZ3h45A1!UcD9p~!PlVJWM}F|Z zi@SV@e+xmiI#0SOG>hq@*vv%@cc(+7EZ^tyU6c0iD zfAD@kswvdcExrQ~H~e?QHTf6gH3!!G&Admq634vaSS#PUe&GxXn=jUD3U^uz552(*p5# zsb_KKdOxI)ew<7!W|w0fq}KYdT0ftlQv%S@1-5(yt$6a4^rIRst^kDH;FUXc;&r?8 z*u!eQoiSOI$c>1<==<#UzZzQ9bEy%b9BoxwR*$$sky7e}G<*nONhiy_A{8Lk*;o+} zLsl{J8WCUjy&_H9)b^3s(ZB{@LM{^q%X5c?d#xJ4b3j^CO`nd3+1QEZ8)sxXonq0w z_KI80;H#ec((~K1+m=AgFtLFo?l|gMJQLRR)|9Po=kW?8U&^=0*0;3%j~5;U62SlX zQU-n=5MI9gi&LB*)wi%=sV#!nH&@zsahd0boY;vImbbyv!Une|=KK)iv>#D~$rsY7 zcn0g25!2R9l#e>2!S`f`{B@(|0+g#v8@^hZ4DZZHf%;A4pFt&*=6I#y1tWLSGsVGF zVS+5fu&zF{n|Itx*p|tcNmN$$@vHwEqx*-*kBqNltQdP5W+M}v;IUUN(MVx~E3DbJM$+6TS|nSeUSMPJj8s=X8Q z2MV#tfaU_om1TFH;frwidQ=SJ0F;;UJW{3Wf(I{OWJ7meBj%f-1&{$5`3twM%SzFFhtmpNxe-)Gs}2bM?GlX2&>Y3x3f^Ps9eeSvKy`lq8! z!tz&$n{i7nsU3n!n>lM*+q9Ym@5^u09Q1|!HV)Dz|bp`^QPwKk?Xy&{eCERv*J}^^{$CnO?BStqq6Ok&t2~F?Mo%rQ*1~fP;jtw zT1InoxwQvy%um3n0pRkfKFx!YJo!HTc8kA2b`NQ_E-v<2^wM2pD9{9Xc(c%xH>(40 zzNj-Ed3f^hFT9+{AHAFmD?3q%3)XFdVdLwOWDrd=FoS>6GKmb*nO^smJ59`>)b)2Y|vKul9Q*x0sIczvO>VQQe zM-C+)eGa(&rUJ8H3cmFsST`$4OYk_D z#~@8;5HRQeHJ;}GYOD4ck(6AUW%K&#yMLEfU1sv;9*afgtmpzk66g4IG_KB~eWv+8 zh;MnmqgX&yr zH56Wn9w}LbgDy%x&{wskYZINpeHWKH^3%jYch&+Wu6wy&LDVDkgREIU)2GXP+@2K@ZZ_|hS@LrC)pDbe? z19=^T=#4+267g0(3Xhd&KtJ`t^Rck!8h+b+)>!2l**-yvrKb*6_5s306Pje&Zl`b^ zSDC^bJR^$zYG(4xZb`QWj1<<15J^=>wmj&-lkaJ+y7tm`1Y)7W;%T1;Tj46uGMDNp zPZ$^>-}t&%@@a`HQu1T=$9r@kO@Te`PG(LjC@u`G6#$3tTuIO9T&=`w!{u1X524 z?Ci?iVC~rP!&SASiMhBHB~mine;ZaKP^k`64fm<}73t-PlJ+W`6s~F*7JcQbFigBh zc`ha?Y+ZY37vB^P1K(7{cV+qy6WMY`|Hnk9PgxCaO4L?sSsgdTUCfBURMZ5r=fN9D zyV^@({?W6$C=|%aK!pEHVC7I=#^9~s$@Ky4v#XqRAAyeJmKHgPH;8P;zZx2lY5l^3o$r5A(REY6GNY<5*-OVx;&v6YMArV;d{Z5EqsEU2leSc03I;63g)RT;*liJcqJ z3RnzTX|w891nq=2OkU1b3WR&Cq%f&sO;)k|XWzWPWsdWaLY{a}CP%Zf%(0=Tjm3yL zhKc-FjF!4l577$>N`D0MVnv01k3(~F|p}FDsFNn8~P5bn3s7jCsi_EcG#lHo;v^N=vr(-larpFd?F%3`^L)U28DO>OV5pq-XydPT> zTdFfed8vH2Q65DLH6_W;;@#|Byk?|0yOFw~#5mKD46AK|nsO}V3;57{5gifm97B9V zdRjz#aIVf26o)c#2*@NuYG$YUFg+Zdzm1F1d_+XnNeX!#Bu!ot%%IGmL_?u>@B6e> zHrrIU(R!Bdjl|oS(%z*rn*uet_d&ca-|_`<{a-zwx_;F%*I{P42Qxo0GR8WCjIf&3 zyC=PJww$#Q_fE!LGAVD6iG7+>-+yqW7$05Fo9OzTZ!=)YIG`a}^xMQZWwx%oD2_bt z1&okf$&lCJ&+msE!#~b|V4Ls9wwxbrBk`(?eYHMESF#8ByQjR@vKt*u>4ZU??X-#d zhC9)2_u)oP&RT-}B`3Lek{C*kNZz~0V~gRFEm9NMA_Xe5?LcRMlfe_0C%V4T79y%{ zpv$zGcxC^ZOz(VWyD*52_2aLd^Nu?OT>X%udN_o;JPb;giqMi~^4(QyDAfTl1+vP^ zzPB1~W&ZCw{2dqY)L)8fmR6CptwLc24R4FA*XR3+)+u2|>vE<*vdh96CO~tZ?cfq_ zms0x8zx!UHCUT+H#4eFdPQV8(_r4JsDum`;6dS^R={7^aycX21G<*8H|hOOC|{GQ}1?84eX(dd>>9U4o`~K0*Y>d zI86GRnXR;$1|~Z{N!!nzlNBEpq{C4)i88#8q(4fkw8C4G!WZIs^NVTcUKl|VVDcdG zmkMwdm3^XZ9zTx!lJ|=gEOz-ee~M9zh_fEvt|r_OR_VwN1d=sA|EE1jYDfFtxPjU5 zJHJ%K8*^sm^(vn#jYLyatsXfY#U=Hsl|O7Ye4l{S20+f(`_%lk;X`#F9HR3fX6;sr zJfl171JApvs_)51g2}UrXg%RvPU>ESZ@tHOSiuuUH<;RH+IFOEA=BLKI)6qkD;iKQ z5D;K?^)wW=3LKo9hlVCH%%Mo9V_&Dfb5+v-{XrOly}KJl9N-Be#fkSBRvw&D*RPS= zp@)rqaFyVf6<}6uAHF2ODXJhvkiVf?NkcK1Qru0s7;~X%k>? zk3LTd6z?D$zRxz74G6%GFo#Pz_7DYs8qo+2l|ef}N9Z1ak#Wo%j#zw4lv=O^r6Rdt_8TaozZ?wD7BOi1PO(tYSq%_Z9=Qu%U{vmT~R3A4C;u2yw_}ogaZXdLo zTG>zwo<@J1G0TicoW96&!~FAE*P2E&@oF^pHv(I`!2vg%t#LIPHIHMY9v-j}#gWek z^DQ0p^;oYT56#(6)<73n1Fmyo-@jeGZ^5a--p~QP-m{k}(k5xoQSRNHn&VAtCwnG? zIYt=T-b|-~`@Mj|`+$v72DS@h3-3wOMu#Oy)4cLA+B~In+~@hBRo}&S6eo?gSDZjU z#_O+8frFEoL`h71JB3OYrKDTQ6WZbRVwhy#TjnzCHR@ci|#nY+}+ zLB;b$0*&XOYB@NxkCOY!C&={xe>PH)zGZgB8}(@_fF<#GIWfrFDw_W^us2-_$4%C#SV^>B9v~n&`-o zsdjR&p(x=`QW(V=i^cgH{9ff_dl><7!-QusYn`k=O8VTj&hg#0H6275vzy$s*3%>2 zt&Se0*&*ba+eZf?DpaTP-hJW}<#lec7k5Q$5`1^mn>+2|QHi}oSfO_DS}6O)aDZ{M z`||tkc8!E-A)}}pP=CWil!q@{>yyi+4_vMm5?`d>PcPB7A4d5piI=+AyC{uV1pu@hDipYNBLWlej>|h^Uo6NA?1j!CLl9fl(b#Qub-AmLTDzy z`Jhp9JAl*P2X$#ca=B&2c2bj7>ejv@YOtEX%ZP8=T`v|wgr8r03dv!c@~f*DekY?I zyl5b)=!s!LY9x-MY^(+lZT+O^mm4_RqV+@`iMYFHV=9sVQ;RX~*XY@tp1&J^0%#i*`O(Z(L#? zs#Ktjh`UwL_^!WX;(lnP1%%1%%a(t1i?0$s@&*$X6E%T*Ow z2t0=EAk~e7$A)VT{Vhl-XtYNg- za+Bmd{;>nO&uV*o83R9o+@dkip1=IT|E*Iwxa63hMTb{Fu}hTCE(X z=i@7$ zx{EuQiuF*Z6~8?UG}gFj{5hpF>Rs(uv)S}|qK5DGm+6jZu63s0J%;uq83(7j((&jY zOGJ56q6tvq0LX3ZACD5q|6laESF^i6@~BEyHW`nR=Gq6QM359#Po=W(zmxpgh3mYn zbI6l%Tk->nCF}#{Mb)^&`Vn_GtO<3nh&%G}CyiK-{r~Y73#kQWzG4#_e%h~6l zSkior|1VV9=WD@I^jTkb6v^FyY5x$O9nj@cxc6xuVKJep!rumC&vUFzgOOQ*o_CgK z5&>U7-xT_KE zX?m@hPio=Fpj%3`E^xJ8mrd8DMDxiMKSFfHhS2e`5_rUm`i&lO*dESsrPz zasMD;UypkY7}y<2tjahd*R4h6`}m#_cHMvB-^;Z7bj4DXl{4Cz5)2lil^;@XAq>*W zkQnIyY=2K$X&P5a8fV!cU}f2W=wIytGVQbC|6|toF3S6O)i;IyoESF#FTuB>-EIhY z-+m$N!=`_!GKOM@AxMFDM#;uN(w=Dt(VmyHx$eujIG#v328YoEkw__q$D7I)yVE5= zlQK{xxc7**ush)4UPPjn@BZ5`Fw)>Ae{}EhUfK%qAOTfDDslv;b+emqnQDxzhe%ri zi3%6XIjkP_?s;HbJo|3%Pb4c4QyG6b*8il`7Cg|=$X(dK^)0;s5?IQtR}?+`k(Uen<4#bD~oU?6-$h?;aMF<+&C2LJetR+I!r8uh%w2u>;k| zo5rO6GYr@M=(mqlD=DWKvlbpto-#^d1XL%>bSG=2lsagQgE1zAf-QACx+@nHq2zxI zI-1%)R6d%bNb$)v@hNh}0OE2jPHi12N&XRq3;h^{Yt&}uRPV?QNVa!Sh1c2sRSa%% zP6Ooic0iJ$u!vyHbHGZ)H^TrQ9wMb>r#2^5AotQroLH`#ssnR29&Sain zMu>jVDjX>tfTfg_Q9xu|m$NfvOd<_m>f|_SMU(iOuUM4%Ik8jm|8R`uB*skvR+8`%}Bq?YATSR7}A=^2Yz`S~BMatTsW)A{HQ5!Gj<5cX2s z`PA&6S_Xl*TpGso>I6TCzOQvre~ZhVmeQKYxfgB+rkCJ!YMUv(vl2~o=qeT~mQA70 zC?GGi)`eYPsONyLnVWW8nCQl$U7Tp;sIUXq^rO>(ny5BXXJe&9IdZ6Ynu=6~LQteX zG1bO|UHBvvDTSi4EDwlBG8qa49x&`O%qnm&Vn>JAZ`smi-;gMC3=}5J&rCn=@ z_kOq26VDF6j4J^Bbm`gGUl{FVVDBT6Zu<(zlTN9_C{|2visA!fu+2iAp+b`mRnD>a z!Vgu}+Hp|2F|)+NccC}Ge=l!hXXdY|qANEm_vOC3j;|8bZmxQ7I_20FySTskc{wji za?tKORcnq&;xzZ!!x@SA$^K~y?4O7g?-W2Y9*zi)ed{ajuN{4d3;aiJG#~q@42JfS ztzI0}hRVT@T+q9kCgb%)61 zlndt%GX{%bdRsRZ$~$5_CnhP24#=bVOtmCqAkD`Q(Q)}RV&BAp$aT4cQ_GENVJT&b zib$#N^}2^60aERv#EjB+M zfC)VTW)1*zb0<&zv)^>@;^{{vLGbCz>#(+i=&8>q(Vg>}*M%e8=|&j*xS{v{!Nh3V z;vXti1-H8iP7n@1ZvaMDr?8dFnxWU8sZ>n+EU~)0GBNr>Odr?2G$OE9w5F%6=f{8Y zj-w2YDh>;ZTJMqj#CX=Pl6`i`=4932N>$fwa@pv1r6i_Wx!#|Z&K{K=)Hz|G&tZf^{$rS zUBd|M%=0MLJ|G0sCTS}l68(h=_^)Ip?gaz*>0gL5pU*et)=YiH`DA#y)s?~oeCXTX zKVz8XkvIo@#%Uxe_!8RUW^dHHq6${pNK8U_Xe6WkTa=ovHMt0rk(%(cBIB`2Vba4>vgHWBKy$l{ARv5|gDBX1=KPpCfkNVyE3RA&iP$5!cm2O9VExciWi$?Ab5 zEg;gs1%|0xiXYP9w@&nzkF6-Q|8PhZv?a^4Rm!sr+0j(f{F!ZmPXd%OTe;>;g zFlF%0zp5sfKzoHhHFA2d^QmRoN_-1ad!ebGr|k!pdEdSK4_9pQRH4E{?DXPxmD zHzn{e;q9i}4$1JbSkp;0?eHK^_8&kFUL|g@k#XP}g17P#jE_)5y z@dO*7-B0||F@%@}e(-e;y{{G*Il>boHl@Y4f1G~W2nro$&_n0bRkKYcI}1;YKgb*g z#4#1v)m#N7mDFJqDf7su!-#LRooszE#4pv2Z<_MmzivwavkYc6)4dU|Toc<@o78NW zZ^JPBgx66(neUXAzxt+$CSLQ&X}+?#<)4{Q2j&)PK7ab2s&F{yX)oYi*~8E8+^JN2 zV{52Jm?jp^pKf+6#wth z1gkAxJD*7rViJXFS9YKCyA!{{r4lyV{`kiDQEl1rU9K8{_FWhB>1Fb0U~THGexX|vU@IVK#k{j|gTNQ5 zm*%bdCR2E=2=;uJ>_q{{ZeQX>=UW{w7+};=FSzOZryrCgkl!~N-*;ah3dOuIVZ*9{ zw<~hT(rF+SeSPE{J1!y(H3>T4^1Z3yXQ=e#RKCHp>tXvxgdimoUA zeR^Q1PvM z64LyydsnGKXE{Qz>b5Q+SnsND>HhIG3P#&sf1%gdO}~31X&Tq_F|W66p$e5RYzn+X z6I0^(Avy^vtN%A*{y#^Bsj|#c{=cQ6f9kG@ba#?RN(luP7L z5Vp67MSvRPf1{sk_kYm=8_E>oTz)q@CUQ~qyMH?${14)(+aM2fq9yiD&3{=7^Ke>Z zRMW5uW~ow7Jwa)MW}~vrYNHbJp!`4BOZ}a4))o?uc(~Y_e?j;N`X9+AK}w95@Q-je z6bEI&?I8k(^5eoNmkn>6zhw~dvSpkJk`33{gh|FylF}FOFmr!>+Mnj`oD0266H!Q0 zgYv#(25I50a*!$`_5PKC_MdvxH#^oRI-kE&F+qmQ-hHJ5Oc)z*nzf>{HY+$Swgw~q zU2v|->UjlEN*J*!;6hb5KL@x_oeS$8N#>gu#^ccb+kxPJ5KJ~UHs(Woiwrv0t$&^c zmaas6AAl0aoiKn$w|1>Ue54m~OLY~(%6WH@@@^HH4M@iJ2~tKY2g|iJ2@4AgmZwm! zcMnhg(~8RetL9J7f1UykflTaQ=-fQwOiZI(v9{9$3;kE_#M_1T!ah9N>nSKs(*`lj zU`KvZoDTn*R!R}-v4R54aLA`UYU^S0_nyubbtr%@mDcv)H?45lCnm*T%TqC5&)!Gr z`Z|46feX@Je{ac%Qr-$nh#U6B`Mx!sWj0N){SjI2y&tIifVyRY9^9~o-D6Wa*V1_P zkWNRlHr7K)nnrijEFet0`=7|96wI;~!Jjr&e5z_v?BTU3PPCKD|4b(p`82bo41&)@ z0(2s-yUE+ywCI}A!nN@>Fl5(>XmJ?#t(e!ErC?X6B7byz(RNCsN<-|cCD zK)!?xjnk(ToXv`gN%E~)N%Y^tvJ0Mx1ktw(O1JXMd>hh$QmGYAKYEsK==ubClAzh#%KDd14h z$4oohs1$|0{HjC#l@8-ODS=KFD1jA`bM7yNUe{{IOZ|%tSUy=lH+-Zsy#ZE_MH9;P zq=mz={2~FqWluf2=9fsfC8N(Nst~lq9@8OyK0)aSprl-T-UD`bpO^?pC_(lB+9LzR zUoIY=osj$#2nl^B^K&aPw)duouJmld!JR;g1W%raZN_6c^0b?EuVsM{-;*bXUn!iK z6c*~6DcW_jo@!&@+BaxuVI~sC5oG)7HKR=HI%^cet9^SZDQ--K=o11hmMZ_z+af))%xzEtb`oDpK z3T}@Wb`>3ar|@{90f7bb{;k|`mKs$8H(0@Oe|(s;Q=@v!{Q?KIV@B@sSCue7M8Zhvj^z8eq*yFT;v-Z z?2K!)j#A8fM;3Kg^Xht9@A*Sn#81j{0m|yFGnE1rds>zQ|H=94!c|D!?w3}7xSP|% zKwpki=3*ql;xLC`Ej_akWka>ymt?p}{V%3E)Wuud=5`T7b&;sS(|KV15~!IKXzEwjmX9(0+iiFRYZ%gpx98 zI{?zRe5+C2=q+KMNP62mVYDD0kxjC?PVFu1&UH6iGR~N`jMS_5qLv9u50wf%sniXq z^pH3q__vYXKM2BD%*5#qm$yRLT$x~`KaAP=_(90+7pJV(&x&Gi7eele0qM_aSb37} z!O~9rn_I_$1KP650cVFF1x7825u)+wn(ho&G%x+la!@s8!xFGLMQ_y6_vXbXvG(_=lM zqf%1GJ`XvK)&f5ykdv*+0mh83bg{tVxH#GPU9Yb4tnzEwLmJ;|ye<_Gs3R0Mio=kV zbKTKMr3Ji$yd&4KNJOEfN6$O}}X-{EMZCRfp>l&?b3!+I;RhLVz z)Y7lG_1#YW*yb{=I?Puy|3l;w)A<=?eo;?9m^UcJrItM!#PtV)HgtCbcqf#luQ>&m}c(vh?DG(Srw*# zVOVltL|~U^L>1=7hV)pNc=JB;heBhX zAoT{2QkWS8Kl04p|D9(Jxk+W4Xc1qF5{2`$_-RzF@MF2WAa}BO%)pW5LjP#}#n%KU z%~3ysfD^L()EP0BR2t182l))OciKeze@epLDvBW!MEE6V+J%G1uSZs#Tu)D^duehb zYuDFIxND0!7G)gx}cXv0^-QCh6Asx~!B_Lgbl<-}M z-g~+4eZTv8pYgqG495EFS{(B_7o6w3=A6F+s; z;1m15n(rNkV}nIBE3U{3>5%d_R2E75d$H5;D<<_MqrFf9Wb17(-Ne~v&tcM^jm`>9`l-)Y%ccaNwP)7B zbhExHcK(L;wc#R2BaKGg4|9%tGgN15Y&~gd${o(wXG79f2f$IKYcW$8Zm#-5FS<19 z+YkdLI1wzgA0dhc7`}ld&ZMW zub@Y!1Z_0i*{N&n>0hxiks%T`<^iXPGfE;7+^?w^l==+y`n6QiOs1L>^BwQquO%`@@1tCZ}gNu)x8drKzm3weW?-x$@Q?Xf8&h5$HzcfZ{~E1X0BXATuV3Tre0O06&7M|rjB`bUR*pNLxRrc!u# zwto_+Vm`vn4&rO&B_CuJ)TYw1_tl1kN03N|()Y@UN&KcyNg1ej%H@eg^4DeH$+FOW zc`nEnN6q?bgv8kaZJqo73_8|JGhQQ)vjAH9d&~s@LmcIwhBzV$YM9)+{RF0||Cnl~ zS?^=!DUplvmXcB_XShl9ot%j0sOSHa+wDh|5B%UHs6$z$I{uLgB&P9LFJ{qGW~jv% zh0tgW|7M7T_PQMc#h+PTq)_UfJf-p&4lo05-WVvqZqK9zaZYVddX)P9*f;E5BChuIMgTEtXO5~ey%tIi4h z&|91;ZQx*K1%g42?a3@*J-4puVk^6R`WJ92*4p|5=4tRz7rL?~Zm5dTcAYg5!)8vM zMXvZ&X{{ml#Th@{7cCDA51<%$pKB^Ogk^Jq_}sD+fsgwpeZgzoh`|XX(JSRU21d>Q zfJ~8Cjf({cHGj~m)s#247GMrxvd&MG&V!{YD-il4t8q=&)^1f1uu(|)~@9Cu@s_X~Nwo*-%ci?JMQR*>h=j6`dReX(* z)mp=)W~i!PS{~0=nwje)hOK}lRx;heKe(CL$-M`lq-FzOGB$4WS-6LZP-rVJga zWzNV1&P5r_p={1tav1A>M<{f@oz}>C!TOl)^}DzvG5iYFVjnJT4WlO-DJheY5^gQ& z?@UQ!S#b_7`Jv%^+<$H6Ss;6yJFv%1U7tJ$xBX)?{|VMOME3r2P)nQZLo>5sHnT_7 z90K3(yHUUsG8p#ix~}(I(-_I2z$}K&@mq_QjnCfMhTOfj^UEZJJy;o7rQ(M4PDkRJ z7qLBFJ2V!H=0;my%uXs$=vhQMI*y&WUs8W_ajQVocmQgGF{04HI{-C*Wx9A5?y@Ou zh0(42knxfpyC-`lxhgE2TdV8KU0vx!!SC1SRMDVN*CEIkQr{2??^`&LSYLoV5S5FKW;hBJ`Q^@oOr zTAEFVvUloY6R{!_Z&RPM{>rRAfCT3W1SijvI|J_UaH}7Rz<3wm&bIoG9(R1Rv#Gk2G*m#luC+a7cMp$Fv41LCU@>X7y|BKYQgS_*G4&; zqBDd!xP zI&8Ywj>JcK(vQx_KWFGAA;W36dhMfKA7s7ISjJ&-J4RA6H9`7ofsQ~l z`v98lFQ1Ep>;0iw6eZ7Y-1WKN>i!bhc^?WA`8ZK5JXlF()p`lir6+UW`*nJIW{mh< z%z!!LN^lR==B&Ajm++W29rgK=5i(YI#fg^7BYZ<0bG?zoHU?M+=1k1*ezih_!2-YX z*UJ}p7eFj12haZFw@(YTGxC`OPL~;`=K5~}ZagWh!leewd1r#@oJ}@7gJpHs-t%mi zjU8Z7)qF0(DjByLxY4(M6Dj3ylhQkPWBFNs(j`l1Rjmo~+jrw5y>v~NR-mQc0L3TT z$7wI%ra$Az#VAgW9cFs}<=iS+Um+^Eghf*4_j5brBCO&q z<*^YM6cSnY$foWE0oo-OdS~>qGz<@p`5|NsByLvz5+y{F$&@!Mo^|}5m({Puc7bO- zBmTqU-b!UvBW1eS4HA6K=IIr%-pb6ZxQ%2t=np zpi}7^oEo^@A2(Udojskhu(r=*eBR`&(>SCtat%T}C-~LGx*w9e|5!H)p|1uuR=D>|+%_$fp6JUS! z=#dzjbZXy&GIXjKT*cn|`Uwj-Wc-+=Yf_;%wF z%}gi}z3{|2Pw5Y3VsmX4d&y{}#@BSxyY>-N1yUBz3g#$j=ek}o?J8vi#iX9K4mXif zAA@L*UB==+nc<*u*}UagtaEhaSjyo*THrJIk@olQ*`PU3r+KpQX9<)kE?IkRq$Ue$ z$cQ>G@g};Z{iV6V&7%qaGE|KlW$8E?{9kp?Zu+M{J*ropQ50Fp?_?<fu;}NOJ9gBL=;23GlRQ<8*$l}D1q)jU3snO?J3aszObSQPzxPrF#v8at&^$=^Y|iqI)@)*oNuGk| zUFLhS-XR*<#W4K0Mp)_|PZD*G9?utaMzyD*(+idrFOUSTc;Ek%eJaKl9#h)x$L>Z-Q`duI|l`!@n>7o))mxPBU`%g$H^6MjF z*ym^>8_W!81q4F>t=V-tw;uP$TOpd?MM-pfF4F%{l4SB)?giXZaR-LcZI~4BH~!Y? zTFS)8NTUvJEYt$nsvy$UOwQ6n~Kt&$fP(9 zlkQXu$Lp_8Uew0eT-1`Tudn|o)97oZDyr$=UJ4)T+Y|GFYI<#)Ht7u`39l!C?+QYI zGJhG*+=LM!4SQvHD`6xP8^dWz+UfJ<=p#oz*KgZYDTeg_2!Cn_4KoZLE~zWgeX1C* zKmOY_wYZFCN+qQ)4lCziAr*4oa*yj^NB=SA8#5hT)fU)79s18x<)se=$WiDuM4z%h za>I&Kj)SZjv;#rn8}jfME_&*SKTcaF{7)RXPWL5I?{merq_u<29cs7FSdQTl5Zg2^9W4l3lvVTQX}NPqJe^^(?-) zjFY>TE$BO$O!LB1!%TgoJ(M^j%-WrWGF}NDCl_z2rDeZ-0E66XGhr*7sp7J+-1zRT zv6i?b?kt(lDuy2`SEC<`*KvZQ2SbIIFMykA(OKaF-avRbt=GQ?Okoq zkk?k@PV3S$r>;!!@i@kExGOL!bT@kH-NI$V9(Z{=b4@05?)t_|Gru;MzvX3cbY0Jh}r1atSm_r2@qkL#>EKqIUmi2G)3Y13Iz6t zR8UCE7>uTEF0B+lb#(c9Zm*wPMHCkEnb~N|@Gj|yg4?DQsJe((X8cM7yg`Br1%isp zCUys(1cLf2FTTe`b$ht9@xOoOn)>6*aa6OX>G#Upwr=U6nR`r>`Q72&PN=5>cdf{d znYGg!HI{g3)ijvgDj(#aqzfTCIBsuucy41xO_x)33unhZF)uEa%&a*u9e&798cb4h zGAVHA9abS#aj!Cm-~ZU=ofXJ@DQ7lC#@@$QmsxN?9leFaYD!ToI(DmuCd46bGfTp8 zz^NpV>a2W}y>La;5()Jz5Vw*9vX^9T-Lmz`fc0{oq}7lU15F8?p9;o{&qm01@ezH} zst;erXpnfrfOs*HmOFo^%0KI&K9pLJT_K2aa)QoC?Gp4Jd}G6oJI(1YsEq{^oLKan z-}gV^e>OUfPiaHBVJLEfcp2Wk_JLZ{P)C`V%I%>HDuNKwb2B1D0xDF*~38iw^~)NeD7d${zg7A;1Q zRD3C8iq z+BTFvN8wGBvKRR%jX)d(`{;XsSryxKgijvip-wG}&p^Ke|EnOR+%MB#nd#Pf=sbdy zEPWb%G=?iT#t7-o1D;;NF1A7DDQR3f87zlIPqcowK0r{uGV(Tz z=bdj~`wf)(01{Xv5Lh18DaoJ3M~aYTSTVFk|3HtB2DqdF#CBTUvDIKssiI(AN8{f!b4R|CKg`Vcg6ng=ufbeX3_=no^#3CeG>$$xiw1!YW2$- zj317LloJN};aq}^$pvqrMqWwvpy0{(>DwhdUQ11XW|uk8{ym1Gg$AdBNs^#}4#CPym$TG>N(1MJ>R% zs|;{(of@aKwT7k~@t~9yeKH2^yssP|AWa(fI3gGljst7(^^NsH!tEq` zS|d)YX34A1g3enJY%};&)-*A-n{VEJ+P`7dsY86X4rAn;;=2)DsSu)?w*CIGq>K5A zZC5aK>$!2OW)evlU(#k?|CW&L7Qu0Z@s|h)U-d!3W+p8wZ5SG#=E*nYiBm}7lqk** z`cXji#{v5Lz@H!al$0OI^F&Kc_TVsJdnxxfT{vt>Ifh*l*eShOhIC-ACC@4wVI! z=?jb!6`?!5bacn2klzrHvNgHA>8jNvsuDabBWQ{{IS&icwtF z`r(f+&YtcBwY@fJc;)S^zFDudQ`T&#TVCag2;Q}G&_Bwi1j8SN*K<(1BE^SHO(!I_ zO14vh9mfLL@jx8#EiyMo7bkQk_R&Q+XDR&;&{0^nuL_k6OXx&Gb;=g7)uibTKP602 ziJU|-3h9a>)RX3|_mnCWHIR4bh`eC^uNf>=xlI6Bc!@|DmKwiEXvPCIiYSy~T$cz5 zYWo2jh5e*8)I+j6rSl(WJ=svaZcxNBU{3gj&Q6}f%#Y3c96mb)7*g$20?qu($DLr_ zl|)8|WokYV!Z1bT5^0O6>JJmVX0-f}; z@tFSvJ;oRWyMPK7WAQEbMdKD77u-a@DsmZ{uj5r7%t@k)z*nS(RTlNr!`{=wQ6p>j zgd&F3gQRMi3t4--LcCP^#r(;Q+!>O=o4aFXfgU6yz{~j#K95`rT4c5tz#Su`$(Zpf zw9gr!6`P|zeL7Um2+x_hJV=Z7Hy56uhh+DvzO#t^$B)dJTLjd8d9SQi<#1y6*E@p) zFO!}mCeV4;W-TS5$ifEC*C~hV@6966ycYQPq0ag+4$-adkVmIv7@c(k@2Kmmr@xG9 z#13_$iiOXPJ=f7M>VIKcs*i8`10~4fEhrpHUv7$_3{S^Gw!_HwKa@i?OY@9LX&uS~ z3~7Z3evNh7DKUXyp^A@y<`3nV=pC}&r69lCa zPM;MkoNrc>j~#;0tsvT}tV#F6@@2jf?5DFP6UP?#U+uRARi!UA031|#mbsIY<*?5_ z$2p#p19L!VLp>8>>5{)v71p8I^i(#2?=mmSE27z_gWkND_eMOJo>En9B|8De>06CJ z8T33}S!JRcV^9~~(ucinpJCjk+LGcN73?&1J^9&pyRWG#96}a7Aa##~y8YZcq5DpMjzfg|-BV49zK*dpZ8$+(+`&5j6Uvx^5dJFZoVJ@D~gc@}e2 z`UNGL2W|iH#U(!zmpcqOL!4I~{}1(GC01I7oHk@7lUHn-cR@GTqsi3JM9qfWR!E}R z^1CL6~?hd&px<;$-U_q2~S!EoMy`&`_Tle9}?(a5I0-w5@$U`%LEc_ z0uZf97XKS?*FTa33DnTF=St&v1b&qh5;vcCd&w7q=nZz>+QX?DwWunPuNxr=qs2b& zY}I!hkSgRVc$q0`Obl;1zh;$&vdY1E1j98TO`0Ir2wk5EZTONj$!4rIP%ML9jXttR zoBHGBupH)%{u_~5VpmI!-)@b9AgbO1s&@9Wmcc9jP_=E&cO?}R{bfzbATI8`Tl-EM zX04C8S-b#Dr{=43019rc=dgVbPNdzJ}w_-2^ zpZOz_(Soa>Jm+VpF|#!((sv#xs!sEyhd-Vz=tV@oB~w&Sc}^p%8Ghg{lgiycr_e()8;Yk?PK;xTHtQ=~II==%i=6!7*7NaZ?V2Z zv|bxqTQ$GIC&lMo^E43r(Jpdm^Ga~#JJDK0FK(;s1#=)k=Z2BWCH)F-;QZrou@`@gZpMhn{s;;(|*$&-&GHABtea=7X zsdU;c@SO1tU8n9+WHvd)@-X49%K>~xzKYcOkwb!G5Ru7%$VtZpIf%Ra zXGGxljHkG-o?uUo$ekS>MV$z8*9D90D8XHEhvf3k@d@D>W6_@F*!W+vjzv#=Y_DmX zn2PFR&@_6_TbiqJ9_?Eod~&Y;!I77j*|&9zp4Nf+GDqH8XERNmS_4A7)5K~u&ef`e z@yMfQ_ZwTv+kPV$CzElrvJCqc+A}f+tEM>W*Cu#5#DvbY_Bn;ggsWoD9w${ia;+My zy)9>@XY-tJ=v)_j?$GnzNETAD4ih(iFtS+-!_S@&d-p|y?O0eg4u70uCA%2`qQrUQ znfV|Wlq;DK$_DbaQ-~3l_2l%#I@j=J7uBj)>LB5rBKU^M8nl=01_zbPmzn(r>?Gux zd{{ZHsE>R!gvS(7N#fCS9}d{ATfI({)|;IV6RFSFO$Z2VedeoYVrVVOwt8Mqao?dk zAu>8#vez|)`fxhOylOKquQ$UkEd0Jz358e7%#~f;grAAAV3Xz)4@(hw(6fOm>?=tN zO?Z24>y}zw5F$`{&9ZOA(Y{Amo&34)<%!BWM7{>-m4Ro&C~a)jZ|I3@iZ|k?xpfA~ z!7$%K#~smhbyS%i?(JXB4KFEObJVJ$ct0$vH^`!<0E@aMZu1S?5?E6b2LUh@Aa%^- z7unl2azoaP`(Q7(&GVkQHxwo|WQ!zji$83OBCIbu&#^>OzlgdUd0*8uLjdKIV=0Z7 zd+o+D!@ioMkgrxPbfXK)S^7R4zp+ORla_>6!iJyx+N3N zLJGRCDZoE~{M7>wQopS^AQN-D!%W649}so~Dr{7wZ9R2A9DRJ)g{T|j6Cw3cO?N#8sn}#r6J@h1kH@l$JF!t-9wGvpIPHEsKc*s?%kO9Nu_H-F#w7s2Ya z{*eNbte-j$)X3$JYz1R_gsdf> z)^F;qb%INul+F|R5@+*i?9PYhFB$O(9N7!#RClgLp-_BbUI`ZC>XfumAm;CLLF-OB z=lE>vuj7RHn10>Zj8Ts`5`r?aOMM?0$r`Pyifd0pTj~TkpOMv28TN|cTHlKLQ8fnh zRL=W5cWPB93m!Uiw0X_;^AsLlhu;9FDv+qsfv6hwb#uT;KvxXtgSn?aT_6IZvI6_I za@1eH~9c^bp~*CPow7m_#nvDKx0W`?(XFF*{E0ivKZyTU5g9TiDt*?1h_2! zp65pwf`Y=u8g8}WrX&q*=yh}~0Ca0EmX9l>MSB~&L6!7LaU{gIX7*SJwYK$;qSoP~ zJ?7_jIJRd>;*YLU=dFUaanzRJAj1^0KT$M$oSO5<7rC)Zz|y!l^X#v=fn`wh86dK| z)DC6pKYq4od5nK?Y3z=6QF&Ni8JYGSM`TX*lJ$;n?7K_MEoah=mUOBL&yXX0xr4P( zGja2{3_bpK*G!f!lW$H68(*UqW|AN2mt!Rduq6px0!``Jn>&bAT=JhA-ENg z^#5l9RP%fB5B+?GD1Bmg=^qCrj~A;*brX4mY{AcY*uyeE+LO&9&Jfz+iX5fg+V`_{ z58dRObq&G@MNi-}=Nu4vV{gc-`T0M+G8e{0O%RVukk&6zCqcE6YwGX;IV!J-hMmaS5^ zK-f=GCEQ$maDUFelQ<*95b6ncIJ6c75@)*y*FNv z;npO<{DPm{1AWfxlUGpcgXuyqsFFrH{8H|uNK=NF)v6(%`XdcNHwDYX!_Zr-g3()1 z)Zgk6K)3Q*=F^{EbYfZm3k1aqM^;&aR5mt)jH*KG*2z826=hfP%`Q5nSCyK=t%$m8 zb70t(ZcWG0s5+d5hu^3shD1EnRockA2Zkuz1+-~83OLh>#|(&3Qz#m>saJpx6DOl> zMux|I_WbV#No}h$PMBz?0U;HXTZCiM;W>dkqcZTc5NUQZsSMQ#{|tm0F&DByqcNH- zbTDuXL$4EYlNg}S#;8|l&bOlY&Sp`CY?hAt75MC96z2IK@STYT4gc%FtEWv zd;^UlS;)ZBhr4-$DFsCm2lekGyII@`u)5aDsMO<~AvbjTed9#2t_GS!Sp9$+F&&frE2L7iC4Vke3>Xr{80OmPNbyY59qZ# z-N$QpDz6mVs~AcjMU#%?8$n@^UP21>5gu9S)yj$soMXTe2EXwVq$Sh)k^hG7wu6ZX zHPzP(`kn`ssPXDaO&P6psa~okzLoS@F{^Uw0n2bR<2#^ge#UAV-hWUlt){b1R;{(z zpGPh!M~(`soI??wMkgcnoV1*hW`-VD$U49gOrpc~7og>! zI21gjj*h9m6*`}f$}<#PG5c!rLsY@*FK-RzsLEns&J55c6CUk?ah^5F67Z=|5N2m4u0555oLY)Vjq%S60N_9AeiQI1+C8pARG-Y-Mkv`SGJwllD zhAuDGnB~ZiczHiG%Ph~9yzvpLSIH2COUvUB*qnyWRG%JVH~O=)O#<{kNFB|~#l zAOEVR7o^@3rlE$7KTrLf;A{F-5nqj%zb;kn{r_s2H773%Ut(O~Mnh&w3%BMPe;qL7Fop)4f%4m&{ce zi@Ya6A=r3m$T}rWDE)lAK<3oav=A7}#oSp3n>Qq%EtuM)_i%<<0oh2ifQ{6gdqD=g z6*w=5*&RXaZ+U`6eJF~nF5R8MzCe=gjuj``y?h_r>zfYA@+v6z)wjqrpHfEyys?@Y z755TlT?kKMGgq4sBG?ynm4 zPgWFuVcF{0`L%)3HBQj?t%uhaw5O=F*K>q>ukkkFtSU=7v+3t{E2@t^u)A-d7$F@S z)M{^%*zBLGu|4H5F?PnYS7=H<<{V>eA8mJHkH6${#w6sZT;O6tvD~eLs*{IVt+04~ z+8|IYu}SbbscA0&Y!RVNIb__qSn|Zv;}*X4>X&3NctGc`R}S#r<)t$S?*DLf`_(IO zvcEeTw|4Hfepa|i7}8jM^)kzjqmxS6h$4K-h$_&hcn^i(ZK0L3ix_MvUnYg;QN}?7 zUOvxbPmX??VWI|p4Gk?kH8hUzfik#_ogxB}jI9-+r0E$rP~5{~UGzAVP%eYiuNLC- zUa2x+eRRBrszHVn-l`UR_^P0Q=*tE41;Q4k0KE)=X=m{-(@t(rD5Rm!XX>x>Hz~)j zkR&ARYL0DHEbqMT64Jcd26t~5NN8vWQtBP__VA!?*Y2)y+wHP2Yw84=m` zY*^fg@S4utt5}?{Xc>)McPohhkYaU->|<9ax{kHRmqGQAc1`_9Oqj?gr8E1~`4sWv zGYRjA9)cnQ2`Uc=YO7U=`w!1$pCDr`sRt`hS9!q7Q^`+Uv+s`c4%%OhoLLEJtu-C_ zdFXZp@3JdamJFgE(%sZh%j`td=DW|{(+s_ZQ?f zU}1Qq$$|HUH{7su_Xh#n;}|O}RwVPR{`GdhfZs^Azj?@0E4}3v|JbPu<+!VqDE!nIgwwr|she-A_H^j4O?EQ$n5!@U@o< zruf{Hd6J)$cU{qQkYX#c)THUF(zm8~72`XEJ4S`;tRy2t>0_5}mR!jzE-bWN8oXLt zl8hD*V!Vyz4JPDKqjODd9u4{S5UU_atOY=<`0q=_z^#78`ZI@v=?$5QB6ga3H`sdi zjVvH|Me1<%4F%+R?e<-8p<|L zYjh#HDm&b(MCw33vbln7YtLtHtn-zfE1`L6j5%N+k7sLViwrfD97H z6dz8lo#Wj)s>K2G2j3Ia)xs|1%2`GO!F1WeC4w}ga=&uhWZC$)VJm#VUazH2?K?Ry z4pzT8G~MdB*ujQp;O{kmQ=MjSZxB?NHa+8RHwFEip^jB=Gj#%eDnLKxaICghRVfrr zqLGC|=q=ewdunc-gSEI(C(3-bdaz;<6A4Jyzs^m&x2_%VU;)zV;+;aKof-%4|9dw zuF>v$HW_uXhzeAQ3%Vps3!OrXBr*~&8x>WgxbiBoDcoXh$g1ImpXuh}rG}MQ63H53 zvw$!4`T!@6z^{oEYY>gafX4I{uf#t}+dh;H>;NN5He&)ve0j<Oe>}`yb{1N(sF| zE-wKt|B6%?_50uFuP&W!v-1q+8Nid5x@KlwcA~A(dF3$l5*gt*(Hh!oVaf&uwY3*R zzU$FQq69eBXkJ@WinY;5zqKsUz&!6Usbl!%h6XK}TbG!$-Ch@zfcTF%*EYY?=Mk>E zoLodS7%vSVV3WCM@mnt#PM^hXMN}a~>>8_3#tA+wK{SZIQb6CJ+w{n<()H~BtBe&C z6ICJS{}ujXQWRDg!B_Vxg0~n}zlrEY7lRYh7sx$(^CtqKUnQz=EBH4#LRPtNwqs30 zk}oBvg5Dze5f||2i!KU)F%M)_!@#nCn~vmZ?r{>vED??CmX8#1_tz-9AKyLJ3oQjN zMB;?Jkakc^P<$JuvPutX2*0P}5W_O1>B<3lr&Wt@m<~jD{44jff^pOoEVs*}6 zb<2@BcppteD-83A^odAk)%PL0Vikz%oDy|xirWvujIul&c@LpCcF--ODLrlt^^SIUbq5v^X*S4!=Y10Rm1CNGyxZtLwP->a7| zzhXZB%C`Z5z%yxvN%OKuEBkDu$wlqTqgC_?V*t9nb`cluigiNDFhpa`SB3J);4^6b z%zTCv2PcvC1X) z_(lIU!23S2e-z1_LWVTZ0R&VW(5cEL&wYy?gE4fGrTRZ8T|Y5sk*p2XF4~m9(H;xW z$-6II_W`V^5KJ*bCLt}kisAgtK40U1wCKGoFcK$<0PKnDUaN}^POgoL#;c#H(O^ak z;QP}*nDj!$bmvrqq^73?@AJ_$_27G?8T9an9}$^A1%$_J-6$J-m~-iCAYa_VV6TXx zxcg*XB0}z4n!(f|;fz(sT(BM?vpP-F3HD?|)`DB44I5>8;4PUSj zzo6?9HL&2!NhTSDtx~^q>#8`QA>Vq8t|d1@s~AcH0*pfVM_`otun7Z+s1){GnB{O| zZL?dg2{KuzMvgxFKlNpI(?P(OHxVx*TJ6LP7#SJq-iqO@{zqKYL+&Yo$Hu|l8FGo6}T7zTo$xzAI5m!nuUZ#bw`xH{D~jdTU+}PQ5$3Et2jF}6xr>JB9(CN zvg>Tc!iypj7l^oF)5KeogWSJ_+^P;7#mMDmi8>(QTQpsiMz@ z3jGad4cc#BR3gM4)~remlpI>izdIM{k~xHOL>0v6qqgXZmWs_QkZUoU#h4|%oKQ#g z@5-h7`#i5A7}mRdHt7AqVUiAY!07I* zBSHCCp()?&yEr$v&+S&}hQ3C%2S2TQwV%e@=?+FFkol7%HH27l3KwhU*A;8tkMUAs z)!6nsONz(7qEw5(C+2#S*9>%TJDDs1m1~lY%~?$fbNyS9l%e|+GnEu$e(*|^rMrY} zT*m9($f%1t$+YdKlhH#H_ew9%7OkM~y`xbZ#)pSJFAHSPD+BgCw{NXmKf$>7S=d7b z+x-?ssSM-9U4Hd@?=I$8|3Sp;51LOrxVk7Yxol=6;qp%(6?Cy3mNLPqS1LWf1fE4u zb*VR3i)Yeb4)o`jvMo`V;M#p4COwdOGVg%E%hkSD>2BBPocv@eV3Eazd3`hS-4cyP zP;L-R3)_=>#B(8h$7Qbi)FZiySi!VgHO(YUEc z?_S#%sbWApTfStfk}ODt^$XqQ%^|L zu08Ucj`WTd;yK&+hvdNl=@0T+fzNS$FN%voP!?sc z$t9xY`cY;b4m|D~AvezcYK8m&a<3}x4_7xGdf+a9oFDH8v!7YLhm5U}K9B{2yk#JH zj5ZY00UN8RzATeM9!XAL8!GV$O@mbp18-{8ipRZn&3EaYmJ3$RUJV-ZBiFFysVONm zZ12HOGxHaB)4421Y1WSp2IEr`6Z<%}12^4Liw*bNEE`Qo!=bcI* z0`CX?_y;bO-7~wU?wlrO@29cVPfpM!RzG$Jq9-#|w&pdIV{qc3tniJJ_Yac?{6L>9 zpe>y|ZEyUbSHrWb>68b{QZ~1*CfS40J^lF6ARTmoF>6+%meT+#$tq!{NT}ckmPcY+ zJCIW&-fpbQA@CI>&hYE7cZBDC_C=Qia!;arw_XdldvZt7UoM{Se>^x?JQg^2`RrOg zcAlcoM__%|^hV$g@yFSDJGtsMv`4Ol85b=rk2;OlMu;BCuS@{!F%a3WR}Jva5Iel| zXID1mc=Xu*v+R2}Ypc4OHCW=rWw{K(E0+O>y(O792ZXnQl?PJqtJ%i~gT=H`&!o~Z zZflGR=H!P7Xur4jtneRC5`8DS%~>}qx!#^DYgE`eUBIwbb?z<@mUOGPuPm!>uw}3C^OxM(Bp?O#r6cEX^faDJ!d)vWH zK-R^FQYCW8*UZ(`J!rX{GkJZ;{-wgJZ=k307jp>0-Jv>6IojqN7 zvsEdWWL=5tiA3=jlNvg42Z+$DHCdksM@6ubl*zx)Q0Pq5U(NG6y zh@ijC{@l2@40U;lx&Y<#sqc*~;8mQ5>JY(nSYsnAUT-vQx>TByPBKPg{T9Gs&O4!9 z?GrdqnG?JqIFMh)Z{B2asB)h?%_Twq=nDO4d2Q%fsHTqJC944SOqGb6!=kOe`me+OJ|2Xkxi2ecY+M=Px4 zj|TRpYk>j%w`(WOX4udC(>gqOAeYrYu#g{kz2Z=zpIue!MSnGQG34Qi3ZbH9;cxWlg~rL*%*j zAnn3194$8J-f?_UnT0(I;wR&>tJs^kw= z!z7L{QMlBtyDu^K(=hi=3D?%98)jID<_$;sOXm2@kJ0^EiAw`cEe8JYi7gvY)fnyp)P4dNts2B+H6> zkj9q>H@eFevtpxmtmHLy4851%AxKk^ZIpgw8Ro;?kqA)I6+^rz;vhmYTR zlKEaJVVYXAc+!(0?0;O~EGDZMJOe*=0?L~kgbq;KMGCZ+*MgpYKzTC?C~tZNI}|C_ zKB5Jg*L|S^R5zRdjr*i)?c15ONX_;?oz`9NcTl4{o+8L?f$BU6H~#pT_Zztr1K@4* zD(pzIZ^Q+Sfkov@_Lo<|*Z-J0-l1#<&`2^0XFuuvS7}qp_xjkBM1vLqix>|@g7n_s z<}rfOu&(dKu+HP<*TrYPANkATWh{efahRHdo!GE_ve2+t#4?W+($C6PBTNKH1yK}Q zQV?S@zaY*#-J9js@`=`n#7y=Q57!H2=^U>AET%zunkuSA zHtHry5Nk+bK6fK>v_t+utzQ(u?$wTvC^ECj$5GeD;dk9pzC&y(FS=Z*W9h2GpfeNQ zqnJM$x2mPcjR@o<Z1&FsIimVo^(UBoZ{P&EqLqVBZF?5>D z4*C1dn=^am~YVMb% zP4!t=l)_nEDOL?5JQe)5R++Ya8gp_oe((`dBJJMky}qQ9Q9hL! z*6Jq{$*7ple~tZyLyA#NF2Jr}0bVxH*4X7mzpQL%8LITwiPHW9BuX1YJ!PD4ZtL3^ z4XpBfBBUn6tML$?pZMYYIm`G6s@MYMMl6|T+;{(Oh`S>^G=E>aR5Rj5wRr_*fy@B5 zr^;$J@BebedtV!RU+^8Ai-%x0_Fo;)Sal{Gm~{yl=ZUFs3QD@HKo_(l);s*tL%_(! zoVsWt-VIHA9Y#!!USXpQS~kDg@TWhn;8#Ps%}tPI#x#VIgKnxA zO{%-US~`u=Y}n|6&XIMm3rH}Zr0VJ=r$=348OR(~ z`U0Rup+@{nFeAS^S@x6q5Nkl$I?I=_^Zz>M>45Bzjld3>opEXUz^R>l;MDq1{!B`Y z0b0~;9Bo{%F<3NZbm|sgtT9p8*YGlD1`Yk9_CLuWrJT*-7;vtbYI6w{rJPfQ^T^>A(g&PfM%HW*FnM>L`oAN<$4Kj z_NT+dU*$$T0|ECeTtJ^nLEx5&v}k){%8!Kb9#uOgaOKQ};r{_c z=+w=!2jj%s-@r8+HtjU&2za>VEqLk#wc-$RxvtWVh*0F}Rd*xlbxO^9QjgrY2!Ytc z2&pJX(HI=rylDx!Adn*ZhLsgf6*1Igs3-db7O& z4DWh7vGcPV$H5`8WT^|<3-fiMS30Z1`0p_%wea9Jj~u>|+3s^yd}$!XMS&n^@S{6y z5|P;1A)wkbgy|3^D=AB$#r({Q%tEk zNmH9(1m!_hG>EDeK-J8JClB~2$m#E%7?sgAxqXCJAt7BM4K+|!CVC^<1+R=#tWKN~ z|8^uE#&>-}kOJBny;J3?yAr?i$A!YVmTs&nqN=$a$89vxp;X|jDgWvxZfbP6bXA1V zc3tT_t2S0HjUr**ULv7FI$%e<_Ry#TG!^zT$?@Z4IJJ#E85GB#Nf|BfiBajFG}e1x zKc&?Ih*3|e4M*kJo9>N08or1=v2dnmizK8x|I8BT<>g^K@ggn8L9zw=tZ!2%P!S=? z)2zS7b@naguTjJ-kWgEJP^0DrM*hZ&azj=soSEGpzsP1gj-h27$>bCGcI>ZO>%hr? zq=l|PHH|ydqcHK7@F@~oFMk?gqxMwXbk6p6z6z!*&9WcNe9!XBr#6#BAu-nqHtmSK z?1_-*=j*!}$07XU@8M7{k(i22O<`)N)B#bv=%I zxqRWly>H4sq^Gg84n5|GkTu5Y9nQ097ZrN3+JC@KTguOeL-+)=&9qq@{aA z)#ZlAOWlHzj3bj@XXpd)%w^YB~Mb zi}*4%=kc?*S5Ec~+%qDyuVOxf$+s)RBE+*j7wS*ui#)C%ckDBBykJ4An}+4MPbIu%+K%xB3^6;s1|S7Y@I7E zo)kp9`>Y?X^roeuVae~Q^}~((1fsefQ2m}&L-*g?)_)>x-C^eUJ?2(vSCVlk(z>C1 zzj*O;Mg*nLsRgCdT4~HtX^PI!cUdg_`A(T(p)v(4O$)w&hT5|L9Q19D9E!YVU!lMnIH)Kp;No z^Q}c8{@$X%4{oQ2dN{Q6200M$C|q)qlW$ixUR2!hU&4R<=@GvN;Tsm0?d#z=Tq{Az z`*x_==%(w#v^o*i;3u`xWypHQLBX5AA1uqrbB^sq#z^z4ymfuS5$Ut%FFqK+_1g15 zMUY14kI>;nkCD)eV@{DgT5@U&bX~9x%vK=Jdj6>4>y3R_Cpwi|CyGnl;p^A(^~ra_ z!4Ltp_pc`4Z`cnuw!hdAM*WG?E7D z=OmPD)}I(RCYEZ&4Y%La47YkhgFrM~u9Zija(d)r_R}~*oKsySCNi$3ffc;uY8fa; zZIuazqt%jRRrdDwF4c@QV0e%3G@(4u)C_16Ev_fOA6VA^U-h3OxaW{^M_OFCM3*-C zarzYU6k)_tFRX^2%4qc=t_A!Tu{O}(0>z7S;u46ULOlfZKJ)F6A{)x~{0$G4R<7_l z9GJ|pDFJw>+JA$G3Jw2duSGDKAhm;wV{+-G0ee0jR5ykGIn@za*>3D}nrVA|nM4nr zjU!!H-2n2|QDB;hCeLqMZSjiAJ3zmu+7J)X5i%qHSHntYIIdyu@%i^UQKNNll&o=} zP|lG#1w4_;alEA>4WCf4HrHUjvk7qrhlKs#@uB|GbFP&sFCQ1?C>li)($`Gf==2k$ zM!b3!ZY%4M8pC;Hzrt=K(e-OqDG_>Ju7W5T>rkcXZbx8>r9o7b`POSmH1-V@hS+}) ztJ)s6QKYt*%PVdR=RJ+p=YJcldY^3Lk1Ds=MU`5H166PKkEr2m;vsm&h&SFs&w@p} zBW`DvFT7QseUu2xyLZwGk_Dy@FZ>>-dZnRoj`}~CXqVoD!?RlnmM~ws*UH{*vYi;I zzZu@VWpb`U{`)p_u@n_X&KnyIYR;Qg5Fib&glfPudTr?h6(~smlz*xAJu+@dt)-#$ zg+JCdBP)8kMEGO(04ufIC?7w{f7M~$4l4Vu6_`0u=je1(eK-qkh*CeslxeSi)zF*N z7H`zUp(WM&ir$H-D(cbK{Y^Y(p>&2$hH@1nM>$d>0MGSE+_`k;o^M5g|lB`h`)>BKKEANlGO`@Yls^2W;_Ueo6>syI_jG+a+}N7S>^qz$}| z*_#Dz*8sd8zw5wj3<;?!c)#Kx3JMBrj>uP4G&J5cFVtJFu7EAJmr^N>SdGg%N)uJo zuIkB)I@<5GwMFPSVw5~RMPvH3f0ZLU9Z4=S(DoFv6+S8s`EY?IWkt`3)wib#CU zJLIK<6X!QD;1SNeEY=e#+4Yw;GJirN-?Y-{vl>k1K!aPYq#AFk`D-?VNtWQ;TDBK~ z!Fd`kbRDOsr#D7-{bXx@fihi@tlb0Da89?Xys{)Ip~4^Gs4KQ4=RiV2N4lY=_|UV1 z=S;>CnmC+dnPcK$CGJbh6_Tycl~2wBBt5;~jUa01qK!Q*%2$Al9IWt=gpbVaiqIxw zek}S#6jQG(n9bpeC4)*;UzKmrkLDL~xb|sDXl4g$fTZZZ7*AsAo#cOEW=myC+=p%$ z(EyDV==~^%{n7}Us6nXv{sluW=#MO$e4IzW29x1;Nj5&l09Y#czKOIe;>`_8I>|m5 z0S{)wt6Eo(z=umn87uHss0{OY7UtJ3k2b11#OwE~ag-C6ki}hyOvA{T71YD;#gzLi0pJ|Fk-5?r6`)X%x>Q-$P?XJkg-+Gq@fkzsit! z+LF5_TiQyq*2YeF(q|s!WFl2$yvUw9#{H?pCSbV*c5~y4xYO6XdGW|JlG;Z14SUOK zS%@Tfq4=Ibv+2u7!BJbd8nKRxTDEp~|NF%)!-FDPfg&~-FXBL%e_CJv%J{J2b*@NH zD`v>YW&Z*{&^|1Yr4l!@I^x$YltvbXcJyL%cVb<9+`{tM_2!zN`cK5n4n zd74Rp-n6MoBC3ZE0CFEi&-Cve9{3{J>{15ppJKb+OnnqyrRHCl;kEi%Ew0fX&v)LP zm{NMjD7rSmp*$La1?7y=I}Xag!>3qlC{ zYcAtgC+Dwx5Ig5NH(N2Cm)FX^++p(1Bddr`P*ac)8Tu}7Hn6^}U7740b@YxgxVy~- z!K`K>BAOEfwRK?gI~<7z7iwZ!5is=Cxkt7~2zY>j^QnchrWTim z;s6SgxL=vr5MGqzM_M)7#VfdB){YN3yb&}vNW!`?8gC$+p7!NWKYjaCSv>sY#m+1m z-N1QPY|yLw-dXd3whlm>;;a|tZyCV%Zn+Vzi?hs2Rj}mf7-7Pq@=#9Ic-ijvStT!6mq{<0?VVtL*v;p zQ-2~afN3Z6ok#wx1=W$8P$NE^m7NBilTBnU>@2;QJbg-eaYf5AzSY()d`^2tr?+iA z5$R>+2hIx>?ai{>vc0=wYW_fXC!l)}%kMF$RY`S0H zlUgy2RLU6I>=v%&F3k1y6RM*&S4q6w2waLC@f#j1fTPDj7gfqjPL(Xu(N?W^u9Xx| zP~>8{u_Ew3nD2}0+wWhnm#4e2IBvo_`rDb(8hUIDdX%`P9H_+e;Ir?laeGir*Xn0pwA5&Hg8*y&lJnBG590tZ%6_`OXGhSS#Gfd_B)_c} z9dVd`9E$@9AChSFtZH~f5#muO=}fTd_WEf#vk!O5l~dUd_az#nP9Mt>KWmNo`a+jd z+r>iUq=}jnTE)Dm+>xIa>((&QJ%QC=AC^IVj^ZQADQnMGvJ+8#NbAG#De@iT*4To= zG8gyFX<#L;pRGAy==+|}^w_j2f6RDRhs^FGquQXkkN*A#&b9vTs8u*XT;(_`BBG}- zx-6nVrw8-AcOd5MJy+-nB~B5W4~moiebz z)3y;vOQ@7}{|k`(;P~|b$IqCKMF(Vkd-#ASl)ng4>vNw!o39p~OsFb4>_JyL~foEdW++c_ior=hpq%5E$1^ z?T#Lv!uHKIDVZ~{)XDXCoM^qPBw{>5s)2elWvY+XrckD{JKgYPq!m<9JVrN&;ewMv zCNP^moal{@J_1?GwM`wwHk{R-c-aS~L7{_??t6{wSPu2fuT<;>)${3=r-$WUn^A#U z)hFJD@EvX~^Ti%VVUg|oRb(P>Pmc>~5Li)|u1Ga)xa_oJC*RfH|3H2pAivhcF8jB6 zD(3%HKO5F0ta92dU$xnFD?-mJbnV!nPC)6V%SFerW>3M+p5Zrh)^d@ zwfa&;NXBj2;wNL799-Y3bhxy1Uzc(oPmwkDBgP>d`uS5(kP?(HhhSmai!DRFELf1P zW(ancT&-{OM0hFY?Y7aYo3`hyvK(+>?dao`2)J)JL}QY3Dw*{VS@NxYgPt}Q{WCu5 zzO99)ba6}?pUJ`9+LIjyi>}3YsG{Z;IU&f~E#?-R4t9MX8l$>#A|9`;Z!)W&ZZ%B# z2l-f>jw@E1?++htFVBC+Jsv+I+f;a>@0}9#>dn4`QvZAOI~y*YfYEEZ<3u5F6e6Zi3*LYa(8!}x9@X#Hq=N~J-W-1z0<%M=TIIsQlOx1!; zP$bOeukEc0{9B^aX<4D{yk~?EAfwX_=3hwT-c)PG>30!xBTBPl!6oJIz%AP)PIk`6&n7sW zxrCoII`D8z+m6K}Lio~wUAu`%q$BS>?pDbN4-#0;2cD|rw~W*`fV{vY7D-F99WG^1 ztO2BytMw_dT{BmyxW*u@Z{h)y*Vem#?s?&8`B*$9!swDWFwNP?fQgaBpOI1~80O); z+vp!8{n@H4J1z)E6kmHcsQqsStS~{l7djj*`VcKEPqRK@_Q{ygvINZ|vqpdAEXxYE zjeQI$ojP6CQ7S$1##-*NT-sP(okJ3SMNi90S-PgbkUwmMyJCLJ7}lIpP~{6)A;}0) zLHO@R?{!MNhy#Qgo`4l4nJX2+<&Uk3Q`Jb|rSK}!rj;99s6~r1sNry>E1+b5f^K0P zYhfxsU|~? z(@jybz@@O`IY^E4$u_Nn{s~mhlb8Fvvc~@cG8N7uJwd%&TA0oT%@q)#7gxbJ`fLE! zw)5TJXRG(1sq=(Lqo}~-Dxq31B8TW+^JX-FGNm0*n{P}@tq!~YM{k^|-?YL>dS~4o zJ8x}Yau^~ch;VXp_@<(a$M_DUT7%Kmx;%oerzft>154g@!E?-M1P|X!#uW`^_s*KA zgp`qPqL074XG`>`Esv(tolv^IldiMmh1>gOoOmrf@GeF2G9oTaP#ZXGSn|licpF*6 zZ#^CJKlrDMJgUhn~W~ESgo{8&^a$QT_`Vu2?&oGo4Y$1V2=QW_pd?VFE^Qh z!(Y1nb+fYLHUi=B>ZP#f8qe*P&x2P?$#|M8r7aQ3EDk;u8}TBqs-&e68C=#>hv;4q z_*#CjBB(%qs{a`BUEM)o|F@tZpW_X2GUZ5lr$fC!3~wF3d9|PJkh_ylpq($uYf!Dm z38)lawq9^^a}%;vG0_=Jpn&5>NkIhbx#S=5r*$)QmptRMKV)WtwitnBTC9{ra(q*k zeSN?9M0rrb5KsZ!N4@4hZEFO~cA3rDA9|6Adnv?}$PzcNM13R3)ERV-uNsG3)(xKtj)0*jB(}gFdrHvYO1# zu+zfpvN^uEua)RQt;0aA1Cr8aps)uEZFdU4J~?~+bbFqU^{i=~L58ie2VZ929K0f( zsr_s|RH+43MK9v}zD6E9q&l1f>vDvB=@S|Hj3NX_+Ss8CsvT^#KqrK*@PMNVv6Qu4 zdQ2>*-P_*!3Qasg%3cNc1uR+Y3Rz`o$y&CltQSerCyG`ws|6qSr_P2m2C58o)PhcR z@}nZu?!O2O57hnu)b2w+hX%h%0OXRHUW3`nrJRDzHiR*k(AHSb9Kml&z?~%I1Jg4{ zBnPqsaq)CXYJ#ZPmC382?aGVF3wpjldv;A?sxO5f&OWWLe6kc!w{aXbS6lG z4)*IU{XypMB)F?Kd?6jHQ%oF&&8y~{Kf>;q`F4z@d`;2rJULtD zQJEu94)TC*{(h|hFpG%fIKI1-xA{v%*9J%yJqip1T;3eri~LzmpSTVS&McEm*_yHw zHrqoIq?q}muVS!;<}-HcpBA2Wu^lixjrU>Y<*(;8#gcbK;1{+GgySLrfKxkj->dr5 zL=7*?hGb|6oVQoB%VT3>cM({yKX2AvpuZN z9|Au1`w-d{QpE9aW=~Cc3?+w1)v*?tc(&&}+AfrZ0ax&&uQdR-IxY$W1G9uvFWu8v z@})b8@((1A0um?vFLXf_w-WEOr0valKk!tq5D4v^A{S66zI?X6C9=2nV`p+ea@Y1%0Y9ynU!@K%e<<8Or4uqcvSS0;NXjC^D+^kebqG;nHfKf+BwOO^|tGD)Q8hFiC-GuA9T$J6^#KExxUri1eHGc zYP(s52PNU3Asi$3sm(?1*W*MO^(`r6m3&)JUP<6gyQ=VBf%Jkg95JP)bRs7Kqiy20 zCbXz{dFXFa&TcB}WQS+8g5_RTf*Nom>R1OIR(+;{oVADn2ENV?GjO?%mMELd)G;`k zFZ zb9?ai3E=I>82G)v7?r;}unF_6~7vyxc zL4*+eS=jlnUf8rQE-EGpw~-EF0_(J+Q7wrBk*@Z1!v-H4-gbt`~gWLLmd4 zJ?deQ_0mx~g|miY8&_!9y*2zR@>g)V)gS8X;-$(ll+m8DF>{D>3N~3Rnz7bDz9m^< z>sL^WbB>p^&qd{Nm_U_JS=Tl^igb-$ao`bfdAHK{%7vb8wcf_7s(CK&-3u6#)ot2m zV$kd3yDVI0@^@Er$b)JpfokEQbv*7z;`9IgBZObnDI(l*6H7yZ3XQlO7@IOB&#>yF zV8j>Ed>P?LkXvzpBfAZ7WG}SKG)H%0Js}VHjOb`T|0QlzjpEdJ%raO(?bP{&Slzvh8JYD}) zbkdkL*?|W>{p;kcZ`qzSS-%+6jLnhffkKhU8&86p&|{8nE!p*Ya0?3(k=~J7gX=4` z^5*Of^R%pSP!{j{(_ZB~-hglCmwL?t8T$cwRdjfp72yf>$EElTr1pNI)qWyp$O(l~ zwGo=XF{eHO%&A_glD8CF35TK#R%`n`rn3s?T3xd06nR{KN>HNb(`|~;Ad}MXLxFXtq6RZ#dOwgb{@sqP?whE}7!A3vEjsI`@W!zoB}10KCSzWVaV@bIpgfS|qxiLN zutK5;qNw_OYWI3O5Uh|z{_~oV2J&rOKGIV_ldj>Pre?#RV5uA z{>MOGBf$#+SZJ$PQ=YeRN@|H91XYiYLJz-ybq1riTg+7yrsu7`Si?lNnooO#+~hfp z^kG3p7OaJbjGs&@W}dLza0vCn9%2aUs1M`cXfXLvjNfvm^zwIMS0xsBdus=Jh2AfI zi3sN%Mjx?yr&o<>!N7p3Kye3{lDY*<@xMRxN|Ff1b2i}NNYK5TpOa}5ph~BI|B%;e zj${BP5Df}*?3-YEA&fU#6Y@g1N1f4XrhwU`m~^i65k_dyjKA(DI+8~HIpKgS56pYE zR4%}ldV0r}f{o{Ax%j7m-q-$TXh+|RWgXQj1{CB|x6_wb`u+Dk{s*#@EovSAaDG~Z zMBF>5&VjD_(7glQoK-a^2qCKr8yrzA1WVnO5y z)xPn&PU#7}xu&2zZS3htTAQ6$^!nnK9gnr3t*sUAr?f(&r2a=RuP7QCj_VhlYyQ!{ zr!V<*4-mUjO_rXmCY+xzn?(xqAdb1bm+y>HVjM- z90%P$9H`AVdZnlw7@}QmHJM-)x*4`P;C#p4Q;TeBGsCgA&m-Mvr zYy@rrQW&=YDgWHpJ-)1y>;5^vKNkRxRP~cLEqYu{wq6ch32}%O4g*h)$rM-&+3&sTa*=sZ?}ps8+6GWQmYkPezvH_M8Qe&+qxG>e@x9wpo;R-v$M+T9-yO` zi@p~AO6LU#Rw`>JWN3URxxez5YU{G1$9R8bGSOZra^Gh3P9whj<-Hz4m1ROD58LO< zL=|`)J0D`nQv}S;&Dfd-7+H%iLPd6Q>rC>>O4OwH(QF@6{+gQKJZaLy%*-q&4db4k z`e{BWPNv7U6TT#$*Kl|9OMYF)bNcLWT=pC=Prn<} zB1i73wA>_LbHd~**$frg>G7nTyLv4wro>pj3eQfeUw{gP_fFF9vy* zGMN^>9nE$K4B?PcdRnlaWMmB{wGY~-O1o%l%ek<1w*VUikI%}KiiCht1z7^|*o>L_ z)uO9OIA6q!itPuIB%Yogn9z?R*h!D(XzSk0CBz=vN*f7gvgBrc=5o6$rszR2(?Bs! zR!81{O1gA2yG`WW>yBrj?{3g_M-p@{# z2L#jFmu&BKIi@yj*kwP8SX>mH(HBA2qnK>q_YbVjC%-7x=aW+3Z8R6-3?X&oHDZ=i z%q(%8NWMR|4G-kZ0CK_^w@N_%4;Gc~l--que2GbL?VE3}`Oz$N4!+2*n0U#jX))%q zq6-e&pgt0;GnB_7{+6#1?R3H6grfSim=HUN8p6f(i65o#OmHk)*bFF5S$+=Kb~$mKy_r`*-g;JeN$ZOf zsIQ`g=joPo!EXrApRRB6-`=dg1p6E=u^+`Y*UerTCofy!!?Kdj^>QOlSfWFv+L2I) zYlUUbjFb!lx1}`iohBuWhcbp|VAK{TANX6&Enwsd_yvU(akT+0n$u?~Ufea4z?5KH`R!>ha*ENS^ispA57SHs+c!sdX&h&8&O z|2d%Z<8J|-a#HB-oJi*O9_G6;+-XJ?BCSYVf^7#L3V}6;-w5pkOOsPm0xuiPnl9HIjdfz z0XB)3Nrar;uAFctrIbE4(^*#Dg&=bZf**J=7XdKEKbF<}$G>tS)J&gn9nisoL!$LT zf7<;4%kS(z5p=Mb!f|~YL@i_?W%=0+GDd*M>3Y(_OOYyr5K5!vkTJ#_aH)mxQusA& zq8+wTz4d=5aUD(qId@(Oonml^)tKJp@Hhg$GU9VPYEVrZw=mIsw?k}9*jQxaOA$-& zT*=oh#at@`_m@8y5>VRxYXSJH|1<65pN>B;mptZL#;3))pr?rUMMGgy5-M?>*gJb1WA>ATSr-U`=pvp+0e zohB_6q}f7yEp@;(bygQ2JMZ>xg=;rkFFMIg)gz-UMOG#n)ZJ%)p*&Ew2q;4jM6vse zMP-EXTlmz1J(4)bk}`$TJMCxl73IQtScXND(kn=@d_rHs&NIBb90d1iGCq!UGgs}S z;0jdTlqXFOFjx!>xbag?ByVMOo|!5EEU0Y40P3%wZdp(vW5+fhKD*!MxS5lOCr5h_ zp04xz*c7VN>+7|C2`x5A5kS(A1npSYaHrD=#(U!Ht?;N=f1-mN}!?EpMVqo;w!( zbhO+^Ea1;Cc01$(=SNmy<%ywbY$v+=E-*Y0y9|i6T#Ne(dPqigr<7#=h*oyY<%qAO zr1&#knw_^H0H^!z-2xBZy#l;D`xEUH$mdT#v3H?qd=TMhGEwz7wx74V+F@K&)?D5i zSGv*9w$u7>80|D$`e1RHiy&V-6_`RK_m>}&32H-RAl|06e#|scO1u1uwRjsF;%b5r zjm#xJ`%AnkkNgqks9JR+h=!&FjD2^=gW#3QGgJLiIb4$^oq>{Szj`(HJB9KO6s`ga zFJW2|?z>C3|C{cTU)5~wG5>(qn%SPXdi@m&nT`cI@rt|oLEzl57vogOf59`hab~^z zChzviKz)=7R4Ji9M6Y5#=d5|K+D-TgT}ky3heZ`(lg^i;+=#Ld@x2(Kc^`s2UnJ%SDL3}3wh_b&IKIT_|I$9Z{!!e zzbMoqhyLNXHp_8lST>>%gH70&_hWv>j)+2EzA_)!+TLTHN$9ntWd0xHp(-L-+N=g1 z``%8YZ;i*OG{MXO7)t!#fuXL%l09Ha5Kso}_dZ2awHVF*mz$Bu+H(M4LYXV@Z+s`j8Fkbv{?R3wxB+j(SyHO;i6aIJjv5W<3n@sT z0_-%c&H^4r7Af2k=_Ro~dL^+GuJCUHtIqf*;5k=0R4GA5(-KrED^IbicU7<}#zObh zeEd7c%tV<)qaJIP?h&`SG$NoK`VXi27l=K>)LE_Gxf-^Z1?Q=ySJL{jUU2YDlaQr;XFL)-*S0@fwG&fAi2IV z;H*BaC(?x45(_i!LHJ8FuLRR$Ae)!yF;Sj<_JgFNaAs0HVL0Mn(5GmGyg~Rx+XvVu z13_4!*eJ_eUv)B`BqJ~UZ?0+#$6wRql9DZ?d+L*&O}>$#U!yf`Z+hTeGVj9TKE3)x zYu=|Oe>1#Kbf{5ndb+lx4IUbWrG1JXWC?0GoImpJd%}|(n|DZLg#S*1L(G;Ts zgeNLgmHDqB5ja!GJ=)TER1vDTjHhIgPO0sG*%S^&q_P`RmA|iclpx1ns~pb^0Iva2v4P_e{9F? zz-$IGd6AW8YcU7)wYZGAVKs00P6MLlI2~*2H-^FVI|s&`7K7 zzfyVE96_V-n0hXn*^hJy+MI@chCD-@ZpA4rUM_9`Nd*J z*2=R5Q`j+4cvi6m9Tq(z@8BN1m^{*nd5subaGvdh_YEzHu~Y(6(`pQQ$Bf92l14dX zX<24rOYJ1>N8p(4?U|RM zTdo|JUzibtF=?iE55LM86$m9b_&rza(_l!63mNC(kJhV zSe1+SvND9op?0NCDZ~2x*P~Y*)aN^vqm&+W_5Fz;LhCLiN+2H9d@$gUarsG9Wl2DM{EN)Vz~!6 zsi2_SQwxk}?qV*F&p#zLui3@&z>r(ccZa*ds7y=fTv2Z3S!bIwWd^W@j<`>Lsure@ z=gqPX;D|A2M7-TdZB-iHt-<9opeho&rKPHvNQUr~GX7gsh>rQsc-HmDF8kEry1nOL zL~}C&N%!MK@T&eLMD3@~HzhS9o7uoc4cl)Lj@(Rq`4A!ToCN9M#1mnaTi>ze!g} zdwx>L7;uph38p|yR-YwtBzvD8+-A|c8NEGB65MKkWm2*D==ugCR#+OTx+nd1b52Cx z1$#3L?n3dnk=n%#yDbdoP|K+AQbF#g#|*UPOHkts`IXhI0Xq0o-nIohJE!*MbjI=S zo5mh(SSRNbw$V(+YCC08_r#~<2SsfGMP&|<9fQR0*QIv^+;53>7q#0pg+)Y#^MwJa zumJCA>osaSr{`%pBJq5KF88pa4w;i$hmF_9_?*(2spshTBk+=KbXBmsGhFoGBesE$ zz<-nm^_!97?zrg>hW2UgSe~z1`HNc0Q*EYwziCT&6%xIl_U>|QwBA{2Rf@sN+Nhy= zfrCj>t8C78D(2kzL_<>pr7!WaT25S~=@Q7H&a+a3O3bFgb`n0@lQ3Ip{F-tZ>OcxkO;G8sj}42cHE$^(--!Z}0Bb zoiqT~+>M~=a?^_G%X2n^6tp^Y3(8!_KXNIBskR6tPj7qB#WXyqZwIJPn4=%%w{5<^ znb{xT)_02RHQ50&mUckM#{^fmgjRN8(&y)n_RsP&Vyrdro`9{tMI5*K|V{g zL7{7`AVlkv^6{_LB^E?h!uZ00?n^h2N2EIQ;oaF}OY)#++y3gecdLGNF1y^W7nk`5 zLpxui?h$@_4+_`^3h?A;t_G3+ses$v0LKY;{3o6+I^M5eo8vFc`|r;I7&7p#`_}>R zH-!0f1}O6OKe!)HJ5ct`S^xC;ARInRNT){5I5CA`Nb;Bx*J7wWZkxhg&7)Z;8g-MZ zD!16}6*vl+cyxP>y7^jhLSlvsEU$F5DlQeHRgc)sg(AF>FDQA(5X?s)LQ5tU$LxxP z8ncDo2!YdsgR=A(tl(znCN0e+53hQH%_E>(d((&BgR~hAj z;6p&LKKxMUZ!TuI|Ia3oOHraQ0p7I;ZVlCtGI0H~^CiyeAP=LM#(AW)Y!-j+IVfP! zp!EZt^%Q39k6tE$P%O!&n4vLoQmsIv|H8y9t}>*-In$(d=mwc)ZH8zO9vF+^^;Fce zJBiLUC$O4h0b(UNl09BlJ*G=;p-Z!0QT2WOcs;Kl0a1tUb`%p=pymrcB;49aP&pEw zEtN$!oVGX;Gs5>}&q}_=dI(Z)0zB2v35tI+FneEB4<<|UV;FIV$F8o>W!*14p{jkKx^lllHvb|Cn=iYh$!7?kdoS+gP@1|cd=~mC zf~`SL%gPnp`k(iUpZpYyvJQ90Z1M*5AKU&0h5D6w^9u@<$ImNP(<1G|QnOMu; zA&)^F`1j1&Hc6EvNm+`bq6H%$Mx%v04pE>V4gs6A?=-vje8jx1jBvltu07aeUWAYc zE@_Dcxje5!fY=B{4P);GW5iaF;FTNV^zkPY#%zJDhF3A(V9Ayvy(r)#3r25O?7Dd@ z&|8QY7`zi6uh4k3m1kqm>$yWMCIV46K+??%ymdVB>Lc?e{l6HPw|cEu+m*-rdPd%n zh=j^X2Hdnl(>-h}?X4^E#~`pJnZjAO7VI5R=kn3z94`E&sC43fD!@}Yd=jH~{LyAo zLFR<1m0H4vJ0KnU&P$c<=BtV2Sl01}H|9k&(wB?p)S&>6SZ)2WsHW=bSJD8ze`+o< z?P;Aidt(|gUy_S*e<3YXgm<*1B<=1b3HyOH@IRoTmSm-KJvk@#~5 zd%17aTS|YCq3Bz&(QvW_05>2GQARaF*Khu%a5LT;wDF_CF> zEI|JPIQ)v$qm*o1Aej3MhOWWG%a!OoCk50SCL)2qc$kl--y#rY{{tDyFiPPI;$*7U zBlqB!Y%v`hKaw&Z^q&ff%|E~c5||~su5>MapGv-_#`|XFgB6$denMGrz0915eu}gE zn?6-OF4bMO4cP*R_TpOFrXfYK5y@Wa*V5aWqz^MQX)ysL>auga$ z5-XIeDFlf4Xj7%`ixx$e8c%TB{TfZu`(!lwk6WHZNDfwM{~-B+J%Wak<41!NP10E@ zY&$hZFl46HZub&P^^4<6u!*l_kAk3ou%VO}nLNiS-ee+q(`x623-NnGu1@)*TR@b3 zje9ghcE0yERd#-s_R|vp4~0==!cEWwbgBB<6Vk>{jk%F$D`iW5JdRphU(V&Jq50sN zd2+k2SJH4~-QlaBvC1uWxZN;Hb#R_4!3M;e!>Sv0!t;v^H4S3-+E!I9;2+l=Gl>DP z!zOI{IzK6z_5m=|Kz{N0$Qz(VwH-9sXc5ORV9s&BepY}+SI)|sgBLopvpwBO8a@hO zhvncgR*nOD?rxGq4{nl2z)g~!dqL_qU)=qAaP%V#uq@z%2y-hIP1DXFHG(nD;F&cUkw|SZqQEMF){b=N?6Zl9?`e*&M59II zI6Sl|;z%?i$DkQZciEZx3sEza8m%gmh9t!a-c99#RKe_>_z2;5_BIfGJwXC@5*Z#y zJO(7Trol%3a*;il>%2uP<)y4`p5shk{-#z`J$K!>k1s!3@DUcsDE;*#3Ir`eB zXJVoqtBo_-t{!+zb@V?kHPj}%Ur7o)DCYzy$0|;87UXod5W9OkfOoccy2O)2o7KEn z-Z62Dh$64{{K#T^s-k9N9NAS78NB??e@1?at#8T%Rehf}*YPVx3}d+^;v?Fy zMt*)6uu7S6`!|c-$1f4O^mLMzzmIcxyqWwGap=A{OjZvw!@g)RRgaRj2SH2jh8t=D?6qMWvL1`Hbm zIK=nMSuDsX+$PAAt?kK!V0%NtY{1(#-*E#FI1|<{agl*_$88E6;hU zkNpV4VjPlM60auCe3gy&sm2!-)r$;DAJr|TmUkFah8eLzQyFxddIk@Xi}IE|u@cj=^wES8HODL7q-;DB%`|l=yO89(-+uU;iVdhvBetqF z6R)a^(yRrk4NrWqAW+=45TjNKu2q~*Y^=R+bac{yk?VW%-AB7U_~>)sqnCGItb=0z z^wA@<&OnCL9$r$Papc)hS&GW>H|~XN@k91^N0R^+R|MU~$fgBP^h|BO2@!WO?Him7 zx1alz;i%n^`%ybBS|X4kfd~t(I6iCPm9Pr-vF&A7B&NOXluGhddB{0f^?@4vhr` zJP>_rZMbWSHf?jai^6nY`nrXgkH5rvb6D>6RiIps@n!Zl)kXpMUn`xv4r3&oiPH*B`*Jy${GKdLZTs5c7fQ+5wbx zFXncmGlbg_WtWEvS@H+DH2|;w#0rAm`eNlbA6UNQzp=xx}OP zEcM#86;#RX;Q5W*1_Pe0g-(zn&`0c!zc$>S7KFJvlIjZ4JL$8-9+E^P^hEBja$H(LJ1fJ*& zO#0?_U+s6Jo2{(dXUfPNx5ikv;s-rxPcl?~8!gb2b`bEiGQuJkkNd%7H3j&#&YjR+ zsihT=RH5s@jkV)zq{r?gXO_m(vUZgExsNBTRBcRhp2YzVr*8pLHop=H!mPZK9xn#x zQ+`AX_{3}awA~i0?H%QJ+OxCEbUmw3dbrF#n_=@-23Euy_2WoLHT~`YQoYSH71hG% z*Llx-OTp9odTC#o08uv_H)}f&oUp@I@ly6b4MI^wdbcN~Kk<%SjDBYHpvwp_Zq3lm zO5GmPxZX}dkID{}imZxOtbwh|VhstK4V_xP{DIyD3YwUP#TTU9qb) zbx;LGONWsKKuA|$WGWTQD>JQ|yq+V>b2kVk5*ia(#&#ql2}n8rBVits6xf zdk2w{l8OBK51THfw zj5zTTzO4yHvNW&O_J!uq{r&yDTPSf`x^^e$bU;s2FgTp$w?1A&6Fhf(UlK`tMaU9p z?T&1KNvx=3K0=F;5u;;CjROSSbX^PR$%Oe+kdl0lq3}v};Pm)|Af@+)nJBT5<_D4F zYufi@Avx-KIbtNjjOZ_{Ul@}cPqGC~Hvs^t782(SRO?@xW5w*7v@uAJLn)q;+Qlp0 zHJr93Pyup=nz$+zo>TfhO@)RNrObw;&;Uc~;3OH}e{rHB1smu!XY_vfr+SKeiyA-0 zz$n{#J7HWhW{dw(Yu%VF97wjoMLxm*ND6F_eLcWkS$-F8gCXS*tkvQw)fw#21h=ROrmKj$3IJ)D7EbYlx7dgbd6cT!<{y%0Ig6G+(K*=LmXc@ndS4@(dt0bAmMhqT0J3ew!K)eyBpiwgBu$d z2#6lwg(UyevvarT@Swy?2QXlV-}9ClPXLB-Ao*HsR=05WEj9(_>fve$I)Bs$)_RRX5ZSm}hAAci(Yy{N>A~1lpve9;uazOQUvuZ;&PF_R{y5Igzj~9rt?^p zEYcwX5@Yf3bj%ZsJtd@0(3g1XntiD+n^n9Bl1yd1C4LXV8a9U|IzlAVOe$C+c(`vcXvvsG|~;yA>AR}jdX)_ zN=ZvdiAr}PAl)U>-8>7yy>ajTkLNw!hi~_NxQ^=_lgTyLm}89JDJ&?gQ(=Wd8wvDHi%RgyPEnf(XANMpM>v2$F6R#f4O{{i~&-7O95)2%@VX7u`huf=A zG_89jReAj&lxXBJ6XHFm#w_MeHdH)w zs@@tN`AlFv=v6Wr^Y`8i4Z0B8=3?K67zCfh00qSGhKzym@5R2KC-&y!BSQLY=~R_* zwrfLMgCU@7LK-2XmmlR8xYOmzMin_v92dv+(XK0rwBA|aE$hl6kBF6MRgt}|y#e=+ zJU!*wV_}!lmjV6d1=ubZp5maQ8>VAKP5(~xDZ)W!XBU{XG!m0zl)Wai(F&7 zC44z~A=|R%^a6^tobM#lhQQr(6}@_|s}oAJ(kdW<5*$1VWp5qYE5*lBhEc-W!H~m1 z2_zE-lCW#3UXFGa9_5SspsFGqiP=oFcZF6&a#o8)Z{?N75&b?n)(aw8iv`a*?Q!;H`yKe2yU^~vwWQyrfk74;G1q37KOaop5J<4UNQtK33VziU zIqNx*w`~(|r)yM1sh*XLjf)c+>QTU{oBEf#mfn*^g8>%JOd$>%)Z%`J{-X+Ms;g+n z=RTVWo_49Q)6>rCD}mSAbCfB06eBt&^fJ@9<9GhXnBhzyDxRya$b;PPQ$3HCmIJNZ6&77lo}(aCw`p^gfGu6{Q$K&3mLukr;nt>wfs9S-4~ zQu$OUV6I=N@`{t|yrThJK-PwxL$t|Z#C@N0rG5?!gdg-2#!B4^H{;hN#k56?T!1OC z2w01Od%Y`TO}*c>WI&dXXxPw@TnHMz2L@kfM&WBKTr-=){wZ7Vs)su?UHlTt24@a0 zfk{^H><40hKUWB8|zO8WmSFcV5c8OLXLIP~LOibKqEov zdsd(x9at2H&D;H)_sa`Yg1L|yUjv@3lte-s z)X4e<;F>>8OAnEe{XnU#5yG~ZA&3QiEkgRWvh$OqaCd~77r@_^PMBeIBnd~_#b(=8TIS})4^Io zS>Xa5lQ~9gRpKj_QB@fki;R$ncx=KPc7Ol9E9*G5$YB(tkiIBF4cUifv5&8c>L}WC zL_{_YXyJ!kmeGs5&Qwg$4GBZH7t?)gr~#9QC$&^`HLlh;F%?qLaC#zAQTfLXTv$BW zycrNht`Dhg5QLTp@C!O0#fG%F>zbdJ@HQ@6e3w~PG-U{-LZm(9N zA30E9PiVk&?82-F2W()R7oeT4@Ml&Brrycko4i964~mr=Ey ztkbUtOaPPCw+UIe(n{pv)XdpsP^+<2>pg^Y>E!4C80`FIXTwtg#Y#g-qfLGff>I-m z0P1mEkp&gjH?+4V)gDcUTRz?*eYu+u85#OM zG!(h;v6Nb(t&DqnJM=3O3g!--Xp<2y_AO)hjfR`lZJJ4is!%7zc|S~9X6OvrSF z{B&%DR~l$w($Ezg1Vqpo&_gE1IIVg(^z-vKOd*X*tSnS=JZ|E=r;WU%7AdeQLDnNo zL2WCAJ!0l1h6HaOaZpv#82z(7c@$Fe6cjQf)aaip9I)}wDl`lq`gxzGxK54{tHw4p z6(3PQp)6M+$>#cjIxjZ3^slkoxtfJg0VLENb10K-XvR0{=YW-zAZ~L8JVdU3oe^^SvwQ> zr{Oo^;B7mtIhX0gFneR;m+6A$(=?A~JT)=&1`mZ+!WCW)3;+y;kQBlJom2yu@DKvz zp;_tje4MxI-;m0*Kt$O_dM`hqHNHp2j-}u{@1d)o$sZMIm#NrYaGz?7iOvR=R`41<(l)i+NiKfn%$<>6UrXY-dggt=u;%<*Ihos z;8EUG7&MT2SIDn(T2~x}NOe!eHWf%GAR{@VYVAgd1E|50_x(!;S*T!9mNt0bJNmK2 ztaamSNqX=}adt-s4T_)kWx=Sd2}~A>8Q3D$gwHRF8pphJDsJ|=8PqMCJjMbm*K`(m_fclem zLAGaa)N+OE73h4v@Pb$g?JB>no*Gt(b)rh;B#Azex1lzO%l{V&Fa zuXF1RdFbE+zUFlYnf}N((Zr$1GEv#sDF4|5!E>DqwHeN_9O7wo3^BdW+A@6UZlnSo zVo~?USHAg)#AkrSPx{%mpe4ZXLfl~=(s08YB)YjUzOrmWchO_gR`O(26*;%5SAxbFJR! z&KrCsfv-1Pm^CCK)ZhGQ>M^<5s2nhKl)~nGT3Xg!fAX-UhM$Ci1cWgud^88T@N`Qt z_7z;oYqacTM0doYGeKx_f7trQcz)#%V|Q^eNIe3puk24J!(u;`F^H7_DtjrpQ!&+! zu-Pg9rScRZCZ%y^qbAs>p)S|G8m=J+7u|C1xMg$py~d~apYSEX*UvsQQl8!Da-KQ3 zz~gNC9>_^aQXcJ39oZ1%n6tXyxTv_p4l}wd%f^A{F%sf3H@gsUGV$MC+`$iY3WU=j z&3Kf3QEsf`j?qm?^}aF_Ss7D{uwN`K=ZrGpar0oM&@>OEEx}mnQjdW5b{h^cQu}(I z*iQVo$rhi4jtqpZD);;nH1lcbR6l}Jg51To2(J?Z)05Y?-|Z0>pZ)lfSU6e-XD>eE zsGm^J0I3O|3#D1mc(de6t$oQh$xdW;-gMemwV{izLC{pY2Mf!FhtS#21(T`#4z|cw z#ruO!4^gokSw4c%X{YSZEV@~Yp!=J;)5f@?^%H@KOO zq`xGHlE&Am#?GO23*AUaXd`*@pw%(cYUNA(@DWh9NMeEG<}_j#KAqp9FWONN{+ zTK`J82o$bp(8;wP1jT@x(D!~`{V1l{STh}(6`m`vqR!03Tlc%8?GQ{_r#ln7d)!Zw z!H|nHLU6O5%+S=N<4o=s$%4ha9 zX~-~z>=tb<&2AU-d<$^{QVEF4#SOjUO1iK)8o@g%t$i z(e4yQ_Bnn7Jtk(S@;PqS>^G_#n-}?fwJUgtAaECKg+l7o=)tf+6==CZ@;tyTLu@`9 z22WrO`3(BGYsA-dH<#EUg;~FIZ_9F%Ubl}Vu_?(7BDzT)o<6v}l4{DiQ(Yzy8lUa@ zrIF)69>OGk5+*tj<^;w*^uzscr#HyQ%5$nab!_%yiK6^MkHPE&A&kb`_ZEXk;zM~6(Z#IM zb(9_HB8Ux{zXSiNzpGQTax{MRQY>pq#B^y+d21sKeHR0l&f4Z%zh3+qNkP9edk5yY zY@@Dp!}wE%3fYtrR_8a8n9adgpKk1EiXH=CdJ+Hz5P)3o*GSN()3m;(Pry$uwc7ff z5bE=YbPwSRK6x4wc={vQ)pO9+zrM46zX3R&Kl9-FaHn|1Ss4ez>t86B1JuhIQw6j< zzOvZ*^K>U$?3dYg^2IOxxW8{@5^olX;(~6C{a$TBS-oZ#8R&>PFw;nFW2?uQo3d#U z>GH*HY`!n0U^A^sGj^sUaF<_AF#cSn{N$@92HR0z%WM~DLkIc6>l#+`2CL*gzLr_* z_>5$DmjATDtmX4wYM7exoCecx;f&IhBqK96xZ zw!ZM1c*OfO2CaFUdAaews9lGy|8R4GHsf5>=24t+Z(?of5QO!p{E_A#|4H5uiDPD) zm&~U9WMiG2f|mvc+0_!Pa6OaMh?HCZM}O?ulj60$o>8VH=oYU9X1Q9n z&s(O_6WdCg0HLC>7&1-g6S%g^NFk0F!wS91qH;{miMP586cz~(iIs;|m#D_A;r1FR zLRksqDJqx&LJy#)iQXHr_fo+p@LfxAGVYL4PVfuW5C@9nQmwtjKOK*B3c2tWZ4*)l z!0M|u70bp#P9P1l@)=UWWKDuEMx1zLg*$rnFDQS$d|&iRDJ#@7fG%3Fy7a&0Jc+3T zPDnouU6f-~df%<(Sb`VdcUgC|f$b{R>noWjw2BmnXZ{Blr2kOCu0PZ;B-g-s5xDiG z2e-S^ZT0?kVD_^^cdR>O3mqBvszig$p{%i373^|HV-srjmosk?sZt*&RsBcU)9G>; za%g8;ZwrT_RHr**E8}KY(W|(tJM087#sSq}%p_seur|mLaY+Bw!+xnY)bhA{*b{I= z0QUM);`=WM50(F>q76fPI<+h5s}YvH3WN8%*LnyfuvExMt!1{I4;Y&IY3iT>aH9X? z{Xo>gDn3(7D<;Tet2K%{+~Q`O^=0e*X|JUe0i38oBurgV&dxhd#K?y!zZ z9k8T9B@g+K*J*~JXAjf$^mZT}31wT7hV}Izov(w05v(mmTrSREGrXz}W=8<;X#fSK zLgbP6q+hY1QR41_^rBxW>nM7&Kuqx^foVZvf}b4suYn}>{_i`Psne?F1g(UYjEaMQ z{E~P8za$~FjJ?;+)PhBEIT_=z)AUkUjgo^vsXLA>PG}*XjW36T%SNC)N(MOuPQV&G)Rs@b$3IBqv#c$B`SCD)h*|xpN=RF z+6~T)7BE8#$K<9y?pzM1`@^x+%1RbNMj}umq`%xr)D$q{Efs}MC@`oW){8z6y7fP3 z_=Al8`K7Mq+h_w=!eEP^2?RRX#T5v?AJ{KxHWuQ$Nd;nZ&ZcaPIA-tBxc@NPV|f zDJF+gkY5}-kuIvamTSgf3t*sXJZ-_akR!_hV6=j4wtwRy2p#e9G#4_Ko=z$q#3V?^ z;rK%doF-*Ix&DMmg-E?7)>To_j4r%XgZ1q@pq0QCSvuj=?U$}S)2x$%I2kL3VR1FF z34K^t=~0KMT0+>D?f{*N2$g$hULRss${taDZsG)}U!Zt#(>VD;WgWMMsCr8x3oNnw z(q<+n|8f<;@cg+k+Kv~Sls^UvL(o zM|^XCMW8Aphn(txF$b4#JxAYa1vFptwoO6AM;6@|#VZoAYVfFn3j<=S;~(%))02sK zM2Ajqn7w%VlJ6oL`^@R>2ds>lEVQNRINP=P3us!GSRX3m5_=A_XF+jXOS6Gy$nt)| znMlnKr>EYN(-RvwJz-4LX@7gP02wJb_QirP***>Vwj~b|RhQ!-etei!oMg3$RxXn8 zo1r{5#+O~7Oirta6v!U8NK;ePH-b^@T!Yjr?9qPbJZiuV?-zZ+VO;2X+EfT0Td`aP z>K+9lkX{&cZnpz#>VU6M&+EjimwQD*p(DQ2pwcQwe()Tn%2mFeoYP+l}b4XzkA<-56wTie(X07Hj0>oPbjOdrdBm=TI;Rs?~Hu`mj zwCkZ8Nn#M^qf_CsIUs(_+falYKq^xmgriOf3<BZN3H zwn$K~-`NCpdzcJeCG$-@%v8mzW5rPnN~8LpQfrC>WT7k?a;* z9g|$Jch#rw8_!;Vvht^$&tXFkXne$&mI9k@<1Y&7mw#U3Q1?Qb!s%IF&BUsauhkng z`QTec@pu^p%oX}S^b0Pq+c&rHFcne;1q8h+g;%rn8;5O$=P}+j^3wvJQwlYwO=TNn*}T|R z@iV~8s_5YQ35i=QbONEr3+b>;XL7iHFQSd9?-{7Tc7UR`o=+X8{ogFpa& zf@FlMSs95R{_rZENFxBGiCZZW|2^mXju%NO+I*D}$#)H{>2whDXInk}Gs2}*SdQ(Q%7Us!l|2}%iu;8i<_-Y%aeX|pLE3%2Y-7t%FRWffBnmf z_PgTkcC^$X2B>0W4StvP8kJpuj?)iTqtnAJAw$4LQ0hWgP1X$;^Gg(ZjKf`P_o=Sn zLwwCo;v)p&Yb|nT1$B9{^uIAt2fH^f$7^*yG`%NBO=`;b)JMH5y=DykZiha8%r;+T zN<>+zubqOmz1+BMZxhS#Ie!ulz!KMoL=FrKi3iF$J826bp_y$|`p~SxDVV5q(o!-kw}#quj)2#~bB?Z@&jd?;YFT5>&TNSDEWGEv90_ib2j zyU%ckS=cA009Xe5PLU`^F=Pgn*F6|%-M2di-PoRclIyhFN}*Hk4X3v$U{FpbxGz8N zrPq9w)vNgY9VMWs9E)HEuxRdd|20Ay&|0W~gW*Fh^s3}-D4hnci~;$pl`aT&Reatx zT9KQE=!GA+bO-%4MBG0&OR~>gto%gQ1p{!L(7wx9h^NGTr^X0L`45U&ab{8StAxYkZ$`Bl4Bs*<_t{c($dev6 zk6dh2VP=6PwD5wIT>SLRAfaQ5t2hf!4jFs&4gWL*gM$C0KASg4NX_`;cj5jMi6nr; zz@qS`f5~I3omzJI{MuI8Ra9QhAI4cf_uXh;f7ntWsQDRY@~)-y7;xkN5g6kou>ROjtp5n#v}T{fN%EUQgP+5K%2<5L?i$e-?^P z=7MJhQq7Np(6E;u?IvF!WXr0}{>mV+CowEsjYAho04i zUMTqm+5k<}Tki*L$WOG90oqE-DQ+Hnr@Q~Zm#F`TB=i^J4H(rWQwHKK%rCWD)Mm9# z1Dfc5f4y1sH&A&bQLBD<2o1A5F^Ccrf4db821lU&7j8u_)kf%B{7E>;q}@4y(G~wc<-&pg2wNpNi84 zZZ-2dEz=xxIh+dXsqF66|8)k+bXmlTMqs=xQe6ri^vD?|OT_#K4+=B$H33V@QGf1$ z9-nxm@ObYr(tZ#|W;y2bVKep@aS)br^Y7Jt6bmW4G~sZhLW(+{jV|=9wU;Sn$4&6d zW(mvGE80ktQnMcB#na{tn~@w7+WSEfSg^w-(2g-ETyAK8DfQx?kE3qzq)yBEUzep3 zrBdHrORwT+yF+FePom|FXeCX2%U3K{c4GKxdGj(1vq)+i2g_(9m8E4Uw@VuDbDn>> zYL(F_m+8Gjk!!u4PA?|{tt`tm6=`1g>VaS}OZZn5F3q}X{!lD?a@~X}hPPjDMbl@L zFwpr$AtQ`X8c-QUyW;wANV|K+7**CKCd62WNdDP8&D-AsX-C+|k(5S??z60nmAThW zqY}Ma+)v%fhc?y1bvvsljKVePrcT*Qqdp{h{>OiJt3sQO*q#UGu_6s0-^WZ{de4MH zV)tY8BDYLFIr+ayHX8~Fhq+9}IxQFbhzU*hO4Z?U-#+VyYzR?+gMMz+3xJ^vYHm$< zx?*hGpb3&=UI=Xt@W60a0az#k(#FBq!6Po27oBJg|H2byHeuE>EU4B5-W!>bX$^D1 z(>rbBmwD|@^7fbQVohv$#VhYyr+;2IgI%w8G$%?KQlK*rcoadR^LFH7@of!S6B>D9 zy5*2^z{Ea`@osbA{bGM3ufL%Y_UhJ7^PQqfcgOOO=NX?{BR_+Y79abk(ovqbyc4f; z)2Cl`HOhqeQ@Yqp8~Ic5%zxQd@KfsKFc_^;rQfKY!}LFt$cv?7&&~g@E6yqmmCS<{dXMU#)fg(V&%^1M-N^(o%G7Z z!~Z&uA6yAc( z@ZF=bQ}@BtRk^54*pql_ZB5iq2He8GrR3^Y%$dSz)?){|L7De`?HM8i!Z z4i72n7oSGzFE;;pdVJ$J^>UMSSrS?$H(HUg56{D>#Kquze}+`;3QB+Az$v^8vOV)fvkDQjbX7r1x)XLT!k{4qAsN(zvoBM(CyE6OCj1Y{zeK@ zUfetIdP_>}G5$*nwVk;ob(ZDNd>Uy^D@JP~bCC?Xpyx`@c~KRuWHl{GpHJ8vS)_qa zTW@piP6$?p?#O^!oDMr8IF}WS?`Wx-Sc~XE2*NNTTOl!80A9R&B^D_D{B!Hp8rQUR z`eygTy0_nr6MyrgG&t}ix3%QwzgG+ZuDo_vj=vc8iW%)6ZFo=NEU_w99gFBFsmhiS z!*&CeYIhSfAG)ZSPG7c)X^?-B&CkuF$f&dy>sd}HAJGFksOPN%YpQvGY|)ZgWRJlZ zPjOyr=J~7C$v(_)iK-4E^6(D;W}x_@w`@<*ZLmxGbMy-+{v*KNNia1cg9XQwi&#Q5Vv{EbK!jB5PIdp&o;ha;KkiChXm zuBrmbGT0ppp!c3Gbw4L24bY`jyzp0cj6M#_8F(>fpC`oXU>x9=9?dwl%sRcWU2-7B z=K)y>_DSXCe{nY~;up@sZ6z4LWB_*zgT~aSJ_kA#u^mxxwceFgiJ-9P7sAnokjNxBZ3R6glrc#V~}aYEd<=6u#i^-QJiuz@3QZC_+? zM`*qsLgPDE8v%A7c9l+)tGT;)*rk%!CnJrHngu|wqXfg zIwt)a_&eFN(nf5W->9h-0su9oApO&b&xwHn93`Zq?x6g=VQ}&yD09EzWa4o|L)n7e zeF_B`gOIPDmGpeg^yR~7cCcNEI3a#BdeRIq8H7OyLR^e#$36Hkm@VaUu)Zcu1$PpB zU8K;=BN6R(Yk2E4L!di>IWl5*0#=*<^<73MqSFuU-c0NxR#x7)&ldgfr|=OGTDa>s zA0pCw5)m~Jk;N*5EU3ianbYyv%G}~1VM+1Ti)(+l+ZX4f#8E$(PqB!;AxBUh;^V-z z8QDvpdUX|ncIMXDU&fndbD&N1C_xG3K75Allh2?5J_CX;ha0r(>1UY!_M<-Fb7*MK zX<+upwP(dTB$LwbXb(aORiyfoU!9Ma&MNi=hFTE8yOL@%cZ6@Y>-%2S3TW7ryqcx= zOC4)+CkXv|})<1?8R+10g$4+-v<}w?WEo`rME{k(_*uo2ui1NZDeD0F9 zy^dxk;wsxBDGFCw_*I=bY1=DVA42qf5+W@S;-`RSm_OfEe|p{tqRoFf?GvHZ&QynF z$IozlxfXvVDPHIvH8rxoT~+qNfg0VqXG6$)*#?;#a$?V?C2eo#`#M>n;6B%lXxG=` z-T{8xzCa@T?=xYp!Z$0Z$uY46##xo4#^iQL>DEYI$>VOucDBwe;~mUq@hheULTCCl z$p;+UqaxpUo(HR_yV4WMWIxD_c_Nn%ko)Xe9`9fIvLBToDK9s~*wG7q0{f~3_NZeA zouco)uWbgL^LmTmPwmoESaHKOmm4*>vR)dvHlS2P*}VZ_4ITGT=hw$7)}o~>E{*-1 zwrTgmrRUXGl`0|vb>w5?AhM$CciyF~frLTX-stuE%UG`-voaKoWy4jUi~- zlTG4BH9@B_>i(NKbtprDur$bFy^B{PhOsh{@#}6{;tC?9xc`_}J@{Am2mEdpv&sO5 zV((`jDQQFRLI)K;zj%R{#OuLD@^XRE3~-(XC#QI`KzSE+Gd%}>QYau6vQk}LdD6fs zL-4bTvKx`>C08?;up&KHjjrq*Zwt%z&m*^F970DpS1!)X&^gRTsr`qQtau{(IUswN zixQyy{U!SWG{q0DqN2h}QycSmzBNC2kO6oQ_3%YMsK;Lq{xH=PJO)lTfytqMLm-vW zQH>5G(?|BpWo9!eVHV*Kl`~zLBJ@p2m6~}Dhe^mHKcZJZq>dhXxR74dVUX6L;oF!A zDsdHeCEx8b%$Tqj-wN#>PW9s+>;&6u8`mW3)k@aM_p(|Qp@)YDf4QDSYl6OTqV?8FHM8wWbD9N<2jH%KaEdxP4b{QckXS*_X%n~eg-*(>h2(i$1<&&D- zVq*GhZ+r{PPH}LcwrOOW+ZK*i9p;OAX84g4lFBTzqtT{Oob9V_rdOD6T=FA9YRX-t zyn+z7xtRMy==#gWwP0Nq5%=F7xNJwnFN_2I;{I22xhe@<9TQ_vilY1^FE9|?6zcf0 zhnt2HR#Q|eU;F>=cs2~CJHZX4B^qNSdP~FO2$x`i^_jSLiB_X<%$p&+1{&P+8EUmg zwi>1m9Q)^3!t7FqU9RU6l^3$8|V&Z5}PP=Wnd8XdAW0is+tX?_{SN`oEVk zf701295UY1q98XK58zY`uZpYTn4?8bZS!*Wfonq_Brq~K>0{j|ZZ)=ALmhdrW~EH( zZ*AM~Rl)DQYJ}T<&*N^Eit<;80j#LvxBtnkCd1Om8_gMg$Q}a5Gsy3>CS?)1CWJoh zoI1G|G`5?l0u(N^v^DtqqlL%7d*Hp7=L%!V5t>&Z;+JO9E<151E5OfJet$$H=y&Lw$3$aVSsij5Fzm1LA^6tJc7 zV7-Z5mG-as_cYRLYCWuv9yw6bBX<3r+k}CC*FPap??v^LH$IZP6r^YrVI{EWgcbm)e813g42D_mXA@n$$F^V0V(h2vIoU zR%_)HbBlx)C}`m6p=qvBOX`q6ajp%mL@>m?K@K#O05@~Yhmfksu^lVLM1`hQZ(8;# zO2NCkmXSXQNQo5~X=*KkRRh&sxc})UZOV00R9Y4&GZ1IG^Xa@(psN%U>Fl(459&kx z2R5uTT3K1i0Xnp|w}OjWq{w}pYcp;@O3hm?_71W$0Kz8>=@=`ryA`YBU7k?aQ6;9H zkgz}uF?ibD8yu7vfo*DJRJ?^@xE^$aMF|l%C>c~y2r_6$TO-WJ0o>Z4ewFn4JfJUm zY@mSU#jbfWS08z$_CUX?No0TIXVz2OD#Id&Rr7~T5k5f<>Iav8Xfa1*z7b)XI5#J1 zwWwaEhFI)LbR#FBZF2o3_2sn6z1xh18kTyMEihRw>g%s9whYu2SysaO{gSI_X=~Ji zXpcw{RF?j<8Iu>{$WRDVvd{fSIDPH7CphKg)MkWV$zB0OVR#dcdydnmZC46WD}hOCs!D4fwE+D| zXABO45BlcY0zg^ujpdo4hYEqfj^ga}?zlkh5l~Q6!A+4CPpZ`EkUDHl)ScKR3`%PAVqgq#El2V+Hm4>i{*?=HmO! zU`gl;B(;Ua_blV{d2enAybl3D_^7DlXpPoLZECmzoa8&T7q{(X{1`I>t(S-#RXfp0 z1B)k4SXnk(Tcwj6EK_zgr+BxlhUV!@UtnE4zvRtuyLm<~=?|)eP?5R$?9^3FjHaE$ zJRG6>PlPc8!g5+FRzS<22=le&g|#eQn5qx>FzKG=LdY#vmJbnxW45l^$kAcr^2=`mgBqhJSzPJ|sUWbF94j|&U z)^*rw2cM#I^4m8o{qGZmDCsKO!*njt>)zLr`rLN{wXdIN35g-Y9dsnrkRMu@XAuD8 zrj1Ok{{Ft2ArF=SS@LM?INiHD5!OFmI3Q^MyaQ(eB3VwLM*ZtG(br++dm!Mxv3Pbc zL$QM@lYfnZwg00t?n_HsDvu{!VLdn2dcUv?+;`_4u5YV#WO&H>AzLj@`n{xD6atEq zz>wIeb2r_{%cf58h@Abx#V^tCVCy@!c}**v_RUVm>f1t=$|d>SpF7(8VZ$Ilk;Do} zg4e~={#`!&Gt&!jn}D*)7Ss^v&<5u6dG}kI-qHxsJI<(7Wt<{SveX1rYl2^5oUDb& zi@Za$FH@xvJP5GkQ|Gz)0$9(!I*|bqcJ73J+TKcTtCfQ%-!+C8_uAsStqTk7>rwBhkY}jRBBo^v zuZS8GdQH7M_q|Phb|ZNXX67sd7_27Ut9{QWYv(_HAGu|x`_iFh==-qgnVzU;2h<}S;Z`H`uOF(7 zHb>Y-1J^d`q&YfDCRTDz>}&GYXd8x~EHxsk=3VduuPb?x->auSuAAVKPv!tV8Ddub z6KM8d>vqqoo%4jII+P_}cif>?xp^~q-4t^@FuDJ6^f+|TX$0=ahYDM8+H7qWlYM4m zZ|00&`2D#RcM+Pd5lmzNGcp2hCCbE0IR-b*#{A>Q;ft&FQ@Y(VV+__JmV8W!Vl*`sd9F@f&Ou;kKa7MCdc(YR$74q7oal@Xm}RQm%D z*O{P{`SDgp+QlAf;BHZ^GCvM2&8Y%= zV=!|t|%GggO<|W+diOBC+ z4j6?MZVqeF9bvSkQ0ZK=NK4G);uiTlRJenvR>h`f97|I?*hN_Ssg}kOQMu~q@&Q3d zUCB1j@Lk{NbOqRTY%F!Yw=%Njxc8Hpr8MigdWv4ss{QrJL3;dRW3mvICU{)(wORXD zGP9XSMsR;uOCP+pFX8X8)&bt`|10j&|B&D5Pvj~TDU}JYLDjnm_m@{86ASu*fw`%S z|Ccs0?5RY*@;`25h3kT-3Bep?D|~vhu|VGIr8!u&4Lf31*7r+Sx$p-qzm8MQZA&(v zD0S^`Pf{@lz>_o}{Z(megJw^>61jJoN*k)lYX(*pScA|4-M6cvp|7b?#S~p~sNhvk zO-D#~MZymoDgN22+HntzB-dsM%w&6goL&}T8Y?__1FH@EKZ#gnJ7L&sH&Jxe0Kw{= zYbpPux${8U%A0YGKjNi5crpxvu{X zR~j(k$EnySciUoW=`taImIcQ`>&nM|TRO6&4d3aywMIVV1j(L0rBRxPA^sihcP$Vb zyNmsAno_mUqKz;Csn>luFzZ~Re}hyTz4dRVZ~8QE_c{HMsBt2UaNgJMBPrfr%t8j< z4@JP+_#6DemsZCUqtz0-$VVFPQ4Z$vgeSFP5G1B#NsXWViIpoOlRuTdJ00}k9{Mtk zoPhD~-wu{Sl99=tYkiSp`o`-4lGocoaZVew2O3C_dgd9YR5LkwA$h)rMe3v%*+DqbN@XE(Mj{L%=!s-;>icZ;& z!m%tnPB`D9Djz!(q20s;M)wze3{|Cepp3PqHxP_!~w5$UUb4?eLd@r&BBH()%drCk&S>-*7r2RGL*+* z@-84jMpMV%WV#p%Z+uJ;#x8feg2&_B$Wm~7Kdo2})_?e%^Kd9uJQ2$Wh^2HF3HuA( z1l&Ob4FscXPxw>H@K#j2in@Wz&yqck(_mzk(#$G@efj*khV?z}v2#N1_=~_tboR z7jAwM06!1_4>Ifm==fjn7^9{4#3Q~B?N{+W5t%&aWxI8b7q8r24~+e|Te!VDzRHPO z3@+Tsz)o)U;A|`w9<<$Mtsk0;YAwi_NBD}{^_HV>&0zAN#VT_5+_PX;>lh(sSD3V7 zs})7JtJb&w?K8X_E1R*aBAElbv+Or|N#hzzbk*9gHk}lMOO|R0voU7w9rK^aYxw7etJ6;XGdxJHq0=^d3vesA$HPaHty<4#1=d$RCLB!nx9~ud7y9utFTOa_u(+gn zOJYva5msWZU)t-tX`|NgYPwrHm{dB@4>J<#;$$MSRR&v?f5T+So06<)S*Va$ORnz(>>+JPm+?q zZbN0+QELp!@9{59CvaI0y+j57HA%RZca7x_K8@7p!Nw;f=*);#hD->#lY!U}^-Nqo zrO%Bb_9Y%>8>u@Ao;)A+49AZLo%>I83IRH|$t7R^ZpHqSM+1!2f{zMEpD&QAKK-)k zTG8e0k5HA|_w~0U+EokZzNqi((^|LRY5WjRX;Q(tiY`)%K)9Ys7iJYrjgERq{RVC% z7ALDuP9yGEm~~wnMIE+Ft9A(s#d_9PHdRRHKXW^k1Eb8HMDckk_~) zmFO~qfk@X~){d|V@FNDBpr{Pl+;uHmL`9K}L33ufy*6mVch}I4!FlU?27#OAzsio@ zvSJiM(Q8(e0I}6uX%&3-S}G899}@Nr8}BdT~>FxFHOz( zBrh)=%nbUkiZK(z4%XpuDX=Ou8tE-^IeH46o=^N@#e4?cop+Wy!K6dvqr_!MnJ5fF zM*{W*roAL1rMH)2#HG!K@3O^)W%c5^ln$C0on1=;k<~^k?5bE=?yLx4?-{C}g@!jD8_`tkLjh+y~A2a+r+-!38!UHQ@<7kV=3v!%pxaP~O-Humt#@(v$zFFeF$g<~xw%;bK9mMuWnrT)z{Rb>k3uTxZv0lfYxEqJ z`SXaNFLZF*lFq^jl!%b;9E4(RO`k<58aCo4d}9JJ_Nk>9cs41QG-ri?Sa2zb+eI(37+KM0|p_g&(|?Qv3i*HZ}OpF|_bb0>s{IdSyV?(b(cv z9i^f#qpbmC%wHuutHY6e67dI-1D?o!`lf3Od3*nLzC~Lfv?q>krye++gP%!+U>)WM zC(E9CL-P!|1TsRD!W*+W?lWf1aOfm{_1n8;iqsDT;5~+6W;2129|_3&ZI$N{ru_R$ z49LmCZMTv8bP`!OFcx#HBKp}|M!<3VOD7y(dL(jW06QoYfDP-~9Z9i94e}?WEco5D z36P;7z2h1>PeNI^ZA(WV6eozhwq1b`gFg2hB6$t%{{=%{EY(4ZY}1{dsF#}m27)(7 z=(`l#XbAK>buYG@NQ_1IXxzY(giWF)1Uf!#dadkX3ny}ziHxtp6}PzxvQeMVSrSlQ zMd(-y8l%5jMtiT&l>qNBjR=2z@mexL3uE)49~G0BJu1rzC>d}$M1z}4UTsSYN-in?WKd4Qmsj}Txwlgr(3?AkI&Goi1YR|$zK zIsTiJw8Bc9NS$hI#~7oYdLUTv-*lwX+-H)cOYi6pa?bMBtPFX>FkLpKw%$?T=Y|if zE53X#@$)>kWX$4uj~#U^O2og@d}*k^z@n1twl#;e#@%2op{v&aJ06Lt3&Xd4TDAfb zm06xW2!=ljFqtVS_L3K3{~zjyh=;h)(<9S+GW!Z3SKlwvd#&~ znsTUG(m*O6w@*~XlFE>mo{u7uN>l}un{kqd3UEjqXfIK`*f%}As1<4W@hQ0oE%s-6KU?e>A#FQhNg&&@GM8nu0xrou8cQpD%zk+&JIugOc zX{TL8r!B9X!L)1Tf18DRU?fGeFwd~2446y2hgIs&|DV&)@I1d>w97&@af|P#MMTc3g}Y?~p9uW^(A&sc z3<;@vxZB@9LKruA#bHS(H4xc`T?ua2v#UALu_kS+l!krEJT>5^`c?(Xhxq`Mmd z>6BEuJET)eKuYP3I|;vUxxc;7x%b?A(f|0Z#Tf6LYrXH7&-0AYUyO+wx_+|X`={4Y z8KQ@W2i9<`NZ`=sB*x>Wri$}FOnm>+qbVpTRfcmRI@?q56dM019!dyyesdLyu%P1+ zqZBLDPFBG)Lr5rOu@Xk`?~;xR8I|v3T|Iw}I89Y%6(_9yIXR(d;924`+XqJ@5t93v zMQSK*lwez{_Hw|YNQ*{?irQO>Q z?CMHh)t=yAQjYCNE>fE6?e09g?#Dzkyk|@@s4`Qd1OiM6 z$_EsxC^S)Ye`oqqx39^?70ehLE4KEycH^|-#9N{^TO5f#H zevchoh)MeaXLX{p&scf!=A8!M6?;*-9c>lBw$^}1eu_lg9u|aSisYYgVf?|@gNWc! zTNk7;86{?G@~*pIodLfB#&AvZGN7NFH1UMu5@Wc8dRwYHK5%Y|BYGm9Ri#j)224Kl zZj1M3PFNaFVPOWshy-Ah#jK*Hua#EN4A6$C+@WpW&(t_-O%7QSnie=!!^s9*IDxM* z`RyZw`Ou9mepid8SoF*3_$ZAq`epAM*!_NO3Bpkr;27*1v;iLQ2S<_Y$>$@^f|C9k zIq^e~1Gtms9GgBtO2fozLH%m}bvv5k+dsx^7;pyIQ2K@irM$&3t=<(n_0r;SmWfT5 zXX(NzNe;6X~traqrFrF(?IoZJ$V0<$-2*h)9x*9zv9-hs15WH zw9a^?rnc@{N98?6PY{eE07iP%4&J|#7w%#Z{|X_z+!rQGeJ*4F+}x(=^>+{Y=v8?< zqi^*bxY9oGILv#5OFc?ITyq5lxJRTPOHc`QuACogza0O(_Rj5Q<%YI|+Y8*?YYzgO zozuk}X3Y2z5?eRnfG@N`5l_kI84T5G5=FrO}D@qHKWvmJBDMWx!5CteOW*oDFAOEq;w+^#g%h?Xz+4m8)|Su{5zdI)Vb;KQ|y?rifZH=>J+ zvbn&p`V~mka;H#oK%onk3~mNUM|sc{BIF`-e|O=7iGat)dxjm?M~LhNM=ucrZyH=s z^bwy=!efb8sF2T3?0Dl%MbZFEYB0;MUk3ac1mz)$J} zkYFzU#Pi$Wlu9;g?In_l1@>h5qXt2JA4IrNkFZ!=6@n3_rJP)dpi=AFOQy!$(nJaU z=Y0pOVV8(2WX;^V9uA5bAS)sUtcWPGEcBl@p8uqOG5RrSBlN<^&}E=O36qnWe8{*! zD_m(no(XmNNPA424E|YHn@AM!N)NJF za*_rM1L>N^*7KYOxdp?Sk7G;Knsdps)B9EDZRgafOa3wh>DLhDrK$rTdWuSWJ@2nt z83;yk0Anm(2@b@KG;rC7tkOO4;sNU{dJWHgiED^K--8SVWp0g+KP+fDJh&Tpbkbt-?aJk9MBFBSb3J!w zQS)X)08QL{Dcae*h1&B}v`(-kruu@8MNHsva0Gm|sCZbd+WI7WHD&{h;9;xf$}ESG z62htFz8Yf5E?6q1DuS0x1r)W;ui*Xa4Awh)EqZLcZjyYU1z&I<@U$d>6?pW3A{qm1g=htmo z*0S{b*`z$O1kO`cF#m4!qGIy#8-t|J8>{8zxbLM1Q@>hi2iuwLepAa0oa$FAnH*~2 zQ+yv$|5ew#KQ>lRb6Q*gmc7jVkyxB$HG)s!$+$I2Zs|?Y%)mL#{bDzREVcx&*p!a% z?ZBOZwMI`_XvPRnJtbq@PEB=S1Dd@7liMf{5m6^*UrQKot9*8wZbGZ>`oQ-E%5QUo zyBu;NY@rw0EpZycSjdUq(~Fa0Hp;j3Vx zC=hcSNNSO|_E_Qkkd~tf1}JNJ#A#ckr%ob+(!NQ8lRoa+t?tzB*Xq(lf(6zGB(+i3ag)~1c3Uz*jXD{RpVJk# zUJCZurA=*efN}eT|ERJCMu6oXnHkO5jYQwN72#w~=CHyhdES`ScDQB;HWOyGYDFf- z0H@ywxbQ|fT*?Uw+qUKFGr1Q_M8ab1MsA%1mA=MXJ|@-TmPeEHh9@bX=;={~-|_Z; zNXt$Ve!Al2o|*75zU!eFxd_5f3gD;Z+?5DkfBVIh&joh-+$=qD?-Y-dZ6ECF?S6v= zOirC$a5kbI_Z-$3o6mVWb1 z&6d2~I&$3rYa+P`Ht36I#EVb-rlgRO$kOUReM}pz&RS%w=A^~jMx?n?*jruT5k)YA z92YPJbT0Jh)&DhMPk3S_X=w|U{$D^Iow!yl`! zK#HB&j0mW5pudq`uDoeVxcDqf6aF0@ETCF?!gjHX2&<1e-UvOT7)s2YH$AV5Pm~q~ zZd)zS9D<Cz zaxB0d_Cc&$|KHVqr#r|CCVAj>gR1029ui{XE*}zNwT(L5frMDrMxo{&c0J^7fyFcj z45z1IdjGS^uS5n?gC2vd;L}OU%`XB4JD)Z8*ZT-Ib<8E0J11N0&2HuNB%G_vb0=jbNPeU&wAsMvQ^YX?H-|rbi?ru!l){Xh zk0o&JwcQ_Vi?$oW*X=wHCmu-;uuIYrz_Wn=Wn4rrNe6yFMFk)IzdJTcU7bM}^l}e& zIL``hyf92gPi~CUXHbf;3sGT{5l)sXPn`=!MrWAfU7q??0$ETXkvzJbzi4jKe>E~X zDXKBVh1m#J;*C;VX5W<5Sgh1qp)_eJk>suC!AV1aJmCECXjn9J!Q1g5h$_D4wy!s3 z?wnn79Zgj3Wgp+TzuZGtueTyP;2q-|C}y_Do%Y`<^Yv0`BEG|-&btB8)zLJ*;ID45 zD%e9r{C(1Bea3W)p?y%n|FkATk5PvTM5QP}!OG2a4t$z<9pW6z^15j+P>SdZ@Fj{P zy7wi5r|p8LrGyvhcz&A!%X4Uj@iqa+O|u+BCa}2tkq+roTEsOUWCjS{PN9Qq3cF%l zYoy!iuf8MHEA1yljfiXXWttOBqjP9)+_ak&#|Z5;U-k2PO0k&e>sJt9U-q{l!6>!h zYv)m!D0@AoYOgma4P^C) zdk-bRMd~QNqN9hO4Ngi9EVyUMzLJQa-#$BG^Q4{-MJwf<}b2 zGXmw&g#*8&Kq8U+mz})5Om8kO&flz3D7S}cUEhRWe;ktrntjv9%iEW(Yya8GyPBB3 z@U`hHS1;3!JdsbYzN#UO;AzGUkK-7F6^SS+FdeeZ;W-NXkaVU|-nXf&FRWGG(#zt^ zX{^zbA`*Iy5*B5{kV=>)KI0+w6B*YNp+&_G={if7rrpcG4t%;2a5L zRe)DrMh>qkzH8=iV`*sS`fve@*QOlRqwai=n<-sYY)KF$HMSVNYiRi5zko3TAT zPCfx@!cVV&Vz7Se6D<{CX_dz#$EcZ2W!tZ{D$_bDhaTUKeoC|fBcDc7?+n*Y0F@&7<6Mwc!GVgd_dTTgm-0Q1_*7)b3RnGA|iy-Aq$wJ5P7ZMh&30ovJaJ z6t`{YsYzE?!se!NvXu1d1--o;Hwjr}jk377noj!lR@FJS20Kq~%}uw}Kp8Vagv1iG^1j7p z2{z)x`$0RN@v#UKkag_3(r3dpmm{QfE*14{>Diu`N01IgkBP;H3o2@R5 z^9rP#?&6~*0XqbB;QKZwm>DK}SY}%_cEzIXmrQ27H;O!;D3pJ-O_=N8l3P_{e%gJO zSAOL5aMa@lfhP~Z8x+9y1CRIv-o9kKg&J8!#R7wS)m-+`tt$`%_1Y9aq8xTXKMzz< z&u|m1?G=*UXpD_|jahbg_hMZ16ls4Eb1pCO)9fos2JZ!;k*$nIFjS`FwcxFcF(PE~ z8!Z=6Q_0u5;u00ftMtCD9j0PYf^A-XFCXp1R3Vuz9lW7t-BA0+rEvLq1`qAw_$38` zRRO@NP+e{YUU`c(WvCfb>7WUWY*A{q3DV`OTMytCJ95dA{juk>BTLW?*QIaB54Uc} zUKsXZ*n+4s!zQ*-AZ)P>JhlAr8^p(ge%^#?@Z2v@jCq0Y#f_>zm(@`AZfU5Ihs#6n zt4h8M*}_(I#w>bqieSoQk1M!Fp|?crEpwgm<-|tcIr*>*E~_!0X`YsnFrv(ple@a zPoPeMKRUR*i#s9{nA_7VOTfpi$YcEuflz`nJQcAq^UQk~!;gP~FVjS{=(bAb@_27; zZDAH3BXQI9@N$DT%DoJdxzgJkWeUN8K0{ginJ-!~7~;z7I?it!uQ++mz(7_hUe>Ru6< zk9H&BL@CQ`DV1gShS6rACX55qZ1R<>qkYj&GaGag5wJ2AYU@Qid}E9S@O+?A0b}|g!+R_gSIaa!%-P} zHB1(V!q3)>ZWP9ycqd$pdDn&6a(1%!FQhmyG@wV!DP8QE3x~EK&3L?zDg zIluL4u$C^1r)w34lZ~4vyM7Y&X?x^h_$p+u+u7i7yKIpA9&7{%SQP;5uTz52`z!R< zcg((I(F=viq-Pv94tzR+REd2N=g6VX1MhJzQ#OL2<(Ql8Fqy$UzbK?pV{Z{}t_JuCnf@&E%7Jo7DtQXGY+seo)rTL5?!`_n zHw+&6YnfAP&=YPjAC*shkJ;57pF_wox=EVnASRXZhJVdqCnhUlf6R+lV0(N|>zH66(rd*ecGh&<@{|Qo=K{b-&e&p^7#C;{oOq4>@_Nj;4 zG6RIPDnJ@ygkBWf7xdFp4Ul#|#?RPVWT|nhZrUW++0vMEDcu)>C3rhF=)daWaI@WT zXKYzT>w`{Fy5LEYv2 z_yUoc^0Vh>%xNl|I+%$}Ne)lVsIEoy1%&nNop(I$FG?8*J~aSe=LvrbIN2Zgb_WOW zaV17aXBXd$10F-OTXIabmSD4cCs@dt&e0#W($Z69N=x8gkPZj|Ry0 zlV5q*?oiM6SPY()Mw|{kb>CH6ZHRZboE~>rho>>`UUZ}9Vfe)gW2awU+gH|VJa?An z{cOSj-Dy>s(Dp0jH)J%VW8U=*A`8jcP@e%r&f}qy3R?zQIo-zy;lpdR?Daz*XNInl z&T10Z1i!1W((2rhBHjZX1_7!80Hst5)q2p3B>%59<6oV^O)YpP(Mzll^>0vk@lBs0 zk$*!FdW+}&KN<(!WA)@biuo#ytD#z2uz^!pz3S7KPUTJ|EvLz_)Vb&Z8&)7wAoF$8 zf?1x=axFnk-vpT}h}H#v*(|DeP`>yx zd@USLL!|gS0|#^GOTUfi8yQzclSa0&-nrR!>hn;+$>xVIv7l>~}to z5jP8<#HRTi;J|?8m4S*$Cz!tXuGnxT!U+L#$J`jY5)pVjPT<1@cJLoX;hkTQseY<2 z{0701e$X#xmQie-!kB1|G4u%=J^fFSpObD4f>88de)Sq!qkqU(z3m8=^-@V9KKtlF zf81^*1#eq zfR`wawgNLYs@%Xl;YUrH6I8{&ndYpL4$(&TjS?nN5qt?W1HY%mp&!KPC(8kiQ4NJR zIpoE(QWi!GM2qReAx{s|#TWVyp0Z7MKQX2jCntv%y|Puo7w4p;WTz?e)?GfdKE0iV zRhBZ>cR{LmEx~>CTuoUXnI4h#MPJ{by)zy`7x<^{LsY)>@{EtnPOkVnKQ-$q&rBoA z$VLQAggm>fma?7-`pndpp=l^!7K=CG63sYa^vGKDAucs&U^nZw7g!3BFjq^eP_@$R z(cq)racaOHR;A*z!{D8>57e9piJi3A7mRfm{rl0)frQ#ik%@wiqTtpVngL8j5`JKG zQ_u^lHVP)nO4rT+DB5H4^UD{^#m2_4pvNxd|2Fd>ff9j^Rm{GAHVyaSkm*VOTp!cxLyzfF$H|OqVHtAaciHA5^woR`!V~>V3n=3XbSaq9? zidXRFPUF??DVi$SQpBz?#8T7UiM%wl62Q)fOUDNie^*gWny4cAIor^0gq!MSBBQ!$h$iL- zXY&w3z6i2`XaXAuCvs{Tc*5_^@|f$<B)8bzpw_N9RI){m#cn zS>lT6L+C$-v);PtO1^an>352J9A~u-KQQMwQ-|=9_^2s^0GZ^F}EJ>KhO=eWPd z$UN7U?TL4Uy-q#aM^Dz2#6#cS1Y&*_)Q=Sjc}p|`P6)FS{Ky1$$&L-Nj-ho9how|q zDdw8yl6Ana0%_@-{`o!%(J5abav;v3P&Snn0kpl^$_GR24hmF=3KTSg0H2$io4G#0 zb$Z%o&rq$In6$wHVpK1M@m44yNULfYg^AO$_=U9tgiSZz4Xh8m`9`HwPTr@oI=6L@;`0frBDRB7bk8UM7Fy|<6(&)+v zXkU{UiDAj5H1vK&kk7!#UW1(l+b~%$dpeIrC%EN*EISU;*_uJq@X9UTNpY+zpKZHEnifT+|Lq zCi?wya)U6_2beMFPtM+d(fuxHGVM!#bmqjrt0E0d?TmU<3U~~^eLa}Y&UJVY3)rL% z#x^;6%=RBe4M}EK+55_G=r)cYP<dWh!yE)Xqim*)k5>Z}z%r@eZ^fk>k3glGoeRwNLJA+wc><5S9Qn#QMay!T6w#7k^$o9e+ zt;v%o7&C?~pYVP!lSyF}T$~4=8RW`qOTi2ExEk?QSs{%N3^D~pCYS%PQ!faQG2Nn@`Ton|;_?uJie6Nu_8c<&xm zuoOuD`YCoIRGEM%rEe%LWe0@ge-27L%?8?k`GV^+{pj_wkysz`VK4Ci~ad?%o zPplriE7Cpagi1}PAp7CFdceg$5>l6h`4@qAC=qF4(o%RD?yJEWd``O=^S$w=lSJYP z|7oSyZz&l{B##vvps1Z@0*~y5%g>oQXLN`nS@>@wQnyqlX5jk;ZHMJ&aeZ#O4GBz? z(!if6dUuz4Ptb*Qe@B`E8(2^*!(@cPOL$^~oPmz0Je^q7)j`U$*QxwkM?Bq^3hYI{ z+@nwvDWc;wuSY9sMPJutpUc~SJGA+jE(lL1Xf@s|oVE#P!t$v?Nw^2qfap_;9H|U( z|Ck!k5e>wi+Y%%lT@cn5 z2N6tW8HLSc6#EL(khmEoL)a1$V|?B^Q_S8k6~IpjZNbcKYj7hC1>#&cFPEbz?5m86 zJt=g2l#bp%oM=r{?)-#Am&iGMMod)raWj_~dY`;7g)oUhA@mjcH{HN>>akKO zY$#4mC4;S>oE*_o(F&dk%uf)#fR3fD_535)w0qhfCRRxk-?Bc*{;scT^em*-<$=tVHVb@0wMxh%_%cFi29}sY zzK}vXAfjJDA1FzqPaAttPt|IxTR6q^F;wFq zzAT_2P@QlJUwsU+Tph0q_X)j=)GKdwY9C~+KP!}&;AK0v!6liQ4S!2k7&EpfDoCZX zxsv3^BxMev_eQik@2;3CZcT=8`#K~=SyWJ`N`A;u+P;$M!%w9BjUAcSiOQQ*sCClXHK>J-^@8GC+1UQ(#x)VK+VhSF0gBmJJRAB+u_@ zfogag`&ApqxJt^Z3JiOw@P~>ec!+Yc;#9H|oc#j$hR*TgT8Z}XF%0qASf2aQ^cdC- zeaF=mCMJfvWm~>KNs|`pI>75<8tUhIWIo6ZzB}jsjO&yDwg+y5gyi4mOCrg@hXr>J ztPBL0+3gAAb5;p>F>u28J;irxHRJgOQv0n!7Gd(W*+j>-!i9e?`= zcCX#%bK(!;6se6Z<%0>e_QT1~0m~BxKAr~J1S-DzuX!1Mr%^%V#g9D;(wv=}ZpOCE zs^@eZ6?Y+KEc8jMN+*CCY9tZ2a!c1*`8SuF!HY3ys%PBPvu$rxbD|+?RN!8I_IP)z zLrl;I02NZ-ZyGf5*xM?|q4IOu3E9J0rx}EZIY49^pD6mS3-B)@Hql|}xc(7eE>3si zD}|}IPN_XuPsi5~alg(k38pzROH2@wJ~EFtI@GXMiCcN4{Ww6IwamP1mEaRe%_`tE z)Y!uSbs;fL_YrZI^s!rxto1&fym%EZbUpjA(_~A|%%VEpG7EyWh{;6QoNC7X@(zQb zvH(!E9(Q;CF;08eP1ZKHvBUD+TUa#_DcC)eUZzqMgOUP|d=6VDWBAD;tBgoh{VQIQ zcmgxxo9hc|8eMPxpdAx;E^jCpvViEBve;149iZM)oxsIllFZXFrAzEF}t_fM*UzTWgFKJV#eM+aA3t%c99+SbvT0Uti&c7Hj$s43CuFxhqB z;IJ}xc3uy(w=v({tW*Qf3B`BhV3;M>zrMb>#(90c8GGn=JjwYY(HncY$KSZ;lWE#u zdpX;~Wmp6uYzYuPsWyH3kMKTMH;Hr&okq!h-=UXK{r!W1{Lc6}THW)ZQ^5cB~ zR?`HKmg6=sQ1M9B-B>@Jr2dL;o+yv1o11=dE&cY`gyi8!4EFTzM<3R}Uxn${M!KtM z|Gu?>aRQ#gEkFYx3U@FmH7}h1JebzVM5WOhb1N5AW6HXOn$wYml^J+XRoY2sJOi`B z=)e7;JcmOW3Wnn`$w{s2+RJ$rU2jY(HT4fr5Xgk4FF49BXHAC)b7u`X(k@s4C$M+Q zynNn1Kf*5^uKA@a`UQMvx?xEIDd85k;Z<<+Qx%-~sQO!ANgNyoW9=O?m#@G&ItDsM z4XZ=oZ7a;?41&~GWFM;<-mfAu2p=1O4>M-F&>tP#o)-79NBGw@#^$q6(8xWbEEhDm z8?Is++#tq@Ph~gRnwLu$S)<#{hhhi#+)bKY>;~Z~MD{hMyGY&S1|Qe6<5(=ZS8^iN zVVp?i*@+DX6EE|YbesKP*QV-vA83&LqQ)sxL{9x(_BUr3Hx`b8`3BGA?Hp8Li7@1Q zjD#QD8^7p zU9jU06vuK}gboaR+D2{Xw?@5+OiMPN?NuMAPLNSWf4o(mZtR<@g;VvC7ViALu!S=*%&4&z6LB8C@C{r9WM4MM>lpb(=0Aq;Nw$7)XcbKC_R zNs6Fevp`wCgmko6yZJ$_Ohk+^bfw0MS3-eK9Lkohg_)JJp{TDG@A%_~Mme`LB<_U` zLU2@2LndlKvMh%Ti(+$I{Y%w@>2O%wWtZMOmp+A2ntdC7t z`tV1y@i;u{nd*RHgCAuBP2T*gft6}U(9oJG@iz9vGBJy6_frN`!_?M5i|`Ctx%q5S z7ehnZfHZk5oIVhGLLtD^g8RZulbz8^)!b;?VI-uF&Mnz498+=59D|eTa?I1B)Ez3SO4k@ zlK3SS6fwB}o&MEdT-l;|gzR3O@ zVhMfxxBq4NGO|Q(O2kk3A-+U>c+n4)y~wyu;nC}@FY-)Gq|Gc>S65=9@G@Mz`xSh1 zV(01U*?Lp)T4)nz0BSkLNLHRXp!hUgT__Ww0H8Y<36Q_hH%mGy{BEN`5Q zV)E599vd&~s={~|m13FY+W}IO;Migly8yUzB=Iay@s79lu$hUr-`-Ul5hz|%Snchd zXRU1K)m|z^?(J>2cGpu-bMR9JQ=z5)9v@}s#U558j-oAX{{-~1<`s-9F$T5EYlU`a z8~;Nw67E|IQ~j%6ymdQ*CKOhq1PLs`PV`33d#5`R^QvtABdTo)*5~%;#4QT?Nxj-T z{QsOB{n4XPWu}x^g%Y#5_qcigI0G+e_b2nBQgZ!3AqJm6T+oy<1*OqcQ{_S(Vq00+ zt*4Pa+E=#QV9OjwCOm&Fgj}s;;5X|FH4^8Q2fzM#nvT%gGA$GBumJZ*HB9X0OfsQiGp8hWXZMKsS7z`m9=e{00MpKHaeO z*4$`Jtn+?MRDGvz?p71tC6u&FH3)0)}Olv#E~^oL6C zgxKdroYCB#7GyrVr5y`D0`r~~2z$6g@~qKk8oG1){OAn{Mg9;NUjrQE=IHUqXVr4k zz7gYef6c^dPA~pAFp_Z((-H)x69AJ`eOBqO^T+)Z<*ldD+5v}KHB?qPP4SC2g>YXx z>hp3Hl1rv+0R5tK6v)L5UD|{(68>og(MW6j#`J4$i0yF^iT+ZWS`j8f+-S>g4w)$t zzdmGBCjWCe?w^jAQu;K%=KKW$&Uz(!gS#87+H7=GyMiXT3)9lz^OTV7{cifKsTiW4t-JIpV+B&_>1oP<~<9%3zMXytfy8 zfPLYYGJ^;^(tsjc8)6i%5(h_riQz?EPd^ep zbF#f+&U&2GC*6b0@MF#Ov+brhK+6?nw(GQ)Z6 zFiI3dlF37DULh*dj${NZCUm|#YFfQYbG}0Qoi8DDeR`yBpg|=LWpiE1)i+LhUNf0k zy%%TUBbWM8ou|P+$6lX-wICa69vIUksf4Nxqjb$JzfftUXjv zYP5!gR9eljW!SZ@;i~wRunF%=Y_N2ZZ5vF#d?Y#!SBYMC4xjbT4emhrBdTgRNgsMe)Whwai1g#GD;@e^9Op|HSI4nuZZsg zWCRFsW>Z;#Zuk`Rscb7fuX84o>YScUOtls=vu4W^2Nx#t)6b}K((qg)pLJEfex=x& zPx)q8j4tn+><}}Gt-LJOHe=}P>%vVRqQK87gXduP9GgKnx&s{f&-p08V?pnKz}*PR zonxrX)mh-^QyRN_tf5EF6pySvMTnSY6&Vy~u8cM(Aa;Y#&wA2eN*02r$p@K+#ppPOf)6k#XlM z@IL+_g(#Tfbfefk`?89su95izl~%%x8pFyJo98{?VGzI`0AR`Ln zHxD(xYfPTf3M}DUukl{&F0AFZW%6|e$SzAEHn5N(KV$APklk4~!k%!{H=rc<`)oKH z?p~%65S?Bo?;;?j@^-%Pem?PB+I-7w^tOX@@Z??auyg0 zDY}DP3qb|RjI`e3Nv%vCpKrq5IS;Ng{U%6Sz{tS}H8nLIUipaZy7u?H=Dvry3j)&% zfa$E4&J0chax(&ke)fx}NY5Qz9~Ttl?)2>J?D)R?=ri0&c>e}qSbskc@dn;tvyWaI zJmvNc9(X$1M2CL}cjxeF`OdW|(Aeu_kp61kxlrBR?~w+cs}`@PElU1@=8oP|mbT=| z8$Ckw>LaH&nmsmybMW8ZAmJpVVs~n`_Mz@)BgB=qBSa=fwb~Otg9NMeg5)_md1vN< z37G;V%=S~zG5C-iT6AWr@6Gg=AwL3KQ3$z(uZ~doFU{v21#^n(=EhlGedC9+%(%ym z41(JSzeurF(InKf#?AdPEqOh+SAl!Xg<7Ho%@77F&JKDblXm zF8hC~JsT4O_4B*H>72$HtXexK!%*~@Da@%pw~14#5#2c)_5S*|DYT8KL}85NaYQK`0s?zAs{4XurbE8VYt1(#!(V#ctojV82@MG&2;^& z*JIGT6$8dKR z`ib7iv&UWX-wsj!Q-rF?6iN3oH$3t~ryC1P565W`$efGE4@AKl`bXksYgBM^BoV)A zthZ@v$!h|bMmKc%3P0kI0={5OMNYn;v`Tp_Dqd!-FowX&WK;5xyU5L~fZWm8nDZFe zqW`wO>Fse_-xM^4u0LslsGhmZxc+hBE{Kne@g08tC>UHv%4^!Qh87N-d$l+*sozyb zmjG8U^BBtXQXJVLviW-GXF9i!_j^12aMllS%VhOG)}2=1|4Vf$thASn!xyOsEmg?# znOOL&%(3JlgY(#s9ii_))aq-Kn637I8ee9kqo0Ro!^BZaW0y<%Zv(x6*&QQ*DKo zG!n_%pKWU-Q-h|d1p$T23qR5-{g+5BG{~%n) zODGU0PmVqQ?6&2bPsC0fF>Mxv;xkhu+Y##I9PoN1a|YUW8|x|fK^1AJE#id*C$SJE zsP9pn0G-%{bclV-4^vJiV>;<1-O)IJS_`*pLF z$JM@>z0-6NZ}7*P>Bb~`feVDGgv1)YO?Y(x+N%2~v8-r6-0&CtKZ~9XUfMJEVb!;} zn_|1BY>2JTB-&imTW{qoRokxR!S!(gtH(@MZ;1ARDJvx(%6Il5m4=XHq9i?JtI$L3iYkig5(2DnslAMb;Nj1 zW@pdLtp`%v0gk@iUA{_W^(<|+wea&A+kUBhV#$5S`@N13WUuoD_Bz^cE7agKAe%f; zv*2FP+Jr{Z>Cw1KA3*Z3UNhfJKlG!gtGHM{YrE0FZYVr7&)KP{?!6I~efcPN^)eC$5Q#4|PO`w5ggoVH-p`g5h}az)jU+3Rr&V^Z*uzxLSLPs+ za;Sd^<*l{qA7hrb=Kf%NT2)|yC6axFCyNToH-x=P$dtq}pdloU5rT{@k4Wo$X+cm@cI%6e~2H5-Hy2zzBR@Y|@w?B~wDU zXH5gb+7DojZ^HldPKEugb@+Lfx^2@U7EkTYg*bKBq!wBeD#2jc7qR6Y%2>>%#63?|>GspguhzGx3utvVERtw79K@jL|76+v z?xoJ@X#itg8+Gbd-(U(gSE!!AiiD_H+V4hWZV+Ve0c4oH)OP)wZTb+t?f^j!%qXoG!zYsGc4KHN5!tm4$w`1~CY=SC?I3jP2ErjBAw z@J-NL3W&Nm_b*!9$K7_K-VN|@**ma1vAcA*(b)c=Mklm#P@XM@fE!y&(3Mb=2h-9*)V=LVBU<1k*J$#7hA|RNtcV zZI29|uQ2#xXWigE@}w-8>!&Sy zc@ZcTs5?03l^2BdnO9VZzyyuiJc2>C=?MN6GDyHa#T6Ycie*?D8D7z_jg>czjUf|? zBI6lc-~T+{oqI6OZtWnQ!9Mvxu4;m;LIAJ|ajf6H?s^$-Z!ry>U1{R;-IJ9mwqHj2 z5@L2=^Slce)c4=z7mmhVJ()6d&W9FS3PH<~+~CHh(wgMR$tZ2S@e=6!w61}REh=PX z&#Y_=3#s34+E!4|l;)Xwi7L$(BVC>F(m(1P<~xEDN38Pui{LNCzJlE2>_JS`h~GZma=@)Ndp;l=#=Q1J2cTmaIKNT|0l932bQ zc(Gfrv4f8ux5^^M?yl5Ol0d+*f;}(BgF^6+$?s5gB+8@6Zi~JqVEV4rNjz*p?wU0? z|j})=i>`#KcW|{L=;aEUfZ3i@9{a2s{~oRM*F<6ado!! zUX&KP+|hmz#wx~|I3*!d^K4q?Eb=ef?T*D z;KF4$tJvPKW)b{jZsvLVDr8*GJZcT;Ee_djW=>q4#J_JT?qnlObzpgrC*eI@IuQ4+J- zqgnQy>@-yJmw&K3qOT?Xtd$?R)XQ`8`k?kb#255{Yp4*#1_@o+W+CUAoc$3tI|{)b zRLy<>pSB-zYWDtX{Pv8ugUlRTCHli0UGmc?VcJ9lMhMrl-)R%_^1RXHU5-*5{I4O} zJ_bk=-d~#x5RxGPNpRv%sNl6A--+)Hx^g4-zP}#hdaef}V$!7gD>j^lFOK^?;J`HU zM(Z&g@(JQGzajr8RttfV?hbC>H{rFjq(it$HOt=z4A$$yV3p6|s~yCD#2Ae7SJH#G zFU0m_9e5pMpW?px95c5S;`W8mC1Y)YaPae}wU(RcZcBu+M03-~W>91WSE zFRTh~UvDbvdLt21ppI}z-3(oS2>wnOCDQ3+^9HX4T#fq)Ab@bjnYFv-Y=cjYUZecz z#VF28+%KOVCdV9@{X(jss_?eGirDhZrR&yy5qQp9WZpw)C7B!^J4}4NHet7lKOp^1 zlD$#V0&R+w8U3*2WloM6sVIx@(J}vrxTWPIGc-JXBQ%Q|BJS_j_T^|*1Z8iQa~E%PU&uGkd_YV4rxKU8>G9t zyOr*c4k;;Vl#s4>A*lH5-}CH!_IVG(KO93B%(>S3a^Lfw*Zf?p63Oqd7VjSY@PkCd zfJ7H$G-vNm6PEukP7?s1RolF9ZJHp_AQ%oL9ctf<^y(!!0$ z^Z~i3r{!aoUk^wjdUeSJ@Gtz%2JGZtv&a0eMr)6%jnLkH0?`Qr`ShsZ#V(#{+|Ey8 z^35wOYpV{(!55ToSdxD_t)^1E4{a4mhlKftmk&y&;me_>@9k$+4)Vut^|xTU6o!jP zBfLG;C=c5~SOkXCs_>ABIuDfAp5xF`&OTrVaO0sLq%|xm>m>*{nl}Lt?bhG0`Ba9R z@XKyB{>4Kg6C9@Y*g)q0Igv?UU-Y#9a4>r7%2z?bi1f~GwK)1bgg+W#3q7n2CGH1I z)E0WP0rYZ)XtYnX_UPu?|8U;cGFw}E{R@5{Wkh9BBbe&>k)qqx|frsSHLZ^u1(EI_4!B zx*W$A7YrawiNs8!_ZXVtdeH5Tu{vJnU3(v)Pii{RX^F7*9vs?I(%?T(o17*mHfo)k z-o3Vq%NqK`n-PyG1ZS6$0AZ|*vXYYVS(w_u`1qgH(Pyq#tPeH=eBpW+JaEzQfqzw8)4l+Nqz&}8oB8navEp|{srA*7R zBioUH`i1ZOC-wAKwMMr5*qCynIJf2%w>;FJ5T~f?;!xt$um5nk5XIa#-?4rW(pV$} z8D~Sogh6yEx=7NcSi&Y$-f1q%Af_YDZWK>D}x z*RaH5_bjJ^SpK7&-=3_4h7qzK>c^-F%1)0Mje|caelUdnHQzh1wJBQoZ6rntjWl~V zIJ7G1*SSJwJN-|`pBF5iFgqZqcaA?as+B@U(=b%A+;?Cn=Xa#uo!xooS&~0-%9#p- z=*kVqk@s*XR0$Jyt4?rh#wU}U!j-?Qf0zS5^aSqu>`FkL>$~AIlJ-(y`v)-aK7p38 zD0|9EQU%XQ^4ql)hr)I~Da#p|jQC$IfHI*;&9>@<17!GfVg>AUF(igljR7k;Um7bY zi5yrmid*N_@C5###=!zJ1moJWl|~h?j#b@Iwnf6uG7?j*nHV$5^MP0$Y^n!lKpu!< z%H~vBu|eDa(kZWNeePpU0sx?J+vF8++si)sjyj=@abW?i@{c)Y&&?RZFKjpSh0X5} z%O>Z{KmCB7N3UcPFdb9X<*T|h(JCVAtvvI%AdQQ#dSCr>7?`p812N5UCYL}cV>#)U z;{h|!wQ2K49c42^C;!*4HOB&~O0n#hRVq{@pV_zSIt#ULbiFmII>5?d`~N$rwxy z*VKVVVZ51^M|uZ8cwliHtp>>lPOk7OYlV4BU%**KP*oXT8rakA+70h{VGP&W!t{k) zI&T~87hmx>^1?&O!Zax$r!KdB!0)UH%N0>}z!(5v>V}LkbQicd-%v|>G|yjlvVJ`Y zV(@`mu}p2{&SRumP_;8$C2??DpbKoSC3p>O_D zg}WOL-z9~tG_#c)AXQ==Z z@kV(d$|FyefFtpiyS)Vn=ARBr1Q3`aVXx|63QZ5P{+i06+{`|!^QrD@=~tGz2Zb_g z=H4>Faw_b}+eMFCUObIlr+)hdLAU^pF$FhQh?zDTl|9=UdQ+G3@>O z7!e=D7zxDKKMs2Ed!zS97D@gsI9fUcAU*k&h`&q>-gP~OzHz&;OLF_ze{qRW5W;M- zH8{rxeUo{d-gv^ht7~|3HUUEXJi4IXbojvLD|i$0xo4Hk?*HQ ztdI_or)dA|5+SO{zSZCgoZ%Yp$Rh7?AQ zS2i_;8jG5%$#=&JbFY`Ztj<9oDiPF&J=QUxS!FjEqeU1G3nW5&Gn*-IG|C58@w5Bg z!@z%#XcUm>^PA0spLDR_he`nO_+C6I#&ia-ZR^1t5CHL{=aY>xt7YORosJwhMpS`5 z&_uFb<3dQ!<9v0m)cYHTmLD;lW^d;998eFzQ9U1G{%*KwEb}E9DMT!=q9#81QZBHd z>mrfa^W&E(Ho;m)w&x3$GJGK5u;=Q&mOREJi+ADCJqRxv2+#IS2PA0YgAMmjvtlO% z8(@HdqWS2he(Y+0nqYF&dUGiKY=5&4P7UHwWX?Qi5)~KY=t`4#*;mir2vIL3=EhoV z=TJc7j%cjYc%CAC_1V$;LqkP9!mVZT8xFY?>^2an)L9F9Rgf3*`pY(P{oa8748(yV z(#McJ&ta@&}!L7yG=*FyR`Toq!k0C1@40N;rBej?KulPWK-^I?)f9LSj_JmVj2!n7Z*xh zDBw2WvGWO46;AW1LgKdVHDF9^T;^__Y;TdtUG2KDP5Z$E%%DF!&VQGhHMH9(VsUsj zK|nSBkqC;F5$nu_afJ~Y&2ZyHJo8<);g*)fTdktSjhx+{<(ss-sAL{Q6$?a#MLzNf zwDZBu298y!QrbURaXW`kXE+{b5*(DP>Zil8BE;<%T8#!#mSJm#@yILWkjWuBAjepi z(QzKtycB?2;%l)?qph`AJZwt|4UT&q*L~jCpYK^Oj|%5t9GLlStF3&fYDU$ZsIXAa zb+VOoO=KAgFTL4N3qFx+*k+6v6<>hsS=tGk2xytbiVo=-yM2qJ#@8GP$vVUqaF~6A zd=FoPFa^x-lY9J{yj&`X0)CY+=x6@GQX$cM!YODJX(n@*pw@!~;B-{1mIev=_C%&z`w5DEaH^rGCS!29(#Y#X1jl5^3&bWzVkyaS`QD3` zwLB}x&5;IQFnO7tC%xRQONckTA4--T=z_kdz`{ijk%R;#-@o_oA4Hi5MCm#-T6SMn zdi}pDD<`qe!KHs_b6{OQoh-d1aUXipA>)_$xP1bvH6Kd1v?at>{Toit<1C~i^=qnh z(iV%li?|sw?{$GLXi`$cuT+Y-%AAXR*Nh;TYDut6IuLc$oQ1DziorgewZO?PVz$_c za%b+^;DrAK{05;YC_iDds>5s3E&NdsRrN0M6M8fbCmOm+N(aJnAm)0Fa?cjChu|sO z8!kuR#iefFqd5mwY$YGurzJg0LsjO@ME>)wMiW~@kfM7XhIA!eJU9FoZF?AK@~?Dp3vdwqYo~t5dFh zkv6_1`m~tyosagFa9Sdc5xG7kVJ=3)jC&t>ZU-5EdUQ0=3hfY!QsFVCfD# zV#`k@7?BM7R`Ks&f;CZ70P1K|QnF4k<^Oi-9< zv&QZ6&&IB`-P~vUEfQ!>?;*xknGmY0^KggRbj%Ez;4U8x{8I;7V!b;ht2+*3r^90u zR+nkV2`v0Z(P*#aFw5pc@czTOS_7Mu?p4Q|1g`+ma8g3*P7XTu%dUsLX0{6}yhBm3 zL-A|3Ll9W@a!bkoWU%vHO(|pk+u5e$q)z0mE}FbxRcGIT_af!Pd@4G_^OS@cMPr;c zTvJ-vPv#UW3pG70-W2;6Q^^v7?8ZM-8sDS*ex{}M{)?F~ql z+(Mr!LZ)#j?|RGV&s8!kH$qt4XqoG0@Q#OUct`Ax<-orYOygD31f`ei3zx0(s z(VlzU`@wd=w9o!s1Zu3AtFV-kqN0{n$t#YPyBRmz1KMaSPc@+4+u>Gs`lFY2l9-k{ zx~=_0$djLS-$9@Xw=dvD#Pdc!zh*BbDFz&N6jR>>De-+~k)qGTt1wPMijH{Me$2?J zHnK%>W5U=;1^v0^rbbr_fu-Gi_K_ME=Nvy3Es7NRjK$n6((?*kDQdT68a!cS`n$p} zw$b9`wy{j|NzntmM<(~j-6ERyV0lUcmZ$ofmFvGX(}qJuaIMm!mKWPcxkfFl%NDSg zdBcr~+9)uL!WkwVp9R{eNC^OcS1Ey6Fj?pA7puChIvy3VX5$^rSiB^M!$pfaXlrY>z3R4X z;S4#u8R$KbO)H>XU(*z5@LQXDd8Ng^FK~w_dT!h1j1bjK8G9~zVAc4_r@X4nA3iu0uMO05W=aDgey=ujTSmvWef9HU7uEt@$C&M^zs~qdM zG{4~u%Fw02!Zsghb1|DPG_V@L$okR9EZXL~~knb>61xXGk> zcC?DVUEe#P?>*Ozq2+Zs+7jO<=>z&GcJl{)JvyR=?dItE(9oKClY#C4NBZZu{d$N) zv3yR<^l?_Ix1T8~-b=T%#6BJ{-hF&HFUyqIR9bO*_hefh+_DtlmdzX#34y--YkLH^ z+i!APNQ3rjP}Gt=l5<{{vppGcK^j^QFqNqil4N&2G4?-i-v{ZqZdJiF>hEF>^QjF( zNN{FbGK;|1R`Ch?x;Z+U#hoGKq;q&2pUiHiApe<_#gyWU(B&s;5I(TSk0GuoGuI5> z-0#?iAB2<&gcNSeKzKKJ`AcYM$?Xc!x`)ee#RbWh;IeHFmD8tQJ(i>=oqW;`N}K(4 z?tF2P9wS)Ijl_ZFa2}i}Mi;l`Gc=}+T2s671|q(4IMy!i!69p`NL;9Ty|pqm=R_9U z37sO(ta&ZQ{-UQp8O|EeGzuq_j?oG1Cxgkmi3WiQUP2i9p_JU;l#8LJptG`taHRi= zg2VK2!*+?jNEjm{W8cJ>gprs$+qtNMvrr+0H8YL--7Q{xkWU(rk9>FLAn2_tji~u0 z=&h39(q?_*jFV&k+veVphDp%QdJhtTX1gYa;M0XebbeSIdvH}eDKYNlF7zRfMs_^3 zpp!9`1#7$E##I|ft;oq`l zy&~@8FgkR*wim*D&GbB(+}g&{1eC1Xm()!?;mG+^6IygpJ0dLjF$K<1S9QT?GoM#o zx3o!{vdKKMy2?ze)@Nn7u(?kab?TS7!02-eUiwD3D5ATAJEYZ3YB5ZSu#|gtyl7-k zdq)QktXuH1o0&Hy!*_PEnfc@O%=j?%^QGlb-L99kC)`{qx+y6ir>=Q#I9<_=7ZR`? z=GcxD+y*ahPP(qIZ)VmH8nSiXzMTsdXZIZMO*Ts;!I_RByRTkAp8YvD$pCWRjxezM z%XAZHJ|%~_ANwJ=pC(&>`5*)yXty&j>9%`wB`ZA;t@2`mWgS7Isleh5x50U~6?}yl zUrPGhk2mPT)-<0lt8m&7#?|45bQ^!LZ{=N79d~M#LP!xIgA#J5;_O*lN5Jnb6JF5w z`Uvja?6&SGM(>r-dA%0dHbQi%U7KyK`W~NF8U{r{oMM1<|BMhH#G47k%hUf<1=RV$ zGx8vlrKKTe=KAD*G)ZxFc>3*agLMEct3jh2@xF^Ejb%N3@M>plhGQ|AQRFJ^f`smK z!Z^vs$#+$vnwTyocn-`@tFS2H^Tk2W#}pnle(!Cggx|22v7ghbd!v_~bY`=yi`ke) zt3RNV;dypsmtGlFu262-u8RNae|aJ2hTSQ^9mY zeTV0UrT~O<@v$@WAZ(#FjN%R-?d^Hy_L+WY`E;dOjx=}x!`$@Y+Mx#URJjA+sqH_+ z9?dnU&<_j=rr}EEee9)KW*Q4+3z zf`S6?X6&3F{{2JYdvIya?L%>HA_n#Q`_kMGjALWpLyrfdx|vJ}-K!(42ynPC%eT!* zTVhet_vt3s>U=0|=<`w2bJ7b{*@Lxb>lXXt*7VtG(e~VI)gZFZedDZFC%_IxDH;7k zw?L90s}Gls>rH-)uD?>jPRXD#@-(C9<<2jU*5Q3?5G%W8^*wi9Gj3%3E<2eAA?5-h zzG%|IzAq93|Mx|r-A(Y7)}`Q4AV;%@Qu#7Bnymn_wc#iiy|DUujD%FKp2<0A@Un5| zJHP}6t+7AJ$b*nB(g%ukv5g%I&h&q0)!OAAT*SD`9EqZ3bYvS^@OrMy(dKK|5q&Kg zHlOo2QqG}qUk*d$6+;{oI@&V@0`|+!09^bY6PkWZ9N{wZRLCdmVRUoYYZN=)P}(Y6OFHw9y!Kq52&?^E9(dOOMJ6Ow!pl zc|@L(iWoW*=<5MmtiU`T&PHJwT;Lyh2Wi^Ycg>W^7C84=*~=%h@Q_R9KM}-KC!u2I z2#hT8r5I~&76R@on5+~8l(xL^a5%*yQ%&HisQX0 z$2aIPnGB`FWA{^E(+S$z7c_xx{&sotwUGLs+1G;C)<;$#IVsMfhp-y4xOGKWam>6p1TB9!2sAwc%kky#%s2s7_Q)#i_%g)Et54($kOsHZEk<42IZV3NzkXB3HKSr`VHT-k% z)V0+WN?sqiZqX0_|A=EkS;yuSGDhi@m2y(S&1nap~7F$1Zq_<*@@Njd?={|`luH5<2DTiiX z$ypa$k5r+vp;JbBd4Q@ebJ2B-BOA@!o5SSDi~eCSy-R)iNeJj4&L{+_p!*122~COp z;xB=?LyE(&0sJLfVLiCca9M?dhA9R@%Dqf5o_Nh3xZVm;m|azT)W_SP*4qk?Ythew z#k~CSZ5K2^`$Ss*fx9Fm*kLfCsz4Wl)C!X*w^ZZuYn;{;rdr_^z103+(Mw_bomgdP zBfF~85V}f}x`K734}ig3vD!`wyOL%|`?eTf|I#n4bb^@?51eL64r4*e2sUGhoUVyq z1Q5dBVLKGXe%cqun`6RQGkKdgCZY4ZW2Qf$!NYE}IzQ1%)0@T=`jgX{x9labxCk4a zLB(4!@)~k^eYKn4tgzbk=a8L5!uT4rm_akQmj0f^TjYK39@> zs(?4q$N8TUWFq&J!AfH5ZX4kKAb|oP0luC#-M>mUcbk>5kX0_9v8DZ)EOR8mG=EO0 z4PXMZ+7!B5PW$r2fDEvP5XKqO3ByyyPQNc@tk*)POUQpq$1K7nC30r??QV2Af!SdB%5PMf6$Q! zo2NfjhY0a|B~tw?9onT@O1SZ&;X&~rLvgeMHUczv379=%Je8FnB3fU@SQb5*R?$b#Dt?^G zqNwP!8enGO2wln}LX54T7=G5G)}D8$Y|Sw1W3DlMg_-YtvS|;JEdr8VeB2LrHwXu4 zf$t`>M?V6vrIhX+`^{^a1jnA}*e|>(c;}9NKe#0hVkdWaZ=MxiknUI(4I|B^yJCWJ zp1iJSa8NFqG#;kd23<_@`SPagTbkC$IKHvFV#bP&?6-4!QyQ4A7PM9cOC^Vn3NUd0 z`Q@8j(G5h0Y&>{uwQj3*w6q!rv^g_EC|)%-uWt)qX3bQx!c6NG%ErFlzxZVj;w}c_ zerp*n0IL1qA$gDqA!b=|N=tjS*je|Q7eJ7csDc;pkr$+Lek5p?GEUo{SkN_7Q=x0X zQj#Sb*!nm@q%+wqPf!^8+*mH1K+T7Wx@M;vSJ$yo$2BiW1;Jt!0$ut3rnNly;U&Ni ze^v2X;;&ELFPf6m>a~+z3Vd=dOmp$sJRpaUZ=@w&ZpvELtZw}XPmulm^Oc7SF&HMk zZY)Q*|o>&Q<;U*M9lC8qArKt z-@V}n36uf}a9_mB{e1-X3!j9%ZGXL69v>XKfbbeF^W|bw(l8j(lBGua^&1vD)bLON zL#xgRpJsL?Fpd*AmZ^rp@5J-$3ALppkl0PC@hww+$(IPBLtdFDt(pQ2C7Tm(s`g`a-;fHUiHRd|@x-LiI(To1irC$#+0EkXl_TDL5*HtYSq6kD`1UnDsQJT( zd^>Xtm_}tTb-z@p?p?JYs&fw{_pQt4u{hAK!dBN13r^P#B(le6n6yQF^bs_|{HY$l z#d^IZC{*lI!(k5e2@%f|TD@m(t(N?>#P7-AnGJVmHp$=N7*s@A9H9AF+~2Rg2Z59W zfxMy5JORzS4PFiT$#p_vT%|^FW$Tne{>p3u<4!ngT zYzXfOF=cR2h?y^;j}}UI@Y#Vs7R3tl2*SFrWEV|BG3q}%7Emfi)kL|D#IgFEpgnTM zb@X+{d`Tr!({GP0>jui0l!a$Kv#OyXP&lVN%&3_+r%i>xbdKfjXIrM<4no4|=p0Gk zB<$qsK);b*?F`5OvPMgO0hB5(f1ISJly|>g1sIlq+%IW{fLkoEKSXBUr}Szi$07G6Tt1RP*Ar-?qMQ zk2DA4W6*NWM8(H1hNpwuMl?_ZY<>e#e0NV2@j(!kKoEFX?@#WlK8gR^s!#7Ikl78a zV5Q?7^@gwL>QI)0PH_EsyBlA?bugKL!$N3vrNn9<_$YY3;LZ_jei3_m^3(sF?WYk` zUpvp33cc{-FeTBg?A?CISRUm|<&1(BL2&4&zb#yLu}6=NRg#Yb zh!6@Q2f0Q9PRgsK%5b0E3rv^3*MmOraCxyFuXU=QVhXy&Wr9|sl;-A5S9D}qZsGMJ zfBZd>s{Ij6`+3L<7LH+=K6xQ2db?`SC|PNL5py8{KKIFjge}n|lsaJrL9zA?uCHKl z9OEXalnQz3X;bhUD$$d-gm`>DY08F@aqK61Y~q6k9_lK#x(gMq?#GNh<}e zY^yI1_e~dJHVClgYo~a%A?2PJYP51ZN3C};-HLwpRiwY9rg{1YWL`E}|LXj26mLap zJkliO9W}}HkDZGJxQ|3LbdNIXvWK8P`a43)>Nf^1NHnXW%~TZ{&`y^@>@``G9 z!v7g4fiAJ*4JyY1MDwC2#~yF^0Yd5fVV=p!`X9J`mfhx6?Vr{x&O6=9^Z0gJ)Z%*_`J;nj~q~s< z+X4=|ftoVUKlUya1Sp^eU4d8#q1AQyIRt@=IjkAKm93d&0en=53$f*SSAm57u0-Ro0r zD^>tpU#P@szO&?)apx?whwkdZB8P{v-C)Z$f|}z_?5Zgmm<#H2FF*14y35Cjx-@6i z9kD}e0+_y(%Zpm(75ijl)FcO8NL~QuF0ib(4lnJaf7rPQjR?m$emqwVw&V79Go-cU zy3^Ji3L-B+2eNLdNKOjR31uU1HJ%bjrqe%hxovjHktR1N#qogA3u}d0pux1otoRIb zc?@POa;E*-XOo+_4J3ey)Yn^Mg^rMy+VGQ=E9O-5-R7AHaRgOG6_f$Lk1^BD{W^pH zV4bM~)|u(=6z~5M%G`31a!Vqoxo`!dax@J~(|LG}mD)8iiDj9HT#Kmb?EUHLlOJWG zNr7;GTY413zF0ET!Pss7k}+=)k{|*@o%n=IS^#x=w zPIj-5gC9mg7XLR?-E})TNCWZRr=Ny6t>hK!g%qeh)Zm9C-K~an52CCFqQt48r2N-2 z>R(u-tc-G^nJ=6TLuP&Rou7sd5m#8CO&qwiw!Uob3|vBWs^#5MKH*U?^?d%7jAgpdxO9fdb~*a{*^UPn9?vx%NHc;IDe@Q1RHs`hpyey5Cp_ z+u*8F=nqMAHoyb))^ZtQfRK1B;?-6)v+lG>@CIv&;yL-60Ukm!bs~xFT?Tv)GN=JE z$S)%S|LLIdtNsMK6(5}tWZ0af!fvWhD?Y)FIwDv$!w_0LeL+J`(9azuq8WX{dwc`M z?VZQR_Q>mo_uQBD(zPq0gOV>F^c(0B+cxLG_(yoZCJsf1$5@p~xz_O8oW&7|_2$D2 zmeb=ds9u4{z9sXhI^i9E*V7MrK8sF#BoVd46Ijggby~Zo8_WGJGnogO)dHC<|}gs^7#QNl{1fgJbvzSxShuG5zG$* z&MD8o%;kd+orAE<)u+|9!j=RKqltBQSXT0P#?gxuJAj0^PfO5Qx}9UvP^)32`W}!t zW<`}j#N9=t^&p};Afn+4x*X7&zcz4_Ppfvg_AAR)ze(m2!qLTtyQK#-2J+yCcUNo( zq7YOL|1geu;=R4bgr=i{X1hm;UMak!$ODHKuV*&CC;K!^9 zHKGnt&&l2y&0Y*Jt$QH|Qw=p5-b9CvJ+YaM3ES3|{H$-mv3Hk|<%5jsfs77TXcs^$ z|H^16pJ2w(t7C_!f2_C>FU0vcr zM4>jR%J(^H{Oj>06ct=)^4%Si1QG`-5~EfOItIJ^cR_ku>xwnQ>z2#+#ff-h;<06OUy>rGvFS47Fz0zlyj>Ckg$PAAv~L8$6AW z1k9qvDMpCb7`(*QYT$!JItV0S7<4r1?zC2ln$(^4g6Nd;`7dK-1KMy6tfoV=X@uN) z#4KYH`{UE zXzR21crrhE&O}^R{BKrb(?e-Hsly}xM>?%xOC z{t<_|&)gkeJ)k97*-XFtgaGf#{7p_jSj-Mw)Eb&j zQ%vwA1SGRV`x0o>Dd>~u@mks{7EWI{)QpW~8m+&~RH}}Pz-71_>1&mhqaP$xr=}}VfyCvff-h4>;b zbJe3ag2R*a6ov{-1yq&yYn(pmnZqEs(VTuZ=DY!kD5lh&O9C%uq$fPWmaG#TvN?7} z_j02U!9ZOdb)qMrv7iL;lf_i%kBqz`m1k66 zq<%b57B#uSG=g75Pri)GltL1zOd(%FHow9L?afpbc+RYgTB`s5V-b0MvqF-Piw)kZ z8)!D`6HxjE2u#67z0|02B%l$$q$}Boh&+Bp>GmcQ(MN z*rxw)ib;oROxHAAG{<7a^Fo?vWz!;DFFr>Xjel($is`@*CvE*2R4lJULS?LzJA()) zMS)%+ZyZ7PDRg4o2!Bf`bfyup@$$>6%3w8ttibZ^pd!jwbQ3!?)r=0&9N58fAMc;D zigMo4LH%1bQ!jUoX zvKEaz)C)uXgybv|%2Smx2p$D>n?^Est=(CPHY{NM^MsV zSK!$dqIc}~7HuVL|f7?NvC`N^Rdv%pM^$hOmH97C_YgQsCO|+L( zw3I5KhA$fF@ROcCt=39y3=ehzMs{AV|J6cNX+B9sB1VnJ|1*o&PxzD%&CDph>~xDk z-fT>xm%u)X{*L*vzl}9@Eu+-YW>|Fj-qIR~yUoEQ3in5J}I`wc9ML-e* z-!vFF)96Mpg%!Dct~)(F;vq^33Zp;QT^S7v3uCRmZ7iC-*0AR+kB^gGd_jW`1!9|) z8A{9%3-MNeEFI$BiF8|e!UyB&kG^X@1IY+JC6f`5Y<@NVN9kJFT7>e?<}}ynN#XH5 z#vE<^WwgG&K`NmO9Tp>yt5%T<7WCC&WCSOqBqd@g7|r)KdN*Ii`CYmyLn^u*oz45X zwqilmsAXkw#h}H+zXE&lRsvbIo@dTf5rq4`d>}y$Bbk0Zp{=rp(Uwtz78p2VPrJ+d z4UnEvFSISRq>NSBmCZ=&%outB^j$!c>A0B-~+P}viA3g9pv>jRZx{y1qAcbz zuXVr;X6P!AZ?V0k`?=rlz`ZP=Lx>{8o-~rRq^m|q+5GA;Ek0PsT7Y#79(;k~ruWo{r6z!KB+GW$fx=*=%^$t~iVd*BQ}&AlhU#r7>AWtWGSqc7WBw#xIa!41cxPIPaG zztL%Jt3Z55blh)LX=CSogFmLHP&0c?LE{Kn?d_DLhAN+2^BoIMWRgYf#EIJ2{%&uw z_aNz3AnAd_w>F^e4|W(HWU9x@03qTc-_jf>u*BDOE@o9AC&{>6e$6&MbeUmA0_4&*VrlPNkLzp3~)x8l_K&mgIoU z=ID}0!#MSAeSm&wUyEB`Ep|I@lBSn$JJ^wh?JhPD>_4aDZ9r@+r4bq6fI%lAAJ3;b zvPGnWzV%bQqrQHu&{XtQ3gl_2$JgNC8nU2Fr`~=d%F)VXdyDWxMF&r~-F{P|Y5 ze|towfa6fzS4w5{1zc7qG!x(duYU(cih#DgF~9CVYrjgJCQj&+2$ZT(l<=CEKvRLz z5c`^(dHH#8WDkqm6}5Og&7Q`Mue{lip^^8wOnOi$jNEo-90L8bSAFO>pfZZy>e`iY zv}%3?kFpKQy0043C{HIomxMNjC@%WT^}%`I>0$aHnE5a$&PF&kEqwpr?^;}xZ;R$$ zT4ztJUUbB<|Dn!@<6wXn7}SM}hnS0h3OVHdDmSLcGeU|_>T6jAYzi9ePP8|uIZ|gf zzWastkr+GmIR6<36YkT)kMgmi?kb?|o9DTlvN&O%&Rmi^B=A5SRQ6!ZBcyx%pPY0& zrDvJ*I(0uy3@Z=|XGUz2;+JL8cK`$`Ual}>P6Pbx8GAKx;H-5&I1~W(a_;{BAq>^*9pEWc?LPE%%`ONRV z_50r4fa6LrqLhGEW z`-f&2PfiB&%gX(1*YO;x{cDNmry@J*tn7&Wa>DBujg*jHO!3l1w)Vz=(nPml`uYds zSCB6D);_sD^s`~~+*GDiQlghTWz`@5@S*495kl$yPTmu*^3b~ZvDC3%X=+9WiG1-A zdB-@LyaOZYno3`<3V5#m<@3H??yBr>+%bKlR*{KTj!q;+cfW1$AKb5w+xrzDM+92H z$Fuec`V_1Qjro+c>_ECCU~^lD2eORK*^l){5bv!_bE8!_1WmTgGjCAQgi$um6BchA zp8#}WuxsX}>`U-5Fz_%2 znw%Er;^c$nYbv}JqJRW|@(Z#A^|TyAFOiy|Ng07fJeutsd*#Og`J)vR9?Z8mlrM4S zS&O1WjjPisM6!LJ-4|nY53=Y4vUvFpi4pAPJ0H*Z)5cTK&(1{+7vC2-cDor3^_;r% zPKT+=wFFj?XU9%c`kdR|B@3QQ>p*JnN+XG_j)&Pqh;2EdTk;le)y8}-b&Q+*kPk(v zr+d+U?fhlVf)gh>95aB=jxcbwc&y>I7!R7Mg8E#PT_K5pwIz}CWorP^!M=`B^!9AyvF*kc0a;IM@NjYVGLEl)H8PY-cK>3FXxr^(i+pL)2?>w1Q7J zDcVjFf-PML-Tb}uVK&iys{zwk|eCaz#% z)2B1^u8m?WX_X3fzUyq)+I7!-C=u~17wP_j;DZb0wDH34fsyK(os`mIL8r9H96da zKi2cTgW#@$pe3Y@u|{*NTuoYCI~;OW6&lSji9#rNyU$hC8~xUVGG8*0Or=t#-UYQe zVUTjj9s&ehUS1v!VKnVpZ^8X8VwndKcLNb)Po{VRbV(lHAddUrSTAkuPhINw06T5& zPts(_em&O4#Hr$f7HTIMF|vjdNhgq|wYHlW!B%kgWNVIWtA4R|l+Y3WMjmBGtigZ_ze`8N<^5R!Ji9VQTWG4lxx!0NTx<@ z9T&N7(4$|)`ls@c`ttI^HCHha3!pSDo;+`WQr2}(j4t5y6`k>j%NmnpItr=NTYY@6 zis5g?=G(XuD$SOQY8PBY-;U|Fk+7N?T1S-T__)O^Gl@)d(0MiqPyY3CO2wrej~&;f zFXn`Mk<|5q*Vm}6Y4$}no`K08j>eBZD!vDAEng9Tc7vF`h+oi9i~6DyRv9~cAZAY$ zM!W}~OQ(PHm5r&igzsjGyr?lURwrfXzDr>F;0gBvPq?lqJ{Ob~*kq%`RRUO(z7qZxVG4`8H)4BOK%i$Dvx+D=Q7o-;ybGw8PX8J z7YHUUmU=zs#->=Cmd}bdA8NTKb+tijrqES(o^PhO7%Qmil?~l5WA7iN*AJve6UWhV zf2O$pzduuS0w`#f`O6t3OcERg;5b$*?=Vgzgd%yumjW5q$18N~IEj>o;S7`xD#n*5hpgo*s%tgCiRNpSmTyijbK;dLF!_89x-549=P@Ywd` zZz@!+UZdEvSFq%%p*{+OsG2ZA_ZzE^gsi zik z%Y(V@puU2SV0k~M)+-Exeg$Ac7#*GP_}1}4gQCL1cV0z z2}fW#X}QDrE@0qL;HGTi7A?ulFeGlgMhN}}ALY(BNJgYvxz9S$Uj7uT^g{v$Ujq?M zQja5J0*c^&+D5a&Nq8!&Q`GnKmDPzxefoj|L-b!x7t^qeM^|W#@_c zzXdCx65I~4e;oq=Xd|vD)WPfFgkSTbtowrNh^$))zjx%(a)0rc%f*|Q+moW-Ncn^k z^%^_?i6X~96hA~bU9L(~Md%9SNZeY}Z3QV!=&WFPd9)+_m(`aXTSi$&ksL;DLOVq6 zNXM&f7}}zzyYhd-(BgV=-8!YJD|kJ+*wX^>0hxQmGsu}qLwEj3{0geY3|-F0PfV{u zf1%JoRDQA5lOzpz5ci&M1EYquLn}}!t++aQ)TXK)sYmVP5#|YLfb$nFp`ZD84)z6x z5`c%6(5*y4>Xb)OwAMGMPZAH*HU4L}reA~RSs#{=EjxtNWQF5<91eB1i=$1hmR=RsKl~L-Cubp1%>V?aNN!cqw;43lX9Yhe z-6`N}Wuf@RqJ&<+44Rr`VssF|JTdQ8JX34PvJUe8$w4DyE|K$ohWJjVCom(9Is`|K z0!m)U>wa`W2D{Iju3j7}B@u?W<8ur7-RMG|4UyYTK)^Mf4FlOZ>!|_(*5??vc5Uir>XGFu5Qr*wK}`HN9+kLk=80>d;KIzC54!J^J3TAb3MQTUPk=#aD)# zR!??HgdgbPa<}ea3R;4xp$AqWgi%Kd4#sFH zhJu*Z+6N!Yf2{V~NZOz>@f*Wn18t4WG{&^Vj4s2wNdqyhuPS;mREcp#83Zsvh4 z)u88qyD&6IsCy6#&A)}P_vWp1mC1bwDpy>tBS%Jexw^W4hy)@E`8TsWVz54Ui zkw7*ebCjbKOJs~c21?#Xk>0;*5Sr=s=n+kjKwC+iIL|~KZfyR~^!tGxET#e5N+^ix zOmyJwR6{&!@RBmXOoxoEwkz9F@^h$L3Go@s&6?lg6rUzpKKV1)@Hqr<3sZhooNY#B zOi86RW6vcdbW2#D-!=XXTNihNl>`nW=_GP$ytD`EHWi)^ACX%jCcL$hD^GmYW|n04 z$VBy^mpDm}5|%jDZ^ts23~cA-Xms%~lp1T6z7aA}+rWFFo1XMw|J4|&HmhLtO6Zr- zq1ThTX6eE+`KZFBn@ybRJi&W)u2oa22?^uCkV9f1GZJ$GQ28wcD%~Ar%t-a0*IbaagqKs5TJ^Egme5@ z`NPvw>1@#~3omCcb(-OpA$r(Yf(^75LTHz)#ibEv@a;-1d?Qb$+(hXQNlCNo8Ps?ki)W9hL`l0|i8@jedlNhh z%ri_ANfwdO+V8M{i*$gZ@BlAqfwmr3;JKbMeOM}K2T?czC_I(L{gc@Spwa5f1+qrT z`nDB53R2vW(S+{EXoW-fsjxN33i`gMBPubE5^2SEVG|Y;>s=h|K5A$m)?}!eLw_Kv zY2fmWt8bC^h@_GVIehwr9(`yb3!nY<1ipzhg~1@6?tEfy5o*a=*n!TxPGsAf?fqpi z1|n<}5Qdnb8Uo(&@SyiM4^8(+WY?x!*pD_88QG+ii1<36Z?{XPB>VoC*OLvI&()Jm z)zz50+7)iU-EMsOnF*G|OC5KN8A7dD%)a&mv-C}v-x5}!sKwfj_u_2p{PFM-J}G(( z#%Q>N8s?&){`4fLc1zyR1B@S7ABE}GW%aEsiR60f!758{@<~Z1O`++yNM3NSICC3q z?4_{T9t6&2;L58zS7UlcH3%S?Nk~So@&TY*b2$cNc(?lT2k_JxpO_9bt`kbQ6^(p06#cZ%F-Gt+kA{F%{r2?<=zKV;FnYvzl9qT zZHHu&5hXZAaoCpZ+F6lKBI=SgPQWfJ<9GYP(c>~Rwa70)(B~8&p{1in9h(fNHIufL z*=QZvHkX`$A*6ysLPAo7QMNohj2?if`~;}n^keP^Z~5z48`!V^m27mHC1QV$qDs12 zwSstAdS#5kEXiI|_JX_L1&&2P68s8ypAfO8I=)2X6mR*Iz6&PnzZrrNsgK*YISth)1F2(@1=~`$#w+ zIxq7oM8a6xZ^Lb~>G*q0MpmMj$VEIgFjSjC~=pPQwUX*_Yslql^ZkW&%(%7+qrz-VSnDX@>;UvB52^K z^+`&=>8jo8zM{@5q{rt9R%kD3jli4=GWu3AJ{@c9yS=a-Yc0JiOQ-1*vTksO{OHn)M$NO9e$PPuN!L+FMn@v!A20lu$8w zPMjiqOxInvO>;Nno_kAPD1!T3hq5)_$;Y&*s69O-wy(-zo@Teg_c&84yT!FrYoVQE zj`ui!x#D~PZuKp3_n<|FVs zv(aB(L0?k{dOohqcWJY$cjU95Tm$Z@G&p_})%TZ>5Xk4JfzMZ>u&w@Me6(rJqrhjm z$Ss&5&9L-N`s-+s=gB;1b$c4JZ&;XvXVtDOPc6i zaRyFlB|mpU?~IyANQqNi-r(|6YL~ss0R^6TSXP)^v>5vbSw??S)BZL z?V~2ObikBH%MpzRDzd&R;Y9Z_*}=1%+J01bTuvOAJLDPoF(b+Uv+glOD@r6^rWP?# zpz$+HhsLE>E2WbCIkip1f0GIA1Cj|{h|K{l;0Fm1ScE7vJ5`*aHfq$?PRfg(TP6|7 zHfh}|E(g6=ZiW%RGo@5GY#c@oFsv?GYCdKa`>u{8o#xhHXpGUhBsZc39RiTgUa$+$ zV)ZJyU+UuE~+ zZ9DkSggc`-82e16^YMwhWQsY|Rh6Cbf#z>%ruVY;$E1}2kuT^t%9%4nG{^Xz3NeIU z=KSfXkoLrP3m+7T(aN6VZP{1t5SQyc!)kB0WN4kz&y*2p-6ABIzfEP#@%5iG9*e(B zh7)<$YPQ`R9^=|!Xc>0VV`(m~mWLa`f4p#3Z`v~i61(*^V@{>7)jG}(PBVP$g;;np zyE&V=CIgPcZ1ivr-%)2+q$-0QCkz)>h<0Hh8RbXvoFJ3hTBS%sv>=$e)%TvIUzC64 zL-R@Ee@ECu<5B$$Kw~68>ka0(Bt!6Be@+(kk zG*s!XwKdw>at#fA!stgddW~R{qSP%G^RF$EqN2hoP<(uRbY7AB#C;sbwBrbqx#6OX zY&+18mI0EYSD#0cd1|U^Jn5hJ8V^|d$NUwx>w+A6f-}Jyf`@07$ z{U$RgodZ0dBiumF0J>A5NwBxQ+VeO0JIQs(jwidS`(8=3DSu9o?0tZ7K?3znR1jvyFLQM*HQ(0$DAcZAc4_;cYnZM zM8%2gzU5yI6tp>&8Bv4RaQeR*zxo*mW*${pM}8TiS7)4|2zv0q$5-f~>~i z{vdZ_Kbp^B(+KXO0ZV<`lAi`opW+D0)Sv{E}RJ2E&gjJ^t zOVp7W!Vrn43nNnKne3UlcuaKZ{<(YP&aV# z!28UnBYb%&DGEi1%!K88Xnfx4!Vph#pjg@;-5ce=r;0@2z>8F8r#c-b+_g3Sbn6E;rApk+sgsqUKP0*4p14 z(B&~y#qgt&k1DnG(76`#@z%$Zx;3vyCC1d4CFlx2J99`#9fZeQS#J-y$oFGUNm_)0 zXS~E)z?Iwk8-m6cKT_yy!nx4EkS+&!l5+`?ns<_@U-0FyGT<9cl=Dwv%0z5ky51i+ zUyuVg2OPNis(KS})4S99pO)l-Yl?bFN)(;PBjQg{+-OGlaX)e0JdK``mU=$ShUJxF zY19oJwCh>))`9WDW$;5TPoQ9!fo8KLLVJ_aTe0-(prFx~SGXs4#3MH|R%fk;D=QX6 z!aN|M$kNf|k3gAU7UVfM#I8kd$_V#~S$TVOPW2TeNNZri!-VKbNV{y8abbrLR-q=e zR2fs}3*%Vnq5Z*naK{l?KukOrt)I+haGF#me&HG^$^4>`5eFyZ83LcFvOa3cyfx6m zKqJS((;lo~?pNM5Fk)c>d|!*@!A#G2Y^@+~`(NRH{Au^4ohc%yS;_9zPyVWehLt<; znS|dyv5ASHv<^q_6FTa6rI}Qwio}tJ>oEtUrUjs;IA1;oaM6dqmWTEw>q5cBt6udK z3j50GFi@Cq)WxoeD#jvIBebi9)R=ctiILKC7`~D@Y%(KLd;Ybrn$Eky*!#0q0rKO& z06+d{NkQtD9qjK%ULmB7j8=7j8p6Xh9H3 z1>51ZWUiQ#6eKBRJ+!xXO{oc1Pg=290H@d?@om^L`)R*)K--A&d1<+243X#cjtTAh zQ;#Ql;hGNfb;pE1j_PT|bd_qVf;Qjk1dOUm&iCCsJ-g06+akr3$Mye7H{9L5ltg6pa|{(Ey(Q$E7+Rc1}ET*M*((I%V&pXa7JOd@rzd&US)z zyy2dH+k87(DsW^|hcFDzwBY&pCkl5=u+o4%oW}_uB#vuu5G&oGco@q z;R)6yo#k%KrGEiAHO2)wd!L;EioD{Y0HGlPn>A6)S!`?OXHVMvlvN5(2-J#^R~YN& zyl6A@#crwmsof7zR%0NlzX7VNEII$l7*u>3rk|c=XuiR-#?dlJw35C%66e;;`qV=F z`I5IT(&|7eVbwKr_N7%MdAx2i74*7uH8MePgb+>zci&bn*bF#CMNA2HvKxJT{>?`T z{)JSS@dcZ&gijRTzhX<2|0=l0C|mbxVK)6!`~B6k2qI|_kYqr-A_!jkaBI)gv{OA| zgt9$4iM8;PS%$_f^yIzAgBS42&4J8|^KNPT<%X{aLv`Ns7jJTDq4o!1g<+9Vm*uSs6>(#`@7Sodi7OT+={TzSR;9voen!v z*hcnvW!PT9&V~>`mrufX#VK1pM||R+&d%JU0pFeV*~e#-=Oe&9Q`=v-F+M$LER2=P zc(c$S6%o|Zu}9qb`$VCENL&FVelB<-{m>;2|KD|q23BjV)$s2r%uuNO+0*ePk$G+& z;+8B7+B1`YxFvQVZfT=(qNz;<(pV~CC5Uap)_^c7n4<)4=H-seFYMJgKq0T7pzNLZzv8--EcI*wzQKdij7bdyvX5M@lFz@-k z)R!e2Y=JWc_suV^o~Yi?*-jBccgJac@$D|=jP1yFjf3^4oj&k~L8J6=jr*v6(llh3 z2DaprL%x1b!iw#6sh?ww6&0**>29$^|H?i4?+1-qvCaH)sP=Pb5g*F}gmUkrmO>a# z9tF{pOtO#!((yXpMJ;825Kfw@lo^)DJ9N}33A`)vrg#Y)EV*GyGI#}Yn=ikdI-FmJ6rf0i5m@5#U)JZ^*nWUApY-6H+J&lG9t>BE%6rzss! z&#qpbF!x|$65ti8pPlrgGCV5#bD%iXovQ#OE2)NtcC6W>kg{CiQN-um3cF$7Ei-7#7Qti7vZWLat&dg(~?OC_%}R8{ClcM zZ;f>}Ss7(U2o-pLasCn1l6KX}b{X+>nhJQXYEmq`E^O{xJ&ZSwEk zg%k}oJ63rmVc7q-@AvS;eSU9a@KxHAwxxc zH%46l!uj`Zz1w5x$Z8;-8DcEoQXl&@LSyRKdN(K?jYMby5lobYlMKxAA0tHVycy2K zI_#Px?3xyFak&r!o8MVV?`ncOhXidh`3l0>32-`Adq3RoGa#lSL}w~dR@c8qdD$mZ z^!&|@Zg<`5h9X@V%%}LA@;ttB@zUIt>!koE4NlM~a3=mB^F2rQK8o|J0w7gM*E%TP zYPxTaDkVHCjk9RN$N9T;ZW@PTHno; zsPr8yZ8f2Okj*FQ%Of1<{xR2=ls3sH)vvm7ap5JHn%cQzRyx`e2qb2)5YIU%%J3!B zHSf?U0YA~sM;>)%cS`Oo2gaQrh0~V8_Jdb^5Zyt%n~#Dr6*51ez*D(!%&clhB^ zM+l^jb)b%M$qP?#C!mhI5vTgh6&AaIAmqC~Z;|~z$1UEU;1v~Z*UP@iN7;48 z4^b558^8urMf>i^`#yW$Xt%>%SYn=mO=_EUh=(6{rFG34$)6|OAEE%cu{G4n9+X+S z6wZYr=R&4c)hj1>+H?9c2P~(GRO^Jr_x=e~5k$~;K#;|ey(Rbp=z%o_<|zr2>#iv7 zlu5W$633%No9=ayo}Z(=UQdlAT5Vl~gR?Tk#`5fwH)+w6r1lK?dHF5;F1b) zh?y{rDR(8yIX;5?*f4?5)JA2@BvG)Cf)R$D8oDY~^nL%d?kp+; z2}fir=3K6s<9yGAHkUI`@+qM4dSNZbb`6N;8q-{rT7YFP=eD-$bBs`!cK@nVY5zoI zv=FOp+A=WZV#N8oji@hGn_nn1doALL>b}_QhzfL3yUWfwComY#B0tov4^sCAP`3a+ z8x(jdNZoh%15YoZrIXX2#<#T3etiC^FncDrDif;?j9W})zWuzt%)LEQDdne&d0ws>#6nIP+&`N{_JV$*7fY$QskJ};`*uWlAQZ}w)Xd)9Uyb2N4y_}dF5!O%&nu);U5FE~tSU}n_k>rys z$7Psl+O?rF9TzCZfpRe_i`r&p)uOeY`tLp63wrmuV?lIp1Gn|MAr`{dAu1!%g1mO#^d-x=;m; z9cpHtskpF&aqJtR2cJU%WcC-`q92h6dSaigG7xDGWV-bGm-Sm3{Os9gtJ7R{-tDtU ze4i$tB0&wgWgX%2$|T)`FU5}aUS|%7&K*D}Yv=;;@4@PQ^C#)aC7&=myUMj`{p2%A zSVQzO1XOOQ&7*{USYgp^R>BuA2Ii5J2r8W2N21L1wOidX8tb6nlk1Gy>pM~AcWeG& zkhv^8(A`k$e{x8QR-Zy1ByVIfYB!FJ#24$7v_^~bfhbx3UQGpvnq5Fm(1j%icph-n z)Kw0k?m%fM_E&Ip85@IQ=U;)yg0A@Z)A{A=d7qRU3CYcllMRDzY2@d%?LugJap&#) zTQ{c!dN-IFbLNfTceB3)nQQ}qZf34W7Gt>wbjEg1PgjloUUyfohorNa5L(q6a0?hy z(NVF)&s{W^8Wz}a7@A96ODxfAxN)evK9;v)CPr(Y!8$s|^sb)AWAlv^-~(&qo&cNz zwAT+K#&!_-dw_g|P+NX*E6|fpbC;8Lhe%60HTSfAB4*=8CC`8REs{Vj`DE~!SU}@# z@psXf!YZX7D4LV@5j7~RJI&1XWZ%8aczc5?u#?AQ2q(N__B)Ph$s&%f#pRNwKf0XA zIxg?P;gwc~(LQ{yjDhIb2XvUMVR1h+injkljpFYBCDJRW(sWa5Me2Am86}5FCOLyq zq>ae`w_PG=fYRQSjKh{Cmvq(S$e5Xe@s8nJonZ4nSZTlgsBY(W-{Y6kgK9+{XldEi zf7(%X@?P7-m~bI=_NiA5@J&2_MwIf_n!pl#sRSV}-8IWt07XM<73^YdILI$xXky5B zGZ{53(X9lw@UT#;QP=MVt+RTnv!@9e=ADv$l==K51L_tB)XcVU0G(I`LZVK5mi@jGvf5z=$GgS1Dk|%-0I~h-|wTl%``$D&z+N1$Fekcvran z8)RU~v>A3!ib#~rTggHO!fQImF$~KmB%fvVMg?&`fR*{9PYE+rT?={Y^g~&4OMVf4 zAf~B;5YuvJJzrNj4CCtqXl(rWd`rlZG!Amft*JXM_WDv-7BEjV0{X*6d6E8dECi$f zr3rOPgYj^R_+2wp=U${~4g?p!BZ7&CzIlTH&$KI-lGz)VNdK9^LJ*i~b7<``du9(sP+awMri!vF`3$j6z#6rGSsU-M<2q zfQb_)bvyU<^>td9SoZ3xU;MPX5Lbp<7`W9!V1Zp+suQ;-$wG`!5gdQyMoiNWmO0K< zRdEW$LyGfON1=O#(y>WD&ez=PH~l)bs7B?RavHK<^tOXsJ!>!9bfpUQKf1lU>7k5g z;cWZ^M=g-~IWfULcNdbJ&3Mxno9_=4?4kn8{p7h`#-HVE1{p6zWF1)I3>b5)CS_DbCGY9t$R3Y9w=_5kD206lnKqJ?$P zP?g{6TAk8ef^Pc&hW;`f5w}wSE+#4P*1uF4DrvmVUm78)_+z3QS!(1^2i$XZZ99d{ zd}xUoqj5RfgnZkcI5_o}b;?h)`V(*xb^g;g3jIdrwDdhYXD)k(L4?H&vF_A#SEVk| z@=7#`PDUz_o1{@p%k^BX^OKUce9v{k&@Y21aYs%5Jx|T0_Fbhldk63zggIbl2uu=J zy}$6d$zi?B;tzSelK;F|@#p9iL;r^I9Z9VaYL>;YO4`-C55AIWV-vn3;`~NgL-mnUDHYBA%&fg213~OEajbs1%qJ%6_T$=wA(`jQWz4 zBTIvT{n_xQ{r;A|2y!nv0PaQP7&QIAAZ33w8<2kQNbb4~AtLWm^(OaA%y0H|7}3XX zo~5)@Q#iVKyLeH;I)kyoTY^=rX8Jrqb**2|AGvxtSXz+IA?!aTRd+l$K%ChYMvWA> zG~?ebELvpnq&2vxzwW&yDXA1Px!%yi0R9FdevB7&Z3g=DSN7A$CX(4_%&)wNl5Qe~ zEx}L@^2}fzB@1A5z8=ZHG;dzi4C_|~GsDez*zG<5so)T(pzAy>1^n$FclBS>6_`=* z(YdPVnSL)?-O{Z-oF}=N?^%?al7PuqMU+NR*LeFUiFl|k9IW@`ay^Xw5G=@Y0IHjoy@K&4T?>E~= zfc|)%FzbJ~)y7)^#y8s10g20n!eK&R#LaEGYmAdeij%m!Ad+{F$5R!(+nC#8hMx(% zmoUV2t5)6^MBpN%QF|Y8-MPGDyH3$VwAk0w_%_k2D@tfxm@cWH1q)H$%7U|p@;w#v zSKpTrm;vKN`KD?bT~8&N5`MlJ9S30!_R0U*+{+7R-l*7>)P>9M$OnZOe529f%l6+V z7(!8#nK1*bzhfHF(KSE5LM(2k=2BekO)@Lrj)r|lw0K_|8c1!&Ky8gy35npgf1Dd> z`8D~8iOB;Z@AO7`m+H&C{v%}vSsrMNFw>%`ni*L%r56w;5eO8XPAmj`>AidH4UE@b z)~o!K^ytW1w!{pn_-PHDh#~gr@T_e_iLl5U37f&`E1qRqNR~GPY4&4~)D8DqNI|sx z0JL~&Yk&L4TZ>-?Gc#g0!Nl3Y?E<><1zGQVgIQNqoG;_e^mZ_pssEl8pU!*2SI}8`)!R%W?U**0YR4a?VgFW?XRCXQV6jZA)>(sb(5|Hu0kE6~8<-$%* zp3T`4EHOP2p^<(sixouH2_Wl7ZOr05eE2t_d$jnj69J#`N?OrA6~sH#N?nvL91xAi_#S^87Nzsr>8A)9OOFm zHWFFQmwx#ogIH)F)WAD-VrRMN#s8)?oT7y1zvEKFo12-5fwvJO<8-fs9-y4?#{=; zmMIdR1;;QnZcW$q|IF8Sm72W0U>mpi{Na7xNscmdbe#t7^37fJ8c8SjdV>na&y?3K z!xmi_xw@A$7uf-@Mo@#Z>{so+-mqcmw~X+KjbW(>uw6*moRh^Y;hD5P4C}}2#0n@~ zjR6EU!uE6|DnlV<+K*P#P>14?1gQPbvYjN7qWJF5tUkygI|mNg^e5-GU#?8vhpW@$ zoxii)MA-JU?Kw)64tXVOmoL14!+?O@#)nXZK6(p>Qpv9?aUlykK6wyD!6R}{7M_f} zc6(zR=7MzNY-mGDIO`nYc|!8aMO_t!EV==!(r0Xn$MiMZU^6v!#oF3h-8^`p*5J*y z$hNf^6Ld~A-?zGn2Un&oh_(wr+ZTJuWN>njFPFc})CcFts+Yx>KNUoh9Z@xX?9vaLwLiwHz77e|*+ds$j^{q(ih+Y4e;%xUpGom~L+3UrEnY{((|{s&+}Mvk z0_9ZkD6B2d5+>M9{ry``&1J`J!m7*X<|m&;ogvG2EEN)>u|EcIH;`f|+O(kEJpWME zKF2A~mgYi(3I$srIQt@GxUUaW+P)fJeW(AKc>x!?TiH`?5vy&0$1umWUAxloeq@xK zKD_@Y4OZcK#7gaaP&{qi-Zb~ZeIc66U{WqpOt(>G;?;HW< zRS1rZyuF-EKCQ?$MN~w->Gxi$DbGqdrcs4+_&$`~Mf7TL|8VUYp;se(TM3OJ{j0TH zUSX#!z=dO^OX^JN7of$F_@_;EETyf#`nAPB2amiJGJ8AseWjBOMzm7T1|#j84S(aW%iyut0u4gZX%EcNlNROQP6;8pLo zxPgB+MKIoS;A^?JokCbrJ$%!6q?cUbUf%B}bL0&E^s7=bg7%nWR*|=)HWMwuzRA2A4*dE0g) zSI{$1F;j{7H0sb27frT<@_-v!BDIU==2f$Z2=JEJ87KvWU4Z{zGR3D`LX8jOs1DnT#`yf z08niWj{vhmQ$NWvIVz{Iy;0FExq0L+&iDOWQwrv7ZS^oMxI<0Yf=}(#%hH7cGv{W6MCtJc!-wgl91YTCTIrX+Ev_YgM(EL8D}E-} zZ{V{HM)yG?o7fy6ycV+1DmUe@?9v%ZsLFm-p{%U!l|3nOFMOK)UbR)5efB zPL|f<=qY0mD1=w?sZdbK-l$<~PsFsZh&;RPI|=idt(qP0E(LIb=aO$C$P5 zq0rZ<>%!xm;L**B``(p+x_@4}A+}l@zb9He1xv2jDQZ5m{+S9)*pUH)Mt;Os@}(1I z+X>cOtzSTJsj_*KC(+UnQV#sz*s(Vm1fng^@9%**Aosv4;2yY0|0M4ZQ{vsE2Gtzk ztr-mruHMq#9Df0q7ufOE^!|8iQ_yyEd$_MROD9g+hQQy1_{lCTgY}7)>*xZt#`^Kw z7A+PCMviOwIY{SE7s0qjg~D7c$3z+Y(lI_0)!Hvg_`mj{->O5qM9OlBsT3EHyf|;G z9BzetJi_J(mgz@}@b}F%7Jt;%X6w2$m1=2{)YKj| znfEpGINeV@B1Rq_sw+Thx&~_MNV#bI$3wOJ9ZzkXP(ZYNT+aseiGxnN$7Ch|>VkBB zU+;u{r0{f({Ch~z&r6C?YB#&5Pq79)pBGkdVZIhVP_?>|D_x+TYGrx6Cxi8d<|wUl zgq!^+eUx4#j&nA!Kpe*XMR2(`Q&L)E*=ys1cVLMu2Oq0ZrF^KqZBabg`K1=Y0%qTtOdF1Qy>AIhI2%crF;N4zu$- z<;AON!+T3++EK#fF*`G71?k)*>>cFm!ZvV)2s_7R>$A#bOPcQQ2|sUDTEtbi046yj zBbM~T90Sd)8x`Njiv!^uWxdv`$B_E~|Bg%c((JY%d#H=CufBehskK^xW>&v0jPzdj z7>Mp$KzE`YaTxeFkf%qWXDRrpAa&q|V#iA$4=-kP*0%8STx&lk201pFQklEbE&&2V z1i!T-3I6prbO9LlybYPwl9@F>vR6xA$HS@;)+fGFj#9b%P2ziS`+%1w(M%;9+c6|; zp0bNU(LwoGQ+sv@LD0*2>%|mqDi6q-wm<|HtYXKw$yYC0qjDYhkoV{cv}FbmB>S`) zYl)k*$;n5i_Yo@1TD=cKB(FMDS1Ut6BP~JX>ZrOPSrtd@S>5Hs>9pn@eR9;_-&CWL zgwUEr*zCLJAJg~f`!I)I&8FwWm9+>`Iv50i#1ODl1&@6w{m$-6dGTX{&pqSkoLJWc zzoP}|8^`P7Ah8T7Nd*);r@HvmvHYHC)c|Bg0&8v&p5|Q+Xs^8+PKVt$4rQM@S8eP3 zm99^IvM!nk$=})#2Vttqng_mQtuOQS&Rjj6;1jquX2RZ(tvhp|Y0IMCm~50+EV1{Y zvI{W$W*Ln13T&u?up)^==HW5@07NS|pq0E^13=o`&78<>Zor)NGS9(A+oRdre2e!o zpSD6Yjl*5DFaX=DS?xbajz6tNhl|B4^E0t~)!o_(vIO7m=|yKp>qURtxqaa?clq>K z?>2?0TKDJsW&+z!C0ebSkk6r9QTj}crH!Bzi{Y&_oUxhtaIFZ(S(Df6Z3kMP>Zb^K zQhnZVVm~#KsA<=?r#jILpj(PyIE>QB-_9svsX^5BJ)5_PoBlli^c(-Ou$9mp#nM>$ zHazlr!wa(wn}*Lr16^wV^}P^VOLk3A#QjeXzrlD>Fh+{AJHaMC<`S?G&I#9ye7(X}bw!&KNi0q)>k6Bcm*ZD)l&Y*;H*ZbN>&dV9JlxmX1usGT zu z-H+}c2?%h*tj6+$J7VSccA+0VF_S*3`Y|Dgv;Tb`J3kGtmubfB%l!Px*-I_ns=CzR zbW!j=EwcgW0LJ$Wj0AKmev!8jC43cD#C0gE(lcj`p!>4tOodcfhX>@&uL4*%h^n;wH^U!BAZu znHT!f?r;z1X#Z=r17XD>@NH1D_+1eg1Pi!DxgK` zilICTMTPK}nO$!4+;u}fgCXRnbuYalng81)5w*MyVZhV}MG$0UZHQ9j3%PV4JDhkU zVWQM_dsy#eM7Wbha`pMeM~J+x7-JI?%J_nOMWqu;!ij7D2pR&G_~?e0_g`wHAO%4I z1vR*18vNSy|I29}Y)V7KjndVxSLm%gVuz{I^xcilXxInY^CeonOElr9Q8XonAtZCy zMw87TLZSfkMeM_{R~kQ~s;sV-hy5HSGPk45seZ_sKDJlN=GeARCt=8bH+F$^^`_$G zQ_7!?-i`x0SJO@3<%Ty`m$Ia{V~E#r@Do_OSUJCqPg8uMdAv2)Y&y=XzUpg>N-X0* zdU2b$0;e?Laxj9b%upN^v%8zyLc4fh3oA%1&_FG($Px$tu~0gV{$XO;Y8O~1RTV6^ zhe`BCe8!3T4D9~%LLi@q0X`2FH}?d55ai_EhgWEJ&Dkql3odK-C^&h_eNj@0X(p-D z(L7e~i3u$iot%k$?Y)0Xd~y{ZtBe@kqh}sT)k`gEB}q499~STU4!KDVYGArxeNtYH zDdt7cu6^5!`VE$`AAOI}vHe6Hl!Lk)6{cS&7kJIkzL})F@lq|rr%&9_Z7$ z>WO#ZOs}8VWk15>?ml3&Vtx57z1}C)F@+Co_WALvZ(GlgHRPGvU_44jt7l|Yxu|eA zRyrQBax}bk-+Z`+6+y~`1e*xQZ54hz#em`|zTOJ8XorNh6#@5A?&epDTn7;$7QC<2*Il^^!C9Pnj%}5l!*;am_II1><(hU;j`$9zPQGgS zQB=;l6CRhq7F5tjn=iY?p3|g7Ykq!XVH^xBr?RkSK8E<;Pg(}hMu}*aDQ0y0#iSpL z?qj!X*M6rg2T}7wX%qYar)8v2!ROTk?JmE9$53|PT; zJF2jsdb2M73z|`E<-On78jKYG>(^BbQ6X7StFZ^l;&j`Lv4iHl*%*>x2F-# zymbpDvfv0>wLf2vqQ-PB1k2^pC1w1FLY``gv69`^?~=T|s$Zk=*ahz5LK1>!T-m9!6O8B`cR!MY7i_PI{$@-^t$qv(W z2F3~zY*Nw4YkwTUKLJL(-q(qSe-Mn^qkmhDB^Xu}COCVzca5DRFh`veGUr7J?&(F# zqNS4}Xz?%66-BC*=J0yi;6$3?bxF3=K7C}yeD*7K`HOub>6pJ_f7E}3b&*4yG++=AStW}-w9sRch!#k#`SG!BB?r^<=$fU!VCm)e_F`dZXE20*e$Hs{ zr`TUCwdQgw>cy&BfF%b?Aej0 zc_pezO&G(%OI7n1`onhv4U6?9Cm1fk(>SGt5ZlD)07H7epm0Uegc>6#$STI^#P|Iy+RHhx)lOVFXNq(S_CcGQ4v0nM*L#tojMj${3TTqLY00Y*0V5gtV~JDs+&=^(qByKNVNbrOs*?8HX1 z^@n!8j}MO|wjiS60nzPzXg|PTfjm<9n%-|P34EBh-kW~}dn|_W=&_!>MF1ocAqmgR z4DpdKVI-YvTlDNUVfuL^x#AO{KFI0#;Jsp)jsu^??0&K&)N80OgXfxAz@M-!!Ao>= z6P6VqOiyVG$OVJRc_u`+J_vP|X3Wz~}ln!Xxk70R)>ZAz~f zncIIfIPCQyRVIYsqQcoH=)Z8T#(7F$t3Me9cERU{%cMHLbr7QuTCMCuJfB0(~Fy!)>QNkW{;KTMvt43T<;_?Rb>T{Z*Ymax;?h5fR2kNtgUMxHmZIun z{K4_j4pJ5hP?m$Tq3ADz{9j!TkSad8-==>pI#sI&g#WQ(lt+KyV$|H!bNxJ|j`9{W z$a=fs5MwFTwf#2Bc-LhxH708=Q;e1x>Wht@1wF+Z4)S7d7VV11&-w`kQFceoGVKQd z)Qt*F>WB;V@(3Qs5Ym*ybyo`{=fjuT7>FQLK+r`uLcl+A@}@ELq}PK-^}Ox5vtF9^ zduo5IDG|R$oK7w7BYJBhMz`R^X4UYCBH>dYA$VUEXW*NC*e?~`q*p_U@T&G9XkS|J zdmSD1gVy`9m2iU_pJT%Xr!wNIsb+ZvUZzjIb#i)4?62!W8bI1sU2QO7x>QsM4Ih+8 zgY|OH`7L-a$y)tVW6JqsL(7&`V60lep}|s(gJ-%&^5%fRN?nk9M`7G2gOsLzxuLftYm& z*uByN5T)pV(!f$v6L8RJupbSCD3`5=g6S*YDOFVkh^0e!6a2-8PlJ(x{r-mmd|G%y zsqfElH=1c{-HDMyz9S#HsuW21q}GO+#r^OL)W}2iHFhw~>(bBOc1WA#(vUlsvdr34 zG|Ux`8C^+)g}F|(H`}1;%<)WDx7za@gVCxu=ynAz0`HtDY#k=^4+ zIfML}#DPHUAY;R|gYsX2w$p>FaBy`=rS`rAj=^4!*IZCwr~i#eq;LcI>5fPwCQ2MT z%3swhsZ@eM)6wO&GQ|0&EBcd8pFcpfCCFWnt@~;7i2yd_$>IB{ER;XumYaXt>`vG; zi?+n@Ie9Q9P{3CG`09pP0vr5y%eN=wF?K)cO-YppfVTf9qh7w8fEUfe3SLSus`9@! zObw><6pNHgMb=QuoCY`41hQZ0hcoLTP;WFV+CFVxV&F)JwtG32r(J};h0rG`qw@qR zeHis*{PXeX`mfzmF9;Mb2-q>Xd0S zTKZyHhozKBt;$$G8h@$_!$g;v{jrFFo!v1ZUCa_UdV`6lB5h>uzL-2t>CR}b_(B-& znzQU17N0m%&dDHg)bP7^h*FLDa%>qtBn@#~He^=sTAc8_p&>MN^zCYMH}c21|2ElW zlF0FgBS%F02CxPNEX&-^utJP>$-#3C%0TX-G1YUMo%J17vBN|BF-QHOxyBOXYUW+ zFgO(tbyXZSIb#72EB95eZNl$KLT*=32M&g)<&jR}E{(p3E zdfz^=u?co3nKHWa{TFe|RX?Qk`oF4~y$&mpdoQJgZf4hZ~B?jTiD$ci6)Lt-G zW2OC`$>u|m!6(~?efs1dO`3oZq_vi3#%#;1)_TX81sFq5JvSdb!e!f9(^HuK8|s<+ zO83LqzMj727q!K|hOjn0JsA;T7gwmM8bw^Ig@cu1GwI5A z=rv^yv}$M~Dt#h6!@<{n8DtySUx8M>|On~t`-GIa> z*`qtCP-lc%%C>fF=7v!w;|rcUAm&{rc~rD_{%e>N?$=NK~?x`2T2o>$s}cwp*A* zgOqfG(kUU`NK1E1H%Ny_i!?}gcQ+C$-Hk}2bV;`$@J)oh_j2$3Jm)>GT5e`@v`PntkxHrY69Fv}*=Xo->Jh1}#_cNX7dbHH|HX z#(90e8K>-;puW&O zY%efa*bf~^2J%c9I*&O;Q_zteu_4o0?4MLrRQ6htU_Rs)(-;=R?nJBEFdyA?UWQd1 z-d0r!6_8D)qbRDGq@Ntu;dgpU75@qz)R?(hZCc|&fAZoCb*%)07aPZGrA=>o?&#IV zd;)DIDkGd0Us)gTsl)UX{Ru>wE^YlwQo-c4T73btQTOj@LTX${70C(9u%tKarf@Xu z5Q4!TNH&t44WIL$rwiPsnI@RmA5o;rZx0OL*odH8I2_d_y}fqjSM!JpS0dN&@gc|4 zAB4&H@bNQ_a`*6ydxk&|Y{{^JCHvam#RYnE|3XK}@3N34d9paHf55vd2kO11siGp4 zg+nVx<`{AU9E8wNCxh&Q%bcd{W4%}Fx2;FT6g@jwNw(H>Is=JGXm>EaJ#m5!tN+Rv zC+CR9Zd+#-DNMpW9@-t)Azc~{HJtB6FR3#-J>=2U)aDmHw>(@Uw8(UjH=D_m!drF! z=*ffO!vXLaA@d3RYFQ)zXQIPgEDfoL&-?C4)dMRF7bxqz_`s?Leac%5VRzR}$F zQ%EUPBuQm;!?y-{8gxQ!5&7SYyAVm}oSbXR4_YCiiMqG}bD@?-l5~U;Y~(m~l0b)+ zJxSa8l6+y^v|XX$MU2zI7g$ zK3T$1{fhe0_Iyq6q&GlSCfX=DJY`vxBJlG5aq$K#9v>*)f8lM&-!j(6QuEDsHup)e zDz&NuNovq()~6ejVeDnE5XSNG+dd219?MS|p%9OnBJQ;bBtwdA>+A&jp}fv%pXpJ0 z;{;DAbRD9Ec-1iad9kEkVQjMbx88oov^OO6ZhZJgS11bCT4*4N8Yw4KQn$O(c;F$(zp{WGqk+WqjwF(cKZP-u8%Wfs8N1gt0 z(g%|7L;FOF-z95$BReVC>Fgz4H5%YC3vRHW2-R}H@b@RwD;U>j(R};JY zhni{dw9n?fNYj4OYKlq^X8;V$9VTgWZRPN)q5M39yon?Lo54~ zHiS^H+x-+%r=~2(b%jr8d9kWa%-^q{*S6dt8v#Q`0w8;6+RJ#~;&uPuwRnyNk=DpC z0#ne(2y7T#$3unDNN&dwNDA@%xzQMf)A*mf4LOtSbVGboV7}lDC-zCd#r1`KG`?k@$&SPI$4n$4zRsL$trQD_HmG_L& zH>IU3he{x!lB@#{S#;WvtY88LV`1^b!5V@5Vz*h@aw`L8IU<`&GFbrsC_wLphGV+g ziTlSwQ0#W=+91k~@`X6hU%hwUU{-k`Q^!bA;u7|5~o7N zYFN5ICPr~MV=7ju06(ErmHU=YN-rPL&^9uUsuMD>kMUS!(clo$RLJN6IW;kg9nd4AyPhS!6Wqf(@p4i zg3qOgn75M|9tr7@DYRQ~MrDDf56-E11^g4j6O-U2YPwhA+=joI32CIP)o;zFCzkx8 z_hN=S8L+{+!Tx~fcJtoMG0`-vx@BbNZs-e1#uS*$gYJben7p0YIDA_}*2G4yvE8z& z`k@~wIZRAa8>CNfy0x_w3LHgjYRFa(sQ>a4 zTBWvwmMDz>(@!X<63NW)MHZTmink&sv!ZWX33ZgEVuiW{VWPoJ&~={C%bNpcfi4si zksGla#2gB37+}u@eja^AeS(;~S|YJVvUmP%OD7nJFkzPWA-J;pC(+kW#sK9MB+$pc zqxzT(E|v-n=Qp-biOmm+MJ5LRsQI1!06ew$A*^4d*NGb*n!q+S8alzZ5yW21i)yFW z^u8HUw}wIybfJEv6{Ret!PZtzHS89O#YnSR`p5y@g~`%JPIKR+32*&rP1fjWX!W;z z#56e7!*hotbN}cZFBG|6uOl(DLCk z#a~y9UG)U9r&%GSL>r(V(4|& z$>J*MG63TzY?B)gOJ_QxKqa*pk|K=3)6q^m7DS65&%nN6b7YYWHDkTaxjP|P8Q4u| z*CNI_VnteNMWEPK;y~OXE9&Z}=jJYt(&_3#XiIGcvO+&_#LfGgeAhff3vos&c#1vV zS6Qv;uU^t!wr!%l)&mgmW(^yhZx{9BpHc` z2@d!?&LQvLB=*4oJpuqlh-)T*K7zeT+$zG>a}IF=TI_>{SK|yjZ|3p+o>gj{<)Grs zvEsfX_4W0gzDSjw<}hJVevU%xHE{`hwXQv}J9XQBz;q5hz9`ui*zjJ1a&sE#uwU(u zYSm-Kh#*;Hg6rR@o3#rj#$+mlQM^hOIf_iUJ$DO&zhJSYkG`^85J=zcvF>gDF=!Ac1XC#{sm>k(iiJzO|XhoKZ-jtSq&X8*Q|;*{j-jx6%-g|2*G@ zcnlOa=eW`avi_|wUR1g8XFWRnBpy|9L95e~o!>S@a(|+)bWj}4J3VyRAxtb$RZU7M zqjdY>1sbs=>dwY&S>kVs)PX=Y=YSP&w2Fr6A(Z>Mbn}&9`eys#y1Ly5Q_$>FtF#;~ z>zN#u$vYruU_i(KAXw7MsGu=$Af~snu5skFhK(L&x@emHJ=*=2anaa>{c^jLqg?bK z8ZR;)CUw%RrA1ZHb=Y#DSK*pUp)j0c{AOOdeYlL%y}oHa>v_JZDL`l_X~C61 z8WEdn6&+GZFIjp2JduJ`OAb^!#D@;J9D-GQCqlc8Yna`MzIgQXAbt9h|Kui;R!Dbn zd_syHGm`RPps4`Ruut+qKtSqW;TN|JNPEpm3h}e$TRWjj7B+kb zG)()9a#f1CuS~VcPfiuv2hsaiQbc!=xIn;>Z_o@xuwJO0X6CC-#{x6FEAh^Ya@h%x=He>WD=uK!3?UEO1MG2>Jw=U``e9QL50 z4h>z!gxVMI7fNfDzZg)!3DXN6tIr1Pg&bm-80Hwc?JY(T#|Y2R5R?3mACWq+nB21wjaTy5vKg?aUUd*pH>ta2@)T4?w@0 zEjW1~r6slbS~Wzwu?ebv>~-p`G9d5@g13ESfaR^is*^8GrFLx zKq(@qGJ0W+MC);Adkk1(v^iuhLq}t<9>x}<(i80)d*OK_l@7rqF+%OBG6%&<1WlVe7J1G36p@2+gdPwT2*`$`F%un@z^5 zGIHD!GHBoStLqVRf$egQn%%-}SP6d9U}Sr`*`2jeh{f*QL10S?ajAB}4F}wFu{3CV$C8gvaDo~Xi6Ujj8z(ba%Cg9aM z^#Z-&)^+D`!O|Oy^Qd2@h^DjWu`ugR2Z$<$mqpcx%n>4|wmDh*!2d$>>BZJpkXoj0 z9<@K=tR6MS(O1Q`{moV=EN6Tv%@PUi)>WuU`yZ}C66$wpmY=v5_<3KWK>{Hq82l1u z2-en?FNCgSfr*H&hx^k1HtET;f=XqzIb55&4y&-?$#C22H<&;BEp z#6_yBt78gIpt;$%r(ba1K<Rgynh3ql1xco*dyu!=VY94^;mkO>4FG zw|GZhR`vJE%}@%fS@!Va+h7vww^MIgPwxje-wdEo;+`e}9z$8X|K0(XTg+6mT97>f z8{UMm=5R|^rA=?ks>2Qro^gJ%!?D|5vCZ)Gf&P>;Q9x#4#mpa(BsewOtiV4K0)kJo z*_ndP8;kJC*Rj^O+K4l)c^Z?78$wrj@@&HjiVoMOJ1)8ELeb zkOIQqPKWsoR@6v8EDgJiTn+c&&DJt>UL!B58?HS`|2IAnm3zAs67OB6?B4d>7MTII zE71eHQimekDkv9hi}bdAx?DJkb_lWWo|fw+_d?k9gu>?Hyp23%0<#XPjCV827#T;P z$dPq=W7wdRnz*Ut8LylTS)7gmevZ?mP$*vH`pe=pIUhB7{D;s%#_jLax?_@^Wts6{ z^e=*+@-bgqvbGPLxAQk7(k#=Sw?E2DR1SR5<9C?*e3iC53CH|NU`|0yC9gvE8tO?I zh3}ZZKPLZf?I`q#;9UU~U3p?2Uk{flQvkXvObwJk>T+w%c>rE4*rs015nC*RCA z4@a{Voe_fPf?N@VrCPBoave*`_1R58e_zA|>SGm}S@)2lv$9rq8C!!GR|MnWIF0eJ z+|%{^GItPp(|qAp;C>Wx?(mI8XH^>ea@0Vd4vXn?%AP8vyGmNXDq#dFF$yEV0rmb? z$?d4@+VMGR(AWHP$>k0SB~}m7R~$*t#k7R!y{DDQc-?Bpt39PRk2&FCBnQbCf8Yh$qygr$_I+=ywPz;c-H1h!JktF)wu zkvx7ENun}6{j4Kpc7!|zeT#)@{|LLjiI#SR>v|j$qw)>Az;~<5aKSyD{tmR)HWSBV zC!lywf%x#Ej)q8?l9T;{(c;+mMDB;5!#v)xpaF4qIP}iYC1t9VPaUZ=!Ru!&7ot%}SYpHOTFe=xR&6`9 zPi-~5?ZPp|zn;;A#VRvnF2AfBxw{PuU)b{A%^lxDAzBi52#!txKi3F6r{QZgndz7SI7^!Lqv4 zR~YB;CFGc83~AkMag!a1#h&>%mHS2A2ZPKEKyK7A?giES26?!s+7G)E&d1dFwdhmXb4eCjZeg|q9l6CA=R*YBRXis6Rd zCDmxoI*Iz^Xeb7C7o}vwn9PBj@zpyG8YcD31ZqF` z&6Z$x3U477&snyz?H^aw^$KK;%Y3b8yxrTCoacE@xf)FQ+zV$POv@3wdt^M`b6UE) z1rTI^9f`02^(-t$J_ZH;R?lrv>$}B663$he{DaZQ|=g)T;e-U*9aD(7N<3Tc^h? z{@^%a{BEJ7Bq9B&GWP)cI2ejPAkdb$3Zg zJODj)o0KFCBqeDL@y}>_Km)DOPXPvU#Vfad$)CId)owDaQd^D)k#tGQ<{=xy#^1wB z*xIY>ZrG9o1`I@U(wtr~opZdFD^aLNB1ZGQB;4~#%AVFRR1k-7VtX;R? z|A#Aj!B+XxZ|)WGTPkf`fT zOh0ifZ4c!W=f9SA^i%!#J!6Unwo{P9$CKg;h)YVinAx@Lyr8SPTtVe{%_;_3Lg44m z8ND{$CK?j9O}sWl9$mC!eX;7p?46-#fyZxM(0QP=&ZMw^{gRb=W1A;AnwZ00lx%Y# zHKgCZfkpoZWmX2e!9jA7r4*~&{liKMws22@h2uxv_4r$VYpTu3mtQiyz*U@cxUzsE zn{x3a#o|d8!p}|O2T=)y`2uM>%pai+&<9S<`^9vbOJ2hfi_z@U=mm9Q#f_8XKC#Zt z)jT+1X5LCnJ*6$iml;eN{C3TH@=?&&mlOmAc^!|zN_lwqs4;<|VFS%mVnMKr*@25oiKYrb5n#_La3*01R^@-eT4FTw4R7x$hn>1oSwK9W5C1TSnVRK} zy>ly2{j&=twhl_oE;{Af0#~SV>5uopeS4rpeiwtn8vg%V7fLT^sY4%|CJc#2O1_gB zsUt@E1|AJr0V~82vug9%e@Q_J_?3ckWVwL2@d$rOg`Vd8Y@2(+tU9m>((%B8>HS^jcYu~OlCijFK%6W0GhLn>;?`Iiw=+P;q7FixCPvYvroQtGe0w~H!i)p z;UOVE_#}U-)T6gR<6**Hdn8CrSX<4iE#CdwXL&#g&AX*z6!r%p>h|^KG04I2wmsEZ zqWW-<$K4>wIxi$+%C2fjLqFu8?PNVXFk$>yn!MzEOf!;PLuj0K#6}X`)9QC4qVMK5 zJQc7kfDuu9ocPo=mKiLM|+`37*j#pO!GxFYyT`!3cN3oyF9 zy80R5%KL#fKCbd%W=Y?u3Fb?I<~UVyH}x;hWr!~(9ZRgNWV{_NFVE>iYmg_%Z&d3G zcwT&)zWQC{%Bs%9Nss?qqT6OjsgxL|n4!(U!ReH%hXVg@}4KuQY!QZ0T(5yq`oZVys# zm6S+_NivfRg4CP3H*mr&oGn7=%J_3yoPV*JEx;J&ORSaH8gvQeQdQ;bhxc~5`gA7K zHBK7GBXuFpBRkGmzbtcy9w8(UN|Tu9EE>PHba8R3mGRkOKP7arBvtRYjoKt5G-F3o zeZ#^r)B&!Eg_N4H_BT!ZyB85aX2M%N!2Vpb%^s~Ky?<+&DjUlQn6$2ErKJcX|R}Ym9e)RrnQ!u2;Cip8N1eqT+p^y z%~0nhbJx{=?FEKy6tOK0_cT%>=+z2W@n@N|-ZPKJ4b4!{Cp7~^X0vtv_dT|!9u|`1 zk#%#o21Jh*gGWfyAv5xF2;$b*9-)_EOtVuOUFeYQg9krS{2|~SAt&^so zqyK8dwUTE1rrv%5Whkhxvub*T9tgRA3Cp%P{-RC5Ip;AQA-`UdB^%3HV8Nwh_w=omyaAYju8+#q%-2s8V-1&nVD zXi?D4Yly&GX=Fbn8nTNYpKPo!$_?WyLSJW5v=AH2o3&oh}-}~)$Z}7KkaVrAZ}W6%V`@f zaPh=U8|r^>@qE!^U`j8*E*$ZknDz&SY35;gII)mJ(xV#t>1IXk3Vnoz_d^#f?^BAk z9UYC~c-^0)eye);P~;Gvb-&T~+FH+Z1MFSz7m-x(Y6$hw1Xa{1 z<33aXa_qd^t2wpFg*c$KxYjCm2#c-#{`;!5j3@BwCOCg5)Ha7e-VbccnIqhgv!ITJ}`^KQE*`TUH zVELQ)-UEpa6V|T|98z5g%VEhGB9wM$Iq=?j#`fsnPpNAdSp=E98DAJS2Uw*yAY4^0 z*>3zOb`1p`z#lo7bV#&Y7A)&FGcBt1unlk`uiPQ407J$HAiLQ!4u!mt0B#StDTy~x z{JJLu$Nu9$qMR#J{4~eM+i$O_k_S->_xVASn`sgf$MGJ{QIQqw=e9;RWK}=I=u}Ry z0Q;dAcx7RhGs1{T!gOPy*aq2HSVHRl9nqW-psDQ@Uj;23Uy#?8rIqqIB|6jOf)myv?LT)rC~(R2h9G;|$ydL?C8}b*!GtM> z-}9Qq+FN|U?8O^FDHU9ZC;VNAYelUv}sq}G&s#p*ucQk-g3BF zErc*YsnM-UR;5=qg_?^yPh)U(E_lKey4N8qmC6Ob8mZQ4cv#2uYGST3W_wS9XlP_g!LDbCy%rG$5lM}9QEJFdmekAMIhM1 zDL95|dF~itGwMdEGC!EJPAP|!>S;W1^K+OuXea>`>H>)K)mCsOMG(4%J6Kl3uW!_ z3GdcOmirJ}d17tr_UJmpnh9l8-ay7~8Eud}*IDGtB^@vP`(}9otT;iSxOT{&bfEIv zzdFDn1E4{cM}bXwjgt1^$AjkMYEO#BbQFT3+{v#3E+ z1g4VBp5Jh%1)^Y7sbjJQ18A9_>iBwP4ix3?-7N7 zAtB59=}O}l?%=W~B!q||By$cD&e8I(NQ5z0)9ej++=+DQi*z_=#H6UUs4*u5$jgQn zjNXVYkp?jsng@Poo?ei5an-;_Na;l&;%GtRKKs~<=JyVb#+^PBDX>EpgcEZ{!Y?zr z{(h2@J!KG*iq%eQZeVpERy24m>7_=<@a3YU_N&x1oukC}RMUJ*YP`wvJk?LIO}avd z?iL9RtjK3Tkqds1!S`+YG6d*IA;%Rh;3|AwCn5X!V$F&mQDDMjqH?ZAW#2e_H#g?q z2Bc*kmYqPYq|WCAH~N9D5bGk3(PP#d>(bNE11bqYeb2Kn7K)A2*&=X{T-d!B+KqFE z3ynIqY{be*afc{V)V8~+-wp@i;!%ZW;UNT45w$gjB%?(i06`(gTut% z3CI`jM@TPnP1^fOUh%6PBtZ1dEohXYG34e}r~DX&lmGh6dx8VLf9yEt=Un*Wn>Ya+ ze)a2q0(9_(6d%rWU2=`2S#F5lk}y zC_JJr#0ch{t_p6olPF&vc)x6^ch0W6*fsS7i=pXkviaHmUh?}e8=_k$_ot?Qd2(ky z)5@PmV9r5Y`jZ2ZXZO}YEKqssjz`o->Zl6K^0oFKp?*H{H!b!Lal}WK&GEti{Juby zWZVLwa>DnmViv7kNNE95R`6?KM_N4FtSS1yj3M4a(!PQke0UGIlnkM8!t!wo%mOd@ z51wc_-5JXH@*gjm_^%3 z|F8_^lG4jdoFkVqei;ls8l$rj)b{0L;;}?iUsxh5=!3 zc`i#6llq9atVAb0ocexm=occGm9g1Mg_=gxkht$mgha6n-hUuVt)b{bOC@AV>QqeF{R~~$OXbN2p>jMO%^$H zSSf15q%%cCYPS$EM)xl%GrT?L^hct`aqz-pU6;g2e|1zT3?m(jxn3JNLo4@~FK2aa8`FY4LG4tY1}{@)CQ=}2HNrN&@b z8m5?lmi>*FfF9I4QlZAr^q-?pulyk)pSfRvG#;m`K^BAuBPCGn%M1I#v3!5tcA~DD zsM^V1$2~*9IuWShrV&Me8ll9VFtBRLO7RwjrI%if)d4H^v4v7xCmyGIQe2U^rmRYt zCcE!C3jMk)u9^245iPW7Fl0iT2_TH0E*zD`{uQRg;hl|ScJ zbKWELLKifZK-(a2 zPPg35Qh%g?zF|{hbYPyiA@|4lDm?;2QcafB+uWWsx(_pXEvL!uC_J_A=na^=32lj( zX8=_&?09AI8CP((MJ>4cxO;XcX^LWr`EOIKFPd(($L`Okq=K`joN@jlp>a=B{n;u2 zheXHSi=oJx1K{iLJaQ;=%aK=Dla5-$4$cm zmp}5c1Cry}!HNp$=L``)E(bm+@FdK9u$~Q4ppR2xFBOeVz9pg;ZKIj;@*-{{Z+Pa; z_~zb?iIZ;<7@MI>cOpX1rr-Chq+r{h2(bN;o5)lAiro0!duZl1Qr(%Rs+CM`@Fd=B z`LJ}ZvG)}TO!$Y!#U>V{biY$)b<~dnEX#bM2@k?ht|xujZ_cy~+ZOFU zuSZ9qBk~rnT~G!~0Igy|GU{=IUb1{^a_(Oh+J{%gsO^b_c%3 zgMl4*!HZI%4+AV@81~}DSL^;?QEWFAVZ>Q@V2-uzz3;YgCa@Yrff^K}-&Fp_Z+O4# z2kdJ#TK9J9x~(fSyhMZyMpQ(y(Qwu_;i*ruWMAxvqVi(qifQmX@=H$><7>Qmus@xd zV%PA-!Y1*O&~v+gWdiC&Ao~eQ&*=JM4y(aU0K3%X{uv7H8uZIA3F+K@Gss`~@6iZ? zp%DYnJltS8`rE*8|9hOA;{d96%O~Y2)dw8d0#Z*=%%((zLpw&3N;=Udp28!cg&+-3 z-Utp+7xR9jd>q~8?nIBYv9TtkY7X=1QB6Et25+du>{rT=PDflz_n$Inu@UB0YgR#3 z&yv4jfHa~czR~C4)Un7AZ>A#cx+FsjnB*c>AIY zW=HfB#(gZhct9@q++I<8yGbH8{p{vkrTwPC!^^)zRMbt?$;n`w5c=ji1D$oUJQc#e zmXujiHGZq~N{c2aR)l%zcn|hfn;0egz$?Xk8Hrwq@C%ItiM|%Ow?FFoo!L6P?Cg)x zVtkc)t;dne5-e<>AS(IzFmn*E#9l15(xKWd4ii-NkTp8IK>Z#NAQa!qMKm+;GO~`z z5OgRSP9k6~1DIQDV$5za)REpj3wmHxNdQ&Rq`uhuTf=Os&9%*YQ0~2wlldh2N?`3~ zgHg(W9HH}bW_JMAXI(fl_*!iD??^7!WybT%p^rFTZe%|yyiQN0%1IuRgU%X5gcmoz z)LkWRMeb1;fhcP(wQs&T2^w?Wi9rx_1M&Llo_!poAx9^#cXf5uTY^9xy+dXThD;Jb zR`HaD6*LZZoZ%e<$muH%G2&b73x`kgUo@y8wLs{>!j+}Ggnhl&g@!nMy6bkr#Y;wgOF8!=8_ zeL@&-gT^EgsGEM?Jp$u3{PZnP$`Q(~UTvAIQsNc#f)mY;Wl2%?6Uboi8|R-#5ov0b ztp!5$LOF~%90iJCW5iNfN! zlJB!Pyus>~0_u&tyo&s#JNVO?2pIF_K3HK)M^)|hNV|R$`ORMSV6qDn7d5HpXfo)t z-t&A;9*g|Aqhpjz*5;*@20E$52kM^g7UGGc67Ocr>@VfTV#HrZo+}3nu*c51=ozV_ z62|mEK1lXRPENb(l>9ajZBj9BbXaUXSBcXL7f!utiJ_iq7kqj@-}w#<;d21tuJYS{ zP#f4C0R-uh!;*+96TwFT#VE`>U%=~e2jaXpI-Sd_KR-H6ZUC?OV!@tdwOz@!s zgP`tm?z5KHMK^nAnP}+5gX3SWfOA)@t6V2G%y#iCrmL~-l{fig(n@PZ=}>+o&HNgw z9x#<9`1w&5??p%?ur9L5ch|l1-V_C=s>-|C@fHWgLL-&uCv?@RWidm`1nHD6+ySZp z10(|gYEzLH0{!kvR7p%I`+2s11#q!dx{jgOeJ^RoMt^s83)t1Nz||oxq*I`<-)`1~ z^=X>xWQ)BgO_f@^Y;0iz`}tnH7liKoM>S77lGE+20M$sx&mT5E%{w5c$DdPL%;4SF^J)go$nR2G=~X=HM1^bSQON1!CI^=tWemJ2DRu`vRhvfR zClFEaVbg~}jjyi{KJ?%fu4jAJrZT_@-T@r}11bjq&7p15zi%l0|L=I;Hu+OBZ!SsC z#TSU-iAN#_VLa8QW4z2_+E@C`8NlcoMrLy>k!AEEGvp`Mhtg(dSo3Y!u56ExT*&_q zTxg3mFSAfGKLmiXY#zoJ7D{bS6Sd!Qz6S=u#h`o?4ybc!`z!2RhO)dPeH%ZQ3_psaroinUIsvAwEp?G!|C zubfQwjjoY1n1Ao7Kbv#1p5)KFl=?zdQsny+nbp+4$&SHWNq)C~Pc&5&1Wz=5Mx%fQ zmS~DpuV95OB5z8p{LWZe6B+vVL{k#&Eu7eh{Mo6;A@OYyjf~@j$org9gC;)O8jjQx zTOzM~D~HG8Wk8hG&#oM6e;(aA&}NJm7Rq&e5{m84(3tp5b{w@E*F4UdX)(^&8tE+S zmQ7E1!E3ON9v4q1=_`)3b@niR61}Q{+Dr7z0>Nr-L$T2Y#O;AofZnBYGgPed`EL9 zYuo3UssFV(e2zOEBGs#2-RPb*LM(}Z+p72;L(eb(oyaB&?M*awurF3p_(&IXpfHxO zq&nM&%3pb=?Hy*r2y1BEHvbSF>wrGRlsNwKDbl7+4;ESp!TBk7!b;|K6BKmKxu-Ph)csjU6iVZnI6Le)@P@_Q8OrOKPtK-ZqaZ|g4#1Rwrmmb#V7c;=Uy4> zheUKVSX%y?Km91Atr0>a)@7nE?gL$4OepI(=OizZqCs@$Uc{_Y^huR=Lcd?lTlr7% zanu|YIl9lPDmA(n^44D?sFIPdO)EO;+G-)CR%iZhUnE+X)6Eie`Uy}US37qVQ~fc4 ziVYn%sA>6_zw&FfOS1A5@#mNN-Og1op<*stq{KZYGV7o)q5YoZilvI+Ov9Mo2yKdDr(F)B@NB zB@b*+qo1o_e_3^c5wyonU9P8asGkHh*=9DqFm7!gB8mv~(KbdCjxofj2ZBhWrueO@ zcwb$%7Y!R8Y_Q1l$5Hvc6kdj5kiaW{(lz%ZcAV^+cMa~QOBHwOlh5Ic0Vf-ZVSXtP zON3D54QJ%j(Ih|$$(EEHmXyK1JdE9YFZZcG1_k%Q04e|gCrxUcA#ccmy&hcX_k4nG zW*}fh*1!XFOvF+}hY`5yqB~oLvRpV0YX2C3gU~zfyCTN)SO#01tWRP@-FGDu5*CjD zKZ9TpR}=5;qg9xbF0rp+!Fi9*Kgw-2!)euu!zbcd^WkbKJ~I0@;eOm?=UsB$sjp7D zUqTY6`dr0Q&vINft10>U;hqo#hoHmP(e>V~Uia@uYDX$$-VrX>(o}Ct-6zF%V0bpt zp8F^iD(W`Tr2*lD1%(Du+@x2&^CCmXZO;>;6^gRwpS-zWp5tcOUug>B9?0 z;h3hKf-HHYE2;EN^jMmo$goxk4U0uqrBozYn^XU0B^`rGM&vfC(B-4vk6wbhbQI2@ zmbQvqzpn?mxl-Z-F9y{**Q<<%Qo|XG3SXz13>w=UzZm{uvkl<|A=uK=GoA8!pugn~ z8X6chB>>u7FN^`G`xe^0!-%UbpC?S~KC$rrIf@YVjOwH2R}iBf1F`f$(3qImLzIx4 z;mX#WNCjhF7X!Ga{TON}GZ;psg1(XZKZ*H3#||@bfx+-Ef~d2CN6ZipZsOZJyk0sT z!{deDPQ!3O;M9nVXF#_j>baE~|FXB+kk}`D8Qkrzhx+ZnMb8#1b?JTJY2rgo0}2(@ z5e40zy00eYIN7+}E?CoFtaaw+qXP)Y$W9li8LFOhg=)D|u#bJ0KC=`T=ee%EUwu-r z5|x1x_sd@)f<(YxRPQ8;^9yG?jpY^OaSka_@TWUAUn}`ui@$}MhGjwuy;Km73>X-p z{*KM!M0Gg7@h$g&rbhjqePaUqd==pHCva)MfLg$p&~$>B=w;0bw}(T+K$h%E7rcd3 z$BVvFssPk?Gh!6NAG^oC*2vG9aiX&Jp;?^EwhS(3N~?OYQV`)%ccL^-)LuIJz^Wum z64kM3Uh4ohN2$yP4%|trcHhWf8}bKX`amEBT(k#pL-yuKs4X5ydp^7tI45>29#XWe zOFy_&b4NWGaI=X>IX+oVOKVuNSkFu=D!7z+Ji5Hod{YOE3DXsy(BXGQEhqY^9~H4R zU#Z7YcHBK4f?&0&0=3QVWXS(50Cp^NSpU|-2%}Q#+71(qW`qite{g)h#&hNU8S0*) z)+L3mypv2YVbg;MLMCV1f?BulCPE6($-)g1Z<59) zzxx$e$@m72;C%2vPju&LU_;w})4)n+{J6UP9(k|357Sya`qrsl8;57|)2zB(ORdG7 z(UxaJ8Nw3&FckaGge#G^lg*2#ou!l=epq1l$tgzduhMCxOGUk0|M-KC`ww?GJupz} z04OS2-Xu^G*h2}-Y|yFIoOBUCi>_RWLM4!M&Jz64csgwMiZkmiJey}^zR0b6Q9RKC zqSQ(dm6nb|XXPi&vNedO@AtF{1pO4D(N1HF;KgT7m$&M*9k-(RETn$M5Zgz=*d1Zv zoSLFUQh9(P5f_9yk29={iHcJt^A8EmD+6^6>a}TUD_r|R29`0?jl4MG7{ysPQ|=xI zTQJlb0P4nXQ+j{v82=b0zKuPpBJ_>?q^E~VdUv%q*wvcA)s%vogMX9be2)LXIy$|- zoEl=4$8FOi@>p@E@Wq1zx+&)nwvkk^K7~iKIkA;*$oi2?skw=;S=07lOnC-zy ztd&~ZHElxw5R`on@f{dMEdXLd4cq(sUh(LEt5;MK+p_x-T1##GfB+`&6fpa!;i<=A zS0kV`E|wM&GZ-+Ss#dzB^dM`;H2y_DI*XNO{GuPTx@EWaXneAugY4Q8HfJ98Oc`pn zguT_?CF+6AK`+t1rpu&kv8lgIn4x;J{;UgulG1dQPL)`l%Q~I&5#jOc4!1UBRo`>w z23@$`*|+R#>!%6uq5R}|%whlsbZlv>&VK{eVWru%k zOB}#HQ*c)A*<$k%Ip=)I>-Kh>({6^YA)PUBMq;YonH~8YkC1wQsbhNyEU7do?7geP z!V}YS9yUnvp>k6<3+R+tapO(&#`~z!M{y|XPDkV(8=8ra{03Ul_c!B+c>8!KpvGOt z8MMmR7OcwB3MqqHt@MUUs_g5Ex> z!gHs7f;aqXQO3$r$7mO*T!MZ?R$%Po&Iqki!8kW*|2BfupltSmswk{xlEWNOS#YA|FvzZ~Kqz5>8BWrIN8S<^0Dl z^i%HJ#|&eIdcB}L4g`E7wO|e z8r1hiWut>Un}GlP9a`x-!oOMEQY8a%B$Sjqt#H`K5p6bYiMxV6Rey^!F`xcduOk*T zG0H1u?FuySeR8)grq(uWTk(XV2lx|bt{N>uuIt55-8wsh5x+(b&2UD3hnEev$7lrO zBE_BnysT_Sr>sO2jKXopL{%iYC?6&35pIpfJtO(;olpYWCdTG%s7ai3%OORpwn|n6 z>c3`~vO6pVCQQB7Q#@l|i*ak~go*h7XnX5`tk!PrmrkWYx*J5gyFpsIqy(fS1Vli( zySqE38!1WYPU-FxkT{cA@4|Pzd!PNC?`;0oXI|r;^Lg%j%rVCAy68N4LqeG!Ts|V` z-&~6GQ~X$JhKHr1aG1-Jdt5ssar#YXqt7>ruk4DwE7rg4<%Hn?_|cpimLS^ktQ6ua z((|EzCY~w0$XOZWT$>_wj!N@)HPM=i zH&rJmIgZr9nSnMP@im*8xi7I$60kPi zG91Aou1wf`^gZc+9#E%16_?#3I)}w>2!N0RA5Bf8Of|H}8)cv_`Z4uPU@Oe;s*)Un z7GpqBvWGdO(0QtyfB-+hSS;}#g_M4ui^B09WERscZOC9g48o#mzd^290g93}t8w5A z28v3vipnJD4q;H#2eHT}JvaP@(&44vlMTyAjIoj)wyuTaqu8@=?@+pAuiI=5pC@KI zp+;t6*ttu zD=Hiu(V^Py(O>QgwUuN|*I;&+S&cqdgh{e51vp4*`Q2p8)0Ns|p1W$S8JaF-%@-rO zRr=-tX4f!*_KeS(wjEVwDnQZrCzCm5RcRS}fX~Fambzi(UF$GO<6QqYP<_cTB8uHTxX>a6 z@Ak&{Hv@LJ37xTZ$ZbK=OQl*NF_!Hgl!rdY1JUQ0E>IUSnc`uBq~hOv!yI{8Z)G9h zMP>?L6Z75P{*IHYvteXqyDTj&*Hw7KBc847DQ)_x&tmvBf`qw-yso&U*6Z_!b4AG$ zm0EyGlS0b1Kh9FX0sj-dqb$)UCusJhDz&kZfU9)E{bdQJtQ>2Ug(U{enQxom@d+)N zQDyNZi~_I>mYwTB4&w%X9>NgI(}E43pcjQfn(j{{kox1)5B-GTew3dz_5f^JAbz|u z@{UO!iWJMfDE8r&g%zZ@RpkRRa?2ZOb4YZ!Bh#Tk{rVsgAXQnzHH&Ya`SO^SG(S#@{Unf-Y~W=F>fM&vnSU%)J2&xJI%y!$ke5v7kCAHT`KEWKWfVd|0w*` zGSMzjb*xozC?96^vHQst-8#z#!+ z)IO<}XJe@m@3fT)Qxi`!EOKJ3qrrOzYgK>e=qP?v7)lHkXV8xKT`ty05||eNgLW9p zq|g_c(3$W4zz#PPU;F~^I(NvbZTBRUry12+(uGQerMaAphBH(A%?&Y5n_%iuTYoBr z%bBM2xSnbCmp3C5LBv|JN@vKTSW`jF0b<$w9|+FZ*?tYUSQFu*70U;a`O+G({fg34 z4bTI52yEd=U^+lxK8*6e|BZn&-00*CJjcJC%UpcPKbu~E-EADWK*@~SnUl&2aG_ne=x?=A5VvNO22t)Aq$v}Dh1-Qw_tAUXJ{f0shxLRiT9IVQE> zZ;v|fkSYCc$C=DvOn|)t<$3{074x%F_|!(jQUG2X26Ee%MACq=OZLmlYRn(z6)Hvm z>(GyzKs-Y8EQMnOuPxpZVKNk>++_sQzuX;zzC=(tYVO#gN9DzfQY-Umli6~@hx?24 zM87_upT5`o^v`0{s~`7}Rc@d0U1z|otE*j$!xv`H@+Y#_K4%%9b~^Ug*u0Degr5cc zs>y_Nd^B^k#qkGpwcQ2DI6`2FxHe3@feWTB(H#*kkmE+{`{|h~aCo9dGPB+Lp;0`c zgKXnu+?|1CBy;th%9~0KG7$|YNH>}KN*xOtx`X|&=-=rdgc3dxY5)jL2~xoXwftkD z#qermdHYj{ewj+Mv>N%dAt8$(HBRSrl9PeLmU~_5>#TqHJ|~92WflbTVqZFPo^+Zp z!&$R#PYzl>Mmk^)-&FK6iv*@97RJYw{Ee`jUf8j|N|hEFRuC>{^BCI)mdojd2QBnZ zw7dhf#4;rsgC+o4o`Q{d_5vdBz(ylHN6OkWMy9{aZ=49Q2r{523ZX%DAHhaG0NAMD z_oTVwxwMT|cCU$88}gkW- zWR;`lC@-}aRENUe=FY21sD4(9sd;8EMu!RdqwJ@)-iL8VeQHq@F^%WUc|jl#viYCL zHUwmk2&+4QzWZYd@40+Q0GBUi`1Nw!27Xv4VZu6hLT5ujSLAck0sqx(Vu9J)pEDIL z4Sd*srK74pc(sloY^T!B-kCDFO!{jpnla#DxOT-NPu3aPuJUlMlowNmpCUa7kb5G) z2oR9YsJix;Bxe4vC5huWmk_cix|}$KSGGm*@2;AqiA5u22IMMPe7Kp?>HjA~q#8#3 zFk(Ce4EUBFN~zzTS*W-j*)0auR&pwOeuBc6EUmNI(|NY=_}`{zl`Uww41i!seuAnp`+IcNQn+$&6f2JuUV0&3~eOf}h&% z@8b_UF4*ek9_ho3$u$4h{3w>rs#h^T;sf&*CdNmq#7QcnPlrb=NN}v@1o6NdJ-Ha; z<)ASOXE=nZ%+EAc7x`TBPIWjeN#DE-%z?NdP$rAf1+>W7Ej^nBHu7<__!f^kzKxOrPIuT_)MGbr{tB$DIBFs zBckj6o!F8L-L(_N#Okgmm3y=heqNPCb}8mRPms#8zO0&-lCpP4c)3a7Ip@VR>jrLc zZ-7#Hdy@lLoGc@9{iDM8@5x}NAt`Vo?0-{^a@#in zrqL*7UN;JVK5y)Oxlu3X&lNr|_k0yvi}(g?R5eu_k)E6luCQ z$5&gzbf4G?z4b=5zKq@w_ksVA1h$)+XQ_}t6I|oX|9iFZ4F5d2Vet)9*pIn60VHbG zj$UXo&Vg4wfc8mNp1afeJ=Z zc+#8YjlFkdX(ng|r#wlV)ax83MB>S&C6~N7oZBlY*+Y-GFutLt);w4h(AHo*bR-cM z(R^x6vD3fmjQP08X#Z8JxAK98S^9g6xP4^Jpiao4z>WK1EvDdkMHG#_ommz!0wNbO zV2V;FvZz!#cl)mqQAmjHthaJH;=&(2NP}afP)0z8Cm;JwXU$Au^zr2V%_SyA(6J5s zmC5dbNAc!m41uTtN!xxkU7lp9rwt<3HYN8Xmt;1prUyK zK6=deNJrn(-gltxQPUv%S4J|_q6JC8T)uN5WFqfYZ8Ouh^2L%O1Mlt@j)JNNzat-^ zWG&W}Lk;LenG#A!6+P)d#hN^A-I5uqAmRCM z$Rm=;&|R$^3GJ~;L&H%~ZNf=>?NRVj4J9`UOV*bKK<7yTy6mF72E2%fIoFG`1h$eL zz%yld(ww5yocs(myRBsTY;$a8!<@$cgGoltbw11R^xo(PpwRfnh7#>r7BolZon=a6 z?k796JSxvA_ARJ<2$}lH`8w zldo4U9A^z@9nvZ7Ctf^7Ww@u>lI>mIxu=Nl{WAD2SKPR7N2^NjqVuqS={(uLjDh{j z<;RiqJ<#y)MzDL}(HSE2Hw8b-FJ7*eMK4+eYo^1A zt64dmP3{}OnIgEI0`)e!ef^uyb>Lt1I}!#E;kU5{Mh!9~Udi63rEPx{g>yed-Kt&)u^gGez1Io!$L!kHC)y(XK#o5 zyqQsQvB>GNE~ zT13ouzF>$feO}+N^1);9@z-Vc50}}X`g%XrfLp$cK-C~8FEb)(2vMWU+qf(ZDd>b+ z>7bq6X*#Co!mS6zel78t{P76m`XmSwAc(4sv$lV;{~o8!*zS{dcAi_OxagjDxxOW( ziu?NJI%;E1+U17t;<+Ns~AMAv_SQ-5ng12zWf|UONKbiSOQhOopG8!|K$Y4#m1D~rWggu`g(9lKYv9z zf+R%hMMWNC`p!{HgjLC6%h4WvT$@P`m~61Zg2b<$r3kUfhI;;I=GDF~D|Va-$&eji z-Sc-sv1{RQ2BzQ4m4i==Rbu@?u?-nMuY!ua@u1c=8s#^1{I5@$pZ6qRI?VrGOxC z{BJKc?n*Dm{j%IC-ISvz4N+u zAmvTQ{9KmHluZ3E`CRwhUI+g`B?D3qMYNV@=SRy8$>bWJ^ItH%#XdwtkM1cH;?;&> zOD&_7FP_y)L=iZ0u0aMbTzV#y`;AA^_IQQri-bv!z1Koq2?TO0(uLj5{G^0|jAHJ) z;Z^xr_G^R^F{HrAX!bd2Ls#F6!q^9$gHLpR0CYA&a|0kFdf-8Q+TU;oGE&X?eu%pH zW?(hbUu=)-n(g2Szq7{zktA=BA#*u{CuS^}X#(>{)dlw~LzNKJv)V{XVG?r-R?Aew zG`p^rX3LFp4~tLZ+ti@NP%`8ppV?a{#O6nXF}t%ugC}0TeqJNu;A%ue86(n0`D-)bom8tl3;$xf81zhD?P znfO+aVKs*812!E`8f$iE@b5isfpc<#NY}0yf5x zkfF0LT;+S8OEg5kf?+E}m=Hx@p7>i7$0Qbro3|Vdy`4m32z>Z#gnQOhTv#U!{Rv6o znSCROz0J*|$~3;V>vPgnCy(Fxg(qui39O}ZWXA%i`{PpHc{s&yE+i#6iwx+VaLzeF zixx+c9qIajpgOG&JFOr)BS|Y(w2R~TpUHR?-%1-cpXg$w|8Q!%_i-Ba!DD!(s7w|{ zf3rv0n_s;PQRVMhRppB~L!^UDX|W|4g+L}5Bj%DBjC4v|tOM=y9H!az z;Z7esQD+6HLvP$C1AS`7a?d)Nc5L7U2RdGF3AZEHqFo<j2fLbK-^C5JG%$>?8Ql4fXZ4B=1~U1J!N^fw zWh+KmFyEIiNVr`WB98Bg)umMgY}Qvonz{6ox1Xt66TF%e%f_!=;ra*pqZ3A zUPD~{WZ}CLEP5^WBU}kR9FoK1HDfHxx@xNBLy$;MgxUZ?SwFROz}!CkA^ooSqP)_)(^E{S;1{P zXFGIzX3dcd4FPHER%VlN z?zKyASsjSx`xYx%lmrd>^+EEpExyJMjH`*lsWKD}=bt|DV&;QqaPW<>L-8F#N6&Ro)`Dm`lJ60gJHV z%Rz-7S`rFVA*#J&Rc<&qMBdMIR!fm?dB;G#Jx4F<>$)-x*ihpD) zW6#i}4&w3_?<5|Js&brsT9D6@DVMC3(1YWH<#_bvK>H@3XZqjzw6x1E z0q@37&@pUl2GQFn)s{upWR%aCy3&lkcoydg%J;B0LVBSwjs~ZMU>AvI&&J^UA!82w z4{}z@A}cS_zZNMWTNx(lb zj1(?o(+}uy0+2{u!_SGu%RDfZQfI?Suck=aZ9G$umqUsung~7UiH0eLr4(wcyM7al zD{6TGg-tAp|77rKw%(4+P;%a!wP)T(dFaB4l8MCu#(KOY?BNg&r>p)>18sV8+p4sXD9~1v zs*>WZl;ZmY4%JBSw&mPz(f0-Vc;=OANIur^w2!_ne`mX!wmQq;dUo(k;YHR%6))IP zicC$XC-R!-Ioh5{TNH=+Gghllmqn$9poe}o$4z51>0?4sT?r!DCa^Q>?CeaRMqYoW z`9&;=;c#oz$;qLyP`#^xlJa+Jcul!&0PkbRZTeAcP$yw9DQ8^NTok*2!JT8Mij}-- zpi(C-?vkpQ47mo-mR;xbSPVB&O%H zeM;)ts(hTiBuO_lX&1@Oe$aVm2X2yH5j=3ZhVr zwSVNka06Tembpb<>FHHT0l%daCbd|bKbyXvW_>7bdY?6VHCZHSee)i!jAdtsz6Q8R zx0RxG8d}pPdI0TLakd8%oJw&2H~Oq%btNJ~YqZaK6vrJMDc=pX`0QnY2{yVx`0LI} zlg2!4(}}MpEN#zdWjF8oZh?Wz;VD+p=a~ub83*)9E8Adm97Oj5$63UC)s2TcZUH<} zR^j*FE#u44aPi)myKLB~&Zs#}%YkgKy|4LUuOxi3SAGQcN`A3RO3;x%Qj|O5>=rao z;Y=BJX5O3Yi|`=13BBVZiG0S-PEnBW5is17U!{!e7(J$t6qKTz_M%|)U0~Kkrgr3{ zV5i-g@#wHowQ*qPRDW%kwJ?m)C9KTDPgOXWu%13wTMQ}7Vrc%((;0*}^fm?ya*-Uw{CNw>`?)t6Oau|N| zX*fLy4o?*=rw~I^vJ70sSSO^fX!}^pTi>~%l1=N9!NG@c>7Rsa3xo?2h0c7B75%%_ zc>J9Mrxj7&=Ek}0rQbjbw4$w69oG;W@kT+pRzWV%5+`1_*uC6yxS;;x_wL(gri?i( z{TSc8IFpE^3lb~qEF+5}a{-Hi$i*EZt2kGgs2)@D#K^Gsns)pKjGit87+o#0`_GNv z$uPzzJ9wRjdH0CsSu0enzjXhr7RCQWqaC2JH{FQ%-?9dPK6_f{fFRphCDHeOi9PRf zz5?9z<`(g0WeOZt)5YD>cIq57g6uFzjzq{y@l+$G(5k3=o5|54S%_J)TU7r(!Z-gu&#}B-xISdY@;ToI%ohag+99J zmtvGFw>_Q*<(}xY2XubFRqp{^{o~PjXolmhow3$F5Q5*`Qs>OMoGslZ^qkc5RJH1G zmRNG~H>&E4LPts+(hT>Emfmk->>Iw2-kotb9MuO`*+q%ifU?Z^q3-CYzZ>LSX*_!n zv^-01nSz+`696Oi*&?^4{En7Qb?SFB>bphd6B`7{_}WGBlVm#;b) zncUBO|I;x>_bLxvGHC46Ps!cFo8Ls?=Vdrb9*+y4^JD=&0Sgdbo{?uB^;AFCm;{Qt!SgF$c|5p){}`a*3Ub@ z3{0#*U@P#|6nNmfqPh4LNKNrDw(5WJy?j}x3IXf8xv=0Xxx}Zz_PJmGx6G&_yBpd$ z4$<72~89)1IF*Tjx`;SE6gR@eI zO}}I`UObx`!-KiuK+1ZdF~u=Eg*fm7B1C z+kNz)5wWq_kyo;WNypi}MUKlK=5M`UO>Nt1f@#^$nxr;;IiL8lwt=s1HkCR_`^goe z9nQbjoXDLdl%9b%@}1ueMDuc}Vs5Y3BpDOAaNXwP!{Ykn7JLS7L4sp!%{@Blj#2dN z4xQBJNO3m_%MCmwT7o3{jpYHP{YzI~pO;o)q8Ar=NpbEaFa9&{yE6N%b#RXjtBTE4om9&KxN7+W=p?|>w?8wzZl@_+eo@rz zI>Chxet&VX14DtHvFviwXV9^HwRNKdqWd6NFujK35}uw^l1r|5v3A=z*bNKGjDY@bKC z_S|S&??y_i`60^GCs8^9Q4$*ue*rCj8fE2XzYM37{R-%%4_{^)ti{xPc5$QTr}}Hy z*C*lC6v`KK0vqsT4sQNuAiGRCAx)s?uJnE?^Ic};-#5oOj80q=3pe}~QI<2Ag5FOr zr8IN;!Vt#dIgmD8rEH(@&v0Q|#jz(Qt%~_WXY*){bvd}!h>=}&s6Y_I^m;OPchU3) zvk9hhw$F_@iXB;2G|pH6>|O$SMKySjL#-+`9mQKfSnY{6W&Id6wq#I z>y&HR*&25ch9ADw?uh*PNVfwwX#r~?<3IPMG6};2%kolti1u1-HVKK^mzUM;G%fwv zwIBiF&$+SrcY&y=L?48JbXNPM1?@UejqeG4%&yvXVJ{iyP*1~0wgy#Z;my|SX{aB!0_`l8n3-Loo(+jj97{aN?lxR}K z58AP8w$$hsWV)tv+yeF9w|}AiILqM_Y~`-nLlhbW0N<#OUg7=#W5u$mu_we1l`OS6 zFZN6Tty|vHH%>-PLc}DEjZ29vQgzT-t#VrMv>7@^UWZ{(hhOMe{X{^{>B>7pm7dQ2 zt@f?bFpG-$59kZ&NNr3tTYmyScPijx0D#>aQTZHmIAqMzKc9@IO{~UQW z`jO5WM~$(pv$Km19s<*~DEeu;HXcI}B&HtEp@xb}_>6&}Y9EdpvPyzg_k8QjJ~~x= z7cV9!+!S=N5H2JBleemF7s5A#kj8t&aV)Vm9%Eb1{{iC|`U3{=Lx9<}C7b60gM_q2 zq+V&&Bb8tGV9dJMb1j-C>2nI-xd~e!d*y(27*Db+=^m>e(>X5n(L4=zmqHlP#Et z6oBSsl-T4?sc*1Ee)=Z9)R;;U4yZ+W)w2^LsC`S^Z=MI|kC}HRFJjE=p59-L4OY87 zDjvo|!{e(qpGH&raXpOq>Xp*lOMl>%h`dJa-cgy0{26Y^k9O>;-^Q3RqG_=I`UCR|| zdJY)F*2l(97XM{}FB~pGJhX9F`5wve@g3a+skfOd}YW1X)2mXXShsZ!K_JlFBds!G)iO6b?2*@>^=~ z*byu-(5=kzy66@Bcxy#Z6;);F__DsL5aw3k8xxstvAKi8kIl*vL1I?J@-?KW&o z9(sF`{)XrB8MKMC(yx_BiYOk*$JFChjYW=1{g!R0iV84uu3%+|(ixHDyTZl!q(Py2 z7gkmG%wt1dULK6W5W}VAjf`#M@s|eLXlTxhV$X(b1Jc+xGMMNyn%yGC(Vk6jWrQi%li~=NnAM`$bQ^TcSa z3QwnvSlJQ((uDwVNw}XNBLkxBix|m(#L$hQmSh5Hbt7tN*ltyjG8Rkl$aL# z`ZC%G+4A!CMXTWp^?2S&^2#FdeS60meeu=PBJp0m3YeVcG|63A*N3Cd!jrwv71;a8 zJ)p$y&2Z4{`9PF``UBJzT>P0#2jIB=@d!7fR61H5`zEEg{`E;E^Sjw(ZJ!qXuXHuV z23VZ%)iw=;wAPG!_8mt02ovH+gaW;U-<|WDxt+F+7h5cAw$)vTHdNDT66axOEa*K3 zC3$t6IXUloR64D#BH#wr^kn&WGHaCU-{e(Hzx~}6g)Hb*3jbS{>wPBO9?}OUrslTE z4NL???Z1o4s<9^UQy(HZcoK;l5J}4TV(k6Y=)aDpRR{Ai(mr3++O`v_ zX7H*yyiSoJ0IN~TmX{TmuV;)WY6c3*OFx3LGkS@E3ySV=_hj;6r}JYHajH z(?W_Vug)l)ll^)UF``=C?dx}(&xfHqLArNLB@>szDfE~2i@QSJ>@BQVpAb`|Pv-a^ zq=8WWT?%mrq#-scW!<;a{w?iDCYZ}Ii6W=E0yrprvkv(_t9ng2$cdwiM$LpOYEq6Q z@G|mJZvzRFIz+ve?&LdlS9(rB_kms+!QAuO*Wd$ULMsK#?(^LhBgJmkV4^>Vjlb1B zV@WF=a$a1`s%Gl%!obG;nH#sgUPUhc8e0c9KWaBJlBZ5TA!5XyE^CffB;t3Aw~v|J ztE8Sh*pzM3r z6tWaANK|P(-|?{(HtwgWID~#H0zI`kY6F!N@6Nm>V(RSzF zcjL(&ko}6_h{$bl0EFU?-rcN7AS{3@V*Li4zL+K$55ZjI7&4VcE&VQ)QrFgv3pur+ z+x|#YTYZHx+}k|xhW8Gz6mh;l2)z)gE+9Z?JGbW>;JpZ$J_r)Af?q*%dofdi5K(Pb zMefJDGK!Ca+ZX9@v@PlB2iO+pVlhyIz&w5<>7PjT0;C?bd53`Z-W|4mP#>VVeGQWM z&s}39UM&=hf3e*Qn=4)kj<=HN}f= zS_eUSj;B4oTaV#51&^T3=yC#&Fa51JzNOM zWbbr{?PUkPr9vi<+Nf@$IqQL7{<-^SDSqZPENL3}frP{FxE+*VQ*oLG^^+9W;zfLa z1AJHUZnxm;4{>LWiF)92pwDjAIET#6xae$>^QRu;FWNLobf?I z{lq;#zP{KO%Su&%XY&wvUk=~v%^Ag)htR=&Nq+t%NjZm*o9KVK& z8ffq4Rj3gf8ZcK3DwJp1GcRYOI90fjy2VRb>X9}vD_17K7g{IBM&Rkp{MCi)xkg(jWb2T_XFIKi%vZUMgokZ0vco& zWZUd#gsr-m5eU_IiV;Z^k}Q2!gM%=Hzo1;y@p=>Cx8=XGj4WGup@8Zhy!`3B(9g+9 z{vz%ymrFxyv5x~_E5!)C#9eKKRYni_(r#RgUYyy1Y&r8; z4wm@qz(Gxnqw8JqgbS;y!AIQe!_(CalhEe zE1)c#y=8*3UItog?0kn{9)6p2o&@U)1e-yZQUvPsN3ch-gB9`Fx4%@>3vn{e8dPcjV+E#IEIQZW~O+QW6B%8hh^k0 ztP%Cc@r;ARc`^ksUt}nv`(JLM((LI5y_KpQZ1wFth?ZY$v;P&f%#dUo5~l_?6d@yCwrt0`(v~q4*|M9`5=GbgKX*TUx9}I`9ZRU z%D-i~O&2&aZyXK2dM8ofu$o`YqaWeLbd73nHKzA~)c?>ZCS2m%k89|v#NSodIYVC+ z*u1`2Vr0VsF~l6;&|i<#D+dTn5Kf@SczdlN27Xr*he<)x9_?~Vr{_4iP=)UW-C(+4 zy7km*rK~g-*6hi8yAj14j?FZ>hhAh@oj&$!g+5Um0H}q{dWZ3ti~9d>1~J0#2B-U%^*8 z<)CNYF)NC_n4sCJ6V2bP)j3-KK@fnZr23rQs)nFdzu+W4vf^_>KiX}bjTBw^D`cd0 zG^T-nI=zl8$T_e=eZtBo%_fEYc5HAos&!Z=~-uAs! zE?iVA+^(SzNw0oY3f+o$6HS>Gtm9PxM^z>@rC!dV2zu%zTma{+G2HrB zd1B#{!ZV_~lJlJ>s(3zkZwsUqem!eU0x@jL_uN-J^S%lN1anHU@`0Zz%DtG{wlK6P zv-Ju*MX5HD(?vFFtrOKY$^v)`AY03zNy^&q!M*G#!I*mTsyXp(5cnp_kf*&2#rhMY z>854^s@-0_Lba*ipM!*!hI8NgNAv}lS4E)WEqDZcvg#teYm8n?bre`k!om9L!3T2u z4_vPx%=h_hnrJW#7bf~Ppf4IB^fQx8=Yay>Rv*5V75dC)F)rgJvAW%-px!6LvG-Y~ zubVy|W|a#=BI$VuuJe1I3kWQK{vrU%G~5(>+Y4&6&PoTjw3N{{(()f!OywzP!X0hP zU_g$ke`BRSEw9wozSQgVi$|oMm(oDvKaa)Ya5=3gtBTO-8@{9=)9ZI+82Z2+vCJYl zEA1AHD{fooD~KYMP7R}Ms=-h84#cmAG+aV?s0V0@)?H#BU{^*R`S=DhEF)ip2+lVF zsUzRwU^uS*Jt-%t4OKL=JRe#Ycbwj>-%Yl`hucF2z77OK0Hk&cmr14x4aecDC|}w% zKR?t&r7-?#eQ&IHo}LAH z_Sh8&W#E74k1pt+y5ldofrGr#a|^c^_!p3uP);gd=@i25t0w?p0y|J<`3t~g!OG&v z5S-i2nz_B{AM~7*l>l$tF@go)FeUvl{hF{SdS?ckiYq`)k)~X0JPn@+t6W*RYdT$g z-xQt1remuHojufpYL~8}gz6*MurHtKtiRV6dwzbRA;^;e(3pzM^~OaO1;l=$S@vN_ z$d^7~c_|yRN!>{k)o|3t3LiV7sk+tFgu*1WLErr4pQB7a^CA%@5|KJGrOlBDfbtT= z0@gWEub#QrLsp^ZqA1jB2#|V7j=hs)K*925Dy=M%B9VmiohwNn%h zdSB?Y)+2$*T^&i_F9ff-GDKDCWP-^)lSvo5qH^nyyoOBsb@nyj z{pxK-ScL~bm_AEOdk;He3>)btAdHm6J|vHYA%7*0HV;kF_|?9wG&Ol2Oz@eo75^G_ zjW_cAK^m^jlj{XL`dY?Zls!wQpElunIgWY53_R%%o}gPEX|8N@F-Kx$)8}jB)0cgv zRxc29Q;JN05->2QNwzoB2#mRYtIRF7iAohHwfaVt)qE`)VgXWLkVeL*ZTb=$#g(-%oq1)Z{atzrz1ITjY$$LzfPV z9j1kNuhUXC4gK%Yo|sR;hu6~Z{p}ckr86Z@^acTXCF|14z;3Yt!6?Tr zAQDFXS12=f17doOOO1u?m-xiauTs~tl|}T*k&3rxY+Gh+Io+`PPoM>v^@QU)QUgfB zR$-Yj2x}?%-Mq!J6v4)@ik>x#S;}TNm+5?=2sV~p+e6%*=`L5rsG}q{CRRH*(KVBY z7rioSdR>i4%%@jYsC)TwN^QfWh-HlBq~a>3EB?jmPj?Ut*Y(DX?yaUhf<8H^1DVnn zE*oHuq9hAQdI{cv(>ezI!8z^biRi?o2c-reQI`3Ij2)+3qzZ|T4htokiz zAKAw=nh3W%UYk5t$Bl1({+;Sx>D2F0*7bH72xthRv63&^`qjz~gY*~8m;3q~mfihB z$O|d`0phQgG+m4aKe`=Mm-66LV0HzgVX^YBQUT-i^15H6yNBCfyX{;qfITXcbL%Vr zgSNpZ+Cl(r5*9BMAF`x>X**bNTieN4;PzYvQaTBW`ID^XXIZbc*uG0$%v)g22V=B> zs>?tg^+&(d3D?tMzzo!KnJjPfoAzrgx3}E@VKOY^D8_o2e4>aVDEYYunPw-ph(?&w z840|}WrpXS-%>ik@3rh;SVm+g-@64NC-kOfcpSUAp1B0=xL(JrA8^>8gMmmF2zU;W zUy7>8Vp>XHRGl4X+`%x{Zc0TBOnQ*60D~Nkc9pIYWPY2Q6SWehn2H4x%@1)dJc%5TaMW9qZwuk zz3kX-a9i)3gk|L8`TyX_1;T&})U3FWfHvJ-;O}&kX&WIJ`1u)I`n;CZ-z}(2 z+QVsb>~glviB(Hnx7DZxEfp< zXigI|7tQ2u7zsv#^?w|{X4T%?9Y9s#ep!(muP-*WPMpvzxA0;AYXyvwK6$*Vs48q}Ihkhqjs4tEX( zcJ_Cb+tp?MXZ-$Bkr7;ySn?5tW4m z82uw2a}}f~iX#BUzCmF4pr(J^ZQw-_e6RouPZ9xw#T;4L4}6*9pZOelM&e*c(_tct z9#z>%%dXkZ%b9r4y=Eq9L8Yo@@Fg6~ab3|@(x()$u*QkeP29T_bTVXu&qY5?Z9*Mm z%Iq5|-js6FD5yTlAbcVt5|AMX_fZNZ27B?LJu%gOS0YF5z$n%-n%H- zvmJtqA+>jB0mNz8xn~4liR;2M|S`{*!e{OD69_Nd8kqj-4%ok*qYZEHF-lD>Z{m3Ldq&aU^&u5Zene?$~ zCDEOQ{UY1DXuQJNc+mrUT+0m$W`KZIC;l#cXNsLZ32N%2*C$(9r_R*6U2cq~>cGD+ zgK|%_#Q@q+l*Hcr)whiLf0Zi=SFozb+JnQ{BcrqrDE3h$HKpU93}k-N3#>h*jZKp2 z8an~U`aa@+qPki0(z&+77lo`7PG43RH^`f%@PESUjh;GoM;;LC6-y)>Gk)cP6Sd%! zq{Sb|YxykjGrXNpv+u-ZX5rF()ADG?Y@!wDv7BT=Uye%PJBrJ9^u|=3s!gy17ll$6 z|22KdKGp&&E?4yGSy0Vx{d0Kgzr9&8V`uEW@WIX;S%kx*;0zgflEzad`YPQ&&#v=L@cEOMb0zVUi~MXj%rNL~n?&!4ggdQeeqe3@SbO(}v^ zo&PvhQC@9FZLqvaP{n$4fLLUs38F9%C}*yBYlQoReJ0ueuM^1Wpd32MANb zvB5Oddk9DwLcP-83-)Yu}^#Vz?9`E%;_G^+-p@pE9@>mY6 z(C$dU`j;gP|G>@yVS~+BJonPlx+0N)#?Ro7!E`f|19+O5aeJxRBdD0Pi%Ax2Q5LeT z<%Mu3>O$p(des?heip6`t%YFfr1)-1hUO$6<*)vrP^|Q-&1( zd?XfcIJH@nWf(R~v{rVCyEdH6v%_=9r7{+V1G^Ion%HLRC!{;+8jZby_H;4r!2TxCE< z1*w=UWL?`!c65B7KK7in@$&zaP=1I^3w z{{k{?IM~6ai%(gKJ{i(I$XK2c5bK-{2uTkq%DVH5k(2-Bg%hOmLbVRnn~4dI8-}d? zMP#cDrIEnL#K0fH9HC4YA|hJtA}$fCg<_1v)ZI_Zob8I45}|+>n{+9FXliDu{CjA3 zR7YIRh>8FbJ+h1Ij~ul^`dB!ZNFG(;2OU(^ziOR&a>af3wNBcEk8FP!yJCq-Dpx(v z(^t7#qif%hJcMdKI!nd#pDu)jcU0NI1}dFfv;t48Vt$@Ql@w*>7J0m%Jk|v&oi}ao zc>>Q$vJrWOBSMY&d&O?p>wEE4|dm5nhvM)s8z{ut}z$!li`lv-tg7Kb7BIRzGNM{$^AV-<-RAoFs-$Ga4RV%yFPI z&IjeUdDX1mH)ZH+bWXoDn>!Oi@laG%I~l&5L-l-uz9@rFiCMz z?^siw)OBxfuL)?_1dIn?vwSjA?v(k>THE5ljb+`IUCXm79wi_|O2JS5CQYXRNsB+# z^GBKxwVKyhJS0vKsf!Lfy8sc3(k>25$0ejdN*hC*|I$K%VRGJ={ zUKkWcgVq2Fv)T55(19Acx)7rNUDCKr!0^||=nV)+=o85afaJCWqnDuHo=U!FIE^iR zLU3V^cmW_)e=23^y;`jDme1^y?86<+jd=e-owgDhbWKMy@pt*lT>ecIuEc=jn|%i| z*j%m3#->adrt7g?RmqMBE-1T^XbO7UsMh7C9b&-C{FYEK7bGE-((e*({3}0ays#H{ z{r7|5!xel!Ydrn=pWJE8m(*SQ%7l(P3Dd+b%Zx`_U zes)!(hKsu+j-QA9GOsqTVvRd{|B5SIFh9nZODXaphLR^SBmptpVjb*&Dm}S7ZWLmm zN&^y`2q33p^Q315sOgEX^P9=Q{PTtC(A+@}tU%oC*KzcIUgOg%YHl@NSd8Z?wG~m@ z7qy}+*Pb|p*!6Rt3Ph;~RCPXFu=&XalYt9DN7g`srvGulaT>K@hrzZkYZuaRS#Vjj z>$l@q`#&xSdKdYo7j8R|zK+PN_CF>;ShVt4l5?Z5l`R*Wasx?mZ_7ASzK@&`TBS;5hhEc3ebS#iwm&=PNDAnUem6Ie z%oYod-G#_L-h~ZBI|^q_w5iTV^kJrs{y)cw4|zkWvmC#klI;|6@8ZM*E< zl5hhg6qy&~1f)NiH_PAMbXULK45Bf40q&&&vz@{^b?!VWVcIrRY;Dqq7y-Vp9G9YG z4X%yhRA3v1F%SMudjh)ILX>TBE(jSrM z!`G6tIO?xvruhti#qKFNZr3O$@qNq?51yz=1JnfYk_Fzw9iBp+s9t=0w{ZSb&-qnb zc=*{2*W3CJ$G0_Ix30X6s_cGL`QarnVDPuMC(w;5BWr~2|`6Yt{l9qc+ zD;QzZtmYFxJxP7<$Z7H{X0u4gbMXvGz%WWQ^0yiP!%~7!|NVj^9S}d@3@r`%{*Q-s z!q3?!nb9sWIg-c8nsfmL|A?UR|Do-z!>Zi2_iyQxPNk%~rMp48Q)!Tr?(Xhx>26R! z5ox5mrBk{D6nGzmz4vmTea`n>=XbsQzZUm+V$C_`7~^x_c3wTw;|w{{uIrGXiP3*= z&so_C7SWY4ZHYclj-O=om5U2I*>u0C_Ch%K$&2YYNGI`v!<$vVuI!tZ)YtVZh(ne| zE9a^YB2Yj?`W4hu*wrJqQSeSvL8k>XXT#~iv0Mssz&ej*+f)W zzQh+VzKdqgb#u;F3xZs9n2jFhI|)zL#rrB6K8>@&6y;;}tu4f5n)bo)Md88ckbc*} zo0LwCAvrTqLzGN$em?*~9nlVHSpAa}OVl}A<-hEneVK#o$LtEj&|{$hmcavxiV$K1RPP{AWl#HS8$= zSA1dj4l>Q~RqESlD*ojU?BCbuN`EDtnXB4pS7;&S)ldfH*i1+pekiQqLR}IkH`E}6 zr@yD1TAEYCUP|Q+b2dR4{R?MdUd@s49m+8G(=V&_T3P{`{Sl1j#hu%toh zmc&t^8Jn9(i6n<38l(awKmY^9`G>>IPhZ6Djl|VlT*(uu8?ReBW4jo7c$5EB)`T=R zCT3wF?!NuGQr|FI8sitWI5Hpjf99C#19_bd8&f%(pVF`B-iBk+*swu!*gTuuc?K)V z99;BF;{o`@LC|mR@rOLOQRT5YW^h^i z)8O$x3}_O<**aHB6iIvZX@av|I7t(gpUflQS&>R51u6JEGl~NWpCz7>Iy9!F(Z!l& z#bU(5Owf*OAuX?^6nq!{U_jlalUOyRo%z_m8P5pD8$MJ#apgeDodF+9zq_QVQimX6 zVpi2DtBzHBz5e7jtJ)4Apy0mg)n#_prQP|=aDLw#D}6V-_9p;J;p08px6hQyzLMYp z>?<`aP2Srr|6HC}lBL?bMiOB9=8&J7rl%=nQfWO8iT=v=)R=9KDNWB@zmpucZhF8_ z80eOzpj;TMs~9k*RyOAw$&U+u?;&#i%W~%9oSHFfB*1{u?vT&hziGW+WQjo5w>)5d zBZijK{MA47=bj4SSQJl1=^nZuDTcUzZSg-_k@|Rc6entY&4Gh3OWC%;VfWqcyB;Jg zv_L&v&xUvdiF@DJp{qw5E@%FTW+482Z|_<|sv#O2=CJ9hdo<1QN}S^yvRd_Zr>T!F zPxMhl4~w;Y*6k6L{MEs3yMu!+!&4{gqvh3Js&>nD4ysA8*yUMd>3g+|AZqggwH_hI z^k7xLZ3zHRK)sCM4xe6ZBd6mXyAw{WYw+O>>N!{2u=8?Rxp*NYsTDXc=_U3fLeW3E zze(~SffWLQwNv1w{{lVzIaZ82TI9xM3kQr9pW=I_O7awMa8~S;7L$Z(43p+MF*Yhs z4(v`Q?x_>`Zf%PM_#%)%R_u$s6`!_tO}vKEtr&ZKjFLhn?(zPNJ4;|j&ZRFdNIrCU z0Ni;-j-@)))Ahi1?Zh=;-u}3s?_kbi>0XsCh^it$6%z?9CRo^SkItl}iR7kprVD@k z%!{xB*z@@pu1@PWK^uuIv8j$o+(D{0afC|hP&!La*d_zv<(KEo z*Z5d(_k55St57rXt66LX@sSu<`N+2Y>~F{`{2}odI3D%3GBe>EdVNsb)pjYS-*=zW z&8CeA?46#7I3@h>Ak!K|W-%Z$XCrU%Z$z^@($hB%cNh%K;$d1kcVsi%Vg!sj&qx* zb@gDB-75az6S~cvgVoMcJt#<_@p?2w=x^pqmi?pr%CKNG&&A$w9ny8r61C`y;UMMf z_p)zNp}4Hl%f&B9xh#>sT@b-8uG`tBqvgBU0{m=@PGO(|uFbyM7OcjPujbcF9(9MM zgritFOkY&rx`_GzU@m!RnvMn$Sqg|`=%20vzeNXBf^wexzVb~9yn4GrF~$?L25_D# zHFUZG&eOn}6*3LLc`9H4I8PPNTi!c53fd8ezWYRogNxN!gQT2{i1a9mU&Ci`z!bBK z1aaY={Zx9i`&O^iP&fk8jsowTzgjXpKzE7{)?_=oqdQ@!mX+c-#Fr(OjA_$((7NPZ zqRGyCqd?fh@Gj>L3@JaEBe^U^b0qI(P?5mvM^xU{!^8Cdafy`4`! zY7V8$5`6F8(yN%>;|UFkYfNm);pbM}bd=9p(UtXZxw1hnR~c}*;t~mR?hRuBZ>T$z zQ@Z3#_q_ILmT=k35@%teUGK@andY?1tbX=SXWEXtgOcwe-M0FYRYiVgo(mWs4=Q2iJ^L<^Rv5=q-ZrL4gG%ye%@6DG&*u6?| ziV)KsI}8(yGlyCI5*z4f${~u*zJJ53Koph(3UTO7Vtf{ME@IBkpj)%OGP1*aDWcStAQ@!p`s%vWAQLOC^>l>B5@ zk|NoB1SPa1ZL*>wHjlp2cJ`)#&99i*e|`avo!(d6l=#JxdQe9t=a~r@w7f*^82(R; zj6r3KDI7>=$z_qM8{GLh-|=~IAE>#sZkiSyq(^4Sy@UG3!RZ{**H+5F6C9CNxx6JG zPo4482J+Q?z{4PVD*?S=b%n40D3LNf0=Ltmbw=@L!5{pnAePjQJJ5qY(5(?eWSg!&p$nR;0M)wHDAPEyM>I!iNQxav% z>PEZ?e!2%E$tQ>(fu3UIg!CP&yh&BphZo8c>s-V-L9NSOu;H@Tk(YL|JBK`&OC_$X zV*yw^IX*vg20b8oasBqxb(!XQDwK`UaIRJ{>JEH2zmyIu zWaG;9QyFctSC50i%C;hN)=&%mpo`|9+IM-`Ou9b_PbI$yPcXj|o_-ZdSJZt& zD7fD1OZRnlnc^y2;gFC;bhIcO3Dhu$eMIHZd{@gCf^AFsDq)7+|Kp8l`kW#r29weS zVBY2dC7NNy3S}dz!D5t$%mpQinc10f=XB~IRV_}ra*Bl^->1ms$zxXkB+OP@id00_ z3oZM@ch6^1WnK=ddSXmlnS&TZ$VD3VIVqu^)rrEXSB?(DHb+Fw!>LG(6iL-lR~<)lX=Xj;fwi^$n+o5C4xIHsSppV#bE*x3}rY_>1RV zHsKw*&gre&E1k7tT2ccf?}Z19b~p#}dEBPmR$Na4#9L;6Ol2(c5JR21O(aFJtTxOf zr%%R*5pWZQJ-+EfPXb*UuIz;V? zyB(qzB7RlhDOh>1d-D&Sx@ol}EO*6HS=iv&s>eNDd;{KX`TqiXO7IqctBpL=9&?19 zg+_{*LR5fRpi(VU9{KL+lQx`gW&Jcohtp0mrdX5NaD%!+U>bDXFqd_rI`Z9?Keu7c zKcu-ysz?R^?gKa zG^xKRP&Wa;os;x}_%m_rhPct0r(P#$@ojW0Gw{Ws`e4UoDk% z-DExn;m`J9F+nTDCcH)TU1a{fh`L{-+TV@?(&>BfS_{Dq+_b1XxBOR|?;E|@bFAwo z2gfVC&?Ls6c)5fhOCqz*i>4%>Gh1-tQ(GB9YY94Chwf8r%?1S)dBq2(QQ!*zbE2eO z6ZH;4tZb5`AKa8h7B(8|ahFp&=J<2x?izlRf3cqgEJ+u_Fu?m{!V#ot(PewP#r8%< zQu_tMwZv380sPZjwiBiT110gvyqJbN{*$m(Nb*}LNvE6p#dHZ|F|7g?)A#!p)xXA~ z{#g8hbZk(3stAt{B3A92=crpYRrf;D9DM|L=@PGz@DFw+q_17Odb3g*67<|Aj#~_( z-Odhq1a_j)m)xlG;6b+I6**!!FvPi|y5oeMG0kV~eVfp2mBDZ4C1l*3R(65uM{oz#iY+hr1?97dSzqL(MQn{GZo_{&d-OYH+NuC6@_=_ z#y>}{wDpm5)TdRGhz~HNpT(7YS4HuSy=GH>jH*t|o%8tu&$8q_yi;*CZ9H1Gpe-!4 z_2Hb^@#bL32@F$Ny7O8c1J3O&eRRX91bRN)OGyRJb$?H+q z1)d-ZyI#_0_Q+qQss*^X2rG@PM1IU5tlHrtL_5JnS%I;uOkj@JQFVGJ9x5E=hlL=n zcCNjNxUk)b8Qxn+o*%WMdg{x#tGetR}gYWgDfatFU^vk_; z$p+i}E$IZPP(`kT$j=5TV!!v&M73wl75@12qi61L_ndn&gwXTJUiMG~N+MN_ZO2G# z(Au~b%Vovs;o6rX;l^Zk-}e11yB z^>lK58AafVvs?G$EiTD^$9oiZ*?99Hb#R$IayO_{k2JE*&)KPJg^v+j7jQfun@!tl zEInGo4P2L=O93B95sFWicxyy6ZBUpZ8!v~ynUX2KJ=w8AZ2(qgmmwIxq3nFqZ-1ts zazbEiw;F^Go&tla?bN8(;PJ4jCIYzxb-*P^ns!bC%lPdQOa*;l8O0++c6-4rWl;Ve zmipsb`isbLEmF(80@AdmM@!l`X6ZcomvmzCwA0wbiQWXFq!?dqG{kGARbRJ22S?G9 z?2f9&#(amj`ZnDH1#^CLV0iMD!*edK%OSGLW^DHr<#BQ_#xrJ(K#7Lq4cile3Z)S; zI>JDAI}UCVUiA#J=5HPI$d}n_rV4L)J6iAW9V3YFdO&!?%s?9WZ496s;c1pPS?#9h zBlJTucQgXr+0r7L(p4e)x{Q`WWxgD@Z6V3EiYVB;-hHFAXE9n|PG0^f9k&{E8Yz4E zF^{M?kAXCV2ga^8k@7QldMToveUwNEf@G2P=I+-TYa$V|o%9w@nUAeJH)-R`Jer-p z*d>CuDbJ+n-;iPWFW&!t#`15WEE4t+L;7 zon7OW_`?&SikAOQfb7mnkXgM)AIoc`Mux^#I zE6Vs=qNVY}4}}28&1wK{)>1W*!mpgp30d`k<+>Bb4afgsFi$Cb#vPE_Tjnq8^y_ZKu(=reW^_45?j4?6F zsz~sLMi+p)0B2((J7dF035$*~qQ&V}HFu1ap#w%<6f%p+;FCUneRw_OL4>~pglmXf zl7e-DydFSrjN@k2UDE2#1d|YV?PWCU0E;xwot;jgZ`ibHg&w|HEH66bldYrOMDG;m zdpMQmNVf9hJ3SdQBrH=VVHta?z-)p7BvA}yUt|+rBP|wIam7zS!-5^F_RV8(Voh$GA*GLy6!1q9a*9o}xfA(qI zodxx;trm8BN*rwF^hlY%(>hRm?CJ(Dk|bEoGM@8pGNp$*#1G2WY0VlaPY~PG?z4Yk z=+>y=spqiSUyU#xp4H&PFzL@m8SaN}ylf@Eb;N`2mFeXhf9YbM=fd?ZgG*@nSq-POcY59;f+!u!KMOChLSfI-`+bg z-cr$P@%tF8L1JhGVz|weOa1+1;jW7&ZesoLNeOVWFxx2JI8Xp})1ja9aF@M7zMu*C zf`X-rX0Q&By9{hD`l2e83adBkLWhpyzI!e3jszEEk&I8>F5i01-t=lxwX|&Z#bdpt zd}I^S4g+!i?#=t|ofp&faC|s(3RpDH)36!%&xc>efutOJVl}FC|&y0YW93GwyZNy3&ZOnzG#s6nt}M_#Ws)s zIEi5We=3s$R=Gks0^s;qF<2P(q#YWMMKkMqLw2vk11bBm6nlff9c9#p5e?8~X^spE zmM4xmyChdB0|jrbPu_p)`Cv!;KlW=!Ok{Hsa)1SCL*O74!_;|H7}Weainx}x?CnM& zd=6RsVb(#pOVJCc1QKEpr!#SH%E8(}+3MG=CcAhQn;J zye#&xN85V0l=*WdjO^H|cZk)@uZCbTLQxzw{KKd`(v}2Y!t*G+nWaMF@<*Lp1aQ?pfAqHvY?wf6t>5#y0_YR6erYZUg@MUB+4e?4+dV z?s>MUgi3nvql=%@u}5$|YS(OPK+PH}o$&9f>r_yh;2)k>Q7e2Qm0|YnnFAZ1Y?LM% z_Lc967?H*ji!8?QrzW-#ep1}rE=8seJ@Pp;9+fw3?ER?;l_?(CLda z-imbHD(+AwCr=OUOs`nqQhxrIlKW>P+jlmccU|1TL7?$J@TXN&9``V8D&swP=>|me z@9Haph$$$ctUva*BZ>YK9V$$ZS!V0%=XA=Eb-xwfcX(I;7X{!zLTp%U_t67<+Ocee z)WQ$DFLMBdKYc`*iu3-8@@iJ=k1lS?2|LkAdjGYZKijxFm7YXu+X&)?w^eYJGC$PZ z%gC$MQc!hTGJXSAtr!p!%k=zYB@=9F6(}WxtS~2TNARqVfB%aT)1Ah7@X! zGD`8DdOKFiTfWf{E;R%W$uwre&xY$jGj|0CZlS{O{my82R$pURZy!g7J6HB4yKbUJ8SU(O8?6g)5Rt1Cw#;$| zuOjgSy19p(5P@#)k2AmkGWWvu!=@=4WIg==tf!Tg!B4>If&GHG-7iSaqo~%Rxa!hb z*98w-N77h961joXNPg;tzOtmZTN8~Wg+#9xQ(*YmgLGG?_*I{^4ra=#Mwr0+UW%Q% zay^~xA-Mhs59$5m(}IsGW+b_mAv=iVPsLi&lnsZkp{bG_v0MWnPHyz z;Xh|ihw$y-OX?-E!eiR&&$r5A>1ElfCA)TX)o-!<&`;g-m22rU!UwYh4wDt8Pp@?0 z>a!=BQWcGk9|EcZ3FspbkRAfw5Lf`n2FTmw9*<0LGiPD-;|cb-2-*|)n{$P;v>z_M zTFHEK0bK(#H#&syk1Nv!{ZO3RS!;(k*F<67(ctj1nHss$7tqAnY`s!e+=?7(#z6S| z)ImJ7vZL+sM^aYkn9b!}Ht~>MrCdh45!6Tt)X&q8jkcRqw3JKFJ1g$DcTL6Jl zP7>0;*Q&J-+@ zvXmzanq($Z2C5x`b3gt13(SCWJ3yU)v-->~Tzmf4miJEUc@35mzNLdih}u z9RV{1#+T3JOQl6VwS*fllGUng!uZn<0K2Mn5AN+kX!^aT9G`VF#SGelx4h(zj_r!#xT%v(a6nzaJz5C(*0we@#c)-;E=E6d4`U%EfTob zq31li=cYGW_3&+r|51$q=>lg+RxRi1YbG2<3JRS)y1XD4FmV6AW73vn5=Ll}j@mLK zU5d6+>d#v4HZp|C#qOI_kU>-qdX{$PWoPVI6ka7yuEnf5^|norN~>9x7dULJ52L6U zwfi(8uI6wR83{=&$n8e2^H~c+5riCLwnZB{?gLu_39J$uF~*zfR!p`#qhJ z*Indq z4+b<1O{;2UjX4@8COlr+IyH0DHxVXx&&N~=&pI(4h{nFvo`3OD68wN0MF7_ug^`&P ziTo+)hlefhA&9!qfV$pS;6%T1N(BddLzdM#5-y92({~h)0ZkPRlSBk+?+_ z7M#IE)e*4<%Gp;I8u)6iD*SzxqsBaOH^ygu;{qeo)6-`J6b-^!$cS>U(IqugO)DAZ zX1sNIf;7rIY4uz*riogsE4A~d@R@I58^aSDQ)cFYzm!z@o`J?|i3C*WS7|5QkxgQ6 zus2rO-y^#jw6EQ|VDMH;?aoBPz$WZ1&N@Zbt*> zM|BAJ$-zl8upyF2rTqaKtxV|wGY(_24PZZ9TOA<9ZhU!4(w^>Cib}{5IDv=W7&yKy z5VM=G!`%-+p z%!q@TCuw%p`}mp}^6@;}8*cWj)q3C0HM0gA4lo+p^r-rdhh4BkIik;emIWW-BHhRn zagLx%#4;syY+ay=hld+osq)#z6*e~F^?Nmp+Yyl26zy5fv*4Yc4RNw3`S@pS=Qb4` z+VnOkD3W-2sGm(x=1pId9pUxkg>g|C7Q}R^Cz3zB07M{hb^vj1U1f6q-HVL(7sr^F zTc`5s(@ifNq40S7p{JACr`r;S+c2FU=%VR|8);`%CobP3o!)8InyKO=&3W2xm0O#; zg$5Y#1;NqMsp)4qFlXBZ$gQK&6p{$S@f3Z$ITO=^Pn_wZ%)%RaE4D^ra`w<-LEB zc>j_MfPA_O__VY{CpcI%$ftcMCN0l1oo6=VF8AU;J#oy~ZGYG8uGZsj65bNFa~|iL z;!X3jvNV_@LZ+)ZdP4gJxZXr^4udcU6Q-fNWy z(b^4YRiWVbd+7b%`~NSgEn`20&Dv_SXTKmRw{<5cQVU$66dnLy-icTm_h*`q{vXYK z*;T#Q+?Sy7tr2y(@(4!G8zXzFT>Gur*RU zkXJ%+HyhM@cAoo)TyVVMaS0sfu$iT4%%TsT)i+38p35?@oF&mc+{onGsr}q30OwXc zmF62)Cue~E)ao#|_2rNTmLwu?0=WUu{Vg;3mu(U{C7mtA*FS8Ncur^udA{&WLX10) z(`i=<+`{T<>@4dqK>H~b6N%OB?O+C-J@K`0$bK7N6q>HT#qC@N)X2NU6+K>@3V8e0 z^Z?;&W^QT&X8 z+Ts-h`D?+w{QtiBTT)vzSy3~+jUisUQI_^pLo`dp_pJuR(X`OR(6Ojy<7-hor2#!( z1xz&(0`Q=TKCc_3TjgO_?ABNNEkD_*e2y^ye(|I=Y>SR=yq$dAeJphB5Vk z8(!X((aQzSecCPmFOU_+pu5YCw2KeW`;AZ3z#`j*WD#{$E1s_XBETs_#I7Nd)D7qV zOjpT?p`@I2?JmPX28>Mztw?TO!|}a-HFT|uz}Hx9t&loCvV6eV`yar`Xbf&=u5@1y zQk-cOO#rx6{5{;tWyo$^tM+um;h&4k#QwWz_Jiv0m}nGKiO<_YF8(v-O1Sxh@`w7c zA6Mi+IXzufR{hZUUn}N^8rtRavR*V_Iy&ZM^eta?L!tf?I9Wy57U6ONhPKr&QEd$o z9AP?JQD)}v&EX457ql^VM!??3@H^E3uM;ek%ni!Bx~c-1CU6SIGdv`UCQM=#J~WQe z-kAZb%4pNqVx;^IP}va#Id_n!(~GP;aDPx#>@-$&${pdn;hE(p1`5?}+gJwkU8o8_{(p<*wW$Jb95= zRdH1Z7YHUpX_a|pRdn@I0Dz@h_FFUf5mO8*`I_ewG@o@T~%>x4wPc?`Lw^Iu*jvcWR)~f{oC_)e|Jan z(1)xvo2_LrBY8v&28kWa29s3(XjgRtuvUgKQv-U#nGXKKDbEDLSpe3+Ri_)jMvI?U zrThY5!58M_K96~@Mv^@!7VEypU}2sgr60HJH^05}MuI!Ps5eVwwn%q?PywefQ|v8p zmj2Zu9<)##SCp7O8-_%sP7-50ZJ9i0!R^w36;YtE>rllD_#)YxMXXr0Td0~NAV#<* z@*e?ItWo2az;Lm|Qm

rQH*8(#G%7J@R=6PFME}p)SZm*aIwtOmAlm{P^aHHgYyK&3+;cn0__Ca|{vZRq@Z^m0SJIbE2T-BUfro4Fly}j<{R&o&ihumtQpQ9N*-*gFI3FU*elhuqKiHH zjt^dDuY(P_i6^wATHlz>lcMh5_6Eyney@m_RuQry&_?pkt7!k#$oa~vAUA)dC=&le z-|30dz!NHuTrr51Vo$-LWbX8IHgr3Ks3>r?+xcaR*Jo3bXG?U#Tz zXDV%N3I0GzU)0kWKDX4EmXI6SPS|}lj9vodWSl3s@D^?*20L~47t9;vf_(ulm@5N^ zGMK~NUJPjIRKHyGb)hhMrC>MhI!FlCdrdC8w(|P(8dz6`TKu!5G2$ztYC3APTU;WQ%*cxOh>KrkNlMRqm(&UXbr+szWNT_JOlVTypSi<6{WW5Kq*k187^s(v6U z)vFJxU@{pDH@Q=Q*k$Zvlg4|DMlS$sD#n(H>SDSVr zA_=|09Ah!TpZvclK@*U&hD-T0M;3lG-O|h!_CBN(z#FS#*i!n+g|Vy<8ySw~^UcwX z+OBv3|IsUo+3W+27ZZ)jn21eyrXwWoO*LgF4V$IK`30+`#T}>Uwgmk0^WO+ce(dgo z7oU%n6BnRx+Bm$J->zH92lHcx?i@NH(1MlebDm*(9%oU4NTmf|lZ|7{>PldID1r^( zeD`e2BF}D(Do+?+CE?<}hSkYom3e5XXaxy!5C{@&*kiI>vs)0y z(TT0{A$G)}P#eF$@53NUhXAFiSqdj$#vu3IheBZF&hVO7PRG4w(J1n0#Bno80{q0$ zyq-9;xT|TUSY?nU3sM>_0=<3qfK|736^)n|nDWjPU?WZD_k3^D5`UmcHAE!HLtGI4 zqrdxI6lbF73=Jh+?L*?c1fpOVQ1E$zj0-IFHwE|R)&#rsApdU*0y%K2k6H=%jc#&Yx+L_vX)uLiC6UVnd!i3_<0;qgr~FDIX6q%kH$Z=trJ zGh4;%&?{Xv2iE+h`|EZHqIv{SZD2t3{I>+thvM$6@NUc-;3D&%c}J3_LD={FaezVh z*8#>T@M&q0jbkkvdNk*LqyB;5a z&?{RJPA%#Fs(Xq0dd`KNL0q4u{Xm)c(tLs1GMnKw37sj8X@%OOplZC$e&p2It}Bar z$2U6fnB#cu#5%FEsEpY;Dui0qGjp>>IkcjUi zMgh@0256=nXlH*&G}r%M63q+7a-?r>y42KjOD{0p2uMauM3}|NJxJOyjE0KebnMt& zRc7OKk*BNWbjxX;*+rldOQBg8uwKLRmob&={*P>AE=c1#pYzn-P)1hQCUF%8t6x*b zSIKj6kwkoEa7r$9JH_F7H?)B=kd407KS}sEt4TU=AB)ZykQ7Zqp)W0eINEqBzuawF zvEklCY_!?{c=X)WO>tN2n7BELz!)64POKFjLw5BIEWhG8BN#9oE}G6F%2j-mC*7Dn z%l!No=SuIO5p1eI=KEVS!$4#f$QMIAeFzYwC+f%wtMc`>A0d7|3ot1S2(y3kST@h+ z$=JIhRl;#IxavvYK*bztn=p_uV+yM^SXfrr$7aP9c_E))_!}vUr2iT-?nYAEc@D44 zU-Xh6KGtyylWLrS-`$VKKi{fQ;i8Ft9PjZVhtzZctt8ewtXp#&Vd9CoZ zJ>|EBZwTas$M|qZ0)6(4KVZ3{&AImB#^iIquF|LlO&U~rP4F6-X^qlVCP>{fxu;&tHs>c-0(wwFBnK_CE z=Ai-;(xaX=E%!a}P*VPB z@K_KIO-LjKLn|^hGWM=eO3uRM69(efgNri!nDmSER7r2t^4bgEFwXywZ-Q4Tp!GJe z95Wd_zfJcNrDhJr`Nm63S%!djwid-P@Nd%1K@P{zQL5OS^z#~SQOW%dWCqeIqEyLL z)__ux9uy1E0Zu*E4Ui?9~Y6dKOPW9iuxLW-e zxD^AVofqL&*7{Q?_26&_jhMBToijXhOPQxDaDVW z{bIb%oO^nD{tmc$s-8#qSrA?t5A8iO!aoco8|Mn4>VgldkK7yg;0&1Kv%ugQCeoxd zra#5D&r_m(eU(drfI8lI%nCY&ydw(<<-Wqh*fH@`Z1kZk+elP5jq=ZiY_?g{qoW;n zjh^>cbmc{<5BVm|4tPJch;AyE>>OC@+Buuk&YlYvYie@N1EQ`r+}fOBs031v!pfbzk`G>MEu(x{fnkEqYRfN*a64Gx5uWR}tNR z*QL^ose6!C>#hxZH;ou?4gsT&H|lcd^&HddC;jb~ZVj3}Q+I|v@MC9QcfHrK-<>RL zfeh2wt-_dQN^bXl0VD!h0LOs^&{&u)@wX{tfL?{q!CROy%mYJFq?$z zmgCXcSJEL%T6om?c|>9A^G8$JAHE2p3XV{J!fHU$Isf_%+1N;>LbX3LGpjUucJ}Q2 ze0H{@+g~jOLU)ZxE;M1mt*+O5;b~J$1=))b#nP3p!s0#OL)~4at)2rL39#kE3*nPD zMijcmIYh1U_i7nI)J_0uDbNgjz-mCY7~XcvbAGcf2<=Op9ey=~6|qEbmL(Pq;xkAY zU?4d1v*@4ME$L;2l?3cUn?B2^S{9)H<}?RgJq$1^pjq0_9N)}&jXNjCtaIvf+OGHN zR@KQJ@p~Kdyx0SX3w}|QnBIcQ%6YPO>33KN5pQ&LfN6E;@UFc58^58;#s=o*kHkGn z0W!R>wuZoyK7Qz?Zx!OE1YHyeyn`Gl%a-a}1`jMhr`ptCbOCjebGTJsa?HmNxoATU8PQ9=(0vxBtSnSs&VG!gr@V zUZjPLUt#(Sa@2W7jgeuoBL0f50S)sppQ=nZbbFT@*9EJasZ9{d6Uh2%)4j&FhaIat zh?prrjQ`#+)^A<--oJQN<4A;HLmOy0YhTI;Nb#)i(xZl9 z2lPUWUunjjLcZN0?H)U*Sw$*h_R%T7jUy7wt5 z#wsxJy`u7@Ug@1Py6bCfcLHQie)fnDi;E`)*Pk4uBxfIgi%-JqN9n+2+|yu_Ge_&7 zynl{#L4utIg8fE%Q1rL0>fHo5U^iV^Jy&=sWRe%6;c@nJ`L-~<(s;+*^WgSk;>`?I z66%Ma8nd?TtNOlq1+-hqb`%+8E5l5|nBRZmw9K8CVvLLvrBKvwykC?ZFlud$u~2P+ zKfsAw3tJ2R`D%I_{}BP7ES@IE3)9_|LEjmy6;zn68JLB@Im;aUREeK@7EsD;PUWf( z&%QN?<{3aU*e9PPFjL@Z`7=eA91-Eo;N0frCGacFl-!G^5UPU{$bm0D5kK`sdY$XH zJ!CGar(bQ@w&gUw$>cYhc=Ak?mRQj~MdZcj8IGo!?+FwQ%OpJ{wVK0yG#};Ch`m;- zdH7@da5U2%9ujX54YPoTiM(MwumX@L7N{Z7=zSY{a)Bhb7Aw`d{Y9ScYB6KR>)B;m zHUdG~s4Uv8@HW{~zJ@9KQ=WFjjNxOmT+?A*NgNXm+_vl%h2SmVuf7ReZUQ+Kx%qmo zqcs@dSZze0yt)Hf0VTCc&r?&^5B3hcV>8o_e7fSnt@xod=;lyaZ!%L;5 zN)nANxX&>N`b^E!)8O6CS0Xb0q7Sz|8$|RxAX;x$0v*gAL^Oc5a_5kZ8@oW_*OL8M zykSM_nPBQgIV~WekQ_@npsK(2JnE$U9ehv&WmspXS--n;*AGZ&SB*{%g!kI^`FShl z^mFscN^;pkpLV+6`_v*cVRQ%yxmV5MQ%2>nK*%b_M+pzW@1j3sO;sRz763g5#T|rT zg?D;@<14Z(?n4Mq$XoA9S2qJ^KES|PilC8(!Lo&3=H2C?yP@Ye)GKcoQU3{PT?{a& z%glI)uNC{LVmTV*%*aTO&O?HhZ}Nhzd6Jr@jz84UA(EYgeFuWljxcz@wfaF zvwW9+f*L7tB(5{GnaGV+R#_1X(*ogz3e>=DiIXu`d<_4aGUwtj=4^&cVo^03mG8+L zJ-uK3x_4zxQWZS;ST6zvQOxXN+8_UZWH=<>-<3vz`1GO3Ijs_q&LxtdMgJ!!oW@8N3^ z7IF@GN z8UqQb;V*$rT83a~1|+E@9Ganm6_**;?@+5Yx!|Mj$+*R6!Q`Gm@7H&g&D(Vnmh=#7 z1%v;9v|3VyC)Qx=@)V;r{&W&LIcHfRhQ#kBZu``vpdleu+&U<=Z`>|T%K3ZM_l~no z__%cIJb+oXg!~a!sd1u%oNQ6xvs$0YAAdv@PclB{5WWGL8 zU|95l6~ag3jPD`cAP}zh>bO;6X1~2i&RT_GA@<7k3Q$C=fC#|rAPzEP|3T}kLZ^Ro z6A}_~L%wA#^sm;hA3hKK^vdyy`A{~(juw3Y^`G)cPW!Na6=AhoJpu3NuQ%SR5*X;@ z2_Ay=!9d;8g^KYp-9OYVSrp#FR)Lw&ngTqlZ(6CZEA+w*%JpB+;u*!NR~Thiq@>?;K$U%O`9lmG%qw3VMhShnqwna-uknP^m9kCv#Jgv*0ky;(u%X+%av%e zh+@=v34nQzVvJED?&zObWaFw*6-_!rNzJh4ff5Vk*YB!Un>E0@h*)&#zD|^v&Nh_w z&jx>a_Cc_U=VK9!enTnv%NJE2O91PhFP{|z+j1JPLV@g&VUJCH_gBTT;i=@VmZV-) zM%C4?d0tHXx!I!aTeArJ3^bRjHT&Ymcns+3T{U~^#PheS2FjsRu@9}YXy?Qhv69Z` zB|;A9ab`>@oiw6;dJP7aAL9&#)AYYN%~=FJD&H>Y>@#bdfUFRr}6rlT#}>+ z7}a!lIF1*^OqAodDP!!~tX>|5v%fyEZt*Q@SgCu1%A2)ZvSwpE_A;(b)k_prvhNwI zLe|iR_Yif90-w+2p<>ir{3yl`t+*=-`+D?}_kNyaMAMSime58Mt$MZFZ)o_Zyi~xR zHauDFVPZKtptJ=)3xf{xxnf@9Zq+z{6*>+ zcV)(xmQXYjo%!WL`&?;q_7sYbKY1oTqmMC3ts_4*HVG|_8Z-Fe5;-^j)q2`01%J*R zOD4?f>x+ItY2;(6V8is{*396ZOg09_;=J;QZTKVlzfRg$0QHYF8IykNh`a+>xgl$` z&)Una^LMG)AE_-kiY_Q9MYR)FzZ@7JBRRfpzCC~SW`}yzuf%e2l(Ew3{ZSvB$YP;J z%ZG4GY#VwZKBg+R<7$gSUwF$oZY1)3EqlaRUZ!5y(5`Qf@MU(%jUWQIeD(b`v+Q%% zg9N6@&Qy`HX==-d)fnRV@p%*M?ctcA!?9UjvwR5~>X=Ix*PXwbUv3exmNee%mb8)Z z`p#cLvOe4U1^j5KalgQ5NqebOD^_FK*QgdfkMVwIgaQ)gDiCIT%=Gf#w!QL-tI;xY za^mfkV^Sql8$-JU;xjU@x-W;xh^Ob)YgqJPqM$5EdXyQZ!4nrI648t4648pxjmjFQ zFsQ!p4sMF{?vD9E&!BU;L~`3Ik>aWGB@p1f&Usc{bV+37wPSQ?%BR^=>V2<=2t>~s zpr;m*=uG_wsd2U0G)J6LO=L4c^q+CMN0fz^6T$&ZG^}S$55W(w! z;0dUmFJKLT;J;GFlM8%R{KAYSq`1931}#VaC*Rky&X#M+wmPCeh>m4uSxGu01?RtK1Tjq6XR4+Mf)gT=FK&o z)3$8$5jz&Y6f1qfwBW0oH8IK_1sJArNyv93$KC@ZX9B%#E@<0v#WqCwhJjBpLe#6j zr;m0D_xrx{Z+@I!>)7XYvG=jpI@V%eV|2}L$u#S^|CP!=z`6=x&Cq$#@SiqU z-}jG8^^%b|1CILLBO)mAtBpmj@r5VqGUpCzK7wP*axssD*tWf%pO^rPP)UQw4LZMp zqL_w401@JT3om(16_z=VfQxF|vDv2a1+?1`9`11#>MmHiu@fa$SJzV!S{&QmZ`*Bh zkr!xDdLNCcc^|7}=2@2|wBo*M5^2ZnRD2l$5xQvy-uGoD}kl!dJ zXu}0lbzEjNM3;8@ zI3g>&A3Ic)Yz*gRUQADqsk{7^^K>X~`qqm`TV10ZvPZk%V3LNNI|Q!L8zGb#hI03$ zt=@y>S_76V)IEO$)aLfr^`|C+z}A*qPNS^B-d$q3vjfFL2HaEf@Z+A`;M_~ai6gqI;NFGn zul0N!Zm#tMP5s~lps34pyBes0;C4pn54IzHo zJ9r&X>B#xo*VLcL8eUXi#7>g?tO~b1A|o?hrdGvQ=d@1dc#3=Urp2Y{v8vZ8<7XY{ z4hNWCbMS4}NK`$u9}c0pI@3S(w!7C%8o9O&GSM8Fz18ZI``={RA)nPIFlaSshKB zWgouyWZGlH7<~6n$t}nF2bX;4?EP%b&pMvhh)rc9O|3PLp|TVOLd>UzsS!3B5j{c4 zt>FVV7y(Bs4-5Yut(1%yDeV89>+(P{Dtwi6a&zQ@P>7#?OHfe@HMHR%g&`xl=}5Xep9gFAa5dN5`lc_ zx+pV>G|Z7IkR6*^k@z<*RskXr)*ck$e^@UATqti#e3JreC1Ji%)5_E70Rt!x3H45V z_g2Z3*2*c#fY3cx^pjJV6b7`=KP$7)~GoL>=M&C zGPSEwlDTG6=C5@1{t+hYg-qfTz(i4n$BIWvBtw#a`t321M5#BXO3HKu$>jubtG!P$ z(qdQvc|D;wWB6l`Z!)melHp}|#%45hury1lew;^J%tfQ1YEg$o50}asAlq(EHN(SelQce z-vA9NgFO@ZIs2)~Q>r-*g&rXa$29lS4pPNYA{N#-O&#Qr)sus+maxAj&Fbi_T=Ng| zj}%fpc6T@Z(dG@|9*A&+5z^6w(VCv4Ra<6kyev&>Dp<=vn23Z_p_g1ij2U4Cg+`zJ zm#7~c^)kbkd?XU=arjFA0}=Yqo>kr0Z*yMhEo0)K6iY+=Egw3%v5wWzHDjr-Luy9c zYJ{I4PVsEID=rx>c4@8gj{sWha^iV^zo&9RoEZ3qNA2wy1O)gmqekvBf80bD3fsj@ z^u;|Ps#6bQ6+oVRKy63HllH2mvhnH&ZVgvZvsF;Zwpuev=(FLU@tjx{j<9*h%|zF#1?K^a{Tf!*~ev^ z8fJ~y9Hb!2nc|O@WSzihXhzn~&yb%N%m78onY0=g==Fu9#x?kEM^AaML2dyXm;15N(ulIMkT5P-oME6p0aT;z%XY)5j!MC*0&F+mZ>s3UbV$iN# zsfX|)`E}}!7VA^;sOdMcbZs=PjjeQ$+p;H@Y}ot+{HA)}0ru#-jdAmJ>OyDUF0SLn z*N^etUL`3w+*6qS?UA~WPQlWIbwVPx9%upbqp`E}G_3-hG9j0MTcQ1U$6*E^!YfD&;Q0fsrOH5*N*_UwE+SwHqh6)QVs? zZVltrYev5Omnb1g1_OMo9l))wwr}89bQ3Jt&jrgiBzel5p%?x*8C-@Ml16a3%+(P zFHBRt;+r&iaa<5~-&_tnsALzYWbv>B9`xw9O8PU;-{sF8;4Zk)okntBf4-`@u6tW_ z6ssl^fqzBkB(K)yFN`8wl^Bp}fEa*+HWH1y9ytV5%%B5V|@sgcvYX8lcsyh#s56)^B5fw(YAe3ED_gNSDPF-+>;T4V+ z*897k+}wlp*aOx>J_Y0PZ;?;8aW1^4M_~hQ+ca`kuiBbmi(WGyOH#^M94r>cjgRmc zIX(4~968Sl07pO!jp{d5_!?Hu3_P2r}4mW^yaO__A-j5!Q;NIf7<-k|=z|()fIBmc2Lj6E7ffNMG!96k3rTzR&0N zaSNWigS__u@;(50lhaZk?B>>N1|*^0121yz*0+kpxzcG5?Rk6l=>T;p3PQ%(OGduP zal1N-uQF>#0WFc=?8N*{XR2~%lt#ju>0C{|oM<^JwTqR7xJoE@K)!Zmoa6rZF`OjB z{vC=0*v_%2rxZzJFULE|0c0`cX?B~=FYFSooirltS5Ys^SnT;CRg4a&NR_Bh=k;X* zo92rvQom2>$WK3)-ZJ3s;o=wy3dYAYK0N>67#+`VUWkFsg;U77+Bli6t)ph6Crrl` zF%Pu{96-l3$r$GJ_?N>Y*V%O}8n7cPY;Saw8r((vi4f(=r5T&O=4~^wIQ)97>XmvM zMC22s5DwoMRNUkMwpK7_TRg@HJn>hRU8)|-ZWf<}@K8R8QJ_6}dL9eND1^;+n2Tm_ zB9ie2h4W9kCMM^@+zVk90 zZ`HAUoF%&oa`iRr`%jtgtD!d%qy`e_p#C0Pi<>>nq65F=?V#{2;1;5py!1$kygN-ggC^b6n(08QQUnEr*>V zhvBGoIwBc{6^crDf_>DT1IuZkHqtnc zQlPdpD=stAR=iewvxUk2ik{iumP!RHZg3%4`V61Fbpfmaya|Q96cr5#!uJjx;sbPt z0J@9>ugbf?vHSkn*@pKuPxlJG(AFM-qS8&KZpTDoZpk67kYRYyP*@VZ4`X8F>GJwI-KaLap21UWWVWsPj_!i5bY`dLnk9+c=_rb z?1HX!x$m2&7M z7OVA{xX9&kwDU)1=evak+5 z4fiPE3_ZE{ir0p~U~wjDIQa&#jPMGEvjfSc;Q6Z1#>|wfoP#d<7vk&VeJX04euW(y zMlMM3SDD#JQwF~-<{nh^1E{DmRLB_g>4QJ^fY=79UviVp`SGpLde{8amJD?Ley0$4 z@bEG4Fkxj~;N7sn@ZInTaQj=$Pp_2KU_Y_UdnS2OKkduR6qxfGKXZYX?KZdIRn%34 zOE?>N%`B>6KnvIW+NVar^zB0e1G-D%B+xyWAma)|y0YM78hj)iE)tg_mBBC=l9^oA zIn=S7FFsua>BfeR(H=+huL)j5Bu`KF)uoMD`((xRQZ5*JBt9d1%bA&JO(s|OcB_O9 z*U`mP-HhYKNZk&Xb^-#^cg}@zxBUq|5SSHyM)gewuuDs-F*OJrGyiYdFXFh4*cq>&@|Kv)-R-~MBSq_6w;X}iSfOjF!OJV$V|5DR$Jd9%6=h2t4 zS^T-@puq;_t#4@@ra9k)+Ip#XJ$)b2e7Qq)K#$w~-$p=jY^pNXAQmXnBoX=85ib#q z=pC$f6Koj1kmc|=%O-ucGL)Oi6nR><%z|7^aY;D%tO;@YUtO)p*~CWR^kzM6w#BVC zF8iU;KuCAmbzZ>A4)O-eSl0qmdavb-Trv&RTaKMHJ&DU5-44%I)e)ZEg+Mhjc^AbI z?+Oif!sDC3#JrO!USCmIDaKE0`vk~kpihNi`_Ez5hAa2Z80vLQnS1Hkq-x0myU_hftV)r17%lYehZ?g-tnmb!pTu=`)ioGy z-ml38$x~Utx`9Ct09P7fWj>i(zlpR90g?74%50*7;U95OBxuTCWpQ(4HOY#(^8848 z>ar=V#NB}Fyc97`hqr(Y>HHljLFb-V(J=3W#!vE zsM;7=7eI4;N@`@v6M#W0B1eYPf|%9Yu#gT} zKLj9)D19?zfnwlSH>F|yi-sGS{`KIP6B_=Z zZ$KgWD)gXCaH=0y|1(%>utdj`1emf-xysj;<{IfvFfRFD#5v2e!dwyF$m!VRB#wG5 zkSKR5$Zm9Om!b4KMt+Wh$K`p-*?w4XBW#B}Vbh=RS*ogCb(N15^(IC`=#K1-np zJrV}-pFwRjGTR835K1L$Va!daW61#RDH6kg6x5fEMwJYxeX57)LiNv4QrU%Tsl~ZU z=anTU1Z%Og8_z|tZZ6HQvUujg3HWw zESSWX^6n{hFT@bP(vnKe%p|a@cuOFyDwcu4+(r~H!63dUuVrB(ycw4#Bw?>lL5qNd z0L-lzWMCjn<{~Jb3VMGipog2VqL#@sNYKK2LB;CB7@FN`wYeS`qH6Efrcot&+=T;< zZ8C)EqS@2=2MO=$Bqhq^??a`4BBsHi9v|%|t||L)emMQJi)A81%P@)=u_Fj<$8DaJ zr=zRpXhl;LTACg>+P%HiOMrPFw1)YC+^axF$7^j(o3GhXM?rBx(c0R2L10R>i6QhH z)x-qV8Bscr9y0LoahtdS%#sP3`bK^SRuGXv;X-P})khN%HFvgH)>W`1uD-8O>5^z?w!QmiPpmd38P$1a&H z_~Qa2{}FhC#P+jsFd(t`ju<~R-p{sZ*#M8L0)KKb4cvXt$)(@zv!Dh5XS)e0OT!r(wGGB-XT&+kVxTjC*{8&QaO~b!T z0k&4pmwE1XQ@sbf=_#fa=dPK(Im3>P>#?B#>Y{-z;^-i@ZymfIH^Zs=Pl}68XHwH86`R@AROMEa2 z=aKCejt}* zKtcC=!-?C;n^^c+`PS;FkUImb7_LPq!mVBO;2-_HEr5X)1gq6R=Yeqgbesg&i;oh# z*cullLdhgCnjeA`h=jzxM_^0oNfF3BUdGF|Pku$}m7Fh&6e!^9@%{NrIck0l_B((c z4*;G60PXoqAb$%-^(61E!syQ`>##i^tDk(G;7t&v3C%bzD#VI}ou&YRCvHnp5%Mfd zfpOD~q;|DzKAR**`bn&HM$SOM+S-x?3-7woK$83j(IY zS;z`Fp8)<pY;=P*-F^Xj zE-*DKyZp$#cu4=(rQ-`A4C3t#9KeSy}f6?E7>`kDs)$$n3yX)Nlc(|aBj`3 zjB!g_B+f!g+D*wDIOk>3k&{fkL`%MD)#$&g9fE*} zPBIPcC1d)uCuiaZ3nNM_i{~#|E#(jLk%*}Nrm>v2%Bq|hB8RU+tB;W-JujTJxw#pn zV$Xfx4p{L6U{?UJ+$bvs(9aKn+3-41oFY8sNCN*TrKNeWE|kBQLdEH>iK3FLhG}K< zS%I1rS*CdzD(k6>4XtF`#!i)6vkN)|DAaa@U!NG3_tfX%mZ66O#O`mIqVO9HDikju{61s%7Vs5VZ*^-g3K-# zr0DO8HvVJUp+kY*Ugj$%rtH@)y1MUblRvmB%0vl=f45atiSD~As^LLV*FaHC`ILR2 zt`Cc{UmRZTe_wO)!>WE_b4e2KM9d*VOLfoRKZVbd$Utmw2uy?f$fb~~FLoDl?D@wV zo=!f+Y9Vso3PlV;pMb}i6=m#C6%>-8hkBC8qL!Jp#&eRfn8+b$ypCH>TF?X7EcpX7 z*;__N5M@+(`2z3TqJamnZU9*GU)$k8>mR@Z+M=khk;9LZz;{BmPG0JGO*PhFs)r>iZTl?N;GhRDJN}zl z!a@~DVK^Bhl-?0v!*Q!*B`t}K4L7_@NoOV)<`k-{j|u4UE}z6?Q$BHSW;qB?uQBwA zJ-uclTM_K{h)uYtGin*0V>nyZcs7n{!hwxsy=-TH*odRCCRL{3esRMf^eWL_vRTCJ z{`z_DL1`f1z>4qlPX7!I_|*UdvU|KR^PRopq{zat5D}lS76&HjV((lllk)j;uCT6Ihc@lAa~!4y$3i! z0h|GEUxEEjo122iHG5CGawUPQs3_mmRWv4$rVJO~Jq^O}=k*F0@bp1&tKM(4`R#Cl zTKQqySMbQQXVKNzjs;sgZ7Y|$9hW9s{2tWTqnq^{enw?_Vs50|OJ0S(;^KO!mNKPss`~F=k*79KVuGLSreY!`;R-Upc6}%8@63|53SIfxAtC%x1}wSQ8AuF# z?9OW3>5a>eptyLPdcbFKP{1f}RRl|KU>>(~(M9AAFyaHi-~iwr6jJ2>D=t<4(xP7J z*Qbcwh@pI{Z^W~VoM#04%8Dd}Z-xOiuTY2m-j6#1!is6tW=DXPFv?(c|M?>}@K^2A zZG$}IT=)!%CU;%qJ-<=O1 zXWJ~6tJ(8CM=Ec!H?o$mWSdE4mtTozef@V9RY{Q(_~x5O|NFLd(5#?)Q&%~AjEXD9q2l^eE1YtMBYaS)eJ_^Y>fn-B zZcJx$RDK*wKwlwdB-6faJd{#zGn}uzFL?4iCko1fr^vquxH0wtVfH1g?~m#MG)Po& z)LMlZ5@RPZs=)WRhReX;c0j<5|5ne-|HnjmT{xoLzcA%8J?{mvf#S`+mIlR8wk8E4 znU3gXs|s9C(P&b`qd!IQq)4}=YO(zz^GRJ{h1X4rtg;0yI99ubJ04zO;1L`aasO!! z&v@mOxqs{~1h&?9e$O_}lt98WaKQs?=*j6}1T$PN2a~Vxm*D>#Q~YNO%FRf4gF(*(|a z5g98!5}hAug*#Ndt8ggVa(&c_fmEL{>oj(gR*Tq8TYG~3UfdnmYeq*TDvdc2B-N>2 zmelW{3EoMwmN*(}j3zbx%rg{M;#G~m5VA}v6^yC{w*aXzNI;ih!Dp)3$1gU*yKdFp z3mpBA)Fs6JBi)JOiScWOYLZZ6rnW%xh4(IW|C?sh-Cd-mn_YSGYFX#_3BcajgVdtKEO~DR7 zqI_QPV3Zi2F`wcntlXO58Ksm)t-ffU_`0yAulB@u0##_zIkJ+M*0Ci$mN6{0jK z!uMa~_O(Yy=v1>dOvq+d)`Jj*nNuQJ(*kXE^I}F3}{P51_QyJ zhtrH?&&xof;(wePrMUALMYrtNlt?7go^>5kQv+!;G|&4%e8N7H9f!knvvca47CMm! zgu66s(alFdyu?}Ya1D*3l?z+oumum?;c@dOxU_P4>bn8z6Ysk{{TT`gCTyW^RY;qX1>&h8QCey@@!jKk^$IK^;#p6D&*K z0X&5aVI)sXzn8Y*a}X~h8Ryxv+OOU@nL%+TN}I1W`76MQO}ie|+IquiwCbxv`x=-o zM@5WiTIO1AP=ui+xCI@od;(z?u>U@IRGXCJx)IOnPUb`IfwVk(#*lQYz{Dwo3J87@kn?q6LBZWinL5 z(!*$wr0e2}gHY*e864-xzAptc`7}SL!Xc9SmBy2A)ITkc34_PbX-C7si5v>%4HWy+1;5n0a&1-`3x}trEjM56>{amb(?H8JsG(qCm5Zy7hzYL^8GmsNwheI^n zy;7S8pYaIzjQQTt`QIn$O}_zo-Wv{pVO5~0ogtJXi3$B2(+5Exj|BR5 z`%+dAF9eXzF*2(Ci+yij0^>I1IZx(`1Kg~%RQ)}NwoKt5Ht}6G9uKO41*)kuel`9VS@^g2gWJ5Hn&70!c5O;w-%421U6_ZEbXW6fiV9XZ^M`L+@w0TI(iUJE>ni zhY|x3QANpd&7VOA&HOew>(9$Y5lX>UXL`O)#VCaNjms2ER-F z^xjC!W@coBxVj6swxCJ7Zl)fYLdtyU;z?^a4XyIsI~aHX2mt`3thMs^7spBcf5>ri zWRyh{_K@X=q;N#T^qJ}7vTU9mg~2Pt@MYAaBTO?{eDyHIjJMSZ!efVgacKWIoJcMd zwJoWM69?W>9jUncWAkT_VK0@Sig@yBBX_BbMYiEGY{BrQFc85Ygm(6nW%5X4Dg zv0)s7xdXaT?9>fsXj`vWbDBUjFiD`yhjtbij?=eVy}OfX+;c)cb1Zu${^wS*xWF**Kya*rhPZ4>$U6bqMPZ=q%DKXZHJ#LG}hUs(|1vtJ<5?df{8Hq4?RnBw8^%Rm(GxtJYJl8M!M$Om4pZKV@Syq^<@M8_9#jq4x>_Ni3MyVjcnTZb#WHkjZExfsM)&03M)xd|zL3HfT??!K z#{l6l#C2aPDSDw#80~)s_b7P{zJ(Hq4s3?>7nzfyAU0PwP<{HR5!LyXTt1TAzsv=< z$T)dDrd`Jd@d}w9unN8*d@)q_fZIH!i1qU@vV-0N`DgVtI1ETQz$t0sx!))ESfHnf zUd2OT-1;B`%;o|G;7G-7wjf@^`wxy(B$8m+t+?Batf=V{5kyImSf{P24|>bi)IwzA zuM|g-0Hs+-e{ytGs$04q& zd!2f`TpxdG6qYFbtE6yLRY=*_2jYn)6YB*TCgIahS4w~2u6#@4-QwNnb!o~pkMHhF zBGi?MLS3y$utvKvV0kiUNFR1cEpWdo!;iSBA}hD7CW_`V zg%nJ<(tk`5D^{#YqFwNf)nx=cFnMiY%289{W_UH^V=WDkB zP??nS!Rj@tEfE-*_fgj|OQFvjcK$*iC=+m`q!hU1A?3 zm8fJB5`ULqGn!aiAsMP&w)tqQ{qjQI1XCyERugnp(t@aauB@JkhE`mztU6TUZeFIP zIO&L19))@wVe4}5U)LI@luB7#3_$x4FY^7@LVBW??U} zX9Ai^h`mY4>t0~yo&4_pbn!DzGW|AA(mp_U_oMbY zu`1u%K>7g--r4D^-TC>x2vce6OKEQ(%&B_EROw>Z<_K-FP9r@NI}Gj7-QsCHFbEh# z$*qDPdoRW#a#T|hS8%#{_3W0rBO3KBBC(k9Nq<`CN})9n=2E>vNnCw&+mH~FWXhtg z1MSG$+_2SXVNz)_f*q~;<_&gG$u2q$#qdS4V#~ss6)W$nvM^?5#^*DvVqQ`qBzU>T z>f-k#76{{?_wvX~(S z+P8bMoJkp&{fNGdvcfD~eL+14*ZAVZ8*gyXW^ds7Sj^3O~g(4giydyWoa_7$^^CwM`j(pCHT}fa%A64N})0^B%Y91^g2&vdOmG zhO9%_VoFRCPA#ZCF|fY3&S1+<%F17Gf*{B-zuElJ*$_S`4;3iSJ>wV^H1D_L?(L|z zJjWa8@!g2?r>sZez?gR}eR)dY@r%sB=aP`R8k~BcCtr+Im}BO=s?qYt{Yo6GtgGlg ze&G6|$SV~Fs>~2#dF#dvx8a@jhzID2m7HL_^#$mz~S-S8GUX}wY<_WDuFGR zL%W<1Y8?1dS3um#=cdNbDBTCbV3gKIl_z+dOKKj+7C%^^CmXCQ>0DE~$Dq8xP0ds8 z-V(!uGSGlBKs&`oK(&7>L-rjVx%v7U0_eyLX@z)e2g22+$mOk$IyM1hl}=? z*6e3uSNz54Ojs>EjZA7zkAN)N#_(>!G%bov!$>^qyV!4)XXau-P+*PeyVjuiUq)ek zTr8C``kt|y>89}r3x~>dD{)|-Co4XhZMd>{dwo%&!i&hBskl#Jx z*cy>cHoQvbPG}jpA`%#&0})4ynj*s-=RAg5{Oh8Z^vTHc_}RW{O1;%T@*%U|&v*D> z;a^T|%yGAtHV+_S0gwW4pUD3-EK^h3gZLTQWp@cfQn%JEa{ArCjlMY|;&^J|YRWzN zs!jY{@ai;0S^b%E8;Ag+Zun^f@5aqn9AO8gzRq-8j;@BO3Snp51^nG~mSA7km=YX} z6Dr|B2qVw%#l>obE#yyKwa>8@6Q?~q`&7n)J_Wztqa%af;7?dNH9W_Ye0$7?8uOBl zM?B2q-H+|v@1(2yM81d^G%8Ok0@B31Uq{_!-&Nr8paN{50`cwgV$herEvl(D=N8X? zWP_c%6vlqfp|1pUnB-!T0gcI?EcTnCxfPw=+5%77e zdCzx#`+wE0@~gjGL*gIwS$l~yI9h3*7$;yE97XXl>C-FLcPz}Q4F6>&5B2zuekC7} zQU(e5p{$t}{cXvKAm|uA_5U!d;uy8@7B&BvG7w+i0_p$xv62>z(JSnR)Hk^7Nj%LK zxE$MP)BQ0b)+CbQ6++`vj{Y;vCc&Y7R3Oqbp>@-!A5&d1W2c+|-FYJdC#;yFaaFCZWK=FUct18z^&G_8owDvvBs9ji%mxCs?-TByXE^Aj<%yVn^ zk~IVc(b6;adz<7=NNh1x+ybM{9AtjgKU|Wtrx~g>&{4bh5`6)mWYmB0N&X*t)H}BG z)~*Wqr(IS4zt~khY*3fGY)wOl0mgn2|@Dvz|nO>-l{sX9O?hZ2oOMA_m3ravuTix8Z@{eJ%gbW^!aE%;EKaK5A z1VCps1^c(o9gW>Lr2pt$l^9L}n}%v%-ZHEhP9!4+#W<>X>pd#jXA`-=WBVihWC_uP z7R@G-c3(XGEW@4u@DWzxl5|`&)4%bYN)z~of&C{zD3WKbme!SH#8Amsc(Z>$39Q7@ zYrHClNS_gG)tX_HRq43i=e9CXmTLCT^d>|`Pk(VLMCIQvSQ+RWQf1{$c5W$rP#p=5j(eQ+(3wKtLANi|-mR6!BIiO8q-Jy|0 zPcWnS@2E`_wm?^=zvS8X+S#JY)$YrwUa(|Q1 zrZ`)Xw##A~SUOn%l%|`i;Ci{84_tXvP?9qNp({T#? zS2=L6p`|KuppHRTCr8!(LqHqEG>VEu8XiJ=o5G`fo5BOMof*bYmK4P@A>5ei-(y7@ z_ApieK7fpfH}mP?o!sjon-D*I(Q8J9 zT+v2tsuj50_wx(2BKBopssaN?4+8V{mQX8+s|4=$RwvCKYLTVA&b$V{q!k+3eqvTOR{xsm^Zd}4 zyhrMd$$0tbkE7M$?R^<)Mq$D=JkE|J(pkK%4W|RnG8NG5Gv=(U4&Lqu1UEQU3JI@L z@|322=Q`cB3%19{)TA`-m*ch{8siQ0B&qG9lh}KGE;TSa`!f0Phnbf8)EFgQ1VX6E z6Nk=sj?W@Tj_&Gdcu)^MP|tb2Rr$|W?oXN9Pgh=tQ-s|XCt16J(jhi(FeA`{8kiP?eu5dr#&Gq~AH(gYG?UD#cAy-R`?{I`GHByZ! z&YmlkU20=&o1jq3LX$d%Q&Ea(?>Pdly*G?6?c=;H@!}y=jhj7TOVgus(;o4#Zert# z+<&149+XD_lozlaIQ;W?{70wC+k1+~2{C+>nf#<)QsksPwkFif^>bK+I7?YNXl($p z^VdNP!tohvf@ z=69*Xyn*K&7xk0e&Hh>#mvNwNE~weBy{2oP4fYBwaxn)(XvenBhng;4zQOIG%bb!U z?N6|R1t%A%u|0-4vXuI+&~S%#?*ZDU09t7BKyo6I1MHhl7t-#vC9lrOrQ1XOgFlLH`~k^DbT zl;@{D$KbGTuUDsSYeO5baN8C$mUj1kv}>??@-X# zmlAfy_|0PMYhD_=JS9{MWqQzC`dd3I_jx>f@j(~2IhWd=vB2WzD3J05Jy+*jrsQL# zre_|@Exqp15PdqTU|tqjeAa?*l-K1DmJbtpdTh416Y$w>v=tqh*IlBfx8fCzny2Ff z+p&ViXB0B9vOMlqjPSvVkpL_9)@KCl=THFm{dJ&gnb({1yM(X7dIwXI7*s3VZinPE z?Ra*hm4gMYnlgKpo=TjrdFTb78D4%z2HgYaXR&Cz%q^nlz%bA1-<-H(0YPhRW;KB1`!1D#6q?(`szdwI; zI?v<5FMp$_JP{Lha(<4ChN8%UVAc$6miB0AZH4S~6ZdmEjfWr#lvP`|4|BUU#d6`L zu%MUxlFLNX;}^4B;4LV4rp=LcA+_Yek3J9u6tFDz#`q5+EMOx5lu*3R@ z59Uo0fHne`&{Fps2yQ%U^&zt=Q-wRtf9bLuc+6`*JP$$>j111QeqxL1s_1C&Q>$Bl z+G$9;*!e-sHiV=!r!a-#{Jt5RftxZB4WV40XRr_zfYrt&M>akO<*aZ(t#edF{ z^2WxQkOs@;^!Ao8myEd9JnUY?PDuk;l0O};lwV+K(*(g9+tPnfkKY%lWD5F%#GzSL z#utELN1_`wLFe=3S~PJ=5e=0Q?ld)U;4P%k`Lr2qU_P4jMwr5km%fu2^TO>QX-&o> zaf*c_bX56nMXt9z78Te*cG^-TB8L0{@;a{dh#9Kw?e5yZ>IqizY^~Y95fCK_n6@sevt+ zE{QJx3bq_4LL@l>I&k$7A8|W@rrcXWD1$+@M@+M*uO$Q3o@fvlo~opzffSl(bc({; z>ud;$A~2e@_P;Jm5RW5(OtM;SMPe*I4F?9GL#g?{(>x*E$bZNehK|T@|1;Yv zV2t6)4g*8)tyS?R#Na02I@9Ro%|0W4+Y=K&+kXR_PO1$J%jvHy1sj;EoLb=@^4LT* z=#kjr#hI~zcvOg*#azaflT=$<%h;`^_qOl7(p*T{xv4KZ{~u^pSs4GxVyW<8hQB&r zvE*&Q!zt2bE!ZZG2lWRaKVD(_!~H5SL?7NTmr;xB+#pSX*(|Gq3y}4`!lGg`&ojic zuFybyXBDl^(M?jK-P<#Fyz?Q@IGSZ1vn?}Y#5?$Lz&NSb!x_>)8sJwB!74SQBMYit zJP*2HlQ*QHvi?8Afe!fic+m&K6iQa;_=)>sPk&hO@$t-3qnFad!t!xW$fIuC3@7BPZ5iB)O9Uj@+_jnZ@g{^TpY+q z1+wO{rOgB!NYH{&e10Vcq&Sb zE|m}`kioulQ}Vo3+Eso(;@wyQ%56|kMXF?}V?o}hU!<#!YX#=qW1uZIWpjV#HxW{K zlb{dSVd+guR?d7fj&7eIt;D)-kJC&_S{}t!2IouJVj$!gJj<6Gxq3#R86nZ@*h^wV z;&+WP#JNZPP5Sf2ues6(n=1vdx#FQ|cY}^RH~|1NSHFC*Cb&yKk;i z5By-gIdvbKK8uJefvo2?S-s*Ytgt2p$D_pKpxNQa(Wexp7Y6xKLS6H5#|!&e_x|Cr zA5J~|!2)}NI=sbAcJ*Rj6h4PF{%(W)Ff}~hb^vwkfmEJXtsrLaxR3w-hHLPi-E&ZM zDK;;zy#wb)qG8+R2{9OJykv0-#4R#Uwwbn)QJ*)0 ze4Gu&^GL=D7WrY2PBM?w%JbRB?@kjo4+^FP3KnuKqx*}}`KLLS?9kBA(yckxAb6dF zf>MeUphept$#-CmMAuc|mIx$D6R!W%eS~djEF9`_N0q1G)Jyg153gT3lj>&@MRN5^Yd?1cxr68N z03HPH(NFhWHV3yUojEF;{LKCZU9WU_nV;t1j?lKIhC#a=$Y zo4v@;HB?eXu5rwAMCa+(%_`}~7o)|5f_(Pp`TG732uMkHcMBrjAsx~k(%l`>-7VeSjdZu9goG%Kf^;b${5HbO zJf3sroU_j7_g!oLnYHE_uKT?o*!$l1b-ykX*V9lcD2`F+Q1qBUT%EF-!R&;CF}ScX zT-eBM*Tf=UAxu|J!MCv!`bRgh@Q=1slDAVR4bo~ysvp)1V?b)418T^|J`wvJgvI#o z7YOSxegA^xdpr;Bh273zsvnmJ_iIi!4-c!;WOnH|x1V3BlzQWU{LYjrE<9Nx>(}az z{mbizUIZN5R-$vB*q5Hm%-e0%)I`v`R(%FX8(S04QR;@?F-&HBlkdtu#$@yC;CTB|!lxpLR_|&= z*Xv{X_qNr$?x)?2#h1@x-ZxrxtOv}_ z&Z~K9?H*K6Zt~y+gAR3Z(E9S49J<4vxRna^r!s>q5zG#nO@^P+s-<-KPO&P_8(o63nFhKy40FD?<-lwx8ZkgVJ!ms%bmpS0N;7zXSa z-(3bWK9eZ(>~?4sEk))cp&0HCriw^1v)R9I4N7XcZhUim8HtbE}9??xBMHDds-StESh(_h^xdWLKlg2A>I z?8pzQ4*=P!@1&XMF?rR@+jw6Z9)}@%yRP2w;+F8@7)hgCQlWG$l*uix)Uc`fMK@Bt z)evL;+0oXG9)2tx?O`6{oh1)HX<%;bCV5_a-WcVG2|2bIYe&u;sOs(i6|W_cc5=3_ zM7jMY?&Q)eAzNWFTLY}OuUMQq`(EQDh(<<0N#A_4Tqrz^-mtoi^Ichi3382{RFcF{iV0&S;Ygd7iw~Y6szqrv+pE!Y!d^{ZiouQiVqDQ|LXarH4SjvuLeS#85^k5=5(`|!?WWA*40qB>4WN+^YlBa@O& zzJHq3*{k93hxOMLkoukh^(CRzBmVX__l|PK$9;^oLzGb0LuoU2H7uDqa`mSFCH~Ze zICbI{G>PE*hKi>A3~+vA@K=si2~zeZq0{B|SU@&eUOu3TWr&g@#_l*(YYj=4F(^M- zT)VTp@J)`W1NHD^DNICOEf`((^N@B~YxNg(U3+=!`dNm^ape2!bqG=q6Hrf!vhpoB z8OYzQJH}PV^ql1(E^u?qI&UtZK_ssxOn$hPfieH}YV0}i@yhMJbMR@9kKbh+{EBGv z*|;6?PS82O$#S}#8eSOAqa=EdK00#ufYJHg`!csPPJTqt>zREL5uQ{xA|nz0*KqEL zP47var`Q`&dIY-TFN4#a-1L;39+M_uE$7sRA{Lu-cv4%~=tp&Z-7P|}cXSL} z%odz)6t?a6WR}wGy{)^pp4OpIqGz6>tnck$KZET8&T%5;0d&k$S zNRLLV|HtV%JL5Vf>7q)*2$ryei!!e-E~bdz0E*!R(nGag+*f z_dva$qSqZ4pxTNdgR0Z{lU7 zP$JR}R&)<~@+n-x4pyfz?An?{A`lkv{_9q&oGp9TDjjPol%3IJo@NQk4%{HWq&5p= z>KM}5WL}j^IeoJCkdwihCj{ah>`JD9jx|HStok=Mcnhqf=Ao>YozUj7^`Gx3N>nJpEo6s9O>yXlC>~)r6<#&}GqvzaQKuLtUAsFsmQyx#hZyhqQt+YT$!^% zA`2p`1%(d=yqbzuD5AKyVWNes8&e5-^M+LA!3$1YZbye8*-sMYmg9%SN(XV#5xxuQ zp-i2+gsk#h&jESglYPrh^}2++8-*XrrG zZQQ2DV}C6f=lP*!aO`Z7PdGubrZ1=$_kTqtmzcpW8AcU=r9lIBjDcL@eP#iJM={Vm zt5kii>$?&ML&T%MfOgs3*SYT8g z4Z{TkJ#ODn#FFuMbd?WW84B%_ISAs9Zzg+26aE^%Q(!)iAx_4AX9}7pbrh)>7nv!< zBI$>LLb=lyFa~>`Ao0FQy~lV|ae}J=Rf&~BIPLevV%J@yV>(UfnVPbT=X5ycN6=lz z=h*~d%eswtAFQdfD!oRnp&{S~A_u;HN|y@E&a5 ziOZW@VU4}9?+dr&6q=?Vwu^gNWa6W;&F4Z3$cPQ=+Ay_5ko9E-{X5$g;5plQI@*o2cuTAVOV?v^EA(Zgg3cyVGsal z3ue~Q0KfJT;mjHEW-~uRzj(AZf0EmfAcn%z7tkK^4I|}5bELh1q#tlX6ESaSwFg&M z#lnI)o%qbe(@!^}=Iez8WsVi|0!El5r{~ z=6O|3#7e-BZE-%lg6F=sOi_fy|Ab^d?>3mMK;mNK%g6qRK!_#XEghE6hRW8)MdBOX z%765h0wC(x0Ci?K6iolX))FJAZ>PFvSMeXar-c(0Xe2pUk_IT5M~Waj5eUc2nc+e{ z>0>ryKSH{8C9Z7LO{xE(@OVGC#7m+A$qu@!8T=5;qJ%PhH+!xV+=g5#mcJyZ4Fjcz29fWX9DM-mu+ne!#@OKR!7Sf$V@l5~!q*f8~2r>v-go&5nU*sC_kADj`$?P zJGa|@6=7YaU=*ZTIm8qW+1%}2e%7Kpdn+U?ChhQrJ3z1_ZzB1-r}rgPLDQQIzH4H?p0aSOBZ5t2%`nPA?yQV8+VTF^I{Qbrn zPR|-|S7+L7E(}{016^`RNw9r}Ir-0tO@mJ?QrU#|{j6xV(_B`|Hf;n}oodYBGq1n$ zl7Bin)PRE#wu~e}3tD9j0bB9Dy-s!Bd($`QFYaogmtEzmAYps>9nxs_5KQY{mo11c zPC%C!TTSL~C?#Mpct(AmDP+g<8179jdijBcEIPoWfu6@X1ElQ zlp#`lx|6X=p76W%1-_~$x9;M^R`R!Pv6Hg>8L+`X$aYQrOU~QZtzY2cv?0I+Pdq#Z zkZ3e+Wk`;}O>ojr5P>#1W{I^Z-&UB;m!HQh2u(i!x=r@FVo5`YsXB&cLzBA925Bwd zX^v?z0iV-`40~N}9#&AwItJ?C9ktG0wDWC2=m*Yrf&0>YKuY5RN>eqU#0Pfe+I=uvt7TG^L+;Td73C_Se_Or{zb1oCF+EAJL&y6$(-z_2$Cku#Vh_skKF5q8 zEGnLa;m5Ax3O_--@0t61Ew)c|3U|&0{f-*EIZT|rBx-nAF2)i{*!!9-&jvV?D|w(= zW$qQlfGFYy6v3^}!-J24DEh<2!}Iua`b(;K_4h=W$7OUV-cK4z5h!Dm4|naRU1f-- zU-JrRzkW$GqI3L2_mc{ypjMLB8Cp=_=U&YygjHEFQLxkP#q0we>%s|OA-jX5RoYMy z1Ate>emiqwX{h9CN%u13g=|AU6nsPcYGI+q+%u~b(?>2Hzv)PVcRb}$47NWz^pf!w zPyF#aO3GH(;n1qY>C$BG(b;Ep2qt-_OWkPxS?T9~JIxfv+eWv^0aOf3`Sq~?#Oi@h zoefea4^XF$w(ZDoCw~XAx&k&CJY?OMENdg%LB*Kb${~JAc}YaMMpZ15&mJ77~%y7kT_*xQvu+r4(A{Q9-7lG zkWcd6eTxXlgMXWR-=V5JUrcbEr)Le5C!S9ytQw1Qa36QPIKC1Wbs^U)ucOifvU> zMr3?ds0-WlKJXDa()1pt_4sy!2GzUK^YNp`k8U%MQeK(gmp2I_k{=Mc@H%7m!LD8K z|E8t<%dCAUrqTHmnclz-on*_`cK->kivseXy}M$hPrL1=>GWM>B%E7tncd4FJ_UAlvYm(?R}vM?r6cZGYoRCn`aoi)h<2T z$>q(z%d`KNE5&6*XkU;Wz994YS<$GM?_y~Cay`Xp_O#eZ#N8BA*niVG!;xd2z|bA* z{L(Ft9{-XjMp?#d6N}q8jTkFbj<2+4iihZ*eFR_1IHB?uTglADYO!w_@U@ ze50etswlg4W^T2_S=W+&C(GXhX={GYss~~Z=6Y}_^6=#ty$>^H#r1 zQ-tYGpF2_7Em!XQ{Ts<2Ms2u3)Udz8g*^!kKFs7=SPH5Q2adjI&hC2x7E=?)a~l>v z7H-v;3?w)S7POm!gN<8w#N17^t;}^j1XeTfaESc*!A|}*TNslG0ND2kOkc0pp*|LW z8Zlk%-y-%?J+J>0ozMaIc$8xl5R|^#UZ?i&Iz>uS`hMwS?U`KbKJ!lKSWir+U{1(b(Xm9WBC#eFZ?h#F9q1i|?v595 zV;oa`HNaysQ>Vjp{<JI=FhYH%q78<{ysaevPKw+5>17&tsGa-oY*vhEFn-Bac)PKXDY7R@3P?%#p_>!EQ zwI;Lhju2r0>9>R?YEH?`1$T1B4I4TZnZB9D&L}vte+4=Q8}gGJUjXdclGnaISP5_v zt^6SQOu&>H7FtLb$Qkz05mcMSR!LFmXKUp8sAK_SKp-Es@L?JQ*U)lEkDLvfYtFrn zbxyy?$UmZ13S;!+IFj{O@j^2}7@?H(Tt`RUV#MTxZ?qT|Zz8jsyAmxlb>>RjwN`^D z-x^!CZa-kB_V*hqtmHWuJ~=s$k?j&W{{c28)L%cM(^PA?i(xufblp(bU7H^rr9LE1 zLf3&u6-0eWA65PrXevoXZbL!UN8Oi5x@rU3aDfinDtsJ_wp=*dO*srQ@yFX*RDaFz zyL{n(sUAssXLw6GIr7SXpiGt8%hwHwCKS*wS10D}QO6h9)&-0u7iBuh#E>0$%vqn9 zr#)J<`o^(8Cr}eY$klrtc3x4&%$CapS?!a!_QZE{PkOiAMyOwgSZ zQ+wU; z;K}IDFsnL$jSkC~Ii7hqA#V4-@#n4$tzlYM&(Mw%kI2$SJSb{(`v-tdMV zz2ms*R4Rmh2A^_*2TQ+kT7^2w)~7{DmAKf8=etd9!;cJdUdgZ1?w3?=2*7%Bd4|to zdDT%Q8|HT(Z`n`3StQRda+wI%a#JpEX;gRTzL9~=vF_#4y%%~2B2*9%itxN=4C0mm zPzq{~yi59I|3byWmvT_3B4Y3%y}WM8sr#c7moKjVCG&#&y5?T6iPdp5-1L?oaZGbh z52uEqV}C7T-2n7sm<=Ll2!&A|d_-)G<+qNXAPH3aToKh2b?7^Oc-O!r<4g!V4Y!}_ z!~w!SyHSX0)Ks4B{IW*M{d5m0htEDDbz&TJhXHSSRCyjP8Lfo7M7Ez;=AY}(dMkhi zUE%RTbPpoNQpszCTGfcqolqn*?{F}6En8*-hS2&)o?a$tXam}Yepcl+>FV}SAn?LugxrVeE# z_T=+AiaWdrsqP-9`iZK8S-E(Dc-9x{3TU6Is-F!apJ87KAS*7XSq-ouz%NOYg3&xH ze5^I02UNp_4c}#ZoTZ+8-i4BJ9d#I2g(#v<`IUHLl!XQ*sZwOIR1!>3z{kurrFc-I zpPj0CuB^2#VEi-TIuQO%{Y13l{U&?EAFoJtX)^BIHa2bTe9J$`L=ce?BlUR5X> z6KK1aY2OG!3KC@`lk~W4`pT7UVE4XxbH%UD6ehwcq{AR0ifBqMFdr1>b{$nOOQS1U z^3cXV1NlKBzz-^CUsnMi0{ubvw5cOrhvt6zW+uNEsLWW01d_U4`0TrVL1-z@-u4AL z6yO2ryv2~{;LtA{n8b25A$3=U)Ggjc7COx}R4o23?hbdKJXscM6%9eA`n6%27=)DJ}0KWW=(?Qx$)4$N?6Oe8lYf?Md=(W zFQ|FXm!IwGisZ?$mV5jG3*oK7^HByGORmP~x$oaR=UtMI)bm4Kx-_9^OP9JaSNIkL z?*DelfyfpEWPAGBErYv(TpC|0^>od`qN0)&uFa?CY6oJhOBtlcw5`Z&`XU&Lfma;k z(kY>JW#KQQug=N!(ESc$l%31e!)sjjqm)oA6rU))81o5vu>&{8pCiHhqn!-Flp9$Z zH`DoOE>IH*N7!oXP%V)>$f+InGIi?H|e5K-cQDA~P*hJQFqpuZ~0v^~bph$c^v zo6~F%WxZS34#N6b5S^f2TE~loNpgAoDC#Hps6XY}`T35!TxjeXR>zkopWbQ)z;K4P zH)B8Zc3yp4iACTYOb8zrypjF0AR)$0ZE);F?TN8%ER~%qj?amCePr#qvtkcgCkx$1 zINY3WlXllhlmB2eGuq(N`>kWZzS6j$^UxOBg2e~!T1?KecFV)tlOCum{gEh?}5a(^{qK$J-V%E(~D=l`%! z6Z~I0$v|Nrd=~UuU9?H^8Ckq(u0m<1?T0WPX%4hnP)=3lnL{KBsU)gxA|6c-+cLw{K5~bk0c&`u}(&^V2x-wYdD7^ViktV$?W*OfKGK6`D zIF%^XLDT)oJC4)~>rJE?N?I}D0?7x48|F~N3y6G9*AJ2WU-p!6^%28NP$-1L0Hw-U z?;ppL!Xd+&alx_fWCwl4jJ%&i6v~K}m6PQo+^OmUnR|CIwW$kr4H3ob;KEdKL~g<_ znRb*mI&KFjUcw)A4WUk{>DIuc!;0WZ_M%q$^`f7s>H3dJcD0`^dTLb0?+gpi&HL5F z!zTwj2!`N-lNgY@-C|IsVJ=xQp%JY3OL+|P4v`IZgHii$fHPnJ2B}IBc+Pn+4>tB$ zts0XRh9DW<0XZ8TQDY&-kBR+j*rre5XZoW)MP#3@zlM`0Z&?=pL{xnh)O^ngm;jdk z&Np4hIr@P>)8T|Q<=1GElKIGYs176_xVNBbzYBXrA|a(pm8iEkiR?cF?ksL1DPGnv za;RZYdfEL%9~z-{o^v;qSHtAo9VRqO`)Dm*+?UR5Jg(Pt&As^pW6=-%&HR(D(X8Iu~clWrfjrBM6>@4g5L? zIFxH&F#Pb_w-FJ(w|W9TF`sUHRK(HIBs;QGJ1_<1?uM0=h_G5XP=RKNmWmbz6@QH? z#fxX9F%`-XmU8u;_(m(TB@gY)*%Tr^AEsAjcHrP`Eg(%%q}AK;6$JoQCEn`zpqA-^ z_p$HpTGQhEKLAxr!3;mrbL%bh#4iVz(|`@(Q%xaW;kYO?EFuviO?lP_M3s3RmRbv1 z&|eN|Mbl)Ic|Xp_46Jv3qU7KJvPkZrW{kLkU1jRPyP}NfXldRAFYE<8N zz%5FKc}R@~{7I-vp4XUnChD}#(8NpdKs{h%`2&ee>+W56jvtlC{@mAm?)Z(-q@}7O z?VIzQwIqU4^{#Ky_he*Lp*IrbTZ5_PaT2cQMX(Q-*gVOiMzmz=lTk zZ(gebvqhp=jZ*mez*E=eFwE!ir6UwxN+U3zRzJN+Bb2TB zb@Z!a@xB2+%2aDy6PebUL6*(Va`FZ)S&4T4?=a-Za#GBf&B)7LjXsb+yl;!1cY&1i z5-5l6`U>J7<4C3>zVHN2uO2NH?4wF&hjd1D$i-+Tb2y0E1Ue->Gu&TX@?M8{D-^Wq zG;A$OVYj=2jaXi}1-*%+yR@dr64j6IR}6c}x4<$&&^JL+M3@p;H3(HzQ2@bEDUXMQ zbCNW8{u!ye%nnXW<J$MYVwQ}nETJh2VMNFH@3R{%q@GbL!E4!s0d<&xqt)=ncAXEt%o{K$iR5Osv( zwLuX&@-hX^lSpPcv(pV%T2Tbb0F0s*nj%i2ImF)#l_Do zXuq9=n0lt&ER@l1gb>DL=khel;cwrh(5mk*#0p5oazMqhjtX!7A+h(5_3fIaq9Y-b z{7`kzldIL+O#Akf9aG??6C69p z(#UkhP4m68t3}4OD+an6jdZUjT>G*}82yC3ZVmEJVXHY@JahVU4rAQtAMUIS-d%!3^*;W1{Gv*LPvOFM}uqF8v+zjL*`BK%xRl3W{3b-Oxey3^_ zD1iJz<)lH4E~w0is0hAP){(mylEXm*b!gwRe?^Ze%G&>Qa~M5WF@N}58MHx-MPOFl3-WD~R zPqmOR5C~!oRk5!iCEYTbR!hn%_~Wwj<++I{tdJ~UWXB|v8KsC@TA{^{O4^VRLd(pA z%c;b>2)0edocs_CY>(XbwqVjpa)DkN%)E4MJFylf`D%YtQz}@>n0d8eWX+|ebYBHB zNEM1e6?FXlLqf6I<|Kwm(98|W2y6qk{@58-o z-9)(nbGG01rVSQ{lf{#53>$fJJta$2nglGKc=BMyjfnsCd{x?V%H|w1SA1Ux&9|Ts zT%<`cMt`Qp1>F~fnkjhcS9ArE%A-XeqNgC2yx42DYR(^iEr~&7DgiS6SyQONy#bkj zF5ye$I(_@Pn}2%hj>zTS@N;;_TCxE$5+^JY!j`^v-u3a><3}C0`|hH6&o%sec|bfmSY1v zc9xWm2|+}Df#`17;eP}52p{53=J!4x=gaZp>-6vNQ;dskSjVsnV?v(l zx%>Azm$)>BkdY%q;{v9J_c6T%9Pw32-_Fvv{kufz@*6a?p`S=)pil4Pi|=Dp#p)PX zps3zZiMLA0(7lWSyX2obKsA;C7Yae}#X*Jj@F*%P4n4CIxIG2C{~8E@6rlnX5rjF{NfOt*y zd1Hg0TJPF@LO+0~d8^^<^2ILXpT?$t9sq|z!=@(DV1V&ObwSZu&jw#+)OdA!zBj$s z3N%1NkS9((THjTX#p702edAHH!Mh)BesUoCQ~`bQNnEfGL(#GSXRYj?p*^)ogBlBk z_D0|ekO~P}dk7`zoH-dNzIX`DAGu?mh*PLFU#kkq_$=F9FxAV#jt57eN=r|SsFd?m z16ToDA=$U7=NT$2TJRtkGZEWv?f@&(s z9mC41{Bckj_zh)r2x`jd9rm7MuZmNJ3Qu?m8#j^0nf_MY-_Cj1xsdP$TXbK z;Ce431=+YJ*-l z#lbQC)?!R?PROf%bQS+YTCBNs0VNDGoH%_rQl1d)sff{@@t?3-cazarB|9PUYY7qH zzZ0n2`}@f#w7^FAv*H4~gjZjh?bFr2)P`4=K^-2UDhE_x1i>SRb|uKyr=}~8>D^mu zKUjpl`j7j*pE&mg3He~ag^7q^vo=_e8k#G-Z%h6Yz>49ANfc>v05tSnTF-a+SnM{! z)a;!xLWU!U0$b{L84-4WlMkCdW;gqmpIIG9h}D0_6nz3%?0}win?vG=kmK^b$1w~u zK9^?HH}HsG1gqOOb(}*}a0?NARQ3y(R2&=E7y+e(R-?Mg%MQ?8bN|o-Gq3o&6VX2UEmu+5hpfGp$ z=BiR#L-^GtB_-AOw481f(SIJ12FAYeZRyL}u&-faN4pF;ps~yDCR+3V3AJwjEbz#T zR%QR&LQ6pkLYZ+>e>B@~gA;Hbnz;lyY;Y2yKiH8Pc-HKvcx_-kZ}A(N{MM8L+Gvx3w6 zCfCx^?$gpe(XY`^4`L^cEdiaIZXm{^q*`{fP&^tQCSUW{^!*Vb;UAV1{Cr}=&jYFv zquiIm@%MP1#<4onojQPFB|2{vB77xD{#A>9mD!ki01dgMJe0{y)BdWREL86C&w2Q zr*WaJS`GWoUf&W%7M`Qef$IrJHbtILHqY7_e}FL=&loKBhwOZmp^mdx7@7<_>-kgj z)MCR=V3F-YwzR#-I+IRHo~t^&U1kW$m#WTTuqDW(58A~@j@fFpGB1C>{Ks1wg}6sf zVu9tEA}O(f>fanRPkhYGy%N&x5tS&jE?v*Ak=ZM zL4*K4&MjvWvr~C=Cp8Bv=g;e0eST;AHQjaW49Gjml3Gq7#IfFIpLH zG?Nt7=&{W+(R+5)aTz#Nd7Zw*>aJ=i=PcjA*{*IJgba2aB_nkm%dc+Jzn|NhOwT}i8_M?!m-R6cZZanMm zAB}uKYS92{DGb!H0Du2mEq5qi_M)!WGG}}Rii7fs-a-8O?MRA$2+g! zrtG?j!&Ju*9Y%jFKJlHcdp%Vq3!{2-am{|Q)^f7vPdlAvU)N#En~o3u>M}gk%iv~Q zi*H87Oe(WL$KudK56TYGU?)H&XB#DSSGQAa)>Hi8C^XsAFLX%i)u67r<-zeMgo^>Z2FF0TVp-_T3XV6kz_^o38`QHTUdV*REpy8-2w(9lsk$gC2_s6U}zC`h<@a+2wkPRY93y_qzr(W?7Zs)u0=##dWy+FWZ zLI zHX7%Ovy4tj{>+dc2G8)a1WmnqP{^4zjE+uukPZRED-dET8HnY@j4f)Wg{2yL7DSW| zb7Wgu^&qesM4&bx5O)3C5WMNPZ^%SxFCY+n-m{@d)0rRlVr?Ko0zO}R!zccxhAEhS5hIo>He_GxMl+93ujcY^*?hhUI^KXnAFds)7NK>yo ziAtMdOaQ-FeV#oF5}4vnb%j)pHwcHC-?W@*DbX($_lwTLD2iGg}ESKVGKL#7eO z6rtx{{|T%C#$vNRM`!%d4+5qXnHB#1%u+_ev?P>)tK`y|`$O*nsYwT@$(vpu20R|9 z3Dm?#}D2AzaW!dD^cHBN(7catldMumrKu zK;!Vd)b?j>^05Rz^D+{C_qgMuBpUPVt2I3qs$DcmmV3FAAaY*;ayeqpR3UD$0llDB z4%If#@*q#hEvom|{7*?0uJA^r_=984ZK#@P9N{nd^G&oou09?d#0B{1;_cei1wLYh zZxls*6f6j%&d8Peezs!deSmwc8pO|A6AYmbpD&^3IbZk&@KK}#h%5BNrD(4tc>HksDvrqNCruKr4-Za@h67RA6%b-E!nC zuEOS-XV$~5W(DNTbb&Mb^m2+5-2S((tqB2;a6D)G9noeOW4JGVSQsyo;`)^^hCzeE zdyHq5>>X(?da$p%qRVSwIZP{b*!2Di9)hUR1JryyTvYsR2N9vD%`<0Wio<XQnty_ zMC2X_zr?KgHjyjxF%)alSt^IoJJy74CQt-H=!QDCp2%0O<1H>kcA5BSJhD8>hR}Y5 zu`#C07s;IjQa3TI?CRVgjo9g-q2&A9a`QZk(Xs>#i57(kDEUV=)muKNR(*8R^3 ztxSH80J`X3WUKniOur|3|7myBb-NkT^*b>X@@pST@0dxxxu_W=w*xOItA-zfyi@0+ zQ9Q)V{|0Q;x|zulrjLw`ol5+f%=c&3@^d5y1EXKdquY`I)`~1+Wo@rLqUJw0zIqfU z12JZ(A_>?%W6&G1hQ%NvdMn_zQT3rU`TE#AIsk-#gvbK175tCaGi>uCAb(gZtV#WlU_ z>so)^w5H@3S<{O#qaDt%0v?Zfk2Uv`66r&gs}C7We)M_s@H^j%LYh~O#z}V* z8xQTP(QkOGKW4RWRmI0ub~WKfRQ%Q+_Dh=>v`;vtCjx4Qe+w2OPq0mHIw30LcZf%ry{ zN2)Qkg1uCG&;5O$800Q$2;4=9hkX&jCw_Z`dEYg4w(}UtV3_K3dlN>HnU1l;`!)aB zNg@!tdwX>|(e7pjC}IHk8RQukPosOgP$6 z6ZlyjpE%L8y{e@L>1R+|xpO5xPr-fDE{4bSpR!!9dj@aNL&zk({ydfd4~dJaJRsc{ zF78|a{k1+}TXem)WLF_2-P;H`cz9NfrrIi|AQbR7Vkra;m|!MMWV+e~?F~_xbslDT zOsKkg=dw)X%uSWk&yEZpo^YRmlxhT&I-4F52kr@!`qu>HeV4)Tbm$XVS+VTh)Au%8 zzMr_LvoA^`2M8bl-iZcL7%#~X$!QLyz%*m$4CJXVa9+k zPq$4E@YLU~!B_M1%(t(!vO>vgV&0=wZ*{Co8Lr+gNs5>DOJcR3#zkgnH#zVSZ1LI* z3`b>%X}f<`AFwTEOt4X&nhLh|CRw9?kZhG|pzO2U0YP;3+0+rKgv zEeSp#(6VdWbCQJ%;u(Htcy6iqU=Gv;soxZ+e^9SO`gc4P01m2Pp4m9&JAdPyFvwy~ zTzWB;T*|DR><4Qamh`UgD3quX2QR><>f4_BmcaqE{8AdU&ZBnOSVO zU0+_`~#079V&77T`4164;LK7Y=B4SUX-<8NW7ma zlVfhN+AB0c&h3UircEJHF;)4Ur=>#r$FZe>K5jedObtG66!GqvVcd(FLEZkZ-nLU9 z4APO`4pe6jmLNAgeSr zf&0IxJ|O384xF=j)|1&^i|+(GUSQ=wW;E-<)Dcg7T_yfGVV#N3286f7(r}+cpfFlE z5MCo_@J8fR?5U6<3b8f!q#R|eOU5U^N2)b#)TBYoGSoWiZEgj8BAdCx&>L59J)P_s zjH-JD1sdP3qjOF$dOvwkTEdmaQ}S(%rM0~EGPPUSMHc|y*YZcUEWcM51ES6XP&Z%@ z9Sc5i_gh=S52nKBvXY69^eV;{Fu~lxq=+x3qmSODr<4_O24`^}73xPzxWKSTWj0l!<^c8Hi4G{e;%AX&{&$@fSksDOwmuVzPUn z9b@B?)d1Zln-;P%K2|VJz}-YBj(DDzE=3G^;t;WBH4&)}27SneIr_TFm|weM-fKKO z#9P@z@B3YHG&P}F(mS`5lt?NU87XQV_c(J}aqd9~?`p9d5!vkf3bR2fv;->b*ARjI zEjY}_AwDYe+6|n8CwP;BN9wfWSmC7f=h;z!L^faOMrN%Jr57SjwsRt(v?WaJrG7Gw zfyqJB5@lApdP5IRpu0+UqP>Ex(Y=AyhxUDg0RAB~HNOMl+iA{cBeztBa_> zDawWAbKbJP`!cFQ%CG{;xNPhI`<+n@*l0Y9$`=;R0g9COE;vr`YTq0GIfRGyxC`X- z*1+fMTqst--`!p4f@|Cv_R$jIpOU7#l8R^BdSF+9N zo0;=zuU~u*N#}$n&p=4yVRonk!|K2-gFv zttIU%_s28|Ql<@1CYHxr^grGLQ2Za?0&ofy4dZ|fNpR{3+D-GBW-?^!J&G>?bT5PJCx##lr)|o@cEC+5f37&?y$ls@fYjx z!zdU`(kd3~{7j|_52aMWvI>?eO5GFe`ur%Me9jc3KS?OkI$x}q4*w^O<0PsD3;ze9 zsP<3QwR*QClUdy*iV9hwul?zw1?tLMAslC@6R&?}^O2;UN$qAQiSR=nZKJC*#{c;m zKw04hVA4+QHm}5ve|}__3JpXFLl*);!jc9y|NVp;OF<+yzF4PhxO8a1ZG-+`GVx=h z!%(a{V>g`v=Z1K*IjNhGs1{m(xQiEspxgenP@>w+PI*s+!4z*gO(v0C?N<@zEIP;q z5jy@UFBET4Udf20&)@rsQM}4tgiE2&iRk(Dk=jz=Q6(n^QRv6?^UPrrpD6fxd?Ay~ zjy5kq)6|C>kY>;)7=tD@g$#^{-M&`JwA8e!zmF2$!0@oVAn&5@m$Qd_a*X?Uan8g? zXzr1rYWK$hX9V2Y$5Lc|f14!?VGMq`f$xEUPhtY;7M5L8VGgO|*JOk$@k)u{ZY`Kx zZm)e?jJvyk$-M_HF9_{#7K7`sD{AJ;=W1g~#iJ!6Cb7FVP@+NR->5udHRL1GAIf}( zIP<|{8AR>>U3`;HSe?r0If`wKJ5^~OKP#B{GX3HXIjFZQ(f_w8H566?0=q#8_;O&gidVY zIhUabZW(KtJ`?+%eJkktF@of^hGb%EE1S*JL!0^vVnw)1~va;T*u0n>rfFPlSbeBjsh@|Kt1*JQrI|P)x8{xek-tXS;-tmp`{Q-OIXD;?( zt-0o$zb9PEP$T?Z7f>9hJui;OgnVe@E(z~%ipbI2xyE4~6Uy^xn~4rWkg-vMU(1~4 zs7^Mnzraq5!|((}VK@HaPkuV?t9+@KYVsX)qle}(s0>tk*aM--oZ?>D1WrZ7_VFc< zM8n{GS;$+<$Dw`WdXqM41|ACaL7>q#V)kpx;r;76!#vqx`n6q;I0pVq7C$#0el^)Y z*vv{&qyDJntBS7Tr<0scP=F211L5p78lZk;=y84pkUQ!y>U?XkWvW`SFl-p0$Urdv znla8R(7T^s;_(}8EoRbsI_p6+u3lYu2XW+vrU)^e$%GfPBS-}K#hSp8fLHi z+w94$irASZ1sq~GFhZT|OPhigY=VMwsHR-{u*OMEIb%9*r z{L~&*ru3S6v&R=3=rqCxY7cCng`H+qSIXt*)TzV0_lI+9YS3q2QWIBgzQTP+%2sKX z+&iVEl-yG|!R@_|eEGcVZ+8xQ_&td?Px~l3RXHSvg5#OdscgID+_zZ19)TGE*Y@81 z=qsAVnt;_a523&y9+iz)-Cibe!Q~1jbSj<`2n&bLS?eDMYYJNRI4jJV>tvSLHF85Yx17EXwUiI3 z`$PVhM=>PcKed&ofH-WC@#Ei+*+0X+oz+EA-;yZMA_g0iQgUYD%TfX3W9aEBzthDG z25f3ozjxO>V<|`SwnECgcZ^Qo2gG;uFS#A-gY&tbP11gwLwiNQvk$^den^quI%_YFn}%n1lg`jKVL-zKfkQBx@#t~j!? z1i$!DPVG)Z=5rVf$Mpp6m~(~%U{KApwJ=LoVB;8up8;6k4-U_sPl#AV^j1~xd?6-! za}b`GooHc!3~Q7gxAatRuISo?m&IkgD{WBfPG};U8WK6ul%_*=aT`WbZ$iI)`!?w< z5mS>7z8CV?5ahuCd5Me@OIO{qqlIu)4}Z@j2qd3r#_%eFnoSH1#e2nlZ=jVWL8+`a zKZj4aZuGxj@2hVaitv8PKBB0_^j(b8V&Vq0>*f22YWv9t=b0HFw>(4o-SrCRN(!}d z%3lE3*Nk@y0{7cJ^7zbi3n{=evrP@u!ykkJq-0b=lazd#d2e0ex(2qHWjc1uF$cGG zckaROmj$Z25K$MEhPQ8MrI?yRBA>mP0Mm>yJkFzo$>|0Q@VZ|{CW;W5GZ5MP1M-3^ z{;j`(Q_=glXpN6Xyi!h|zmnAiyt8jTKu(Ea!wc~ITmV8I9V^9;blY$8nwst)=(%|) zK;Am6h8h7pk1a*(a7tcPP2o!B8I$YD4mT-{!dP3NL>he2P3~LGA@U?mstwKXRoN-IcibJkh3-Sxk26SR@w3HK0bU(>xVofi0!9pbddo zNMZY(C!zfErFvN&*Pcip*x?fU2===5V#Pj-O|Sm3ibneNYZPYt>b~bBiLkOdn|g_p zR#5@tog<{fbW7Kjl@j{)qvEv0wE1^J6DYz0xX`s&7PRph5eGxO$kX$W8c)s^yYI1VwGPSY z&>T*elxlEJ*JUrmb|lJFN>NGFv7>(>sC*HgbqAgm>=FlG0Sf{fmbDOC3XfA#YKL|9 zeqTj{QF5c;&MAPP()$(KN_1ugOHGnK`9io`Km1KiaX0gG0i2v|C@C?Q_t}z`tIH&+ zczdze+tYa$oB1fp1Ahl7!~MKn-CN57Ny6G5+=p+Um62P4iE-h<38ckR#ivs`8#^nY z%jJKCpw0tOhgG_Mc-dw>_5YTR7V!Q+PhDzp;{8cosQ**Zw>V5v`8l|a7SxjI%1w#o z0{Oo zn^CTj8r$Iu^Dh^&+%xkJ@g+DgF6O;XXP)wzmSV<()k5`dh%leuPrdF>RXxQ6gKJc5<*4X+J0j)Zy%bBo>K81rn*4O9#OcU2 zgjpZ8`@ftOUQ(Lw&&yM4Z4irrr)dxV6F;SafS>9w`Z%W-m15qBCK3T5QhzmXMU5Ix zia?)g>hEI(&{NX?{g^Oj9#va=KdZ*vfQhlt&Uqbr4j?W`hGYT&Dix7Bp4dbxjMRTS zBkVYDkVv0xcF5Yo^7uD?DnjE~y7sl#BSx16XsPxE8lp>|V3dPF^da`u6&3C(aDhq7 z0_AwG(GA~+TJ01*pJWz3RgGQx1dC}_^*ohF>C!+0i%wCdc@-9l?)!brG^XA%o2K~B z8K<+6*z)z#1ZO;Zt-E`s5hSj!^%gh6VPW-#7~|Xjvf}J#%C2i%s$B>L%#>abu}}E* zEN~)>1XH(q5O{uTOg(NQ_Wlp_so4ih`P_C&h9sD`vW{mf=`-?Qzx1J$gRR_*rSHYZ#|ORmnqpr7q5iv1aBna9vMf9rXt8F35^le8yZOIh zsEQUJ*{J65AcClHfzjT-J0_Jz7r`VKcX(qGXlE^LbdXd?|3z8(Lv?e*w+cV`B4;d2 zHt>AAe(3b|d6Y=oo|6C+6bX+*WNomr0>fdHy0w!(B!VR#Dfqgvx}gqK_txm}s)I@a zWhhLF(M(^Jfm_%-AT}l*Xtf?JABZn1ClX{rq!d3?rOoEIRuK?jQ^(jwjZY|L%)Fo#}bbDz0N>`88ldktj_sT8FasRld$`au2bPyev9D^D?3}tne?V zU}gX|{-Uhv&-AapLlrh$162l0P$p2G-$we9%BW~IqgE?lTO#-gvMHihaIhgiI2xCs z^nr|i;J&!Bm4i=QYaCymD+ceE+sq|}qLH;O9#;l{jr#jIg7+H|RHMsXDC#S&=8_Kz zUL3;RyZ>h<`DCEd)U;m;JgSOH^2ak6Kf*`?unaaKLNE+29d-sVRV&*H=k7>->wN2i zxci{z_WBoDq~zJ_%Z6+9AM>6R=%ddJ%05ZLKXSd<)(h#LI(NDzXA(% zmk1YdZB;$#ZkBqhZbaiah#N{0XHVL)eNSVSAa!6RTE#f0Lw8!xZj*dBhPmubK_9GD zce0*pw+R*E)r0ohV(_`(QmjvOu8&fqKK}?y{D)3d_F?^Rq@H+rALiiQOfMi#IT`q~ zLY_T6HP_r^^oJOX$B%s`(z%$2-_9#u96(ACw0Z$rHGS$OQO<|}v4UO4$WUPBOkrec z?HpX?M8_@?JJZKVU3wJ$$iucqFgz1rKSZ`{VVh1_sl$G%ws0%m>g+& zUGS=qfq{Lv*q%Jj5of_THKvvA(mPwe89IZ8A}z-kl%q6pHo~`cRVmHKLJyXmzaz8D zwv;A*%>GuUldr4Hy$nMSS?8sT{fk+}D3`yuAib+0q>O&xGuPs3IaKdtop-(IZ47rg zV_7X=>FIq&bLT{Z0yNeJv^yrSbYxnJh#71=wU6I#gL5V#QJz{D$j{Rnq9~<@)v&(c z6>yQo@%G^Wh*ft4(g)lCVwL@ac5XUjr;ksoy`p60Yri)&6+pu<())^~-`7mUT`X7= z!h(4N3kHRWRv`x=oY>CC+klB~+lFhAK%bu?678=Z+FxxMhu{>q$4fe$UoBY;fiy}i z?=ZW7ll`;^I$`rY$D*yz3Egf!x_UXlP|+@#vSOI`M@1g)mtG!LBBgag3IlKF_&Uap zcLf$@kE{o=qwe3|JEee3+O2@x#)*(nF~@6>HM+=5w=N|1B1rTBB#J}#v96AHJNEtn zpj9qGO;2S;vy&zk8ds|~MZN73+M_YD9!eUq6ZO;xGFWrG5m4b~ju`U{VOe!)uk`}T zT4=LPffT0-`eU}AC?30pO0zt!Wg;d`sHzzDu4cO?w_Y{o5EeibigGjSUii_5J+S=- z6Nr2=8tG47%h1$qK=^Q>|!-gJr@9rj@-)jsOCBO##)uUt> z@)jK*1YiD~rV+yN1;UBQ)#pN%L0IvNIfjY8UJu*1Yv{CC#I2rDg5OqigUi;$hVZR7 zLY*L-opwly!p0CCWar?ON|w7R`Zc-}-cBYd$!QmBwuSH#Kj0-N=xUqDaKxAV_A2RL z-utph5d1i<8Jl10?5wchLMgOcp2nd?fci62&z~hKJsu zcOE|oahL!RVs;&=gH~|_W5kp@-=VbHHp2|H=BqR{)nrLPdWw)!+BqTH!1))rx@&7E z*m?T{1yNjREJ6~jjyVpfST}63OV8Nn`-a!z61JlVwK?&cT>KuXW3qLbW%fR^Lltw} zZMKKOq#mwU+2R^3m|}dW!=}lqh&2zxo4yDUiSN(t%QGNEEUxad-!Q#Dw=av05f!kl zyM$F^yD!rG$GG3`+vYTzdz@{Z?LF{$s=cgKw9m-1(A3ZTMpay@LfxpE+8^#6ty+FX=KyFd39CI1m zoxiAmi6mN=gZ^ElVIg!;iMS}XYYP2=fl1@X{I#;yT7x+^2sX`PJl z$sRRE5-uUetK2Af7Q?XXR)+JgJ(H}G_vCZ^%EG&%7fS|4Q1Tp5a??Rr>q-grobqe& z&HXzrW&3fYJgweS#X;zbL?h!IJEu{jT%BmqD#%H^av3yD%T%x<`HfV>BQ@%-1#8Q^*`(Cz;&FBw#VgyijL=8A z2!jnFi~t}Emzf>3D_Q0hDwU8>mU@Sy@5QsIq6p6h0?*RnMN9qd&aNl7k>b_#Plx?6 zqqt?;o0a$&R{7kwgS9-+ZUo(=K2XHtQ#ySUKquWAh4ZSJwQSYR=TQ8D-3KxL+ep!zu P>(;|=BzXycc!&NUQ9E6a diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/support/util.js b/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/support/util.js deleted file mode 100644 index 9d62d223d15..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/full-screen/support/util.js +++ /dev/null @@ -1,18 +0,0 @@ -function makeFullScreen(selector) { - var element = document.querySelector(selector); - if (selector) { - selector.requestFullscreen(); - } -} - -function makeFullScreenToggle(selector, targetSelector) { - var button = document.querySelector(selector); - button.addEventListener("click", function() { - var element = document.querySelector(targetSelector); - if (element.requestFullscreen) { - element.requestFullscreen(); - } else { - document.querySelector("#fail-marker").style.visibility = "visible"; - } - }) -} \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-cursor-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-cursor-001.html deleted file mode 100644 index 9ef2efb9e47..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-cursor-001.html +++ /dev/null @@ -1,53 +0,0 @@ - - - - - CSS Regions: CSS cursor on content node - - - - - - - - - -

The test fails if you see any red or if any of the expected results below don't happen.

-
    -
  1. You should see a blue square below.
  2. -
  3. - Move the mouse over the blue square. Expected: The mouse cursor should change to a large, left pointing, black arrow.
  4. - -
-
-

xxxxx
xxxxx
xxxxx
xxxxx
xxxxx

-
-
-

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-cursor-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-cursor-002.html deleted file mode 100644 index 29248365a54..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-cursor-002.html +++ /dev/null @@ -1,54 +0,0 @@ - - - - - CSS Regions: CSS cursor on region - - - - - - - - - -

The test fails if you see any red or if any of the expected results below don't happen.

-
    -
  1. You should see a green and a blue square below.
  2. -
  3. - Move the mouse over the blue square. Expected: The mouse cursor should change to a large, left pointing, black arrow.
  4. - -
-
-

xxxxx
xxxxx
xxxxx
xxxxx
xxxxx

-
-
-

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-001.html deleted file mode 100644 index 0774957c4c8..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-001.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - - CSS Regions: :hover on content nodes - - - - - - - - -
    -
  1. You should not see any red before or during this test
  2. -
  3. You should see a blue square below
  4. -
  5. Move the mouse over the blue square
  6. -
  7. The blue square should turn green
  8. -
-
- -
-
-

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-002.html deleted file mode 100644 index 0d0c849bf17..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-002.html +++ /dev/null @@ -1,58 +0,0 @@ - - - - - CSS Regions: :hover on content node parent when the parent is in the named flow and rendered as a sibling of its child - - - - - - - - - -
    -
  1. You should not see any red before or during this test
  2. -
  3. Move the mouse over the yellow square
  4. -
  5. The blue square should turn green
  6. -
-
-
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
-
-

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-003.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-003.html deleted file mode 100644 index dc855987699..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-003.html +++ /dev/null @@ -1,58 +0,0 @@ - - - - - CSS Regions: :hover on content node parent when the parent is not in the named flow - - - - - - - - - -
    -
  1. You should not see any red before or during this test
  2. -
  3. You should see a yellow and a blue square below
  4. -
  5. Move the mouse over the yellow square
  6. -
  7. The blue square should turn green
  8. -
-
-
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
-
-

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-004.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-004.html deleted file mode 100644 index 76d73eb40ab..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-004.html +++ /dev/null @@ -1,61 +0,0 @@ - - - - - CSS Regions: :hover on content node when the content node has position:fixed - - - - - - - - - -
    -
  1. You should not see any red before or during this test
  2. -
  3. You should see a yellow and a blue square below
  4. -
  5. Move the mouse over the blue square
  6. -
  7. The blue square should turn green
  8. -
-
-
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
-
-

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-005.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-005.html deleted file mode 100644 index f13cd0fbaed..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-content-005.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - - CSS :hover on content node when the content node has position:relative - - - - - - - - - -
    -
  1. You should not see any red before or during this test
  2. -
  3. You should see a blue square below
  4. -
  5. Move the mouse over the blue square Expected: The blue square should turn green
  6. -
-
-
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
-
-

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-001.html deleted file mode 100644 index d28c79b0526..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-001.html +++ /dev/null @@ -1,55 +0,0 @@ - - - - - CSS Regions: :hover on region that has borders - - - - - - - - - -
    -
  1. You should not see any red before or during this test
  2. -
  3. You should see a yellow and a blue square below
  4. -
  5. Move the mouse over the yellow square
  6. -
  7. The yellow square should turn green
  8. -
-
-
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
-
-

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-002.html deleted file mode 100644 index 347319195e0..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-002.html +++ /dev/null @@ -1,56 +0,0 @@ - - - - - CSS Regions: :hover on regions that have padding - - - - - - - - - -
    -
  1. You should not see any red before or during this test
  2. -
  3. You should see a yellow and a blue square
  4. -
  5. Move the mouse over the yellow square
  6. -
  7. The yellow square should turn green
  8. -
-
-
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
-
-

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-003.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-003.html deleted file mode 100644 index 103800a73dd..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-003.html +++ /dev/null @@ -1,60 +0,0 @@ - - - - - CSS Regions: :hover on region when content nodes are relatively positioned - - - - - - - - - -
    -
  1. You should not see any red before or during this test
  2. -
  3. You should see a yellow and a blue square
  4. -
  5. Move the mouse over the yellow square
  6. -
  7. The yellow square should turn green and the blue square should remain blue
  8. -
-
-
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
-
-

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-004.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-004.html deleted file mode 100644 index 4dc41bf7c5f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/css-hover-on-region-004.html +++ /dev/null @@ -1,76 +0,0 @@ - - - - - CSS Regions: :hover on regions that have rounded corners - - - - - - - - - -
    -
  1. You should see a blue square, with a yellow circle inside it.
  2. -
  3. There should be two blue dots in side the square, near the top left and bottom right corners
  4. -
  5. Move the mouse over the top-left blue dot Expected: The color of the square turns green. No red.
  6. -
  7. Move the mouse over the bottom-right blue dot Expected: The color of the square turns green. No red.
  8. -
-
-

xxxx
xxxx
xxxx
xxxx

-
-
-
-

-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/elementFromPoint-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/elementFromPoint-001.html deleted file mode 100644 index a59fc54aa30..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/elementFromPoint-001.html +++ /dev/null @@ -1,117 +0,0 @@ - - - - - CSS Regions: document.elementFromPoint() on for elements that get split between regions - - - - - - - - - - -
-
-
-

FAIL

-
-
-

FAIL

-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/elementFromPoint-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/elementFromPoint-002.html deleted file mode 100644 index e36d0ac275b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/elementFromPoint-002.html +++ /dev/null @@ -1,125 +0,0 @@ - - - - - CSS Regions: document.elementFromPoint() for elements flowed into regions - - - - - - - - - - -
-
-
-

FAIL

-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-001.html deleted file mode 100644 index b23cb0e78c3..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-001.html +++ /dev/null @@ -1,65 +0,0 @@ - - - - - CSS Regions: Changing an element's named flow when hovering over its parent - - - - - - - - - -
    -
  1. You should see no red before or during this test.
  2. -
  3. Move the mouse over the yellow square.
  4. -
  5. The blue and green squares should swap places.
  6. -
-
-

xxxxx
xxxxx
xxxxx
xxxxx
xxxxx

-
-
-

-
-
-

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-002.html deleted file mode 100644 index 852af75109e..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-002.html +++ /dev/null @@ -1,67 +0,0 @@ - - - - - CSS Regions: Changing an element's named flow when hovering over a sibling - - - - - - - - - -
    -
  1. You should see no red before or during this test.
  2. -
  3. Move the mouse over the blue square.
  4. -
  5. The black square below the blue square should appear on the right of the blue square.
  6. -
-
-

xxxxx
xxxxx
xxxxx
xxxxx
xxxxx

-

xxxxx
xxxxx
xxxxx
xxxxx
xxxxx

-
-
-

-
-
-

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-003.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-003.html deleted file mode 100644 index d43b4e257cd..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-003.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - - CSS Regions: Remove child element from named flow on CSS hover when parent and child are rendered as siblings in region - - - - - - - - - - You should not see any red before or during this test. -
    -
  1. You should see a yellow square above a black square
  2. -
  3. Move the mouse over the yellow square
  4. -
  5. The two squares should swap places
  6. -
-
-

xxxxx
xxxxx
xxxxx
xxxxx
xxxxx

-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-004.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-004.html deleted file mode 100644 index dc1d8ee008a..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-004.html +++ /dev/null @@ -1,55 +0,0 @@ - - - - - CSS Regions: Remove child element from named flow on CSS hover - - - - - - - - - - You should not see any red before or during this test. -
    -
  1. You should see a yellow square above a black square
  2. -
  3. Move the mouse over the yellow square
  4. -
  5. The two squares should swap places
  6. -
-
-

xxxxx
xxxxx
xxxxx
xxxxx
xxxxx

-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-005.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-005.html deleted file mode 100644 index b421fa91a74..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-005.html +++ /dev/null @@ -1,63 +0,0 @@ - - - - - CSS Regions: Remove element from named flow on CSS hover - - - - - - - - - - You should not see any red before or during this test. -
    -
  1. You should see a tall gray rectangle alongside with a black and a blue square
  2. -
  3. Move the mouse over the blue square.
  4. -
  5. The blue square should appear in the gray rectangle on the left.
  6. -
-
-

xxxxx
xxxxx
xxxxx
xxxxx
xxxxx

-

xxxxx
xxxxx
xxxxx
xxxxx
xxxxx

-
-
-

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-006.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-006.html deleted file mode 100644 index 26e82a33edc..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/flow-change-on-hover-006.html +++ /dev/null @@ -1,62 +0,0 @@ - - - - - CSS Regions: Remove element sibling from named flow on CSS hover - - - - - - - - - - You should not see any red before or during this test. -
    -
  1. You should see a tall gray rectangle alongside with a blue and a black square
  2. -
  3. Move the mouse over the blue square.
  4. -
  5. The black square below the blue square should appear in the gray rectangle on the left.
  6. -
-
-

xxxxx
xxxxx
xxxxx
xxxxx
xxxxx

-

xxxxx
xxxxx
xxxxx
xxxxx
xxxxx

-
-
-

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-001.html deleted file mode 100644 index b461082768c..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-001.html +++ /dev/null @@ -1,129 +0,0 @@ - - - - - CSS Regions: mouse events don't trigger for region children - - - - - - - - -
    -
  1. Mouse over the green rectangle and click
  2. -
  3. Mouse over the yellow rectangle and click
  4. -
  5. You should see "PASS" appearing below
  6. -
  7. You should not see any red, or the word "FAIL"
  8. -
-
-

-
-
-

-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-002.html deleted file mode 100644 index 4f6fd4d8e77..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-002.html +++ /dev/null @@ -1,200 +0,0 @@ - - - - - CSS Regions: mouse events on contents node made up by unknown tags - - - - - - - - - For each of the three narrow boxes on the right of the cyan square: -
    -
  1. Mouse over the green rectangle and click
  2. -
  3. Mouse over the yellow rectangle and click
  4. -
  5. You should see "PASS" appearing below
  6. -
  7. You should not see any red, or the word "FAIL"
  8. -
-
- - Some text here - - - Some text here - - - Some text here - -
-
-

-
-
-

-
-
-

-
- -
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-003.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-003.html deleted file mode 100644 index ea0d5433a33..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-003.html +++ /dev/null @@ -1,101 +0,0 @@ - - - - - CSS Regions: mouse over DOM location of content flowed in a region - - - - - - - - - This test passes if you never see red during the test or the word "FAIL" and all expected results happen when following the steps below: -
    -
  1. You should see a blue empty square and a green square with text
  2. -
  3. Move the mouse over the blue empty square Expected: The text "PASS" appears under the blue square.
  4. -
-
-

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Recusandae eveniet. Explicabo veritatis adipisci praesentium placeat voluptates dolorum pariatur architecto itaque.

-
-
-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-004.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-004.html deleted file mode 100644 index 790c1432560..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-004.html +++ /dev/null @@ -1,159 +0,0 @@ - - - - - CSS Regions: Removing content nodes on mouse events - - - - - - - - - - The test fails if you see any red, the text "FAIL" below the two rectangles below or if any of the expected results below don't happen. -
    -
  1. You should see a green and a yellow rectangle, stacked vertically.
  2. -
  3. Move the mouse over the green rectangle. Expected: The color should change to a lighter green.
  4. -
  5. Click in the green rectangle. Expected: The color should change again to a yet lighter green.
  6. -
  7. Move the mouse over the yellow rectangle.
  8. -
  9. Expected: The color of the green rectangle should change yet again to a pale green. There should be a green text below that says "PASS".
  10. -
-
-

-
-
-

-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-005.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-005.html deleted file mode 100644 index 09557a08ecc..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/mouse-events-005.html +++ /dev/null @@ -1,191 +0,0 @@ - - - - - CSS Regions: Adding and removing regions on mouse events - - - - - - - - - The test fails if you see any red, the text "FAIL" below the three rectangles below or if any of the expected results below don't happen. -
    -
  1. Move the mouse over the yellow rectangle on the right. Expected: The green rectangle in the middle should change to a lighter green.
  2. -
  3. Click in the yellow rectangle. Expected: The green rectangle in the middle should change again to a yet lighter green.
  4. -
  5. Move the mouse out from the yellow rectangle.
  6. -
  7. Expected: The color of the green rectangle should change yet again to a pale green. There should be a green text below that says "PASS".
  8. -
-
-
-

-

-
-
-

-
-
-

-
-
- -
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-001.html deleted file mode 100644 index af039fefd05..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-001.html +++ /dev/null @@ -1,97 +0,0 @@ - - - - - CSS Regions: document.elementFromPoint() for elements in a region's hidden overflow - - - - - - - - - This tests that calling document.elementFromPoint() on an element displayed in a region's - hidden overflow will not return that element (but the element "underneath" it).
- You should see "PASS" being displayed below. -
This text has overflow
-
 
-
-
-

-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-002.html deleted file mode 100644 index 9f7b88f6dcf..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-002.html +++ /dev/null @@ -1,106 +0,0 @@ - - - - - CSS Regions: document.elementFromPoint() for elements in a region's scroll overflow - - - - - - - - - This tests that calling document.elementFromPoint() on an element displayed in a region's - visible overflow will actually return that element (and not the element "underneath" it).
- You should see "PASS" being displayed below. -
This text has overflow
-
 
-
-
-

-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-003.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-003.html deleted file mode 100644 index 3562c8443e6..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-elementFromPoint-003.html +++ /dev/null @@ -1,96 +0,0 @@ - - - - - CSS Regions: document.elementFromPoint() for elements in a region's visible overflow - - - - - - - - - This tests that calling document.elementFromPoint() on an element displayed in a region's - visible overflow will actually return that element (and not the element "underneath" it).
- You should see "PASS" being displayed below. -
This text has overflow
-
 
-
-
-

-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-events-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-events-001.html deleted file mode 100644 index 513dc5d05a1..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-events-001.html +++ /dev/null @@ -1,110 +0,0 @@ - - - - - CSS Regions: JavaScript event handlers for elements in a region's hidden overflow - - - - - - - - - This tests that elements displayed in a region's visible overflow handle mouse events. -
    -
  1. You should not see any red before or during this test.
  2. -
  3. You should only see one word (This) at the bottom of the gray square.
  4. -
  5. You shouldn't be able to scroll or make visible more text in the gray square.
  6. -
-
This text has overflow
-
 
-
-
-

-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-events-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-events-002.html deleted file mode 100644 index f769d3c5c1a..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-events-002.html +++ /dev/null @@ -1,115 +0,0 @@ - - - - - CSS Regions: JavaScript event handlers for elements in a region's scroll overflow - - - - - - - - - This tests that elements displayed in a region's scrollable overflow can be scrolled into view and handle mouse events. -
    -
  1. You should not see any red before or during this test.
  2. -
  3. Scroll the contents of the square below so that the blue word (overflows) scrolls into view.
  4. -
  5. Click on the blue word (overflows) outside the gray square.
  6. -
  7. You should see "PASS" word being displayed in green, below.
  8. -
-
This text has overflow
-
 
-
-
-

-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-events-003.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-events-003.html deleted file mode 100644 index 16425ef49bc..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-events-003.html +++ /dev/null @@ -1,112 +0,0 @@ - - - - - CSS Regions: Mouse events in visible overflow of a region - - - - - - - - - This tests that elements displayed in a region's visible overflow handle mouse events. -
    -
  1. You should not see any red before or during this test.
  2. -
  3. Click on the blue word (overflows) outside the gray square.
  4. -
  5. You should see "PASS" word being displayed in green, below.
  6. -
-
This text has overflow
-
 
-
-
-

-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-selection-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-selection-001.html deleted file mode 100644 index be6d3ce960f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-selection-001.html +++ /dev/null @@ -1,59 +0,0 @@ - - - - - CSS Regions: Selection for elements in a region's hidden overflow - - - - - - - - -
    -
  1. You should not see any red before or during this test.
  2. -
  3. You should only see one word (This) at the bottom of the gray square.
  4. -
  5. You shouldn't be able to scroll or make visible more text in the gray square.
  6. -
-
This text overflows.
-
-

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-selection-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-selection-002.html deleted file mode 100644 index 6a11f8b0ca6..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-selection-002.html +++ /dev/null @@ -1,62 +0,0 @@ - - - - - CSS Regions: Selection for elements in a region's scroll overflow - - - - - - - - -
    -
  1. You should not see any red before or during this test.
  2. -
  3. Scroll the contents of the square below until a blue word (overflows) becomes visible.
  4. -
  5. Select the blue word.
  6. -
  7. You should see the selection highlight drawn around the word.
  8. -
  9. If you copy the selected word and paste it in the text box below you should get only the word overflows.
  10. -
- -
This text overflows.
-
-

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-selection-003.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-selection-003.html deleted file mode 100644 index b512b311af1..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/overflow-and-selection-003.html +++ /dev/null @@ -1,60 +0,0 @@ - - - - - CSS Regions: Selection for elements in a region's visible overflow - - - - - - - - -
    -
  1. You should not see any red before or during this test.
  2. -
  3. Using the mouse select the blue word (overflows) outside the gray square.
  4. -
  5. You should see the selection highlight drawn around the word.
  6. -
  7. If you copy the selected word and paste it in the text box below you should get only the word overflows.
  8. -
- -
This text overflows.
-
-

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-001.html deleted file mode 100644 index a5ddbb4cf80..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-001.html +++ /dev/null @@ -1,55 +0,0 @@ - - - - - CSS Regions: Remove element from named flow when hovering the region - - - - - - - - - - You should not see any red before or during this test. -
    -
  1. You should see a green and a black square side by side.
  2. -
  3. Move the mouse over the green square. Expected: The black square moves under the green square.
  4. -
-
-

-
-
- xxxxx
xxxxx
xxxxx
xxxxx
xxxxx -
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-002.html deleted file mode 100644 index da102188567..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-002.html +++ /dev/null @@ -1,58 +0,0 @@ - - - - - CSS Regions: Remove region from region chain on CSS :hover - - - - - - - - - - You should not see any red before or during this test. -
    -
  1. You should see a green and a black square side by side.
  2. -
  3. Move the mouse over the green square. Expected: The black square will turn green.
  4. -
-
-

xxxxx
xxxxx
xxxxx
xxxxx
xxxxx

-
-
-

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-003.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-003.html deleted file mode 100644 index e3a980aa1a2..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/hit-testing/region-chain-change-on-hover-003.html +++ /dev/null @@ -1,53 +0,0 @@ - - - - - CSS Regions: Remove region from region chain on CSS hover - - - - - - - - - - You should not see any red before or during this test. -
    -
  1. You should see a green and a black square side by side
  2. -
  3. Move the mouse over the black square. Expected: The black square will disappear.
  4. -
-
- xxxxx
xxxxx
xxxxx
xxxxx
xxxxx -
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-001.html deleted file mode 100644 index 46199c4b2d6..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-001.html +++ /dev/null @@ -1,67 +0,0 @@ - - - - CSS Regions: onkeydown events inside region - - - - - - - - - - - - - -

Press (and do not release) any alphanumeric key in the text field in the black square.

-
-
-
-
-
- - -
-
-
-
-
-
-
-
This div is outside the region -
- - -
-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-002.html deleted file mode 100644 index d5c804015ec..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-002.html +++ /dev/null @@ -1,69 +0,0 @@ - - - - CSS Regions: onkeydown events outside region - - - - - - - - - - - - - -

Press (and do not release) any alphanumeric key in the text field in the orange square.

-
-
-
-
-
- - -
-
-
-
-
-
-
-
This div is outside the region -
- - -
-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-003.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-003.html deleted file mode 100644 index f268cf11422..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-003.html +++ /dev/null @@ -1,84 +0,0 @@ - - - - CSS Regions: onkeypress events inside region and outside region - - - - - - - - - - - - - -

Press (and release) any alphanumeric key in the text field in the black square, then press - (and release) any alphanumeric key in the text field in the orange square.

-
-
-
-
-
- - -
-
-
-
-
-
-
-
This div is outside the region -
- - -
-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-004.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-004.html deleted file mode 100644 index 8a43f30e9b8..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-004.html +++ /dev/null @@ -1,114 +0,0 @@ - - - - CSS Regions: onkeydown and onkeyup events inside region and outside region - - - - - - - - - - - - - -

Press (and release) the "a" key in the text field in the black square, then press (and release) - the "a" key in the text field in the orange square.

-
-
-
-
-
- - -
-
-
-
-
-
-
-
This div is outside the region -
- - -
-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-005.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-005.html deleted file mode 100644 index 645979cdec0..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-005.html +++ /dev/null @@ -1,108 +0,0 @@ - - - - CSS Regions: onkeydown and onkeyup events outside region using Tab key in forms - - - - - - - - - - - - - -

Press the Tab key two times.

-
This div is outside the region -
- - -
-
- -
-
-
-
-
- - -
-
-
- -
-
-
-
- -
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-006.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-006.html deleted file mode 100644 index bf6dadd9a7a..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-006.html +++ /dev/null @@ -1,119 +0,0 @@ - - - - CSS Regions: onkeydown and onkeyup events using Delete key inside region and outside region - - - - - - - - - - - - - -
    -
  1. Highlight all of the text inside in the text field in the black square
  2. -
  3. Press the Delete key to delete the contents of the text field.
  4. -
  5. Highlight all of the text inside in the text field in the orange square
  6. -
  7. Press the Delete key to delete the contents of the the text field.
  8. -
-
-
-
-
-
- - -
-
-
-
-
-
-
-
This div is outside the region -
- - -
-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-007.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-007.html deleted file mode 100644 index dfeb2316129..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-007.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - CSS Regions: onkeydown and onkeyup events inside multiple regions using Tab key in forms - - - - - - - - - - - - - -

Press the Tab key three times.

-
-
-
- -
-
- -
-
- -
-
-
-
-
-
-
-
This div is outside the region -
- - -
-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-008.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-008.html deleted file mode 100644 index ba4c800553f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-008.html +++ /dev/null @@ -1,104 +0,0 @@ - - - - CSS Regions: onkeydown and onkeyup events inside region and outside region using Tab key in forms - - - - - - - - - - - - - -

Press the Tab key three times

-
-
-
-
-
- - -
-
-
-
-
-
-
-
This div is outside the region -
- - -
-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-009.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-009.html deleted file mode 100644 index 4f1ac1cd37a..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-009.html +++ /dev/null @@ -1,116 +0,0 @@ - - - - CSS Regions: onkeydown and onkeyup events inside region using Tab key on page where normal document flow is reordered - - - - - - - - - - - - - -

Press the Tab key four times.

-
-
-
-
-
- - -
-
-
-
This div is outside the region -
- - -
-
-
-
-
-
- -
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-010.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-010.html deleted file mode 100644 index d4a6a8a1221..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/regions-keyboard-events-010.html +++ /dev/null @@ -1,104 +0,0 @@ - - - - CSS Regions: onkeydown and onkeyup events inside region using Tab key in forms - - - - - - - - - - - - - -

Press the Tab key two times.

-
-
-
-
-
- - -
-
-
-
-
-
-
-
This div is outside the region -
- - -
-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/support/css/regions-keyboard.css b/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/support/css/regions-keyboard.css deleted file mode 100644 index bdcc5b92fcf..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/support/css/regions-keyboard.css +++ /dev/null @@ -1,49 +0,0 @@ -/* Set the margin to 0 so we'll know that the target will be there if the content isn't flowing into a region */ -body { - margin: 0; -} -#msg-complete { - color: blue; -} -/* Set the width of the content div so that the blocks will wrap downward when they're not flowing into a region */ -#content { - flow-into: content; - width: 125px; -} -/* Set regions to float left so the blocks will be laid out horizontally when they're flowing into the regions */ -.region { - flow-from: content; - width: 125px; - height: 125px; - float:left; -} -/* Basic block */ -.block { - background-color: gray; - display: inline-block; - width: 100px; - height: 100px; -} -/* Set color on the target to be different than the others */ -#target-block { - background-color: rgb(0, 0, 0); -} -#target-block:hover { - background-color: rgb(0, 255, 0); -} -input:focus { - background-color: rgb(0, 255, 0); -} -#outside-region { - clear: both; - width: 125px; - height: 125px; - background-color: rgb(255, 191, 0); - margin: 25px; -} -#outside-region:hover { - background-color: rgb(0, 255, 0); -} -#log { - clear: both; -} diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/support/js/regions-keyboard-events-test-helper.js b/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/support/js/regions-keyboard-events-test-helper.js deleted file mode 100644 index 0fc5d664cef..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/keyboard/support/js/regions-keyboard-events-test-helper.js +++ /dev/null @@ -1,53 +0,0 @@ -// Timeout is 10 seconds for manual testing, 1.5 seconds for automated testing -var testTimeout = 10000; -if (window.testRunner) { - testTimeout = 1500; -} -setup({timeout: testTimeout}); - -// This block is executed if running in WebKit's harness - if (window.testRunner) -{ - testRunner.dumpAsText(false); -} - -// Verify that CSS Regions are enabled in the browser. -// Divs will be horizontal if Regions are enabled. -// Divs will be vertical if Regions are not enabled. -function getLeftPosition(elemID) { - return document.getElementById(elemID).getBoundingClientRect().left; -} - -function keyDown(block) { - if(window.testRunner) { - var input = document.getElementById(block); - input.focus(); - eventSender.keyDown('a'); - } -} - -function pressDeleteKey(block) { - if(window.testRunner) { - var input = document.getElementById(block); - input.focus(); - eventSender.keyDown('delete'); - } -} - -function tabKeyPresses(numOfTabs) { - if(window.testRunner) { - for (i=1; i<=numOfTabs; i++) { - eventSender.keyDown('\t'); - } - } -} - -function completionCallback () { - add_completion_callback(function (allRes, status) { - if(status.status === 0){ - //Update the message stating that tests are complete - var msg = document.getElementById("msg"); - msg.innerHTML += "

Tests are complete. All results in the Details section below should PASS.

"; - } - }); -} \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-001.html deleted file mode 100644 index 30c2e35bd4e..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-001.html +++ /dev/null @@ -1,72 +0,0 @@ - - - - CSS Regions: onclick events inside region and outside region - - - - - - - - - - - - -

Left-click the mouse on the black square, then left-click the mouse on the orange square.

-
-
-
-
-
-
-
-
-
-
This div is outside the region
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-002.html deleted file mode 100644 index 81fee6722f1..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-002.html +++ /dev/null @@ -1,56 +0,0 @@ - - - - CSS Regions: onmousedown events inside region - - - - - - - - - - - - -

Mouse down on the black square (Press the mouse button down, but do not release the mouse button).

-
-
-
-
-
-
-
-
-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-003.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-003.html deleted file mode 100644 index fc206aa0259..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-003.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - CSS Regions: onmousedown events outside region - - - - - - - - - - - - -

Mouse down on the orange square (Press the mouse button down, but do not release the mouse button).

-
-
-
-
-
-
-
-
-
-
This div is outside the region
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-004.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-004.html deleted file mode 100644 index cd57f96fc12..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-004.html +++ /dev/null @@ -1,56 +0,0 @@ - - - - CSS Regions: onmouseup events inside region - - - - - - - - - - - - -

Mouse up on the black square (Press the mouse button down somewhere outside the black square. Then drag the mouse to the black square. Release the mouse button while on the black square.)

-
-
-
-
-
-
-
-
-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-005.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-005.html deleted file mode 100644 index 1e728935e59..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-005.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - CSS Regions: onmouseup events outside region - - - - - - - - - - - - -

Mouse up on the orange square (Press the mouse button down somewhere outside the orange square. Then drag the mouse to the orange square. Release the mouse button while on the orange square.)

-
-
-
-
-
-
-
-
-
-
This div is outside the region
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-006.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-006.html deleted file mode 100644 index de5751bdd43..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-006.html +++ /dev/null @@ -1,72 +0,0 @@ - - - - CSS Regions: ondblclick events inside region and outside region - - - - - - - - - - - - -

Double-click the mouse on the black square, then double-click the mouse on the orange square.

-
-
-
-
-
-
-
-
-
-
This div is outside the region
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-007.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-007.html deleted file mode 100644 index 95547892b05..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-007.html +++ /dev/null @@ -1,72 +0,0 @@ - - - - CSS Regions: onmousemove events inside region and outside region - - - - - - - - - - - - -

Move the mouse over the black square, then move the mouse over the orange square.

-
-
-
-
-
-
-
-
-
-
This div is outside the region
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-008.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-008.html deleted file mode 100644 index a374cae7293..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-008.html +++ /dev/null @@ -1,72 +0,0 @@ - - - - CSS Regions: onmouseover and onmouseout events inside region - - - - - - - - - - - - -

Move the mouse over the black square then away from it.

-
-
-
-
-
-
-
-
-
-
This div is outside the region
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-009.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-009.html deleted file mode 100644 index 5b224addddf..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/regions-mouse-events-009.html +++ /dev/null @@ -1,72 +0,0 @@ - - - - CSS Regions: onmouseover and onmouseout events outside region - - - - - - - - - - - - -

Move the mouse over the orange square then away from it.

-
-
-
-
-
-
-
-
-
-
This div is outside the region
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/support/css/regions-mouse-events.css b/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/support/css/regions-mouse-events.css deleted file mode 100644 index 8d5cbce46c2..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/support/css/regions-mouse-events.css +++ /dev/null @@ -1,46 +0,0 @@ -/* Set the margin to 0 so we'll know that the target will be there if the content isn't flowing into a region */ -body { - margin: 0; -} -#msg-complete { - color: blue; -} -/* Set the width of the content div so that the blocks will wrap downward when they're not flowing into a region */ -#content { - flow-into: content; - width: 75px; -} -/* Set regions to float left so the blocks will be laid out horizontally when they're flowing into the regions */ -.region { - flow-from: content; - width: 75px; - height: 75px; - float: left; -} -/* Basic block */ -.block { - background-color: gray; - display: inline-block; - width: 50px; - height: 50px; -} -/* Set color on the target to be different than the others */ -#target-block { - background-color: rgb(0, 0, 0); -} -#target-block:hover { - background-color: rgb(0, 255, 0); -} -#outside-region { - clear: both; - width: 75px; - height: 75px; - background-color: rgb(255, 191, 0); - margin: 25px; -} -#outside-region:hover { - background-color: rgb(0, 255, 0); -} -#log { - clear: both; -} \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/support/js/regions-mouse-events-test-helper.js b/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/support/js/regions-mouse-events-test-helper.js deleted file mode 100644 index efbffb7f4ac..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/mouse/support/js/regions-mouse-events-test-helper.js +++ /dev/null @@ -1,104 +0,0 @@ -// Timeout is 10 seconds for manual testing, 1.5 seconds for automated testing -var testTimeout = 10000; -if (window.testRunner) { - testTimeout = 1500; -} -setup({timeout: testTimeout}); - -// This block is executed if running in WebKit's harness -if (window.testRunner) { - testRunner.dumpAsText(false); -} - -// Verify that CSS Regions are enabled in the browser. -// Divs will be horizontal if Regions are enabled. -// Divs will be vertical if Regions are not enabled. -function getLeftPosition(elemID) { - return document.getElementById(elemID).getBoundingClientRect().left; -} - -function mouseClick(block) { - if(window.testRunner) { - var elemBox = document.getElementById(block).getBoundingClientRect(); - var xStartPosition = elemBox.left + elemBox.width/2; - var yStartPosition = elemBox.top + elemBox.height/2; - eventSender.mouseMoveTo(xStartPosition, yStartPosition); - eventSender.mouseDown(); - eventSender.mouseUp(); - } -} - -function mouseDown(block) { - if(window.testRunner) { - var elemBox = document.getElementById(block).getBoundingClientRect(); - var xStartPosition = elemBox.left + elemBox.width/2; - var yStartPosition = elemBox.top + elemBox.height/2; - eventSender.mouseMoveTo(xStartPosition, yStartPosition); - eventSender.mouseDown(); - } -} - -function mouseUp(block) { - if(window.testRunner) { - var elemBox = document.getElementById(block).getBoundingClientRect(); - var xStartPosition = elemBox.left + elemBox.width/2; - var yStartPosition = elemBox.top + elemBox.height/2; - eventSender.mouseMoveTo(xStartPosition, yStartPosition); - eventSender.mouseUp(); - } -} - -function mouseDblClick(block) { - if(window.testRunner) { - var elemBox = document.getElementById(block).getBoundingClientRect(); - var xStartPosition = elemBox.left + elemBox.width/2; - var yStartPosition = elemBox.top + elemBox.height/2; - eventSender.mouseMoveTo(xStartPosition, yStartPosition); - eventSender.mouseDown(); - eventSender.mouseUp(); - eventSender.mouseDown(); - eventSender.mouseUp(); - } -} - -function mouseMove(block) { - if(window.testRunner) { - var elemBox = document.getElementById(block).getBoundingClientRect(); - var xStartPosition = elemBox.left + elemBox.width/2; - var yStartPosition = elemBox.top + elemBox.height/2; - eventSender.mouseMoveTo(xStartPosition, yStartPosition); - } -} - -function getBackgroundColor(elemID) { - var foo = window.getComputedStyle(document.getElementById(elemID)).backgroundColor; - return window.getComputedStyle(document.getElementById(elemID)).backgroundColor; -} - -function mouseOver(block) { - if(window.testRunner) { - var elemBox = document.getElementById(block).getBoundingClientRect(); - var xStartPosition = elemBox.left + elemBox.width/2; - var yStartPosition = elemBox.top + elemBox.height/2; - eventSender.mouseMoveTo(xStartPosition, yStartPosition); - } -} - -function mouseOut(block) { - if(window.testRunner) { - var elemBox = document.getElementById(block).getBoundingClientRect(); - var xStartPosition = elemBox.left + elemBox.width/2; - var yStartPosition = elemBox.top + elemBox.height/2; - eventSender.mouseMoveTo(0, 0); - } -} - -function completionCallback () { - add_completion_callback(function (allRes, status) { - if(status.status === 0){ - //Update the message stating that tests are complete - var msg = document.getElementById("msg"); - msg.innerHTML += "

Tests are complete. All results in the Details section below should PASS.

"; - } - }); -} \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html deleted file mode 100644 index 2ec81b0d81f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/reference/regions-resizing-001-ref.html +++ /dev/null @@ -1,12 +0,0 @@ - - - - CSS Reftest Reference - - - -

Test passes if you see a green square below and no red.

-

The test also fails if the there's a green block that is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/reference/regions-resizing-005-ref.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/reference/regions-resizing-005-ref.html deleted file mode 100644 index afc4cd74ca6..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/reference/regions-resizing-005-ref.html +++ /dev/null @@ -1,12 +0,0 @@ - - - - CSS Reftest Reference - - - -

Test passes if you see a green square below and no red.

-

The test also fails if the there's a green block that is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/reference/regions-resizing-011-ref.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/reference/regions-resizing-011-ref.html deleted file mode 100644 index 5399cdc8bbd..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/reference/regions-resizing-011-ref.html +++ /dev/null @@ -1,12 +0,0 @@ - - - - CSS Reftest Reference - - - -

Test passes if you see two green squares below and no red.

-

The test also fails if any of the green blocks is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-001.html deleted file mode 100644 index 04ef0e0a945..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-001.html +++ /dev/null @@ -1,32 +0,0 @@ - - - - CSS Regions: resizing region that has percentage size - - - - - - - - - - - - -

Test passes if you see a green square below and no red.

-

The test also fails if the there's a green block that is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-002.html deleted file mode 100644 index caec60defb3..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-002.html +++ /dev/null @@ -1,37 +0,0 @@ - - - - CSS Regions: resizing region that has position:fixed and top/right/bottom/left set - - - - - - - - - - - - -

Test passes if you see a green square below and no red.

-

The test also fails if the there's a green block that is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-003.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-003.html deleted file mode 100644 index d9e3225e514..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-003.html +++ /dev/null @@ -1,34 +0,0 @@ - - - - CSS Regions: resizing region that is sized using viewport units - - - - - - - - - - - - - -

Test passes if you see a green square below and no red.

-

The test also fails if the there's a green block that is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-004.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-004.html deleted file mode 100644 index 67437c64d75..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-004.html +++ /dev/null @@ -1,33 +0,0 @@ - - - - CSS Regions: resizing auto-sized region - - - - - - - - - - - - -

Test passes if you see a green square below and no red.

-

The test also fails if the there's a green block that is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-005.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-005.html deleted file mode 100644 index e2653ecf56b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-005.html +++ /dev/null @@ -1,35 +0,0 @@ - - - - CSS Regions: resizing floated region with percentage size relative to the body - - - - - - - - - - - - - -

Test passes if you see a green square below and no red.

-

The test also fails if the there's a green block that is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-006.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-006.html deleted file mode 100644 index 00ae9855047..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-006.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - CSS Regions: resizing region with percentage size inside a container that also has percentage size - - - - - - - - - - - - -

Test passes if you see a green square below and no red.

-

The test also fails if the there's a green block that is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-007.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-007.html deleted file mode 100644 index ff716cf008b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-007.html +++ /dev/null @@ -1,42 +0,0 @@ - - - - CSS Regions: resizing region with percentage size inside a container that has size set in viewport units - - - - - - - - - - - - - -

Test passes if you see a green square below and no red.

-

The test also fails if the there's a green block that is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-008.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-008.html deleted file mode 100644 index 6b79ddaef29..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-008.html +++ /dev/null @@ -1,36 +0,0 @@ - - - - CSS Regions: resizing region with percentage size when content flowed in it also has percentage size - - - - - - - - - - - - -

Test passes if you see a green square below and no red.

-

The test also fails if the there's a green block that is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-009.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-009.html deleted file mode 100644 index 45dc975b5d3..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-009.html +++ /dev/null @@ -1,40 +0,0 @@ - - - - CSS Regions: resizing autosized region when content flowed in it is sized with viewport units - - - - - - - - - - - - - - -

Test passes if you see a green square below and no red.

-

The test also fails if the there's a green block that is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-010.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-010.html deleted file mode 100644 index 95630558aa4..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-010.html +++ /dev/null @@ -1,38 +0,0 @@ - - - - CSS Regions: resizing percent sized region when content flowed in it is floated - - - - - - - - - - - - -

Test passes if you see a green square below and no red.

-

The test also fails if the there's a green block that is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-011.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-011.html deleted file mode 100644 index e1c146f1248..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-011.html +++ /dev/null @@ -1,42 +0,0 @@ - - - - CSS Regions: resizing fixed sized region and percent-sized region - - - - - - - - - - - - -

Test passes if you see two green squares below and no red.

-

The test also fails if any of the green blocks is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-012.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-012.html deleted file mode 100644 index d587cf14d08..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-012.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - CSS Regions: resizing percent sized region and auto-sized region - - - - - - - - - - - - - -

Test passes if you see two green squares below and no red.

-

The test also fails if any of the green blocks is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-013.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-013.html deleted file mode 100644 index bec40648295..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/regions-resizing-013.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - CSS Regions: resizing region based on media query - - - - - - - - - - - - -

Test passes if you see a green square below and no red.

-

The test also fails if the there's a green block that is not a square (e.g. rectangle or polygon).

- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/2-80px-block-ref.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/2-80px-block-ref.html deleted file mode 100644 index 7bbc641de95..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/2-80px-block-ref.html +++ /dev/null @@ -1,35 +0,0 @@ - - - - - One region in body - - - - -
- xxxx
- xxxx
- xxxx
- xxxx -
-
- xxxx
- xxxx
- xxxx
- xxxx -
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/80px-block-float-ref.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/80px-block-float-ref.html deleted file mode 100644 index 2643db0627f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/80px-block-float-ref.html +++ /dev/null @@ -1,29 +0,0 @@ - - - - - One region in body - - - - -
- xxxx
- xxxx
- xxxx
- xxxx -
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/80px-block-ref.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/80px-block-ref.html deleted file mode 100644 index 77d3795068f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/80px-block-ref.html +++ /dev/null @@ -1,28 +0,0 @@ - - - - - One region in body - - - - -
- xxxx
- xxxx
- xxxx
- xxxx -
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/region-in-body.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/region-in-body.html deleted file mode 100644 index 9b9c9c68b81..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/region-in-body.html +++ /dev/null @@ -1,38 +0,0 @@ - - - - - One region in body - - - - - -
- -
- xxxx​xxxx​xxxx​xxxx -
-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/region-in-container.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/region-in-container.html deleted file mode 100644 index 5e1c1c6ef36..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/region-in-container.html +++ /dev/null @@ -1,40 +0,0 @@ - - - - - One region in body - - - - -
- -
- xxxx​xxxx​xxxx​xxxx -
-
-
-
-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/two-regions-in-container.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/two-regions-in-container.html deleted file mode 100644 index 2db4c048fc3..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/two-regions-in-container.html +++ /dev/null @@ -1,40 +0,0 @@ - - - - - One region in body - - - - -
- -
- xxxx​xxxx​xxxx​xxxx​xxxx​xxxx​xxxx​xxxx -
-
-
-
-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/util.js b/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/util.js deleted file mode 100644 index b2fa69a97ec..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/resizing/support/util.js +++ /dev/null @@ -1,29 +0,0 @@ -function resizeViewportTo(viewportSelector, width, height) { - var iframe = document.querySelector(viewportSelector); - // Commonly used trick to trigger a layout - iframe.contentWindow.document.body.offsetTop; - - iframe.width = width; - iframe.height = height; - - iframe.contentWindow.document.body.offsetTop; -} - -function injectStylesInIFrame(styleSelector, frameSelector) { - var style = document.querySelector(styleSelector), - frame = document.querySelector(frameSelector); - - frame.contentWindow.addNewStyles(style.textContent); -} - - -if (window.parent != window) { - // we're in an iframe, so expose the bits that allow setting styles inside - window.addNewStyles = function (cssText) { - var styleTag = document.createElement("style"), - textNode = document.createTextNode(cssText); - - styleTag.appendChild(textNode); - document.head.appendChild(styleTag); - } -} diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-001.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-001.html deleted file mode 100644 index 29bf67ef1b8..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-001.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - CSS Regions Test: Selection begins at the top of the region and ends at the bottom of the region - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
-
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region -
-
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-002.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-002.html deleted file mode 100644 index dd7d0304136..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-002.html +++ /dev/null @@ -1,47 +0,0 @@ - - - - CSS Regions Test: Selection begins at the bottom of the region and ends at the top of the region - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
-
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region -
-
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-003.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-003.html deleted file mode 100644 index b77f3543d36..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-003.html +++ /dev/null @@ -1,45 +0,0 @@ - - - - CSS Regions Test: Selection begins at the top of the region and ends in the middle of region - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
-
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region -
- in region in region in region in region in region in region in region in region in region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-004.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-004.html deleted file mode 100644 index 7d2cdd2b560..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-004.html +++ /dev/null @@ -1,45 +0,0 @@ - - - - CSS Regions Test: Selection begins at the bottom of the region and ends in the middle of region - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
- in region in region in region in region in region in region in region in -
- region in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region in region in region in region in region -
-
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-005.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-005.html deleted file mode 100644 index 8b7091fbf0b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-005.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - - CSS Regions: Selection begins in the middle of the region and ends in the middle of the region moving - downward - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
- in region in region in region in region in region in region in region -
- in region in region in region in region in region in region in region in region in region in region in - region in in region in region region in region in region in region in region in region in region in region - in region -
- in region in region in region in region in region in region in region in region in region in region - in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-006.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-006.html deleted file mode 100644 index 6eb176bb11d..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-006.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - - CSS Regions Test: Selection begins in the middle of the region and ends in the middle of the region - moving upward - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
- in region in region in region in region in region in region in region -
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region in region - in region -
- in region in region in region in region in region in region in region in region in region - in region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-007.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-007.html deleted file mode 100644 index 8173226ba75..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-007.html +++ /dev/null @@ -1,52 +0,0 @@ - - - - - CSS Regions Test: Selection begins at the top of the region and ends outside the region moving - downward - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
-
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region -
- after region after region after region after region -
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-008.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-008.html deleted file mode 100644 index d5e8b7e80db..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-008.html +++ /dev/null @@ -1,50 +0,0 @@ - - - - - CSS Regions Test: Selection begins at the bottom of the region and ends outside the region moving - upward - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region -
- before region before region before region before region before region -
-
-
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region -
-
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-009.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-009.html deleted file mode 100644 index 9712f6dbf8d..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-009.html +++ /dev/null @@ -1,52 +0,0 @@ - - - - - CSS Regions Test: Selection begins in the middle of the region and ends outside the region - moving downward - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region -
- in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region in region - in region in region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region -
- after region after region after region after region after region -
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-010.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-010.html deleted file mode 100644 index 0b53764b688..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-010.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - - CSS Regions Test: Selection begins in the middle of the region and ends outside the region moving - upward - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region -
- before region before region before region before region before region -
-
-
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region -
- in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region in region - in region in region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-011.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-011.html deleted file mode 100644 index 7ecdb5480ef..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-011.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - - CSS Regions Test: Selection begins outside of the region and ends at the bottom of the region moving - downward - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region -
- before region before region before region before region before region -
-
-
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-012.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-012.html deleted file mode 100644 index 9770a4b8d1b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-012.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - - CSS Regions Test: Selection begins outside of the region and ends at the top the region moving - upward - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
-
in region in region in region in region in region - in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region - after region after region after region
- after region after region after region after region after region after region after region -
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-013.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-013.html deleted file mode 100644 index 5594a516451..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-013.html +++ /dev/null @@ -1,52 +0,0 @@ - - - - - CSS Regions Test: Selection begins outside of the region and ends in the middle of the region moving - downward - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region -
- before region before region before region before region before region before region before region - before region before region before region before region before region before region before region - before region -
-
-
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region -
- in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region in region in region in region in region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-014.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-014.html deleted file mode 100644 index 822b364e8f2..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-014.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - - CSS Regions Test: Selection begins outside of the region and ends in the middle of the region moving - upward - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region -
- in region in region in region in region in region in region in region in region - in region in region in region in region in region in region in region in region in region in region in - region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region -
- after region after region after region after region after region -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-015.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-015.html deleted file mode 100644 index 4db2a873c98..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-015.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - CSS Regions Test: Selection begins and ends outside of the region moving downward - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region -
- before region before region before region before region before region before region -
-
-
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region -
- after region after region after region after region after region -
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-016.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-016.html deleted file mode 100644 index 967308e633d..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-016.html +++ /dev/null @@ -1,47 +0,0 @@ - - - - CSS Regions Test: Selection begins and ends outside of the region moving upward - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region -
- before region before region before region before region -
-
-
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region -
- after region after region after region after region after region after region -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-017.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-017.html deleted file mode 100644 index 9497ce245dd..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-017.html +++ /dev/null @@ -1,55 +0,0 @@ - - - - - CSS Regions Test: Selection is downward, begins and ends inside a region containing one other element - - div - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
- in region in region -
- in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region in region in region in region in region in region -
nested div nested div
- in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region -
- in region in region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-018.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-018.html deleted file mode 100644 index 6cb10b50a33..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-018.html +++ /dev/null @@ -1,54 +0,0 @@ - - - - - CSS Regions Test: Selection is downward, begins and ends inside a region containing one other element - - img - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
- in region in region -
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in - - region in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region -
- in region in region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-019.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-019.html deleted file mode 100644 index 0c4d7fb9829..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-019.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - - CSS Regions Test: Selection is upward, begins and ends inside a region containing one other element - - div - - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
- in region -
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region in -
nested div nested div
region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region in - region in region in region
in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-020.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-020.html deleted file mode 100644 index e7489506576..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-020.html +++ /dev/null @@ -1,53 +0,0 @@ - - - - - CSS Regions Test: Selection is upward, begins and ends inside a region containing one other element - - img - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before - region before region before region before region -
-
-
- in region in region -
- in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region in region in region in region in region in - - region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region -
- in region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-021.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-021.html deleted file mode 100644 index fd7d4c068a8..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-021.html +++ /dev/null @@ -1,54 +0,0 @@ - - - - - CSS Regions Test: Selection is downward, begins and ends inside a region containing two other elements - - div + img - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
- in region -
- in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region in region in region in region in region in region in -
nested div - nested div -
- region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region -
in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-022.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-022.html deleted file mode 100644 index 6053a40d173..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-022.html +++ /dev/null @@ -1,55 +0,0 @@ - - - - - CSS Regions: Selection is upward, begins and ends inside a region containing two other elements - - div + img - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before region - before region before region before region -
-
-
- in region -
- in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region in region in region in region in region in region in -
- nested div nested div -
- region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region -
in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-023.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-023.html deleted file mode 100644 index 0afcc1e687a..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-023.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - - CSS Regions Test: Selection is downward, begins inside a region and ends outside of it - both the region - and the content after it have child elements - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region before region before region before region before region before region before region before - region before region before region before region before region before region before region before - region before region before region before region -
-
-
- in region -
- in region in region in region in region in region in region in region in region in region in region - in region in region in region in region in region in region in region in region in region in region in -
- nested div nested div -
- region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region
nested div - nested div nested div nested div nested div
after region after region after region after region -
-
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-024.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-024.html deleted file mode 100644 index 03b40048fe0..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-024.html +++ /dev/null @@ -1,61 +0,0 @@ - - - - - CSS Regions: Selection is upward, begins inside and ends outside a region - both the region - and the before after it have child elements - - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

-
- before region -
- before region before region before region -
- nested div - nested div nested div nested div nested div -
- before region before region before region before region before region before region before region - before region before region before region before region before region before region before region -
-
-
- in region in region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region in region in - region in -
- nested div nested div -
- region in region in region in region in region in region in region in region in region in - region in region in region in region in region in region in region in region in region -
in region -
-
- after region after region after region after region after region after region after region after region - after region after region after region after region after region after region after region after region - after region after region after region after region after region -
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-025.html b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-025.html deleted file mode 100644 index 9ed1dd8b312..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/regions-selection-025.html +++ /dev/null @@ -1,93 +0,0 @@ - - - - CSS Regions Test: DOM order is different than the linear selection - - - - - - - - - - - - -

- Click on the orange square, keep the mouse button down and drag it to the blue square, - release the mouse over the blue square. -

- -
REGIONS ARE NOT ENABLED
-
-
-
- -
- between the squares between the squares between the squares between the squares between the squares - between the squares between the squares between the squares between the squares between the squares - between the squares between the squares between the squares -
-
- - after the squares after the squares after the squares after the squares after the squares - after the squares after the squares after the squares after the squares after the squares - after the squares after the squares - -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/support/css/regions-selection.css b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/support/css/regions-selection.css deleted file mode 100644 index 081d200386e..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/support/css/regions-selection.css +++ /dev/null @@ -1,22 +0,0 @@ -#source -{ - flow-into: content; -} -#region -{ - flow-from: content; -} -#start-select -{ - background-color: orange; -} -#end-select -{ - background-color: blue; -} -.select-point -{ - width: 15px; - height: 15px; - display: inline-block; -} diff --git a/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/support/img/cat.png b/tests/wpt/web-platform-tests/css/css-regions/interactivity/selection/support/img/cat.png deleted file mode 100644 index 85dd7324815b8f8ef1a1d0496224c1a0661db9d8..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1883 zcmV-h2c-CkP)WdH}z3>gRm8%$Aad;kCd2XskIMF-Ff83-yN8ye1400009a7bBm000id z000id0mpBsWB>pL*-1n}RCwC$Tnn<>HVmXZK1a^ho3&SK4-(g{9GN13#R7t8y*I%m zZ)BMw!6g9VLwR{T9*v;e^Z&9e>xbnR^*7(`)-M11{_j7xFNSfJ@$>S&(_i1@5GH@m zhpeXC{afFEKhVJCt^WWpLj3iQEg77_JYJnk79anUvL0gx`(AYZ27s0x;q_WRcJD`A zg+R7jBu}y@4l@kFdQJ7DGoh@H-xD(&>S?#kV5MJwAHN8ovs16uEnknmyyLJw3_Dz} z-2t_1y-WcyWmd+)eVZDoh>C$4rk3Oju)y$mQ#%^)+P>PB74gM`GN6$$a17nlNge7- z3RmB|dPjb|$p?mh6-(D?ThB@WuYf>+sj1twj=G%GFkj5O!mZqLtqotF8cC*N$ri;H z2HQ+$17ses$k7#RTbJz}gD2-`@wiB%W8DFRH7rLV$VR8C-{$0BU^7QA)6xcOPkeLG zIC+y8#pHH3S(N>pr`5y87*;bv|b^HW*-n7#c-VH5l06wfM%K8tMv%QYu1VMJ&`q zXuT9g-DjG%ok+2IhK&G~#M;r0zu4sf-`3+KmoX<0eCv7>JZuYAQ4+JlXds3Yz$`iq zO!pQ9wr}Yor1)n9bJP~%@)tD+crwU7nJ%PeORd0)1m4F<)qG~XO2nT^iMivEf)z-D zBxjR-YQ3Q3>4*f>(%TkH;D#Ki*aVYot>nkyxLr9zV62-PtQAsVZ<)M&ROZ`q=r-yb zxV0FojhaWJa00$t-zE`xTYXArX#ra%P+dk^apt~h+vO{N9i$&>6i;Se`Xu#!Aka_7=8lY{bL`gE8-D*^)! zY7!?ohKiqcXDjd>0jZICXBl_KZ$6sC00LyW54V5*dj5-!>hm-t>Ht(52LoWuR*1xE z2G*{@twTZxdhmIo{825j6wMk`;$*SKGZc>R!t=-#&gkXakkRkQfHYSKVRo~#WuBph;XemDuD z6qUJ989evMeRwkDj)54kU$UA#IGU-IZHnWTVRA#9kA1APN3ZjwA2_hn2Ug_Nvo#=1 zvdA6|8~BUnoI@62w{|P|2@lwrchE#7bJ6Kq6kBhZllSFE87tja$&a^Vsv9DzjxZA* zQVOrQc2nyJWb8G&wn4GZFkUv;Z=ATnxIprXHN_9;9UHeyvrlY2*kxbFPXGYML&r3) zen%FSp5K}|`|V@N#w>xf>JHCqGnQ($o1mTz0Za^NSrBZ!onF6dnw<3&y(VH1bndXf z391*{FlywkRueb2`q*Y`c5i|#c-`R1y$R0#>_jShsA?F))d087sWd*L&RJQPVgO6z zuKDv)`2I=hc!ut73ss>?(GbUMv>AFu zUSWGaq^ijA)f<0KH8%k6{9y7l%|MvpgU?6jsh(M$ z5N*sz^783ghS!jcq!BDms81L*G}VLWyHB!u>=8qC&htH>PmP{AHB})c5>>6kFjvP9zMaPHfq~YhEr7DrH zD;~lup<3-juf%_Prr9Z-V4nORxcT&~FF{{2Nk&bqG}pd>$n(1*n4sj(w0;RH6sT{j zbhUJqyjT6iN>h5jrHP`lGXxi;LI(=%bR`2^fsT95-&yGjH)}sb@TGCA(mUti&QX<4 z{U$^U=I18hwKL%pN^cWLwM6MtTI+-Up~5fcjt@Bxe*M77{d?${Py^67eTt4eFFZ)l zh8I~nmB}UQ_u%EtP`CsPA88ZuaO!(Y>9V^z>txmUh$SjH&7r>5XT86X<2m!DSg2-= z-~W*e9lSUNASn#NOM-@)>-Im^e@d- V= 0) - return true; - else - return false; -} - -/* - * Returns true if the node toCheck is in the current document selection - */ -function isNodeInSelection(toCheck) -{ - var sel = window.getSelection().getRangeAt(0); - - // If it's a node in the document, check the start & end points - var nodeToCheck = document.getElementById(toCheck); - var range = document.createRange() - range.setStart(nodeToCheck, 0); - range.setEnd(nodeToCheck, nodeToCheck.childNodes.length); - - var startToStart = sel.compareBoundaryPoints(Range.START_TO_START, range); - var startToEnd = sel.compareBoundaryPoints(Range.START_TO_END, range); - var endToEnd = sel.compareBoundaryPoints(Range.END_TO_END, range); - var endToStart = sel.compareBoundaryPoints(Range.END_TO_START, range); - - if(startToStart == startToEnd == endToEnd == endToStart) - return false; - else - return true; -} - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-003-ref.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-003-ref.html deleted file mode 100644 index f99644ae302..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-003-ref.html +++ /dev/null @@ -1,33 +0,0 @@ - - - - CSS Test reference - - - - - - -

The test passes if there are three vertical green rectangles and no red.

-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-006-ref.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-006-ref.html deleted file mode 100644 index c76c3bbe467..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-006-ref.html +++ /dev/null @@ -1,38 +0,0 @@ - - - - CSS Test reference - - - - - - -

The test passes if there are two vertical green rectangles with one green - square to the right of them and no red.

-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-008-ref.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-008-ref.html deleted file mode 100644 index c7e2d981b31..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-008-ref.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - CSS Test reference - - - - - - -

The test passes if there are two vertical green rectangles with one light - green square to the bottom right of them and no red.

-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-009-ref.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-009-ref.html deleted file mode 100644 index d157f284828..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-009-ref.html +++ /dev/null @@ -1,38 +0,0 @@ - - - - CSS Test reference - - - - - - -

The test passes if there is one green square and two vertical - green rectangles to the right of it and no red.

-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-012-ref.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-012-ref.html deleted file mode 100644 index 7e17aeb8d4d..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-012-ref.html +++ /dev/null @@ -1,58 +0,0 @@ - - - - CSS Test reference - - - - - - -

The test passes if: -

    -
  • There is a dark green vertical rectangle on the left
  • -
  • There is a dark green square in the middle with a light green - square below it
  • -
  • There is a light green vertical rectangle on the right
  • -
  • There is no red -
-

-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-013-ref.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-013-ref.html deleted file mode 100644 index 54e40694df4..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-013-ref.html +++ /dev/null @@ -1,38 +0,0 @@ - - - - CSS Test reference - - - - - - -

The test passes if there are four green vertical bars and no red.

-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-016-ref.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-016-ref.html deleted file mode 100644 index 35b46b53054..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-016-ref.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - CSS Test reference - - - - - - -

The test passes if there are four green vertical bars, plus one - small green square to their right and no red.

-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-017-ref.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-017-ref.html deleted file mode 100644 index 64ae5b5a307..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-017-ref.html +++ /dev/null @@ -1,65 +0,0 @@ - - - - CSS Test reference - - - - - - -

The test passes if there is a 4x4 black and gray checkerboard and no red.

-
-
-
-
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-019-ref.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-019-ref.html deleted file mode 100644 index bbad3a6ac44..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-019-ref.html +++ /dev/null @@ -1,43 +0,0 @@ - - - - CSS Test reference - - - - - - -

The test passes if there is a square with four vertical - stripes alternating green and blue, and no red.

-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-024-ref.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-024-ref.html deleted file mode 100644 index 584b410311d..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-024-ref.html +++ /dev/null @@ -1,36 +0,0 @@ - - - - CSS Test reference - - - - -

The test passes if there are two green side by side squares on the left of one blue vertical rectangle. - There should be no red.

-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-028-ref.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-028-ref.html deleted file mode 100644 index 36f296f06e4..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/reference/regions-multicol-028-ref.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - CSS Test reference - - - - -

The test passes if there are two green vertical rectangles on the left of two blue vertical rectangles. - There should be no red.

-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-003.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-003.html deleted file mode 100644 index 5952996076c..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-003.html +++ /dev/null @@ -1,73 +0,0 @@ - - - - CSS Test: One named flow multi-column container, text content - overflowing one region - - - - - - - - - - - - - -

The test passes if there are three vertical green rectangles and no red.

-
- XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX -
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-004.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-004.html deleted file mode 100644 index 4e00e0ffdea..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-004.html +++ /dev/null @@ -1,70 +0,0 @@ - - - - CSS Test: One named flow, text content flowing into one multi-column region - - - - - - - - - - - - - - -

The test passes if there are three vertical green rectangles and no red.

-
- XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX -
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-006.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-006.html deleted file mode 100644 index 94f9e2d58d4..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-006.html +++ /dev/null @@ -1,84 +0,0 @@ - - - - CSS Test: One named flow, text content - fragmented between - multicol region and non-multicol region - - - - - - - - - - - - - - -

The test passes if there are two vertical green rectangles with one green - square to the right of them and no red.

-
- XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX -
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-008.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-008.html deleted file mode 100644 index 46a341280dd..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-008.html +++ /dev/null @@ -1,87 +0,0 @@ - - - - CSS Test: One named flow, non-text fragmentable content flowing into multi-column - region then into non-multicol region - - - - - - - - - - - - - - -

The test passes if there are two vertical green rectangles with one light - green square to the bottom right of them and no red.

-
-
-
-
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-009.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-009.html deleted file mode 100644 index f4c59682874..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-009.html +++ /dev/null @@ -1,82 +0,0 @@ - - - - CSS Test: One named flow, text content flowing into a simple region - then into a multi-column region - - - - - - - - - - - - - -

The test passes if there is one green square and two vertical - green rectangles to the right of it and no red.

-
- XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX -
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-011.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-011.html deleted file mode 100644 index 222ef24c69f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-011.html +++ /dev/null @@ -1,87 +0,0 @@ - - - - CSS Test: One named flow, non-text fragmentable content flowing into non-mulicol - region then into a multi-column region - - - - - - - - - - - - -

The test passes if there is one green square on the left and two vertical - green rectangles to the right of it and no red.

-
-
-
-
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-012.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-012.html deleted file mode 100644 index 1dab35e1a74..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-012.html +++ /dev/null @@ -1,81 +0,0 @@ - - - - CSS Test: One named flow multi-column container, monolithic content - flowing into one region - - - - - - - - - - - -

The test passes if: -

    -
  • There is a dark green vertical rectangle on the left
  • -
  • There is a dark green square in the middle with a light green - square below it
  • -
  • There is a light green vertical rectangle on the right
  • -
  • There is no red -
-

-
-
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-013.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-013.html deleted file mode 100644 index 2020ec50ef3..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-013.html +++ /dev/null @@ -1,81 +0,0 @@ - - - - CSS Test: One named flow, text content flowing into multiple regions - fragmented across multiple columns and overflowing the last region - - - - - - - - - - - - - -

The test passes if there are four green vertical bars and no red.

-
- XX XX XX XX XX XX XX XX - XX XX XX XX XX XX XX XX - XX XX XX XX XX XX XX XX - XX XX XX XX XX XX XX XX -
-
-
-
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-015.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-015.html deleted file mode 100644 index 41fe6cfa940..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-015.html +++ /dev/null @@ -1,79 +0,0 @@ - - - - CSS Test: One named flow muticolumn container, text content flowing into - multiple regions with content overflowing last region - - - - - - - - - - - - - -

The test passes if there are four green vertical bars and no red.

-
- XX XX XX XX XX XX XX XX - XX XX XX XX XX XX XX XX - XX XX XX XX XX XX XX XX - XX XX XX XX XX XX XX XX -
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-016.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-016.html deleted file mode 100644 index 4d2e7814a70..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-016.html +++ /dev/null @@ -1,82 +0,0 @@ - - - -CSS Test: One named flow multi-column container, monolithic - content flowing into multiple regions - - - - - - - - - - - -

The test passes if there are four green vertical bars, plus one - small green square to their right and no red.

-
-
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-017.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-017.html deleted file mode 100644 index 6f7b89998cf..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-017.html +++ /dev/null @@ -1,94 +0,0 @@ - - - - CSS Test: Multiple named flows, text content flowing into multiple - regions in a multi-column container - - - - - - - - - - - - - -

The test passes if there is a 4x4 black and gray checkerboard and no red.

-
- XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX -
-
- XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX -
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-019.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-019.html deleted file mode 100644 index 8b96fb73aa2..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-019.html +++ /dev/null @@ -1,70 +0,0 @@ - - - - CSS Test: Multiple named flows multi-column containers, text content flowing - into multiple visually overlapping regions - - - - - - - - - - - - - -

The test passes if there is a square with four vertical - stripes alternating green and blue, and no red.

-
- XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX -
-
- XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX -
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-021.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-021.html deleted file mode 100644 index 486b39dbe9e..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-021.html +++ /dev/null @@ -1,77 +0,0 @@ - - - - CSS Test: Multiple named flows multi-column containers with - unspecified width, non-text content flowing into multiple - overlapping regions - - - - - - - - - - - -

The test passes if there is a square with four vertical - stripes alternating green and blue, and no red.

-
-
-
-
-
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-022.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-022.html deleted file mode 100644 index d48d3d700fe..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-022.html +++ /dev/null @@ -1,68 +0,0 @@ - - - - CSS Test: One named flow multi-column container, text content - flowing into one autosized region with overflowing column - - - - - - - - - - -

The test passes if there are three vertical green rectangles and no red.

-
- XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX - XXXXX XXXXX XXXXX XXXXX XXXXX -
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-023.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-023.html deleted file mode 100644 index 1f3a6c9d448..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-023.html +++ /dev/null @@ -1,63 +0,0 @@ - - - - CSS Test: One named flow multi-column container, monolithic content - flowing into an autosized region, overflowing column - - - - - - - - -

The test passes if there are three vertical green rectangles and no red.

-
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-024.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-024.html deleted file mode 100644 index d0c14307e01..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-024.html +++ /dev/null @@ -1,84 +0,0 @@ - - - - CSS Test: One named flow multi-column container with text content flowing - into region of smaller width/height than the second region - - - - - - - - - - -

The test passes if there are two green side by side squares on the left of one blue vertical rectangle. - There should be no red.

-
- XXX XXX XXX XXX XXX XXX - XXX XXX XXX XXX XXX XXX -
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-025.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-025.html deleted file mode 100644 index 806791b3186..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-025.html +++ /dev/null @@ -1,82 +0,0 @@ - - - - CSS Test: One named flow multi-column container with monolithic content - flowing into region of smaller width/height than the second region - - - - - - - - -

The test passes if there are two green side by side squares on the left of one blue vertical rectangle. - There should be no red.

-
-
-
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-026.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-026.html deleted file mode 100644 index c08188f7c10..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-026.html +++ /dev/null @@ -1,81 +0,0 @@ - - - - CSS Test: One named flow multi-column container with text content - flowing into region of smaller height than the second region - - - - - - - - - - -

The test passes if there are two green side by side squares on the left of one blue vertical rectangle. - There should be no red.

-
- XXX XXX XXX XXX XXX XXX - XXX XXX XXX XXX XXX XXX -
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-027.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-027.html deleted file mode 100644 index eea5189c9cf..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-027.html +++ /dev/null @@ -1,81 +0,0 @@ - - - - CSS Test: One named flow multi-column container with monolithic content + - flowing into region of smaller height than the second region - - - - - - - - -

The test passes if there are two green side by side squares on the left of one blue vertical rectangle. - There should be no red.

-
-
-
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-028.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-028.html deleted file mode 100644 index 0e10c81c1c8..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-028.html +++ /dev/null @@ -1,84 +0,0 @@ - - - - CSS Test: One named flow multi-column container with text content - flowing into first region of smaller width than the second region - - - - - - - - - - -

The test passes if there are two green vertical rectangles on the left of two blue vertical rectangles. - There should be no red.

-
- XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX - XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX -
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-029.html b/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-029.html deleted file mode 100644 index c26ddc20017..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/multicolumn/regions-multicol-029.html +++ /dev/null @@ -1,83 +0,0 @@ - - - - CSS Test: One named flow multi-column container with monolithic content - flowing into first region of smaller width than the second region - - - - - - - - -

The test passes if there are two green vertical rectangles on the left of two blue vertical rectangles. - There should be no red.

-
-
-
-
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/positioned-content/position-relative-001.html b/tests/wpt/web-platform-tests/css/css-regions/positioned-content/position-relative-001.html deleted file mode 100644 index 3daff7885b9..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/positioned-content/position-relative-001.html +++ /dev/null @@ -1,79 +0,0 @@ - - - - CSS Regions: flowing content that has position: relative - - - - - - - - - - - - -

Test passes if you see two green squares (one bigger and one smaller) and no red.

-
- xxxxx - xxxxx - xxxxx - xxxxx - xxxxx - xxx - xxx - xxx -
-
-
-

 

-
-
-
-
-
-

 

-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/positioned-content/reference/position-relative-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/positioned-content/reference/position-relative-001-ref.html deleted file mode 100644 index 024160c237a..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/positioned-content/reference/position-relative-001-ref.html +++ /dev/null @@ -1,58 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

Test passes if you see two green squares (one bigger and one smaller) and no red.

-
-
-
- xxxxx - xxxxx - xxxxx - xxxxx - xxxxx -
-
-
-
-
-
- xxx - xxx - xxx -
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/reference/region-fragment-break-1-ref.html b/tests/wpt/web-platform-tests/css/css-regions/reference/region-fragment-break-1-ref.html deleted file mode 100644 index 089a6e1ec1d..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/reference/region-fragment-break-1-ref.html +++ /dev/null @@ -1,22 +0,0 @@ - - - - CSS Regions region-fragment-break-1 reference - - - - - - -

- Test passes if you see a green rectangle and no red. -

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/region-fragment-001-ref.xht b/tests/wpt/web-platform-tests/css/css-regions/region-fragment-001-ref.xht deleted file mode 100644 index f628ebd7af7..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/region-fragment-001-ref.xht +++ /dev/null @@ -1,36 +0,0 @@ - - - - CSS Test: Region overflow - - - - -

This test passes if "auto 2" runs through the bottom edge of the silver rectangle and only "break 1" is visible in the right rectangle.

-
-
auto 1
-
auto 2
-
-
-
-
break 1
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/region-fragment-001.xht b/tests/wpt/web-platform-tests/css/css-regions/region-fragment-001.xht deleted file mode 100644 index f8f7d17c1f2..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/region-fragment-001.xht +++ /dev/null @@ -1,60 +0,0 @@ - - - - CSS Test: Region overflow - - - - - - - - - - -

This test passes if "auto 2" runs through the bottom edge of the silver rectangle and only "break 1" is visible in the right rectangle.

-
-
auto 1
-
auto 2
-
-
-
break 1
-
break 2
-
-
-
FAIL
-
-
-
FAIL
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/region-fragment-002-ref.xht b/tests/wpt/web-platform-tests/css/css-regions/region-fragment-002-ref.xht deleted file mode 100644 index a8113fae213..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/region-fragment-002-ref.xht +++ /dev/null @@ -1,51 +0,0 @@ - - - - CSS Test: Region overflow: last region - - - - -

This test passes if the top rectangles are identical and in the lower rectangles "auto 2" runs through the bottom edge of the rectangle and only "break 1" is visible in the bottom right rectangle.

-
-
first
-
-
-
-
first
-
-
-
-
auto 1
-
auto 2
-
-
-
-
break 1
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/region-fragment-002.xht b/tests/wpt/web-platform-tests/css/css-regions/region-fragment-002.xht deleted file mode 100644 index b2b3d86d534..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/region-fragment-002.xht +++ /dev/null @@ -1,73 +0,0 @@ - - - - CSS Test: Region overflow: last region - - - - - - - - - -

This test passes if the top rectangles are identical and in the lower rectangles "auto 2" runs through the bottom edge of the rectangle and only "break 1" is visible in the bottom right rectangle.

-
-
FAIL
-
-
-
FAIL
-
-
-
first
-
auto 1
-
auto 2
-
-
-
first
-
break 1
-
break 2
-
-
-
FAIL
-
-
-
FAIL
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/region-fragment-break-1.html b/tests/wpt/web-platform-tests/css/css-regions/region-fragment-break-1.html deleted file mode 100644 index 919f60a5a30..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/region-fragment-break-1.html +++ /dev/null @@ -1,34 +0,0 @@ - - - - CSS Regions region-fragment-break-1 - - - - - - - - -

- Test passes if you see a green rectangle and no red. -

-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/region-stacking-context-001-ref.xht b/tests/wpt/web-platform-tests/css/css-regions/region-stacking-context-001-ref.xht deleted file mode 100644 index 718fef5f220..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/region-stacking-context-001-ref.xht +++ /dev/null @@ -1,18 +0,0 @@ - - - - CSS Test: Regions create new stacking context - - - - -

Test passes if there is no red.

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/region-stacking-context-001.xht b/tests/wpt/web-platform-tests/css/css-regions/region-stacking-context-001.xht deleted file mode 100644 index 5d9c1d0cb43..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/region-stacking-context-001.xht +++ /dev/null @@ -1,56 +0,0 @@ - - - - CSS Test: Regions create new stacking context - - - - - - - - - -
-
-
-
-

Test passes if there is no red.

-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/region-styling-001-ref.xht b/tests/wpt/web-platform-tests/css/css-regions/region-styling-001-ref.xht deleted file mode 100644 index 592f600d828..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/region-styling-001-ref.xht +++ /dev/null @@ -1,17 +0,0 @@ - - - - CSS Test: Region Styling - - - - - -

This test passes if the word below is “GREEN” and is displayed in green.

-
GREEN
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/region-styling-001.xht b/tests/wpt/web-platform-tests/css/css-regions/region-styling-001.xht deleted file mode 100644 index 7fa401a3303..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/region-styling-001.xht +++ /dev/null @@ -1,35 +0,0 @@ - - - - CSS Test: Region Styling - - - - - - - - - - -
GREEN
-

This test passes if the word below is “GREEN” and is displayed in green.

-
-
FAIL
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-001.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-001.html deleted file mode 100644 index c1e5f19bc36..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-001.html +++ /dev/null @@ -1,38 +0,0 @@ - - - - CSS Test: flowing content with opacity < 1 in region - - - - - - - - - - -
    -
  1. You should see no red.
  2. -
  3. Test passes if you see a purple square below.
  4. -
-
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-002.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-002.html deleted file mode 100644 index cabacb20ba4..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-002.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - CSS Test: flowing content with scrollbars in region - - - - - - - - - - -
    -
  1. You should see no red.
  2. -
  3. Test passes if you see a green square below with a vertical scrollbar.
  4. -
  5. You should be able to drag the scrollbars
  6. -
-
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-003.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-003.html deleted file mode 100644 index a6e3e6afb57..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-003.html +++ /dev/null @@ -1,38 +0,0 @@ - - - - CSS Test: flowing content that's relatively positioned and get fragmented - - - - - - - - - - -
    -
  1. You should see no red.
  2. -
  3. Test passes if you see two green squares below.
  4. -
-
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-004.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-004.html deleted file mode 100644 index 26eb37b9596..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-004.html +++ /dev/null @@ -1,59 +0,0 @@ - - - - CSS Test: flowing content with opacity < 1 and opacity = 1 in region - - - - - - - - - - -
    -
  1. You should see no red.
  2. -
  3. Test passes if you see four alternating purple and blue rectangles below.
  4. -
-
-
- xxxxx
xxxxx
xxxxx -
-
- xxxxx
xxxxx
xxxxx -
-
- xxxxx
xxxxx
xxxxx -
-
- xxxxx
xxxxx
xxxxx -
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-005.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-005.html deleted file mode 100644 index a79197a4749..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/content-node-layers-005.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - CSS Test: flowing content with position: absolute and clip - - - - - - - - - - -
    -
  1. You should see no red.
  2. -
  3. Test passes if you see a dark green square in the middle of a light green square.
  4. -
-
-
- xxxxxxxxx
- xxxxxxxxx
- xxxxxxxxx
- xxxxxxxxx -
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/javascript-stacking-context-001.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/javascript-stacking-context-001.html deleted file mode 100644 index 5caff8062a9..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/javascript-stacking-context-001.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - CSS Test: document.elementFromPoint() for overlapping, positioned regions with non-auto z-index - - - - - - - - - - - -
-
- xxxxx
xxxxx
xxxxx
xxxxx
xxxxx -
-
- xxxxx
xxxxx
xxxxx
xxxxx
xxxxx -
-
- xxxxx
xxxxx
xxxxx
xxxxx
xxxxx -
-
-
-

 

-
-
-

 

-
-
-

 

-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/javascript-stacking-context-002.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/javascript-stacking-context-002.html deleted file mode 100644 index 2b4a076f250..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/javascript-stacking-context-002.html +++ /dev/null @@ -1,123 +0,0 @@ - - - - CSS Test: JavaScript event handlers on overlapping, positioned regions with non-auto z-index - - - - - - - - - -
    -
  1. You should see no red or the word "FAIL".
  2. -
  3. Move the mouse over the orange rectangle.
  4. -
  5. The orange rectangle should turn black.
  6. -
  7. Click on the black rectangle.
  8. -
  9. You should see the word "PASS", in green, below.
  10. -
-
-
- xxx
xxx
xxx -
-
- xxx
xxx
xxx -
-
- xxx
xxx
xxx -
-
- -
-
-

 

-
-
-

 

-
-
-

 

-
-
-
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-001-ref.html deleted file mode 100644 index 488665c8e71..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-001-ref.html +++ /dev/null @@ -1,31 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  1. You should see no red.
  2. -
  3. Test passes if you see a purple square below.
  4. -
-
-
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-002-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-002-ref.html deleted file mode 100644 index 934f8d2976f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-002-ref.html +++ /dev/null @@ -1,34 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  1. You should see no red.
  2. -
  3. Test passes if you see a green square below with a vertical scrollbar.
  4. -
  5. You should be able to drag the scrollbars
  6. -
-
-
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-003-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-003-ref.html deleted file mode 100644 index 5b18aefe1e0..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-003-ref.html +++ /dev/null @@ -1,37 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  1. You should see no red.
  2. -
  3. Test passes if you see two green squares below.
  4. -
-
-
- xxxxx
xxxxx
xxxxx
xxxxx
xxxxx -
-
-
-
- xxxxx
xxxxx
xxxxx
xxxxx
xxxxx -
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-004-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-004-ref.html deleted file mode 100644 index 7621b56607e..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-004-ref.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  1. You should see no red.
  2. -
  3. Test passes if you see four alternating purple and blue rectangles below.
  4. -
-
-
-
- xxxxx
xxxxx
xxxxx -
-
- xxxxx
xxxxx
xxxxx -
-
- xxxxx
xxxxx
xxxxx -
-
- xxxxx
xxxxx
xxxxx -
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-005-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-005-ref.html deleted file mode 100644 index 2b81b709fa0..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/content-node-layers-005-ref.html +++ /dev/null @@ -1,39 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  1. You should see no red.
  2. -
  3. Test passes if you see a dark green square in the middle of a light green square.
  4. -
-
-
- xxxx - xxxx - xxxx - xxxx -
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-dialog-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-dialog-001-ref.html deleted file mode 100644 index 0a1060bf9ce..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-dialog-001-ref.html +++ /dev/null @@ -1,34 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  1. Test passes if you see a green square in the gray box.
  2. -
  3. You should see no red.
  4. -
- -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-dialog-002-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-dialog-002-ref.html deleted file mode 100644 index 4ec63450d57..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-dialog-002-ref.html +++ /dev/null @@ -1,37 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  1. Test passes if you see a green square inside a gray square.
  2. -
  3. You shouldn't see any red.
  4. -
-
- -
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-layers-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-layers-001-ref.html deleted file mode 100644 index 2a31645a856..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-layers-001-ref.html +++ /dev/null @@ -1,32 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  1. You should see no red.
  2. -
  3. Test passes if you see a green square.
  4. -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-layers-002-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-layers-002-ref.html deleted file mode 100644 index 463e7abad56..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-layers-002-ref.html +++ /dev/null @@ -1,47 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  1. You should see no red or blue.
  2. -
  3. Test passes if you see a purple square.
  4. -
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-layers-003-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-layers-003-ref.html deleted file mode 100644 index 1f08f67f0d8..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-layers-003-ref.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  1. You should see no red.
  2. -
  3. Test passes if you see a dark green square with a light green border around its top half.
  4. -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-modal-dialog-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-modal-dialog-001-ref.html deleted file mode 100644 index 82e3ff55b85..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-modal-dialog-001-ref.html +++ /dev/null @@ -1,34 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  1. Test passes if you see a green square in the gray box.
  2. -
  3. You should see no red.
  4. -
- -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-modal-dialog-002-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-modal-dialog-002-ref.html deleted file mode 100644 index daef4795223..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-modal-dialog-002-ref.html +++ /dev/null @@ -1,28 +0,0 @@ - - - - CSS Test: flowing modal dialog elements in region - - - - -
    -
  1. Test passes if you see a green square.
  2. -
-
- -
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-001-ref.html deleted file mode 100644 index 2b94886c387..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-001-ref.html +++ /dev/null @@ -1,68 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  1. You should see no red.
  2. -
  3. You should see three colored overlapping squares, from back to front: a blue square, a green square and a yellow square.
  4. -
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-002-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-002-ref.html deleted file mode 100644 index d1b08ddce66..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-002-ref.html +++ /dev/null @@ -1,60 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  1. You should see no red.
  2. -
  3. You should see three colored overlapping squares, from back to front: a blue square, a green square and a yellow square.
  4. -
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-003-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-003-ref.html deleted file mode 100644 index f06d531eb8c..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-003-ref.html +++ /dev/null @@ -1,64 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  1. You should see no red.
  2. -
  3. You should see three colored overlapping squares, from back to front: a green square, a blue square and a yellow square.
  4. -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-004-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-004-ref.html deleted file mode 100644 index 004b6a81b72..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-004-ref.html +++ /dev/null @@ -1,60 +0,0 @@ - - - - CSS Reftest Reference - - - - -
    -
  1. You should see no red.
  2. -
  3. You should see four colored overlapping squares, from back to front: a purple square, a green square, a blue square and a yellow square.
  4. -
- -
-
-
-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-005-ref.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-005-ref.html deleted file mode 100644 index 0ea90faca54..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/reference/regions-stacking-context-005-ref.html +++ /dev/null @@ -1,43 +0,0 @@ - - - - CSS Reftest Reference - - - - - -
    -
  1. You should see no red.
  2. -
  3. You should see two colored overlapping squares: a green square on top of a blue square.
  4. -
-
- xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
-
- xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-dialog-001.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-dialog-001.html deleted file mode 100644 index 3522593b069..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-dialog-001.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - CSS Regions Test: flowing content in dialog - - - - - - - - - - -
    -
  1. Test passes if you see a green square in the gray box.
  2. -
  3. You should see no red.
  4. -
-
- -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-dialog-002.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-dialog-002.html deleted file mode 100644 index b0744e270ca..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-dialog-002.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - CSS Regions Test: flowing dialog elements in region - - - - - - - - - - -
    -
  1. Test passes if you see a green square inside a gray square.
  2. -
  3. You shouldn't see any red.
  4. -
- -
-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-layers-001.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-layers-001.html deleted file mode 100644 index ded5bfe0ca9..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-layers-001.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - CSS Test: flowing content in regions that have a non-auto z-index - - - - - - - - - - -
    -
  1. You should see no red.
  2. -
  3. Test passes if you see a green square.
  4. -
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-

 

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-layers-002.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-layers-002.html deleted file mode 100644 index f494e8fda78..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-layers-002.html +++ /dev/null @@ -1,56 +0,0 @@ - - - - CSS Test: flowing content in regions that have opacity < 1 with the content also having opacity < 1 - - - - - - - - - - -
    -
  1. You should see no red or blue.
  2. -
  3. Test passes if you see a purple square.
  4. -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-

 

-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-layers-003.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-layers-003.html deleted file mode 100644 index 9908c40bdba..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-layers-003.html +++ /dev/null @@ -1,62 +0,0 @@ - - - - CSS Test: flowing content in regions that are absolutely positioned and have visual overflow - - - - - - - - - - -
    -
  1. You should see no red.
  2. -
  3. Test passes if you see a dark green square with a light green border around its top half.
  4. -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-

 

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-modal-dialog-001.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-modal-dialog-001.html deleted file mode 100644 index f20c9b5e5cc..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-modal-dialog-001.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - CSS Regions Test: flowing content in a modal dialog - - - - - - - - - - -
    -
  1. Test passes if you see a green square in the gray box.
  2. -
  3. You should see no red.
  4. -
-
- -
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-modal-dialog-002.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-modal-dialog-002.html deleted file mode 100644 index 3be9e4df6ba..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-modal-dialog-002.html +++ /dev/null @@ -1,37 +0,0 @@ - - - - CSS Regions Test: flowing modal dialog elements in region - - - - - - - - - - -
    -
  1. Test passes if you see a green square.
  2. -
- -
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-001.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-001.html deleted file mode 100644 index c1b2380fef6..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-001.html +++ /dev/null @@ -1,84 +0,0 @@ - - - - CSS Test: regions as part of the root stacking context - - - - - - - - - - -
    -
  1. You should see no red.
  2. -
  3. You should see three colored overlapping squares, from back to front: a blue square, a green square and a yellow square.
  4. -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-
-

 

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-002.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-002.html deleted file mode 100644 index 9d4f3a35b84..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-002.html +++ /dev/null @@ -1,76 +0,0 @@ - - - - CSS Test: regions as part of a non-root stacking context - - - - - - - - - - -
    -
  1. You should see no red.
  2. -
  3. You should see three colored overlapping squares, from back to front: a blue square, a green square and a yellow square.
  4. -
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
-
-
-

 

-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-003.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-003.html deleted file mode 100644 index 70885aaa2a5..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-003.html +++ /dev/null @@ -1,75 +0,0 @@ - - - - CSS Test: regions as part of the same stacking context as the node - - - - - - - - - - -
    -
  1. You should see no red.
  2. -
  3. You should see three colored overlapping squares, from back to front: a green square, a blue square and a yellow square.
  4. -
-
-
-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx -
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-004.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-004.html deleted file mode 100644 index 73756dab1a4..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-004.html +++ /dev/null @@ -1,74 +0,0 @@ - - - - CSS Test: regions create stacking contexts - - - - - - - - - -
    -
  1. You should see no red.
  2. -
  3. You should see four colored overlapping squares, from back to front: a green square, a blue square, a yellow square and a purple square.
  4. - -
- -
-

 

-
-
- -
-
-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-005.html b/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-005.html deleted file mode 100644 index 9a34d3c6a1b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/stacking-context/regions-stacking-context-005.html +++ /dev/null @@ -1,60 +0,0 @@ - - - - CSS Test: regions changing stacking order when as part of a stacking context - - - - - - - - - - -
    -
  1. You should see no red.
  2. -
  3. You should see two colored overlapping squares: a green square on top of a blue square.
  4. -
-
- xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
- xxxxx
xxxxx
xxxxx
xxxxx
xxxxx
-
-
-

 

-
-
-

 

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/1x1-green.png b/tests/wpt/web-platform-tests/css/css-regions/support/1x1-green.png deleted file mode 100644 index b98ca0ba0a03c580ac339e4a3653539cfa8edc71..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 135 zcmeAS@N?(olHy`uVBq!ia0vp^j3CU&3?x-=hn)gaEa{HEjtmUzPnffIy#(@^1AIbU z85$Vo{9HN_$mQ~MaSW-rm7D-%GchneRloNK$dW8^jVKAuPb(=;EJ|f?Ovz75Rq)JB bOiv9;O-!jQJeg_(RK(!v>gTe~DWM4f4{;-! diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/1x1-lime.png b/tests/wpt/web-platform-tests/css/css-regions/support/1x1-lime.png deleted file mode 100644 index cb397fb090e199c51e80e4243d1ede03a79aa8d9..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 135 zcmeAS@N?(olHy`uVBq!ia0vp^j3CU&3?x-=hn)gaEa{HEjtmUzPnffIy#(@^1AIbU z8U8bv#2r`xnHU(Ks^9wqWJ#8|MwA5SrbP0l+XkK_O>_ v4B~>Z+sSM@AcNP_#W95AdU8fW!Vi81W){YV4{giyfD#Ozu6{1-oD!M<@rf3U diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/1x1-navy.png b/tests/wpt/web-platform-tests/css/css-regions/support/1x1-navy.png deleted file mode 100644 index 9b9a03955baea7abde9e056e8604e18694e49b66..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 109 zcmeAS@N?(olHy`uVBq!ia0vp^j3CUx1|;Q0k8}blwj^(N7a+~R&>-^LA|6O{7I;J! w18EO1b~~AE2W0Six;Tb#Tu)9&$oRp}z{JAX(7`d=3n;FVdQ&MBb@0MNe`HUIzs diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/1x1-red.png b/tests/wpt/web-platform-tests/css/css-regions/support/1x1-red.png deleted file mode 100644 index 6bd73ac101874f306d007e9cea8fa3a1f62dce16..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 135 zcmeAS@N?(olHy`uVBq!ia0vp^j3CU&3?x-=hn)gaEa{HEjtmUzPnffIy#(@^1AIbU z|1&U1KH@Y7a=AQR978H@B_{ycObm=q)$jcQvLs7fBT9nv(@M${i&7aJQ}UBi6+Ckj b(^G>|6H_V+Po~-c6)||a`njxgN@xNA!@(kn diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/1x1-white.png b/tests/wpt/web-platform-tests/css/css-regions/support/1x1-white.png deleted file mode 100644 index dd43faec54ae60a210f1eab6ff4e7c88b8e34c97..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 109 zcmeAS@N?(olHy`uVBq!ia0vp^j3CUx1|;Q0k8}blwj^(N7l!{JxM1({$v_d#0*}aI wAngIhZYQ(tfDB$w7sn8e>&ZX<|Nmdl!1`sfEmlzu3&R;K0lq*X$r9Iy66gHf+|;}h2Ir#G#FEq$h4Rdj z3(2QlSh?@M7jG eOI|GCZ+2WP<2UBa)$Kro89ZJ6T-G@yGywqpiaLV; diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/60x60-green.png b/tests/wpt/web-platform-tests/css/css-regions/support/60x60-green.png deleted file mode 100644 index b3c8cf3eb4c89bd8f2d1ffde051856f375e3a3de..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 218 zcmeAS@N?(olHy`uVBq!ia0vp^HXzKw1SGf4^HT*`sfEmlzu3yE9XPACF}BuiW)N}Tg^b5rw57@Uhz6H8K46v{J8 zG8EiBeFMT9`NV;W+&x_!Lo)8YJ?F^Fz`((>;PMkU^HzRy4~NuGe(INq1>ePjdKrGS TIXtNc8p+`4>gTe~DWM4fy9-d) diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/60x60-red.png b/tests/wpt/web-platform-tests/css/css-regions/support/60x60-red.png deleted file mode 100644 index 823f125b8e4a60f780f00443c9c9a10b9fa1f447..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 217 zcmeAS@N?(olHy`uVBq!ia0vp^HXzKw1SGf4^HT*`sfEmlzuQ<1cFzubXBk|nMYCC>S|xv6<249-QVi6yBi3gww4 z84B*6z5(HleBwYwZk{fVAsP4Ho@3->VBlchkp2JMEhm9(EUQo2%VrV@UNUpX$1;`+ Ty_~-WXd;8BtDnm{r-UW|v1>m& diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/README b/tests/wpt/web-platform-tests/css/css-regions/support/README deleted file mode 100644 index 2e5f2ad0738..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/support/README +++ /dev/null @@ -1,28 +0,0 @@ -CSS Global Support Directory -============================ - -This directory contains common support files (such as images and external -style sheets). These are sync'ed into the support directories of all our -test suites. If you have test-suite-specific support files, please add -them to the appropriate test-suite-specific support/ directory. - -If you add to a support/ directory, please run the tools/supportprop.py -script from the top of the repository to cascade support files into the -lower-level support directories. - -Description of the Common Support File Collection -------------------------------------------------- - -The 1x1-* images are all exactly one pixel. - -The swatch-* images all use 15x15 cells. - -The square-* images all use 15x15 cells with one pixel borders. - -The pattern-* images use cells of various sizes: - - pattern-grg-rgr-grg.png 20x20 - pattern-rgr-grg-rgr.png 20x20 - pattern-tr.png 15x15 - pattern-grg-rrg-rgg.png 15x15 - diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/a-green.css b/tests/wpt/web-platform-tests/css/css-regions/support/a-green.css deleted file mode 100644 index b0dbb071d5b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/support/a-green.css +++ /dev/null @@ -1 +0,0 @@ -.a { color: green; } diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/b-green.css b/tests/wpt/web-platform-tests/css/css-regions/support/b-green.css deleted file mode 100644 index a0473f5ca26..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/support/b-green.css +++ /dev/null @@ -1 +0,0 @@ -.b { color: green; } \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/c-red.css b/tests/wpt/web-platform-tests/css/css-regions/support/c-red.css deleted file mode 100644 index d4ba5c64e95..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/support/c-red.css +++ /dev/null @@ -1 +0,0 @@ -.c { color: red; } \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/cat.png b/tests/wpt/web-platform-tests/css/css-regions/support/cat.png deleted file mode 100644 index 85dd7324815b8f8ef1a1d0496224c1a0661db9d8..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1883 zcmV-h2c-CkP)WdH}z3>gRm8%$Aad;kCd2XskIMF-Ff83-yN8ye1400009a7bBm000id z000id0mpBsWB>pL*-1n}RCwC$Tnn<>HVmXZK1a^ho3&SK4-(g{9GN13#R7t8y*I%m zZ)BMw!6g9VLwR{T9*v;e^Z&9e>xbnR^*7(`)-M11{_j7xFNSfJ@$>S&(_i1@5GH@m zhpeXC{afFEKhVJCt^WWpLj3iQEg77_JYJnk79anUvL0gx`(AYZ27s0x;q_WRcJD`A zg+R7jBu}y@4l@kFdQJ7DGoh@H-xD(&>S?#kV5MJwAHN8ovs16uEnknmyyLJw3_Dz} z-2t_1y-WcyWmd+)eVZDoh>C$4rk3Oju)y$mQ#%^)+P>PB74gM`GN6$$a17nlNge7- z3RmB|dPjb|$p?mh6-(D?ThB@WuYf>+sj1twj=G%GFkj5O!mZqLtqotF8cC*N$ri;H z2HQ+$17ses$k7#RTbJz}gD2-`@wiB%W8DFRH7rLV$VR8C-{$0BU^7QA)6xcOPkeLG zIC+y8#pHH3S(N>pr`5y87*;bv|b^HW*-n7#c-VH5l06wfM%K8tMv%QYu1VMJ&`q zXuT9g-DjG%ok+2IhK&G~#M;r0zu4sf-`3+KmoX<0eCv7>JZuYAQ4+JlXds3Yz$`iq zO!pQ9wr}Yor1)n9bJP~%@)tD+crwU7nJ%PeORd0)1m4F<)qG~XO2nT^iMivEf)z-D zBxjR-YQ3Q3>4*f>(%TkH;D#Ki*aVYot>nkyxLr9zV62-PtQAsVZ<)M&ROZ`q=r-yb zxV0FojhaWJa00$t-zE`xTYXArX#ra%P+dk^apt~h+vO{N9i$&>6i;Se`Xu#!Aka_7=8lY{bL`gE8-D*^)! zY7!?ohKiqcXDjd>0jZICXBl_KZ$6sC00LyW54V5*dj5-!>hm-t>Ht(52LoWuR*1xE z2G*{@twTZxdhmIo{825j6wMk`;$*SKGZc>R!t=-#&gkXakkRkQfHYSKVRo~#WuBph;XemDuD z6qUJ989evMeRwkDj)54kU$UA#IGU-IZHnWTVRA#9kA1APN3ZjwA2_hn2Ug_Nvo#=1 zvdA6|8~BUnoI@62w{|P|2@lwrchE#7bJ6Kq6kBhZllSFE87tja$&a^Vsv9DzjxZA* zQVOrQc2nyJWb8G&wn4GZFkUv;Z=ATnxIprXHN_9;9UHeyvrlY2*kxbFPXGYML&r3) zen%FSp5K}|`|V@N#w>xf>JHCqGnQ($o1mTz0Za^NSrBZ!onF6dnw<3&y(VH1bndXf z391*{FlywkRueb2`q*Y`c5i|#c-`R1y$R0#>_jShsA?F))d087sWd*L&RJQPVgO6z zuKDv)`2I=hc!ut73ss>?(GbUMv>AFu zUSWGaq^ijA)f<0KH8%k6{9y7l%|MvpgU?6jsh(M$ z5N*sz^783ghS!jcq!BDms81L*G}VLWyHB!u>=8qC&htH>PmP{AHB})c5>>6kFjvP9zMaPHfq~YhEr7DrH zD;~lup<3-juf%_Prr9Z-V4nORxcT&~FF{{2Nk&bqG}pd>$n(1*n4sj(w0;RH6sT{j zbhUJqyjT6iN>h5jrHP`lGXxi;LI(=%bR`2^fsT95-&yGjH)}sb@TGCA(mUti&QX<4 z{U$^U=I18hwKL%pN^cWLwM6MtTI+-Up~5fcjt@Bxe*M77{d?${Py^67eTt4eFFZ)l zh8I~nmB}UQ_u%EtP`CsPA88ZuaO!(Y>9V^z>txmUh$SjH&7r>5XT86X<2m!DSg2-= z-~W*e9lSUNASn#NOM-@)>-Im^e@d- VQL70(Y)*K0-AbW|YuPgg44gppHg^c>jqd=iJPZ!6KjC*fy z8gelx@Gu{^HvM;TY)zwU$c{IS(wnBFeYtT?qh#}i+>eP179zlX|30sumufTRE+B#Q jJePWx&kbz|5I0kznWOaej?gzin;1M@{an^LB{Ts59-mW( diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/pattern-grg-rrg-rgg.png b/tests/wpt/web-platform-tests/css/css-regions/support/pattern-grg-rrg-rgg.png deleted file mode 100644 index fcf4f3fd7d95431b8cd1bc5f5129fcb724c5e40f..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 231 zcmeAS@N?(olHy`uVBq!ia0vp^x**KK#K6FKsNOXi$XVy<;uunK>uuO>p#}vW?s@X} z?5{Vn@(E1fdg>#_p5-zBiX+1VA%+4b26mx2|7={&ovNQ>6SXtcysBl-)c>9DyExiv#HMbsD$XX>p~Q&Z4f6DV?h!MD37E_}{svR6Ky{&{h` fDhG(UQO-Q~pMsNotNvM_%Naaf{an^LB{Ts5h3Hy_ diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/pattern-rgr-grg-rgr.png b/tests/wpt/web-platform-tests/css/css-regions/support/pattern-rgr-grg-rgr.png deleted file mode 100644 index d454e3a630cd98146c241537dbb3d4cef313f465..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 223 zcmeAS@N?(olHy`uVBq!ia0vp^HXzKw1SGf4^HT*QL70(Y)*K0-AbW|YuPgg44gppHg^c>jqd=i}PZ!6KjC*fy z8gelx@Gu{^HvM;TY>lI9$c{Iy(wkbIbyRJ-o`3vUZZ|(OF9Q6nGtzszXKw9ExeG`j k-E5KlqACYx1X%C$w4CD$N64zrK&u!$UHx3vIVCg!00%}%YybcN diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/pattern-tr.png b/tests/wpt/web-platform-tests/css/css-regions/support/pattern-tr.png deleted file mode 100644 index 8b4b25364e0ffbe09e563e13b567fa57330e48d5..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 137 zcmeAS@N?(olHy`uVBq!ia0vp^azM<_!N$PA*s|9jBoW~0;uunKD>)QnGsEKzd}=q=PizO8&EV3$*aCb)TpJh~{xkePDssRFB<<gTe~DWM4f*isp& diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/square-teal.png b/tests/wpt/web-platform-tests/css/css-regions/support/square-teal.png deleted file mode 100644 index e567f51b91bbe40754cb0e0cae066201219cbb4a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 92 zcmeAS@N?(olHy`uVBq!ia0vp^f*{Pu3?vyBU)>3$*aCb)Tp1b~82Uv7 diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/square-white.png b/tests/wpt/web-platform-tests/css/css-regions/support/square-white.png deleted file mode 100644 index 5853cbb238cb2d4aba3dd49af3f2ba64d6c7a2de..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 78 zcmeAS@N?(olHy`uVBq!ia0vp^f*{NRBpBq_B-DVEsHcl#NX4yWiv~UkzCZ4)$}udm Z3=C_{1@!OB{@4Xl=;`X`vd$@?2>|f05A6T| diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/swatch-blue.png b/tests/wpt/web-platform-tests/css/css-regions/support/swatch-blue.png deleted file mode 100644 index bf2759634d45dbe3df13868341eddb7e4bf24172..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 84 zcmeAS@N?(olHy`uVBq!ia0vp^{2gp+Mj%g@f$_JNuojTT;OXk;vd$@?2>>P$4{-nh diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/swatch-green.png b/tests/wpt/web-platform-tests/css/css-regions/support/swatch-green.png deleted file mode 100644 index 0aa79b0c86bd72c2220ecce39b9553e2cd3605b9..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 84 zcmeAS@N?(olHy`uVBq!ia0vp^{2;I(;rzSbh26A~kT^vIy dZY3uuFamkH42-|EgtdSy22WQ%mvv4FO#nq@5F-Ep diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/swatch-red.png b/tests/wpt/web-platform-tests/css/css-regions/support/swatch-red.png deleted file mode 100644 index 1caf25c992aa8e23483cddb3334b5f51ec967f4a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 84 zcmeAS@N?(olHy`uVBq!ia0vp^{2wg9Y$w!>#KrWA`i(^Q| dt>gp+Mj%g@f$_JNuojTT;OXk;vd$@?2>=8a4uJpw diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/swatch-teal.png b/tests/wpt/web-platform-tests/css/css-regions/support/swatch-teal.png deleted file mode 100644 index 0293ce89dea5c9413e4c829cc83a4e39d8f23300..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 156 zcmeAS@N?(olHy`uVBq!ia0vp^{2QL70(Y)*K0-AbW|YuPgg4R#65`cCM1`H9#R5PZ!4!jq}MV s85uv$JE$cjEnw)$lDlfNN|Kv_A+(E0c5RvdE}%LFPgg&ebxsLQ0IVw~FaQ7m diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/swatch-white.png b/tests/wpt/web-platform-tests/css/css-regions/support/swatch-white.png deleted file mode 100644 index 1a7d4323d77287d8eb03a89c635b09d099d94869..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 85 zcmeAS@N?(olHy`uVBq!ia0vp^{2zopr0Qo5vZ~y=R diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/swatch-yellow.png b/tests/wpt/web-platform-tests/css/css-regions/support/swatch-yellow.png deleted file mode 100644 index 1591aa0e2e274854ed836cf582235ea0202f9c8e..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 84 zcmeAS@N?(olHy`uVBq!ia0vp^{2;L}@UB|w-0=Yb%E{-7; dw~`YS7=b)p2FBl7!dgHUgQu&X%Q~loCIDbL5Y7Mq diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/test-bl.png b/tests/wpt/web-platform-tests/css/css-regions/support/test-bl.png deleted file mode 100644 index 904e24e996a3e5da93bef89e10c49e24c07d0ed2..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1368 zcmV-e1*iInP)1FDgrZWOHO<59>534BKsDgp7p3B>I7zAF2$Eby&QX;;i_BGr>dV-tSTkfVYNIl zi$7l1mTrsB_C8C-i#4X^3LaLG>jn4e0?941+dy=QV9i9xkG(@4H;@(~ogt^a`43yj z^`**Zh^{Td#Pj%+Qr%fKN-5`g;nYOF+LzqmXhmO+m0gFk>gfe#F-NRAhUdXXT_P3& z5hZ>zhPowUE`a<#=%qb^0(KmTs?O^A;`TX0ocz1q{qO362uJ`J02e5qdmo1g`RwHP z!A7z7fk;yZJFK4j+J{j+R-gEgot3{VQ zT_EJMJvHm{U-0*2vCJ(xH5>9<9E?yX{cn>?Cg7{`b(@FBIAj4b8LLlxUA}&DNX9v( z3NQA_a4!BS*5!`~%BqqjA5Y&4uFEHnEyD3&j#zU)o^f5S%cniIzr|OZ3i>ow5`DiR zKV-E(ZYQ3EdZkb6@rGpW1SV4To*jSQh zlcG$a4=ps-GU>1C2_a&@$I%?>7`aa!VnfzdIeZ#?+sUD|PY~B%U0^7GO|Nu@sDsJ# z@KlWWEXlsO1AjC<{IhGw1$M}i5N36xL4oHW;3LYQL{&USeE7rWXggil@q+qy zcqZ;IVJjWW`PLt<%)`T&`L8>V}>OaO$2em@zx|mEC771}cDVqgE!@z!yT>QYv82lFP(%@F<5;wl4TqknAA$72YTMI-# zh4f`KPMMiy>XyGdc~Of)_A+14L1KJ#R!khI&B)WtXi&X5b{lL3*@ZkLC@MvW|+A?7gN zW^9D0T;2*9*?`>~p)-$sKP@gC`DhvB0@0TW$+>vr68OLZ|AFHIA?8UIVp5VL8#iJF zp>x%gNY!OhEyLo1uORl+--}g*Wst2R?yDkOfv7^I8;JRK;rXg-$rj?i69C?WTvb<5 z-Ama!5K|d3=PQC$$WP>d ai~I`(b4pM507-ZN0000VP)dx3m9n@P^7faO%<|&!sf>KZm^B!d3qut2z>beeU2{xp@)&j(02`` zTY^Y(yls!8j-g6{#iqXUOZZmq^{tQRnwIpYptOGKE#wg=geU|udB&pePc3cOueFKs zvzd?t6~fN!7xtH~ecHeFR|~mNE=(hUj9-;D~v`nZNntt8~9LC7xNOec_RZz1(-9N|5dP=m0v9-_#(n4W^-V2~txiYhzj z!i$YK*$mpxEQDn<+Gk7q?5d2K>8gc&fN~c@-gEJg62@yGi)KdJFKsVL7OffK1s(gk zuDvn5Y{BUI*USjd;i%YrdEb z{Sn*_^roe9hCXX0U8@*Tm5}W<;uM1)L8qv|EjeFw?$DQBbYc7Y_+{2Z;0_;OA3x6W z0PY|Sr^RF&+^N9lo^nJde+0T>e|Q%!CAxA~?GMkwJ^q*@L1D^DW{@@e8aZfW&HlL( zh^h58`-7ZbHV0aSI!6vcWNu~EzD%TLWzD`ywDV7Xr)zJ+r5pkj?+gS_u|SWDG`g}53&gW~H?kPATZn)^ z{pHpDF0f_Yc)Al>7VPVTai^XiPQR;MAxJ&d2ec|FrET5HXc}tCS~{7gaV(KcTpQZ^Z1TjZ~gu`3RQzOf}P2=}cU|fp)kR|{zS!z=9ML<>z3CM~dAz5JrL$V?W z4Q^@!)=5xS07+PK!ylVGm5`=3ktPvYvS1MHR5ItZK3>BJtE{TnlF}3mey44O;Kkq6 ztd@0Ivcj%UvClb}M#-r)(X{Qa==a|U(_!d)YlyiY`vK(N;tTmg{#)cPVxOudoeJ1E P00000NkvXXu0mjfoHYWE diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/test-outer.png b/tests/wpt/web-platform-tests/css/css-regions/support/test-outer.png deleted file mode 100644 index 82eeace7fc0c4202f79610978ab423e62abf8939..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 2412 zcmZ{mdpOg78^=c{EOMMh4qF~6Bd3rFi9{I*a|(^Nvdq~?QjT*?4xw_Itd@FmT1%@; zkHai-Y6->Aa{4*!H%&eKiag(`-yhHQT+j9WT%Y^CzTeON{@nNL{(P?Mo9&Krl9f@D z0f9iW&LO`RQ%dM1nrDqQhOXQ7#ug?V#Sa2fmTSTTg# zq5n>b3YP6~G}vwrp{7((H(F%s9=vs(d(vdsw5S`*{!`K=^0e|Hs;%}@ZAe9;YhM#o z_ToaBZbi>ZoPth;c~{8~-g5bm@{$}EyaCQ}|KNtGC?`*cg`T-jp?`3qQTBgZTv?v{ zsdiqg_=L}TaeDHp)WEMH?m}9l;@m~8p=7pF>!36@MZO>-W1E4=+P#fwf=QndMcXv7 z8Z8-fF2Q7mdllSkqq$$v5O4Max@#iK>)>}|J2%opy`et}FlLkY$|k=MPb|h-F&GS# z`yPH&Q53dkQkZ<87kdVuoRE+pLOXW`h4H>u8uuqXC&Rob*li9oo;cl8K)zjxUvIBg z$)w}LH2k-=iDKc?$`Kh8{tr6}PB1uTuEZnV2}8sH8=6vc={^tU1@E=j4k~YXOGQ|X zkJ7bc);}A=x!>Q|ZjgqKntxci{z1vOpT5iHp(Eo0q?hU&McH@xcJuaJ!&r=t z?vM4Ew=lmncbCv%iQg%g%g!y>UhwjyyUTO+MrE;m#Qlfbq|*dc(4 zZC|6qC(sSHP6V-iNf|!edmH+^^*p7Z*`Fr|qZ;SsTT5vuq{VfHE_u(9E~{{7oy($sRI!r_#kERyw=)upx! zFkJKpcdtUCXezrquiN45{@FUmzL;55Wac?m%0{3=Y46O}udzZQvI2GYkbbEmgW{O# zB*tP_1EQvt8AEX}i1ucwo7Do-=J@@}d(C-#{nOcUixx3CVB}yfx&o9U9a{k9oC*L+CRvNc6NGmAaSr-%G%isWSVX*Ri;gJFYDY61-RZMJ9s z-`z?*?sVxk?ebatm>?cmkvn8n>~gVoVD9PAWg?M?$DhQ9`wq>_JP04nEs0as zGCYyp$>C%Uz4Sbg-8nx$KQdBELKqs3JZpaXR0kdt6C;QpRUl$8ZN2BT1ay8+QeDwI zu62>#lKkWL24UmrHRFc%C7-=lR_WXembP{E_3D{)24gRLd3m`56V=JI3W>Gc@|ghD zM4FnK`Yo)lucxJLsZJ~`ENt|1#h-mVSROoe^Uf(EVVw0btkFTIuq)O|12?%MoRDpA z2yb%N3pEM(Fd#*y6-Dy|)=~4^T7Ra;qxZn6bJQv8eU-G*cUmx99|SwF1S^VO>?Mcy ziKu&}Y5&7fzUR%+PBa2D*ec=Nds+$#Hi85rKsnpQ4u~Tuc0eH#V&@ut(`oSm91zDY za+r0m+14Xz`N-u=du{O&XwC%ls)q~AieIs$nYA?j`i;>+?lE4qb*u__4g0>Wic&zo zR+V36^t{R_-%yv8wr}-_^1lgZWPfdu3O$yvqYW912-Zu#GoWhgovH3+iIzI{A=E)V zcQydV*I>n-slX6bO6zsU?5t4944(oUP5)GKA$4KLQ4haDC`}{Ps+Ey(|x}` zyBd9~%hyJlk{^d?Lo)0)dE5l)3+)ni{3Zg_i0Xi|wj6^6BU*ew>BPGjg>hpsG84#F zFtJR+%|k#s!XCqF_ng1k)XQe2ZTWsnZZ|ncg`BfZy2~e>2r%0X?)0(asHJc|7s;{V zAyLed^iYKNI1KWOw{~cQNG_eYN!$n`KQ1lw1ky25mK1-sOUN<}du0+Jm-|WOJ}UZk z;MD^*RM{7)%54F{-bX|b)&Pma9Hxh~L<9I*zLO^8O^&sR* z+Z4@)s8v757MByxkbSog24S(-^4S*wgp`yZd~#%@yPop)OUea1c4?kMp-^sa!(oST zlOoZRWmaIl?bWsCD++LG;;LvBull2 zTKN2P=4FEB_A-kIhbh4*)5)gT&@Gq#)33|s%4+1d`N2!(NL$;9utxEAWYvRMlM?)J zUGmy09Ze5xzD#Sp`sH(nNMyos$)$75^*zJVnHX>A58rdx9N!z~iBj0IU6@K0Y6KJQh(%2_LZ+=$Xf!%}G|=DQ-_LJ; z{R@v*PI@{ju&;VMdI8E|v)OrCwr%pJojwJ7oSpnX!a|OIC{+5t7cWF27_n5j0g~u3 VAD}`@1i=3k$k`F)P-h>U`X3Goc2EES diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/test-tl.png b/tests/wpt/web-platform-tests/css/css-regions/support/test-tl.png deleted file mode 100644 index f6ac0ef7e8f6e192c9c26239884bf92b13cf67b8..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1025 zcmV+c1pfPpP){9_J2)W!F@R;Dg)Lp$zS!5CX;rV991JU){SM-DYAV0|e zM%uPHwukYjIUJ7B*Q=ZTu2z>QMR^bD+hKK83n7YJaQrDaUiXl8N2@a^ART^^rwFp> z9#IKgok0Td0KkTyXt?~yXZ<2qM=a7Vzey#Q*6RDnL2!78qHiE=Ex4QTA^lz~J%kTw zstmq|U|5-t@E~V@SRUkpVNEL-i@q);x>HzkHGJJLeJv;~hO4ub=d-q4IFZka!eTMc zu`{buHGh%+at79akO>1WhSi7Zh!q^12-bv5K>WppZFh6@Am?f!KvZ5Be|6^zTf#t8UO;S(JZAKN+3ASN z3j@6)uNUz|&Al}d$_w_F78jlrimN;suUD0qIN$0jWDohucq6MjSV#Rh_J5@Pc!G3f z_wwM3t6xj|WYw9-AC(uqCDDE%<9fTAh~QL5JzvTmP~Jf3VT_w`oktbsK$-$vb-dY+ zEip&>4?ZIC^U;m)Hw&SbOn!F;BHM*_pCjsYrK_unjA?=AlYvYnPPY~!(~?^V6%rmz zkimBF|Bjt{e!>7aIY` z$e-!kZF!dZ$<~h?Ekqu$Hyc?mW_>Y3_Tv~aU&L~krJRVP<{Xh@#O3lKU&e81AT)VW z+l8Kn<$pJj%%^`s>@+0W|%%6zicXInEvpcG8HpS|5i+Fr$GIwnD~MX)K@9PlerDlpNfeu>p=af vm<;kz{V6gHxvP)gcJytThUyO|QzGyW8di!g0nvTM00000NkvXXu0mjfqXF-V diff --git a/tests/wpt/web-platform-tests/css/css-regions/support/test-tr.png b/tests/wpt/web-platform-tests/css/css-regions/support/test-tr.png deleted file mode 100644 index 59843ae54b64f6ce4f7e616d4be491c911ea84cf..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1235 zcmV;^1T6cBP)%)>Qhp^}!Di#F%(|iB->7dhx5Bfwt zkx%50BC1n|tx|6vK%_mLQWqnX6K;;U`FDFEg`lc|)m4wlpBK4@05B8)B_V|J%_Vlw za4<$t6qwQ5?fVe&2b-UQ(B}DF=TLGmWzFWjfTsuoBj{dz2tgQl^A0mb5R|kzAGjHU zzt-QIvk5};13=E&LB-q-)byMklsg#6^|GA>1kTt&3kTTsQcmN$3rJ$UlvDpmfxi-B zs(OsZVotq*l2F1pfdVHvT}FC0ny!_MGKlO{^1lTH|7D!$)SEgOs2&9Y@Lbr2kd{<# zhySTga0aoQC4`TSr6hxqDd{GMq~)Oxf{zHUHg7p3EkeB)qa9pj)F50=N<;4i33kkV z+Zkfqoh0ngavtIa&CE4aHM11QcA(1_eQZqwfj_k!6`W4$RXtT;($sb=Vf=Ltrw9n z=2B#u(Pr7sL0tWekex*^{dF&8!>RY)KGWH*ffTXTQc}}ioq82%jI{MEgls^5+h<%O z^>H1Z@tJtBVk*~XX#88aM!5hI=gDs?hBhOj+jXMvWV-~H?(^Z!I&l*r!fNriI&I;K zUB`|wTQ4r~E*vl-*0C6Qu@PH2eTrR0Wf{T~%Xbknf3wf*S&<+a`6o9M zz*S7^KKgFY$UnJ0HVgZg8jXfF%*cL({(KZLbt zzRNL^s?W;zZP~w5L&>g+M15Ai**#&3n|Wb>4eGP<`;PGlMsC0muRbf^cs3p5##&fh zIr(FkMaZ}vrt)1Swj2@$kLqXgyORsRw`3xZBX}-f+RL=$Ntgft002ovPDHLkV1lbeOeO#T diff --git a/tests/wpt/web-platform-tests/css/css-regions/test-plan/index.html b/tests/wpt/web-platform-tests/css/css-regions/test-plan/index.html deleted file mode 100644 index 388d1c78689..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/test-plan/index.html +++ /dev/null @@ -1,377 +0,0 @@ - - - - CSS Regions testing strategy - - - - - - - -
-

- This document is intended to be used as a guideline for the testing - activities related to the CSS Regions spec [[!css3-regions]]. Its main - goal is to provide an overview of the general testing areas, possible - caveats and testing aspects not immediately apparent from the spec. - Also, it provides a means of tracking the progress of the CSS Regions - spec testing. -

-

- This document is not meant to replace the spec in determining the - normative and non-normative assertions to be tested, but rather - complement it. -

-
- -
-

Introduction

-

- As CSS moved away from the monolithic development of CSS 2.1 to the - modular development of CSS 3, the number of proposed new features and - the complexity of the layout landscape have increased dramatically. - While this directly translates to increased flexibility and agility in - adopting and implementing new CSS features, it also increases the - complexity of testing CSS features and the need for coordinating the - testing efforts. Also, the need for testing coordination increases as - crowd-sourcing efforts like - Test the Web - Forward present people less familiar with the processes and policies - of the W3C with the opportunity to contribute new tests. -

-

- Except when defining new behaviors or redefining old behaviors, the - implicit assumption for new CSS modules is that they play nicely with - other modules or properties defined in CSS 2.1 [[CSS21]]. As CSS - Regions is a spec that touches many aspects of layout, styling and CSSOM, - it's not unreasonable to want to test the spec against these implicit - assumptions, too. -

-

- This testing strategy document is meant to complement the CSS Regions - spec and the existing test suite by providing an overview of the testing - areas (especially the less apparent ones) and tracking the progress of - the testing activities against these test areas. -

-
-
-

Goals

-

- To ensure a comprehensive test suite with useful, high quality tests, a - number of goals are proposed. They range from process goals (how to - conduct testing) to implementation goals (how to write good tests). -

-
-

Enabling easy test contribution

-

- An important vector in successfully testing CSS Regions is to - enable easy test contributions, both from W3C partners and from - non-W3C members that wish to contribute. This is achieved by clearly - marking and explaining the areas that need testing, linked to existing - tests and general testing progress. -

-
-
-

Providing guidance on testing

-

- In order to increase the quality of the test contributions, this - document offers a set of guidelines for conducting testing (see - ) and a testing progress - tracker to increase the surface coverage of tests (see - ). -

-
-
-

Creating automation-friendly tests

-

- In terms of actual tests produced for the CSS Regions, the main goal - is to ensure that most tests are automatable (i.e. they're either - reftests or use testharness.js). Even where manual tests - are absolutely necessary they should be written so that they can be - easily automated – as there are on-going efforts to make - WebDriver [[webdriver]] automated tests a first class citized in W3C - testing. This means that even if a manual test requires user - interaction, the validation or PASS/FAIL conditions should still be - clear enough as to allow automatic validation if said interaction is - later automated. -

-
-
-
-

Risks and mitigation

-

- There are a number of risks associated with creating a high-quality - test suite for CSS Regions. The most important ones are listed below. -

-
-

Implicit interactions with a lot of other specs (and commonly accepted - browser behavior)

-

- The CSS Region spec introduces a significant change in the way layout - can be done and as a consequence, many of the assumptions that hold in - the context of CSS 2.1 must be re-validated in the context of CSS - Regions. In the meanwhile, a lot of new layout modules have been - proposed, with various degrees of implementor support and maturity. - Also, non-CSS specific specs introduced concepts that affect how style - is propagated (e.g. Shadow DOM [[shadow-dom]]) or how elements are - rendered and interact with their containing documents (e.g. - <iframe seamless> in HTML 5 [[HTML5]]). -

-

- All the above factors increase the testing surface and the number of - the possible cases that might need an explicitly specified behavior in - order to ensure intuitive and predictable results as well as stable - interaction with widely used browser features (that might not be yet - so strictly specified). -

-

- In terms of specifying the expected behavior, the current approach is - to try and specify it for specs that are final or nearly-final and to - just make a note of the possible interactions and unspecified behaviors - in the case of specs that are still in flux. In exceptional cases, a - new spec might be created to cater for the needs of multiple specs - (e.g. the CSS Fragmentation spec [[css3-break]]). -

-
-
-

Big number of tests required

-
- Add here the estimation of tests required produced by - W3C test coverage - tool. If possible, provide a better informed guess on the number of tests. -
-

- Given the complexity of the spec, a big number of tests will need to - be created to produce a test suite that can ensure interoperability - between implementations. -

-

- In this context, the main purpose of this document is to provide - useful informations for creating and contributing tests in an effective - manner in terms of coverage and test quality. -

-
-
-
-

Approach

-

- As spec testing cannot be realistically separated from testing a - particular implementation (except for the very simple cases), the - approach proposed for testing is one that tries to first cover as many - areas as possible, instead of deep diving on a certain feature or aspect - of the spec first. A side benefit of this approach is that the spec - tests can be used at any time to gauge the level of support of a certain - implementation. -

-

- Having this breadth-first approach in mind, tests will be - created for the testing areas listed in . Testing will be done in multiple passes, each - aimed at covering more specific edge-cases. -

-
-
-

Testing areas

-
-

Explicit testing areas

-

- These are testing areas normatively defined by the spec. They cover - things explicitly or implicitly defined in the CSS Regions spec. - Please note that while detailed, this list is not necessarily - exhaustive and normative behaviors may not be contained in it. - When in doubt, consult the CSS Regions spec or ask a question on the - mailing - list. -

-

- Below is the list of explicit testing areas: -

    -
  1. - Proper parsing of the CSS properties and rules, rendering - according to the spec. -
      -
    • flow-into and flow-from; - flow-into should be tested both with and without - the content switch
    • -
    • region-fragment
    • -
    • fragmentation additions: region-avoid, - region-always – see [[!css3-break]] for - details
    • -
    -
  2. -
  3. Nested named flows and cycle detection
  4. -
  5. Multi-column regions
  6. -
  7. Regions' pseudo-elements
  8. -
  9. Region auto-sizing (regions visual formatting details)
  10. -
  11. - CSSOM - interfaces implemented, behavior according to the spec -
    - regionfragmentchange might be removed from this level of the spec. - Adjust the contents of the list below accordingly. -
    -
      -
    • - NamedFlow interface -
    • -
    • - Region interface -
    • -
    • - regionoversetchange event -
    • -
    • - regionfragmentchange event -
    • -
    -
  12. -
  13. - DOM additions -
      -
    • - getClientRects() and - getBoundingClientRects()
    • -
    • - offsetTop, offsetBottom, - offsetLeft, offsetRight and - offsetParent -
    • -
    -
  14. -
-

-
- Region styling has been removed from the spec waiting for it to be defined in the page - styling spec. This is a reminder for adding section here related to page/region styling - once this gets specified. -
-
-
-

Implicit testing areas

-

- These are testing areas either normatively defined in other specs - that explicitly refer to the CSS Regions spec (e.g. [[!css3-break]]) - or simply not explicitly defined, but implied by various aspects of - the spec (e.g. processing model, CSS 2.1 compliance, etc.). - Please note that while detailed, this list is not necessarily - exhaustive and normative behaviors may not be contained in it. - When in doubt, consult the CSS Regions spec or ask a question on the - mailing - list. -

-

- Below is the list of implicit testing areas: -

    -
  1. - CSS Regions and layout modules: -
      -
    • Floats
    • -
    • Positioned elements
    • -
    • Intrinsic and extrinsic sizing [[css3-sizing]] and auto-sized regions
    • -
    • CSS Flexbox [[css3-flexbox]]
    • -
    • CSS Multicolumn [[css3-multicol]] content in named flows
    • -
    • CSS Shapes [[css-shapes-1]]
    • -
    • CSS Grid Layout [[css3-grid-layout]]
    • -
    -
  2. -
  3. - CSS Regions and different types of elements -
      -
    • List items
    • -
    • - <iframe> -
        -
      • fragmentation of <iframe> and - <iframe seamless>
      • -
      -
    • -
    • <video>
    • -
    • <canvas>
    • -
    • <table>
    • -
    -
  4. -
  5. Stacking contexts
  6. -
  7. - Fragmentation -
      -
    • Named flow content fragmentation
    • -
    • Regions fragmentation
    • -
    -
  8. -
  9. - Dynamic content -
      -
    • Changing the content of the named flows or of the region chain at runtime
    • -
    • Interactive content: contentEditable, designMode and - input elements
    • -
    -
  10. -
  11. User input events (e.g. mouse, touch, keyboard); this includes event propagation
  12. -
  13. User action pseudo-classes (e.g. :active, :hover)
  14. -
  15. Writing modes
  16. -
  17. Transforms
  18. -
  19. Transitions and animations
  20. -
  21. - Shadow DOM -
      -
    • Regions inside shadow trees
    • -
    • Flowing content from shadow trees
    • -
    -
  22. -
  23. Content clipping and overflowing
  24. -
  25. Pseudo-elements in named flow contents
  26. -
-

-
- Region styling has been removed from the spec waiting for it to be defined in the page - styling spec. This is a reminder for adding section here related to page/region styling - interacting with <style scoped> once this gets specified. -
-
-
-
-

People and responsibilities

-

- Below is a list of people you should reach out to if you have any - questions related to this document or testing CSS Regions in general: -

    -
  • Alan Stearns – editor and test coordinator for CSS Regions spec
  • -
  • Rebecca Hauck – CSSWG testing owner
  • -
-

-
-
-

Test progress tracking

-

- Currently test progress tracking is done via gitHub - milestones - and issues. -

-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-001-ref.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-001-ref.html deleted file mode 100644 index d5373898308..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-001-ref.html +++ /dev/null @@ -1,19 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

The test passes if you see a green square and no red.

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-008-ref.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-008-ref.html deleted file mode 100644 index c11a78aa3b5..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-008-ref.html +++ /dev/null @@ -1,37 +0,0 @@ - - - - CSS Reftest Reference - - - - - - -

The test passes if:

-
    -
  • The two squares each contain five green horizontal stripes
  • -
  • There are two green horizontal stripes below the square on right
  • -
  • There is no red
  • -
-
- XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX -
-
- XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX -
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-010-ref.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-010-ref.html deleted file mode 100644 index c0945e56342..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-010-ref.html +++ /dev/null @@ -1,21 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

The test passes if you see a green square and no red.

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-013-alt-ref.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-013-alt-ref.html deleted file mode 100644 index d5bb4cfbcdf..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-013-alt-ref.html +++ /dev/null @@ -1,21 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

The test passes if you see either two green squares or one vertical green rectangle. There should be no red.

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-013-ref.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-013-ref.html deleted file mode 100644 index e16c0abd0eb..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-013-ref.html +++ /dev/null @@ -1,22 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

The test passes if you see either two green squares or one vertical green rectangle. There should be no red.

-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-014-ref.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-014-ref.html deleted file mode 100644 index 887362633cd..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-014-ref.html +++ /dev/null @@ -1,22 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

The test passes if you see a green square and no red.

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-016-ref.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-016-ref.html deleted file mode 100644 index c445b93d125..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-016-ref.html +++ /dev/null @@ -1,21 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

The test passes if you see a green trapezoid and no red.

-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-017-ref.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-017-ref.html deleted file mode 100644 index 8928057ebf6..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-017-ref.html +++ /dev/null @@ -1,25 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

The test passes if you see a green square and a blue square below it, and no red.

-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-018-ref.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-018-ref.html deleted file mode 100644 index 96004c186ca..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-018-ref.html +++ /dev/null @@ -1,31 +0,0 @@ - - - - CSS Reftest Reference - - - - - - -

The test passes if you see a green cross and no red.

-
-
- XXXXXXXXX -
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-019-ref.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-019-ref.html deleted file mode 100644 index 2de61e6570b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-019-ref.html +++ /dev/null @@ -1,56 +0,0 @@ - - - - CSS Reftest Reference - - - - - - -

Test passes if you see a green trapezoid and no red.

-
-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-020-ref.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-020-ref.html deleted file mode 100644 index bfc3c79eb80..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/reference/regions-transforms-020-ref.html +++ /dev/null @@ -1,22 +0,0 @@ - - - - CSS Reftest Reference - - - - - -

The test passes if you see two green squares and no red.

-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-001.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-001.html deleted file mode 100644 index dc35614862f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-001.html +++ /dev/null @@ -1,35 +0,0 @@ - - - - - CSS Regions: Transformed named flow (non-text) content - - - - - - - - - - - -

The test passes if you see a green square and no red.

-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-002.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-002.html deleted file mode 100644 index 3dca430d66e..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-002.html +++ /dev/null @@ -1,44 +0,0 @@ - - - - - CSS Regions: Transformed named flow content element that has a child - - - - - - - - - - - -

The test passes if you see a green square and no red.

-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-003.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-003.html deleted file mode 100644 index 87ec4d31e62..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-003.html +++ /dev/null @@ -1,44 +0,0 @@ - - - - - CSS Regions: Named flow content that has a transformed parent outside of the named flow - - - - - - - - - - - -

The test passes if you see a green square and no red.

-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-004.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-004.html deleted file mode 100644 index 3cf43cb5457..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-004.html +++ /dev/null @@ -1,63 +0,0 @@ - - - - - CSS Regions: Transformed region using a 3D transform - - - - - - - - - - -

The test passes if you see a green square and no red.

- -
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-005.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-005.html deleted file mode 100644 index 8a0ff4d1e21..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-005.html +++ /dev/null @@ -1,65 +0,0 @@ - - - - CSS Regions: perspective set on the named flow content's parent does not apply when content flows into region - - - - - - - - - - - - - - -

The test passes if you see a green square and no red.

-
-
-
- XXXXX
- XXXXX
- XXXXX
- XXXXX
- XXXXX
-
-
- -
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-006.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-006.html deleted file mode 100644 index d451ed2c067..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-006.html +++ /dev/null @@ -1,54 +0,0 @@ - - - - CSS Regions: 3D transform on region with named flow (text) content that overflows - - - - - - - - - - - - - -

The test passes if you see a green square and no red.

-
-
XXXXX
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-007.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-007.html deleted file mode 100644 index dddc7b5b367..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-007.html +++ /dev/null @@ -1,52 +0,0 @@ - - - - CSS Regions: Transforms on both the named flow content and the region - - - - - - - - - - - - -

The test passes if you see a green square and no red.

-
XXXXX
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-008.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-008.html deleted file mode 100644 index 70964f3e877..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-008.html +++ /dev/null @@ -1,76 +0,0 @@ - - - - - CSS Regions: Transformed named flow (text) content that breaks across multiple regions and overflows - - - - - - - - - - - - - - -

The test passes if:

-
    -
  • The two squares each contain five green horizontal stripes
  • -
  • There are two green horizontal stripes below the square on right
  • -
  • There is no red
  • -
-
XXXXXXXXXXX XXXXXXXXXXX XXXXXXXXXXX XXXXXXXXXXX XXXXXXXXXXX XXXXXXXXXXX XXXXXXXXXXX XXXXXXXXXXX XXXXXXXXXXX XXXXXXXXXXX XXXXXXXXXXX XXXXXXXXXXX
-
-
- -
- XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX -
-
- XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX -
- - - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-009.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-009.html deleted file mode 100644 index 7a26bdf512b..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-009.html +++ /dev/null @@ -1,76 +0,0 @@ - - - - - CSS Regions: Transformed region with named flow (text) content that breaks across multiple regions and overflows - - - - - - - - - - - - - - -

The test passes if:

-
    -
  • The two squares each contain five green horizontal stripes
  • -
  • There are two green horizontal stripes below the square on right
  • -
  • There is no red
  • -
-
XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX
-
-
-
- XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX -
-
- XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX -
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-010.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-010.html deleted file mode 100644 index 3803890c9c0..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-010.html +++ /dev/null @@ -1,45 +0,0 @@ - - - - - CSS Regions: Transformed region with position: relative - - - - - - - - - - - -

The test passes if you see a green square and no red.

-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-011.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-011.html deleted file mode 100644 index 7272c1c34fc..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-011.html +++ /dev/null @@ -1,54 +0,0 @@ - - - - - CSS Regions: Transformed region where parent and child are separate named flow content nodes - - - - - - - - - - - -

The test passes if you see a green square and no red.

-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-012.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-012.html deleted file mode 100644 index 972894daacd..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-012.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - CSS Regions: Transformed named flow content flowing into transformed region - - - - - - - - - - -

The test passes if you see a green square and no red.

-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-013.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-013.html deleted file mode 100644 index c03496e4050..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-013.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - - CSS Regions: Transformed named flow (monolithic) content that breaks across multiple regions - - - - - - - - - - - - - - - - - -

The test passes if you see either two green squares or one vertical green rectangle. There should be no red.

-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-014.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-014.html deleted file mode 100644 index 38b65c10f1d..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-014.html +++ /dev/null @@ -1,40 +0,0 @@ - - - - - CSS Regions: Transform region with position:absolute and transform-origin - - - - - - - - - - - -

The test passes if you see a green square and no red.

-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-015.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-015.html deleted file mode 100644 index 3362c46d820..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-015.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - CSS Regions: Transformed named flow (non-text) content with transform-origin and position: absolute - - - - - - - - - -

The test passes if you see a green square and no red.

-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-016.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-016.html deleted file mode 100644 index ba0628e931f..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-016.html +++ /dev/null @@ -1,69 +0,0 @@ - - - - - - CSS Regions: 3D transform on named flow content with perspective() - - - - - - - - - - -

The test passes if you see a green trapezoid and no red.

- -
-
-
-
-
-
-
-
- - - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-017.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-017.html deleted file mode 100644 index 7a3f69f7af4..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-017.html +++ /dev/null @@ -1,58 +0,0 @@ - - - - - CSS Regions: Multiple transformed named flow content nodes that overflow a region - - - - - - - - - - -

The test passes if you see a green square and a blue square below it, and no red.

-
-
-
-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-018.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-018.html deleted file mode 100644 index b267886a405..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-018.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - CSS Regions: 3D transform on named flow (text) content that overflows a region - - - - - - - - - - - - - -

The test passes if you see a green cross and no red.

-
- XXXXXXXXX -
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-019.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-019.html deleted file mode 100644 index 7114a97e3dd..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-019.html +++ /dev/null @@ -1,62 +0,0 @@ - - - - CSS Regions: 3D transform on named flow (text) content with perspective property set on region - - - - - - - - - - - - - - -

Test passes if you see a green trapezoid and no red.

-
-
- xxxxx
- xxxxx
- xxxxx
- xxxxx
- xxxxx
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-020.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-020.html deleted file mode 100644 index e2e7d7d09bc..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-020.html +++ /dev/null @@ -1,62 +0,0 @@ - - - - - CSS Regions: Transformed region with named flow (fragmentable) content that breaks across multiple regions - - - - - - - - - - - - - -

The test passes if you see two green squares and no red.

-
-
-
-
-
-
-
-
- - - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-021.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-021.html deleted file mode 100644 index 0c5ceddc462..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-021.html +++ /dev/null @@ -1,54 +0,0 @@ - - - - - CSS Regions: Transforms on multiple named flow (non-text) content nodes that break across multiple regions - - - - - - - - - - - - -

The test passes if you see two green squares and no red.

-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-022.html b/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-022.html deleted file mode 100644 index 8dbaf902eb9..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/transforms/regions-transforms-022.html +++ /dev/null @@ -1,85 +0,0 @@ - - - - - CSS Regions: Transforms on multiple named flow (text) content nodes that break across multiple regions - - - - - - - - - - - - - - -

The test passes if you see two green squares and no red.

-
XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX
-
XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX
-
-
-
- XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX XXXXXXXXXX -
-
-
-
-
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/variable-width-001-ref.xht b/tests/wpt/web-platform-tests/css/css-regions/variable-width-001-ref.xht deleted file mode 100644 index 05522170e61..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/variable-width-001-ref.xht +++ /dev/null @@ -1,26 +0,0 @@ - - - - CSS Test: Variable-width Regions - - - - -

Test passes if there is no red.

-
-
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/variable-width-001.xht b/tests/wpt/web-platform-tests/css/css-regions/variable-width-001.xht deleted file mode 100644 index 1049b421c11..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/variable-width-001.xht +++ /dev/null @@ -1,66 +0,0 @@ - - - - CSS Test: Variable-width Regions - - - - - - - - - - -

Test passes if there is no red.

-
-
-
-
-
-
-
-
-
-
-
-
-
FAIL
-
-
-
FAIL
-
-
-
FAIL
-
- - \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/css/css-regions/writing-modes/extract-ordered-list-direction-and-writing-modes.html b/tests/wpt/web-platform-tests/css/css-regions/writing-modes/extract-ordered-list-direction-and-writing-modes.html deleted file mode 100644 index 8bbdb97de05..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/writing-modes/extract-ordered-list-direction-and-writing-modes.html +++ /dev/null @@ -1,86 +0,0 @@ - - - - CSS Test: flow-into on list items that use different text directions or writing modes - - - - - - - - - - - - -

Test pases if you see three rectangles with black borders containing a numbered list as described below. Each of the lists has a total of six items, three being in a nested list after the second item.

-

The first rectangle should display the numbered list on a light gray background. The list items should be right-aligned, with the numbers on the right side of the list item text. Also, the list item numbering should have a period prepended to the actual number (e.g. .1) instead of appended to the actual number (e.g. 1.).

-

The second rectangle should display the numbered list on a light blue background. The text should be rotated 90 degrees clockwise with the list items progressing right to left (or top-to-bottom relative to the rotated list) – this means the right-most list item should have the number 1.

-

The third rectangle should display the numbered list on a light green background. The text should be rotated 90 degrees clockwise, with the list items progressing left to right (or bottom-to-top relative to the rotated list) – this means the right-most list item should have the number 3.

-
    -
  1. Top-level list, item 1
  2. -
  3. Top-level list, item 2 -
      -
    1. First inner list, item 1
    2. -
    3. First inner list, item 2
    4. -
    5. First inner list, item 3
    6. -
    -
  4. -
  5. Top-level list, item 3
  6. -
-
    -
  1. Top-level list, item 1
  2. -
  3. Top-level list, item 2 -
      -
    1. First inner list, item 1
    2. -
    3. First inner list, item 2
    4. -
    5. First inner list, item 3
    6. -
    -
  4. -
  5. Top-level list, item 3
  6. -
-
    -
  1. Top-level list, item 1
  2. -
  3. Top-level list, item 2 -
      -
    1. First inner list, item 1
    2. -
    3. First inner list, item 2
    4. -
    5. First inner list, item 3
    6. -
    -
  4. -
  5. Top-level list, item 3
  6. -
-
-
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-regions/writing-modes/reference/extract-ordered-list-direction-and-writing-modes-ref.html b/tests/wpt/web-platform-tests/css/css-regions/writing-modes/reference/extract-ordered-list-direction-and-writing-modes-ref.html deleted file mode 100644 index e713238bfec..00000000000 --- a/tests/wpt/web-platform-tests/css/css-regions/writing-modes/reference/extract-ordered-list-direction-and-writing-modes-ref.html +++ /dev/null @@ -1,76 +0,0 @@ - - - - CSS Reftest Reference - - - - -

Test pases if you see three rectangles with black borders containing a numbered list as described below. Each of the lists has a total of six items, three being in a nested list after the second item.

-

The first rectangle should display the numbered list on a light gray background. The list items should be right-aligned, with the numbers on the right side of the list item text. Also, the list item numbering should have a period prepended to the actual number (e.g. .1) instead of appended to the actual number (e.g. 1.).

-

The second rectangle should display the numbered list on a light blue background. The text should be rotated 90 degrees clockwise with the list items progressing right to left (or top-to-bottom relative to the rotated list) – this means the right-most list item should have the number 1.

-

The third rectangle should display the numbered list on a light green background. The text should be rotated 90 degrees clockwise, with the list items progressing left to right (or bottom-to-top relative to the rotated list) – this means the right-most list item should have the number 3.

-
-
    -
  1. Top-level list, item 1
  2. -
  3. Top-level list, item 2 -
      -
    1. First inner list, item 1
    2. -
    3. First inner list, item 2
    4. -
    5. First inner list, item 3
    6. -
    -
  4. -
  5. Top-level list, item 3
  6. -
-
-
-
    -
  1. Top-level list, item 1
  2. -
  3. Top-level list, item 2 -
      -
    1. First inner list, item 1
    2. -
    3. First inner list, item 2
    4. -
    5. First inner list, item 3
    6. -
    -
  4. -
  5. Top-level list, item 3
  6. -
-
-
-
    -
  1. Top-level list, item 1
  2. -
  3. Top-level list, item 2 -
      -
    1. First inner list, item 1
    2. -
    3. First inner list, item 2
    4. -
    5. First inner list, item 3
    6. -
    -
  4. -
  5. Top-level list, item 3
  6. -
-
- - diff --git a/tests/wpt/web-platform-tests/css/css-syntax/escaped-eof.html b/tests/wpt/web-platform-tests/css/css-syntax/escaped-eof.html index 5d47c34ac51..b4450ea730f 100644 --- a/tests/wpt/web-platform-tests/css/css-syntax/escaped-eof.html +++ b/tests/wpt/web-platform-tests/css/css-syntax/escaped-eof.html @@ -15,7 +15,7 @@ diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-objects/parseAll-invalid.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-objects/parseAll-invalid.html index c1809543559..45fad409bbf 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-objects/parseAll-invalid.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-objects/parseAll-invalid.html @@ -11,23 +11,23 @@ 'use strict'; test(() => { - assert_throws(new TypeError(), () => CSSStyleValue.parseAll('', 'auto')); + assert_throws_js(TypeError, () => CSSStyleValue.parseAll('', 'auto')); }, 'CSSStyleValue.parseAll() with empty property name throws TypeError'); test(() => { - assert_throws(new TypeError(), () => CSSStyleValue.parseAll('lemon', 'auto')); + assert_throws_js(TypeError, () => CSSStyleValue.parseAll('lemon', 'auto')); }, 'CSSStyleValue.parseAll() with unsupported property name throws TypeError'); test(() => { - assert_throws(new TypeError(), () => CSSStyleValue.parseAll('width', '10deg')); + assert_throws_js(TypeError, () => CSSStyleValue.parseAll('width', '10deg')); }, 'CSSStyleValue.parseAll() with invalid value for valid property throws TypeError'); test(() => { - assert_throws(new TypeError(), () => CSSStyleValue.parseAll('margin', '10deg')); + assert_throws_js(TypeError, () => CSSStyleValue.parseAll('margin', '10deg')); }, 'CSSStyleValue.parseAll() with invalid value for shorthand property throws TypeError'); test(() => { - assert_throws(new TypeError(), () => CSSStyleValue.parseAll('--foo', '')); + assert_throws_js(TypeError, () => CSSStyleValue.parseAll('--foo', '')); }, 'CSSStyleValue.parseAll() with invalid value for custom property throws TypeError'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssKeywordValue-invalid.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssKeywordValue-invalid.html index b923f380bda..69007a1c590 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssKeywordValue-invalid.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssKeywordValue-invalid.html @@ -11,7 +11,7 @@ 'use strict'; test(() => { - assert_throws(new TypeError(), () => new CSSKeywordValue('')); + assert_throws_js(TypeError, () => new CSSKeywordValue('')); }, 'Constructing CSSKeywordValue with an empty string throws a TypeError'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssKeywordValue-value.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssKeywordValue-value.html index 1af557fb086..ceb39bce5d2 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssKeywordValue-value.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssKeywordValue-value.html @@ -27,7 +27,7 @@ for (const args of gTestArguments) { test(() => { let result = new CSSKeywordValue('lemon'); - assert_throws(new TypeError(), () => result.value = ''); + assert_throws_js(TypeError, () => result.value = ''); assert_equals(result.value, 'lemon', 'value does not change'); }, 'Updating CSSKeywordValue.value with an empty string throws a TypeError'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssPerspective.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssPerspective.tentative.html index 4fbd7ca0ae4..5edf5bb5b01 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssPerspective.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssPerspective.tentative.html @@ -20,14 +20,14 @@ const gInvalidTestCases = [ for (const {length, desc} of gInvalidTestCases) { test(() => { - assert_throws(new TypeError(), () => new CSSPerspective(length)); + assert_throws_js(TypeError, () => new CSSPerspective(length)); }, 'Constructing a CSSPerspective with ' + desc + ' throws a TypeError'); } for (const {length, desc} of gInvalidTestCases) { test(() => { let perspective = new CSSPerspective(CSS.px(0)); - assert_throws(new TypeError(), () => perspective.length = length); + assert_throws_js(TypeError, () => perspective.length = length); assert_style_value_equals(perspective.length, CSS.px(0)); }, 'Updating CSSPerspective.length with ' + desc + ' throws a TypeError'); } diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssPositionValue-invalid.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssPositionValue-invalid.html index d63c0c78694..9ff9f014e19 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssPositionValue-invalid.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssPositionValue-invalid.html @@ -43,13 +43,13 @@ const gTestArguments = [ for (const {value, description} of gTestArguments) { test(() => { - assert_throws(new TypeError(), () => new CSSPositionValue(value, CSS.px(0))); - assert_throws(new TypeError(), () => new CSSPositionValue(CSS.px(0), value)); + assert_throws_js(TypeError, () => new CSSPositionValue(value, CSS.px(0))); + assert_throws_js(TypeError, () => new CSSPositionValue(CSS.px(0), value)); }, `Constructing a CSSPositionValue with ${description} throws a TypeError`); test(() => { let position = new CSSPositionValue(CSS.px(0), CSS.px(0)); - assert_throws(new TypeError(), () => position.x = value); + assert_throws_js(TypeError, () => position.x = value); assert_equals(position.x.value, 0, 'X member should not have changed'); @@ -57,7 +57,7 @@ for (const {value, description} of gTestArguments) { test(() => { let position = new CSSPositionValue(CSS.px(0), CSS.px(0)); - assert_throws(new TypeError(), () => position.y = value); + assert_throws_js(TypeError, () => position.y = value); assert_equals(position.y.value, 0, 'Y member should not have changed'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssRotate.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssRotate.tentative.html index 17490dcea90..6c234bc4724 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssRotate.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssRotate.tentative.html @@ -20,16 +20,16 @@ const gInvalidCoordTestCases = [ for (const {angle, desc} of gInvalidAngleTestCases) { test(() => { - assert_throws(new TypeError(), () => new CSSRotate(angle)); - assert_throws(new TypeError(), () => new CSSRotate(0, 0, 0, angle)); + assert_throws_js(TypeError, () => new CSSRotate(angle)); + assert_throws_js(TypeError, () => new CSSRotate(0, 0, 0, angle)); }, 'Constructing a CSSRotate with ' + desc + ' for the angle throws a TypeError'); } for (const {coord, desc} of gInvalidCoordTestCases) { test(() => { - assert_throws(new TypeError(), () => new CSSRotate(coord, 0, 0, CSS.deg(0))); - assert_throws(new TypeError(), () => new CSSRotate(0, coord, 0, CSS.deg(0))); - assert_throws(new TypeError(), () => new CSSRotate(0, 0, coord, CSS.deg(0))); + assert_throws_js(TypeError, () => new CSSRotate(coord, 0, 0, CSS.deg(0))); + assert_throws_js(TypeError, () => new CSSRotate(0, coord, 0, CSS.deg(0))); + assert_throws_js(TypeError, () => new CSSRotate(0, 0, coord, CSS.deg(0))); }, 'Constructing a CSSRotate with ' + desc + ' for the coordinates throws a TypeError'); } @@ -37,7 +37,7 @@ for (const attr of ['x', 'y', 'z']) { for (const {value, desc} of gInvalidCoordTestCases) { test(() => { let result = new CSSRotate(0, 0, 0, CSS.deg(0)); - assert_throws(new TypeError(), () => result[attr] = value); + assert_throws_js(TypeError, () => result[attr] = value); assert_style_value_equals(result[attr], CSS.number(0)); }, 'Updating CSSRotate.' + attr + ' to ' + desc + ' throws a TypeError'); } @@ -46,7 +46,7 @@ for (const attr of ['x', 'y', 'z']) { for (const {angle, desc} of gInvalidAngleTestCases) { test(() => { let result = new CSSRotate(CSS.deg(0)); - assert_throws(new TypeError(), () => result.angle = angle); + assert_throws_js(TypeError, () => result.angle = angle); assert_style_value_equals(result.angle, CSS.deg(0)); }, 'Updating CSSRotate.angle to ' + desc + ' throws a TypeError'); } diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssScale.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssScale.tentative.html index d52a8f1a226..9bbe6c92f11 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssScale.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssScale.tentative.html @@ -15,11 +15,11 @@ const gInvalidCoordTestCases = [ for (const {coord, desc} of gInvalidCoordTestCases) { test(() => { - assert_throws(new TypeError(), () => new CSSScale(coord, 0)); - assert_throws(new TypeError(), () => new CSSScale(0, coord)); - assert_throws(new TypeError(), () => new CSSScale(coord, 0, 0)); - assert_throws(new TypeError(), () => new CSSScale(0, coord, 0)); - assert_throws(new TypeError(), () => new CSSScale(0, 0, coord)); + assert_throws_js(TypeError, () => new CSSScale(coord, 0)); + assert_throws_js(TypeError, () => new CSSScale(0, coord)); + assert_throws_js(TypeError, () => new CSSScale(coord, 0, 0)); + assert_throws_js(TypeError, () => new CSSScale(0, coord, 0)); + assert_throws_js(TypeError, () => new CSSScale(0, 0, coord)); }, 'Constructing a CSSScale with ' + desc + ' for the coordinates throws a TypeError'); } @@ -27,7 +27,7 @@ for (const attr of ['x', 'y', 'z']) { for (const {value, desc} of gInvalidCoordTestCases) { test(() => { let result = new CSSScale(0, 0, 0); - assert_throws(new TypeError(), () => result[attr] = value); + assert_throws_js(TypeError, () => result[attr] = value); assert_style_value_equals(result[attr], CSS.number(0)); }, 'Updating CSSScale.' + attr + ' to ' + desc + ' throws a TypeError'); } diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssSkew.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssSkew.tentative.html index 2b22d9bcd21..0a410859b22 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssSkew.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssSkew.tentative.html @@ -20,8 +20,8 @@ const gInvalidTestCases = [ for (const {value, desc} of gInvalidTestCases) { test(() => { - assert_throws(new TypeError(), () => new CSSSkew(value, CSS.deg(0))); - assert_throws(new TypeError(), () => new CSSSkew(CSS.deg(0), value)); + assert_throws_js(TypeError, () => new CSSSkew(value, CSS.deg(0))); + assert_throws_js(TypeError, () => new CSSSkew(CSS.deg(0), value)); }, 'Constructing a CSSSkew with ' + desc + ' throws a TypeError'); } @@ -29,7 +29,7 @@ for (const attr of ['ax', 'ay']) { for (const {value, desc} of gInvalidTestCases) { test(() => { let skew = new CSSSkew(CSS.deg(0), CSS.deg(0)); - assert_throws(new TypeError(), () => skew[attr] = value); + assert_throws_js(TypeError, () => skew[attr] = value); assert_style_value_equals(skew[attr], CSS.deg(0)); }, 'Updating CSSSkew.' + attr + ' with ' + desc + ' throws a TypeError'); } diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssSkewX.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssSkewX.tentative.html index 1e614146563..59d7c064edd 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssSkewX.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssSkewX.tentative.html @@ -20,14 +20,14 @@ const gInvalidTestCases = [ for (const {value, desc} of gInvalidTestCases) { test(() => { - assert_throws(new TypeError(), () => new CSSSkewX(value)); + assert_throws_js(TypeError, () => new CSSSkewX(value)); }, 'Constructing a CSSSkewX with ' + desc + ' throws a TypeError'); } for (const {value, desc} of gInvalidTestCases) { test(() => { let skewX = new CSSSkewX(CSS.deg(0)); - assert_throws(new TypeError(), () => skewX.ax = value); + assert_throws_js(TypeError, () => skewX.ax = value); assert_style_value_equals(skewX.ax, CSS.deg(0)); }, 'Updating CSSSkewX.ax with ' + desc + ' throws a TypeError'); } diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssSkewY.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssSkewY.tentative.html index 643d2f686bb..6a6fe55a976 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssSkewY.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssSkewY.tentative.html @@ -20,14 +20,14 @@ const gInvalidTestCases = [ for (const {value, desc} of gInvalidTestCases) { test(() => { - assert_throws(new TypeError(), () => new CSSSkewY(value)); + assert_throws_js(TypeError, () => new CSSSkewY(value)); }, 'Constructing a CSSSkewY with ' + desc + ' throws a TypeError'); } for (const {value, desc} of gInvalidTestCases) { test(() => { let skewY = new CSSSkewY(CSS.deg(0)); - assert_throws(new TypeError(), () => skewY.ay = value); + assert_throws_js(TypeError, () => skewY.ay = value); assert_style_value_equals(skewY.ay, CSS.deg(0)); }, 'Updating CSSSkewY.ay with ' + desc + ' throws a TypeError'); } diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssTransformComponent-toMatrix-relative-units.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssTransformComponent-toMatrix-relative-units.html index 67b63a6b666..432943b6da0 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssTransformComponent-toMatrix-relative-units.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssTransformComponent-toMatrix-relative-units.html @@ -10,7 +10,7 @@ 'use strict'; test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { return new CSSTranslate( new CSSUnitValue(1, 'px'), new CSSUnitValue(1, 'em') @@ -19,7 +19,7 @@ test(() => { }, 'CSSTranslate.toMatrix() containing relative units throws TypeError'); test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { return new CSSPerspective(new CSSUnitValue(1, 'em')).toMatrix(); }); }, 'CSSPerspective.toMatrix() containing relative units throws TypeError'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssTransformValue.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssTransformValue.tentative.html index 47dc05dbec6..4c1a4861fe8 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssTransformValue.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssTransformValue.tentative.html @@ -10,8 +10,8 @@ 'use strict'; test(() => { - assert_throws(new TypeError(), () => new CSSTransformValue()); - assert_throws(new TypeError(), () => new CSSTransformValue([])); + assert_throws_js(TypeError, () => new CSSTransformValue()); + assert_throws_js(TypeError, () => new CSSTransformValue([])); }, 'Constructing a CSSTransformValue with no components throws TypeError'); test(() => { @@ -78,7 +78,7 @@ test(() => { test(() => { let transform = new CSSTransformValue([new CSSScale(1, 2)]); - assert_throws(new TypeError(), () => transform.is2D = false); + assert_throws_js(TypeError, () => transform.is2D = false); assert_equals(transform.is2D, true); }, 'CSSTransformValue.is2D is readonly'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssTranslate.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssTranslate.tentative.html index 7ce281d43b6..0554351db3b 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssTranslate.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssTranslate.tentative.html @@ -15,21 +15,21 @@ const gInvalidCoordTestCases = [ for (const {coord, desc} of gInvalidCoordTestCases) { test(() => { - assert_throws(new TypeError(), () => new CSSTranslate(coord, CSS.px(0), CSS.px(0))); - assert_throws(new TypeError(), () => new CSSTranslate(CSS.px(0), coord, CSS.px(0))); - assert_throws(new TypeError(), () => new CSSTranslate(CSS.px(0), CSS.px(0), coord)); + assert_throws_js(TypeError, () => new CSSTranslate(coord, CSS.px(0), CSS.px(0))); + assert_throws_js(TypeError, () => new CSSTranslate(CSS.px(0), coord, CSS.px(0))); + assert_throws_js(TypeError, () => new CSSTranslate(CSS.px(0), CSS.px(0), coord)); }, 'Constructing a CSSTranslate with ' + desc + ' for the coordinates throws a TypeError'); } test(() => { - assert_throws(new TypeError(), () => new CSSTranslate(CSS.px(0), CSS.px(0), CSS.percent(0))); + assert_throws_js(TypeError, () => new CSSTranslate(CSS.px(0), CSS.px(0), CSS.percent(0))); }, 'Constructing a CSSTranslate with a percent for the Z coordinate throws a TypeError'); for (const attr of ['x', 'y', 'z']) { for (const {value, desc} of gInvalidCoordTestCases) { test(() => { let result = new CSSTranslate(CSS.px(0), CSS.px(0), CSS.px(0)); - assert_throws(new TypeError(), () => result[attr] = value); + assert_throws_js(TypeError, () => result[attr] = value); assert_style_value_equals(result[attr], CSS.px(0)); }, 'Updating CSSTranslate.' + attr + ' to ' + desc + ' throws a TypeError'); } @@ -37,7 +37,7 @@ for (const attr of ['x', 'y', 'z']) { test(() => { let result = new CSSTranslate(CSS.px(0), CSS.px(0), CSS.px(0)); - assert_throws(new TypeError(), () => result.z = CSS.percent(0)); + assert_throws_js(TypeError, () => result.z = CSS.percent(0)); assert_style_value_equals(result.z, CSS.px(0)); }, 'Updating CSSTranslate.z to a percent throws a TypeError'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssUnparsedValue-indexed-getter-setter.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssUnparsedValue-indexed-getter-setter.html index 9f0403fbae4..65a65ac0dfe 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssUnparsedValue-indexed-getter-setter.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssUnparsedValue-indexed-getter-setter.html @@ -47,7 +47,7 @@ test(() => { test(() => { let result = new CSSUnparsedValue(['foo', 'bar']); - assert_throws(new RangeError(), () => result[3] = 'foo'); + assert_throws_js(RangeError, () => result[3] = 'foo'); assert_equals(result[3], undefined, 'fragment does not change'); }, 'Setting out of range index in CSSUnparsedValue throws RangeError'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssVariableReferenceValue-invalid.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssVariableReferenceValue-invalid.html index 3696e9997ed..4da6a322bd6 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssVariableReferenceValue-invalid.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssVariableReferenceValue-invalid.html @@ -11,12 +11,12 @@ 'use strict'; test(() => { - assert_throws(new TypeError(), () => new CSSVariableReferenceValue('')); + assert_throws_js(TypeError, () => new CSSVariableReferenceValue('')); }, 'Constructing a CSSVariableReferenceValue with an empty variable name ' + 'throws a TypeError'); test(() => { - assert_throws(new TypeError(), () => new CSSVariableReferenceValue('bar')); + assert_throws_js(TypeError, () => new CSSVariableReferenceValue('bar')); }, 'Constructing a CSSVariableReferenceValue with an invalid variable name ' + 'throws SyntaxError'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssVariableReferenceValue-variable.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssVariableReferenceValue-variable.html index 236758bf1f2..51b60a8df55 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssVariableReferenceValue-variable.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/cssVariableReferenceValue-variable.html @@ -18,14 +18,14 @@ test(() => { test(() => { let result = new CSSVariableReferenceValue('--foo'); - assert_throws(new TypeError(), () => result.variable = ''); + assert_throws_js(TypeError, () => result.variable = ''); assert_equals(result.variable, '--foo', 'variable does not change'); }, 'Updating CSSVariableReferenceValue.variable to the empty string ' + 'throws TypeError'); test(() => { let result = new CSSVariableReferenceValue('--foo'); - assert_throws(new TypeError(), () => result.variable = 'bar'); + assert_throws_js(TypeError, () => result.variable = 'bar'); assert_equals(result.variable, '--foo', 'variable does not change'); }, 'Updating CSSVariableReferenceValue.variable to an invalid custom ' + 'property name throws TypeError'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/add-two-types.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/add-two-types.tentative.html index 313ff5acfdb..3571d542f8c 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/add-two-types.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/add-two-types.tentative.html @@ -13,7 +13,7 @@ test(() => { const a = new CSSUnitValue(0, 'number'); const b = new CSSUnitValue(0, 'px'); - assert_throws(new TypeError(), () => new CSSMathSum(a, b)); + assert_throws_js(TypeError, () => new CSSMathSum(a, b)); }, 'Adding two types with different non-null percent hints throws TypeError'); test(() => { @@ -40,7 +40,7 @@ test(() => { test(() => { const a = new CSSMathProduct(new CSSUnitValue(0, 'px'), new CSSUnitValue(0, 'px')); const b = new CSSUnitValue(0, 'percent'); - assert_throws(new TypeError(), () => new CSSMathSum(a, b)); + assert_throws_js(TypeError, () => new CSSMathSum(a, b)); }, 'Adding a type with percent 2 returns type with percent hint throws TypeError'); test(() => { diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/arithmetic.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/arithmetic.tentative.html index d58bb075ce2..cb9a7a71027 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/arithmetic.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/arithmetic.tentative.html @@ -62,7 +62,7 @@ for (const {methodName, mathType} of gArithmeticOps) { }, 'Calling ' + mathType.name + '.' + methodName + ' with number CSSUnitValues simplifies to a CSSUnitValue'); test(() => { - assert_throws(new TypeError(), () => new CSS.px(0)[methodName](CSS.px(1), CSS.s(2))); + assert_throws_js(TypeError, () => new CSS.px(0)[methodName](CSS.px(1), CSS.s(2))); }, 'Calling CSSNumericValue.' + methodName + ' with incompatible types throws TypeError'); } @@ -145,9 +145,9 @@ test(() => { }, 'Calling CSSNumericValue.div inverts all argument values'); test(() => { - assert_throws(new RangeError(), () => CSS.number(2).div(CSS.number(0))); - assert_throws(new RangeError(), () => CSS.number(3).div(CSS.px(10) ,CSS.number(0))); - assert_throws(new RangeError(), () => CSS.number(2).div(CSS.number(0), CSS.number(0))); + assert_throws_js(RangeError, () => CSS.number(2).div(CSS.number(0))); + assert_throws_js(RangeError, () => CSS.number(3).div(CSS.px(10) ,CSS.number(0))); + assert_throws_js(RangeError, () => CSS.number(2).div(CSS.number(0), CSS.number(0))); }, 'Can not divide with CSSUnitValue which has zero value and number type'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/cssMathValue.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/cssMathValue.tentative.html index 574043e84d8..2be200eea95 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/cssMathValue.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/cssMathValue.tentative.html @@ -17,7 +17,7 @@ const gVariadicMathValueSubclasses = [ for (const {subclass, operator} of gVariadicMathValueSubclasses) { test(() => { - assert_throws(new SyntaxError(), () => new subclass()); + assert_throws_dom("SyntaxError", () => new subclass()); }, 'Constructing a ' + subclass.name + ' with no arguments throws a SyntaxError'); test(() => { @@ -35,7 +35,7 @@ for (const {subclass, operator} of gVariadicMathValueSubclasses) { test(() => { let result = new subclass(CSS.number(1), CSS.number(2)); - assert_throws(new TypeError(), () => result.operator = 'foo'); + assert_throws_js(TypeError, () => result.operator = 'foo'); }, subclass.name + '.operator is readonly'); } @@ -57,7 +57,7 @@ for (const {subclass, operator} of gUnaryMathValueSubclasses) { test(() => { let result = new subclass(CSS.number(1)); - assert_throws(new TypeError(), () => result.operator = 'foo'); + assert_throws_js(TypeError, () => result.operator = 'foo'); }, subclass.name + '.operator is readonly'); } diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/cssUnitValue.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/cssUnitValue.html index 411b36fe1ed..b44c67129fc 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/cssUnitValue.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/cssUnitValue.html @@ -11,11 +11,11 @@ 'use strict'; test(() => { - assert_throws(new TypeError(), () => new CSSUnitValue(0, 'lemon')); + assert_throws_js(TypeError, () => new CSSUnitValue(0, 'lemon')); }, 'Constructing CSSUnitValue with an unknown unit throws a TypeError'); test(() => { - assert_throws(new TypeError(), () => new CSSUnitValue(0, '')); + assert_throws_js(TypeError, () => new CSSUnitValue(0, '')); }, 'Constructing CSSUnitValue with a empty string unit throws a TypeError'); for (const unit of gValidUnits) { diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/cssnumericvalue-multiply-two-types.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/cssnumericvalue-multiply-two-types.tentative.html index 38045ee0fe5..e09c57e641b 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/cssnumericvalue-multiply-two-types.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/cssnumericvalue-multiply-two-types.tentative.html @@ -13,7 +13,7 @@ test(() => { const a = new CSSMathSum(new CSSUnitValue(0, 'px'), new CSSUnitValue(0, 'percent')); const b = new CSSMathSum(new CSSUnitValue(0, 's'), new CSSUnitValue(0, 'percent')); - assert_throws(new TypeError(), () => new CSSMathProduct(a, b)); + assert_throws_js(TypeError, () => new CSSMathProduct(a, b)); }, 'Multiplying two types with different non-null percent hints throws TypeError'); test(() => { diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/parse.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/parse.tentative.html index c4904ded6b6..9b9f2f601ae 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/parse.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/parse.tentative.html @@ -8,19 +8,19 @@ 'use strict'; test(() => { - assert_throws(new SyntaxError(), () => CSSNumericValue.parse('%#(')); + assert_throws_dom("SyntaxError", () => CSSNumericValue.parse('%#(')); }, 'Parsing an invalid string throws SyntaxError'); test(() => { - assert_throws(new SyntaxError(), () => CSSNumericValue.parse('auto')); + assert_throws_dom("SyntaxError", () => CSSNumericValue.parse('auto')); }, 'Parsing a string with a non numeric token throws SyntaxError'); test(() => { - assert_throws(new SyntaxError(), () => CSSNumericValue.parse('1 2')); + assert_throws_dom("SyntaxError", () => CSSNumericValue.parse('1 2')); }, 'Parsing a string with left over numeric tokens throws SyntaxError'); test(() => { - assert_throws(new SyntaxError(), () => CSSNumericValue.parse('calc(calc(1px * 2s) + 3%)')); + assert_throws_dom("SyntaxError", () => CSSNumericValue.parse('calc(calc(1px * 2s) + 3%)')); }, 'Parsing a calc with incompatible units throws a SyntaxError'); test(() => { diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/to.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/to.tentative.html index 57ac63118c4..bf78c509c8d 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/to.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/to.tentative.html @@ -8,19 +8,19 @@ 'use strict'; test(() => { - assert_throws(new SyntaxError(), () => CSS.px(1).to('lemon')); + assert_throws_dom("SyntaxError", () => CSS.px(1).to('lemon')); }, 'Converting a CSSUnitValue to an invalid unit throws SyntaxError'); test(() => { - assert_throws(new TypeError(), () => new CSSMathMax(1, CSS.px(1)).to('number')); + assert_throws_js(TypeError, () => new CSSMathMax(1, CSS.px(1)).to('number')); }, 'Converting a CSSNumericValue with invalid sum value throws TypeError'); test(() => { - assert_throws(new TypeError(), () => new CSSMathProduct(CSS.px(1), CSS.s(1)).to('number')); + assert_throws_js(TypeError, () => new CSSMathProduct(CSS.px(1), CSS.s(1)).to('number')); }, 'Converting a CSSNumericValue with sum value containing more than one value throws TypeError'); test(() => { - assert_throws(new TypeError(), () => CSS.px(1).to('number')); + assert_throws_js(TypeError, () => CSS.px(1).to('number')); }, 'Converting a CSSUnitValue to an incompatible unit throws TypeError'); test(() => { @@ -52,8 +52,8 @@ test(() => { }, 'Converting a CSSMathMin to a single unit finds the min value'); test(() => { - assert_throws(new TypeError(), () => new CSSMathMin(CSS.px(2), CSS.s(3)).to('px')); - assert_throws(new TypeError(), () => new CSSMathMin(CSS.px(2), 3).to('px')); + assert_throws_js(TypeError, () => new CSSMathMin(CSS.px(2), CSS.s(3)).to('px')); + assert_throws_js(TypeError, () => new CSSMathMin(CSS.px(2), 3).to('px')); }, 'Converting a CSSMathMin to a single unit with different units throws a TypeError'); test(() => { @@ -61,8 +61,8 @@ test(() => { }, 'Converting a CSSMathMax to a single unit finds the max value'); test(() => { - assert_throws(new TypeError(), () => new CSSMathMax(CSS.px(2), CSS.s(3)).to('px')); - assert_throws(new TypeError(), () => new CSSMathMax(CSS.px(2), 3).to('px')); + assert_throws_js(TypeError, () => new CSSMathMax(CSS.px(2), CSS.s(3)).to('px')); + assert_throws_js(TypeError, () => new CSSMathMax(CSS.px(2), 3).to('px')); }, 'Converting a CSSMathMax to a single unit with different units throws a TypeError'); test(() => { diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/toSum.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/toSum.tentative.html index 3d67f7d88bc..1e5e1c9b76a 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/toSum.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/stylevalue-subclasses/numeric-objects/toSum.tentative.html @@ -8,27 +8,27 @@ 'use strict'; test(() => { - assert_throws(new SyntaxError(), () => CSS.px(1).toSum('px', 'lemon')); + assert_throws_dom("SyntaxError", () => CSS.px(1).toSum('px', 'lemon')); }, 'Converting a CSSNumericValue to a sum with invalid units throws SyntaxError'); test(() => { - assert_throws(new TypeError(), () => new CSSMathMax(1, CSS.px(1)).toSum('number')); + assert_throws_js(TypeError, () => new CSSMathMax(1, CSS.px(1)).toSum('number')); }, 'Converting a CSSNumericValue with an invalid sum value to a sum throws TypeError'); test(() => { - assert_throws(new TypeError(), () => new CSSMathProduct(CSS.px(1), CSS.px(1)).to('px')); + assert_throws_js(TypeError, () => new CSSMathProduct(CSS.px(1), CSS.px(1)).to('px')); }, 'Converting a CSSNumericValue with compound units to a sum throws TypeError'); test(() => { - assert_throws(new TypeError(), () => CSS.px(1).toSum('number')); + assert_throws_js(TypeError, () => CSS.px(1).toSum('number')); }, 'Converting a CSSNumericValue to a sum with an incompatible unit throws TypeError'); test(() => { - assert_throws(new TypeError(), () => CSS.px(1).toSum('px', 's')); + assert_throws_js(TypeError, () => CSS.px(1).toSum('px', 's')); }, 'Converting a CSSNumericValue to a sum with units that are not addable throws TypeError'); test(() => { - assert_throws(new TypeError(), () => new CSSMathSum(CSS.px(1), CSS.em(1)).toSum('px')); + assert_throws_js(TypeError, () => new CSSMathSum(CSS.px(1), CSS.em(1)).toSum('px')); }, 'Converting a CSSNumericValue with leftover units to a sum throws TypeError'); test(() => { diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/computed/get-invalid.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/computed/get-invalid.html index 8117d18b764..403c2691f40 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/computed/get-invalid.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/computed/get-invalid.html @@ -12,7 +12,7 @@ test(t => { const styleMap = createComputedStyleMap(t); - assert_throws(new TypeError(), () => styleMap.get('lemon')); + assert_throws_js(TypeError, () => styleMap.get('lemon')); }, 'Calling StylePropertyMap.get with an unsupported property throws a TypeError'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/computed/getAll.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/computed/getAll.tentative.html index ca7d3b6a65f..1673a52bc0c 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/computed/getAll.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/computed/getAll.tentative.html @@ -11,7 +11,7 @@ test(t => { const styleMap = createComputedStyleMap(t); - assert_throws(new TypeError(), () => styleMap.getAll('lemon')); + assert_throws_js(TypeError, () => styleMap.getAll('lemon')); }, 'Calling StylePropertyMap.getAll with an unsupported property throws a TypeError'); test(t => { diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/computed/has.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/computed/has.tentative.html index d387304d43a..53924c4a483 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/computed/has.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/computed/has.tentative.html @@ -11,7 +11,7 @@ test(t => { const styleMap = createComputedStyleMap(t); - assert_throws(new TypeError(), () => styleMap.has('lemon')); + assert_throws_js(TypeError, () => styleMap.has('lemon')); }, 'Calling StylePropertyMap.has with an unsupported property throws a TypeError'); const gTestCases = [ diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/append.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/append.tentative.html index 3f94a899ea5..ced6e81aaad 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/append.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/append.tentative.html @@ -24,7 +24,7 @@ const gInvalidTestCases = [ for (const {property, values, desc} of gInvalidTestCases) { test(t => { let styleMap = createDeclaredStyleMap(t, ''); - assert_throws(new TypeError(), () => styleMap.append(property, ...values)); + assert_throws_js(TypeError, () => styleMap.append(property, ...values)); }, 'Calling StylePropertyMap.append with ' + desc + ' throws TypeError'); } diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/delete-invalid.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/delete-invalid.html index 547ea269762..04dcccf5e89 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/delete-invalid.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/delete-invalid.html @@ -12,7 +12,7 @@ test(t => { let styleMap = createDeclaredStyleMap(t, ''); - assert_throws(new TypeError(), () => styleMap.delete('lemon')); + assert_throws_js(TypeError, () => styleMap.delete('lemon')); }, 'Deleting an unsupported property name throws a TypeError'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/get-invalid.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/get-invalid.html index a91d1978130..0cd1412945b 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/get-invalid.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/get-invalid.html @@ -12,7 +12,7 @@ test(t => { const styleMap = createDeclaredStyleMap(t); - assert_throws(new TypeError(), () => styleMap.get('lemon')); + assert_throws_js(TypeError, () => styleMap.get('lemon')); }, 'Calling StylePropertyMap.get with an unsupported property throws a TypeError'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/getAll.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/getAll.tentative.html index dd4e90b22f4..97baf08a784 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/getAll.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/getAll.tentative.html @@ -11,7 +11,7 @@ test(t => { const styleMap = createDeclaredStyleMap(t); - assert_throws(new TypeError(), () => styleMap.getAll('lemon')); + assert_throws_js(TypeError, () => styleMap.getAll('lemon')); }, 'Calling StylePropertyMap.getAll with an unsupported property throws a TypeError'); test(t => { diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/has.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/has.tentative.html index 93d29d94c3f..6ea24c7ea9f 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/has.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/has.tentative.html @@ -11,7 +11,7 @@ test(t => { const styleMap = createDeclaredStyleMap(t); - assert_throws(new TypeError(), () => styleMap.has('lemon')); + assert_throws_js(TypeError, () => styleMap.has('lemon')); }, 'Calling StylePropertyMap.has with an unsupported property throws a TypeError'); const gTestCases = [ diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/set-shorthand.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/set-shorthand.html index 2d6ec13ffc2..7a025df6479 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/set-shorthand.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/set-shorthand.html @@ -17,7 +17,7 @@ const gInvalidTestCases = [ for (const {property, values, desc} of gInvalidTestCases) { test(t => { let styleMap = createInlineStyleMap(t, ''); - assert_throws(new TypeError(), () => styleMap.set(property, ...values)); + assert_throws_js(TypeError, () => styleMap.set(property, ...values)); }, 'Setting a shorthand with ' + desc + ' on css rule throws TypeError'); } diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/set.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/set.tentative.html index 6161f94d53c..d9c24fafc22 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/set.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/declared/set.tentative.html @@ -19,23 +19,23 @@ const gInvalidTestCases = [ for (const {property, values, desc} of gInvalidTestCases) { test(t => { let styleMap = createDeclaredStyleMap(t, ''); - assert_throws(new TypeError(), () => styleMap.set(property, ...values)); + assert_throws_js(TypeError, () => styleMap.set(property, ...values)); }, 'Setting a StylePropertyMap with ' + desc + ' throws TypeError'); } test(t => { let styleMap = createDeclaredStyleMap(t, ''); - assert_throws(new TypeError(), () => styleMap.set('width', CSS.px(10), CSS.px(10))); + assert_throws_js(TypeError, () => styleMap.set('width', CSS.px(10), CSS.px(10))); }, 'Setting a non list-valued property with multiple arguments throws TypeError'); test(t => { let styleMap = createDeclaredStyleMap(t, ''); - assert_throws(new TypeError(), () => styleMap.set('width', '1s, 2s')); + assert_throws_js(TypeError, () => styleMap.set('width', '1s, 2s')); }, 'Setting a non list-valued property with list-valued string throws TypeError'); test(t => { let styleMap = createDeclaredStyleMap(t, ''); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { styleMap.set('transition-duration', '1s', new CSSUnparsedValue([])); }); }, 'Setting a list-valued property with a CSSUnparsedValue and other ' + @@ -43,7 +43,7 @@ test(t => { test(t => { let styleMap = createDeclaredStyleMap(t, ''); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { styleMap.set('transition-duration', '1s', 'var(--A)'); }); }, 'Setting a list-valued property with a var ref() and other values ' + diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/append.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/append.tentative.html index 36c14d76b6e..ee9a9e4ddbc 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/append.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/append.tentative.html @@ -24,7 +24,7 @@ const gInvalidTestCases = [ for (const {property, values, desc} of gInvalidTestCases) { test(t => { let styleMap = createInlineStyleMap(t, ''); - assert_throws(new TypeError(), () => styleMap.append(property, ...values)); + assert_throws_js(TypeError, () => styleMap.append(property, ...values)); }, 'Calling StylePropertyMap.append with ' + desc + ' throws TypeError'); } diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/delete-invalid.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/delete-invalid.html index cc2657ecbdc..a4f1b620b03 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/delete-invalid.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/delete-invalid.html @@ -12,7 +12,7 @@ test(t => { let styleMap = createInlineStyleMap(t, ''); - assert_throws(new TypeError(), () => styleMap.delete('lemon')); + assert_throws_js(TypeError, () => styleMap.delete('lemon')); }, 'Deleting an unsupported property name throws a TypeError'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/get-invalid.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/get-invalid.html index b847567008c..07f4a6dc7c4 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/get-invalid.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/get-invalid.html @@ -12,7 +12,7 @@ test(t => { const styleMap = createInlineStyleMap(t); - assert_throws(new TypeError(), () => styleMap.get('lemon')); + assert_throws_js(TypeError, () => styleMap.get('lemon')); }, 'Calling StylePropertyMap.get with an unsupported property throws a TypeError'); diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/getAll.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/getAll.tentative.html index c7e370086db..935417ddcc0 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/getAll.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/getAll.tentative.html @@ -11,7 +11,7 @@ test(t => { const styleMap = createInlineStyleMap(t); - assert_throws(new TypeError(), () => styleMap.getAll('lemon')); + assert_throws_js(TypeError, () => styleMap.getAll('lemon')); }, 'Calling StylePropertyMap.getAll with an unsupported property throws a TypeError'); test(t => { diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/has.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/has.tentative.html index d2528831d85..0427d5a606a 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/has.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/has.tentative.html @@ -11,7 +11,7 @@ test(t => { const styleMap = createInlineStyleMap(t); - assert_throws(new TypeError(), () => styleMap.has('lemon')); + assert_throws_js(TypeError, () => styleMap.has('lemon')); }, 'Calling StylePropertyMap.has with an unsupported property throws a TypeError'); const gTestCases = [ diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/set-shorthand.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/set-shorthand.html index e00d07cc502..87ecadcb75c 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/set-shorthand.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/set-shorthand.html @@ -17,7 +17,7 @@ const gInvalidTestCases = [ for (const {property, values, desc} of gInvalidTestCases) { test(t => { let styleMap = createInlineStyleMap(t, ''); - assert_throws(new TypeError(), () => styleMap.set(property, ...values)); + assert_throws_js(TypeError, () => styleMap.set(property, ...values)); }, 'Setting a shorthand with ' + desc + ' on inline style throws TypeError'); } diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/set.tentative.html b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/set.tentative.html index 411323a2f0c..048ad87e8b1 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/set.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/inline/set.tentative.html @@ -19,23 +19,23 @@ const gInvalidTestCases = [ for (const {property, values, desc} of gInvalidTestCases) { test(t => { let styleMap = createInlineStyleMap(t, ''); - assert_throws(new TypeError(), () => styleMap.set(property, ...values)); + assert_throws_js(TypeError, () => styleMap.set(property, ...values)); }, 'Setting a StylePropertyMap with ' + desc + ' throws TypeError'); } test(t => { let styleMap = createInlineStyleMap(t, ''); - assert_throws(new TypeError(), () => styleMap.set('width', CSS.px(10), CSS.px(10))); + assert_throws_js(TypeError, () => styleMap.set('width', CSS.px(10), CSS.px(10))); }, 'Setting a non list-valued property with multiple arguments throws TypeError'); test(t => { let styleMap = createInlineStyleMap(t, ''); - assert_throws(new TypeError(), () => styleMap.set('width', '1s, 2s')); + assert_throws_js(TypeError, () => styleMap.set('width', '1s, 2s')); }, 'Setting a non list-valued property with list-valued string throws TypeError'); test(t => { let styleMap = createInlineStyleMap(t, ''); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { styleMap.set('transition-duration', '1s', new CSSUnparsedValue([])); }); }, 'Setting a list-valued property with a CSSUnparsedValue and other ' + @@ -43,7 +43,7 @@ test(t => { test(t => { let styleMap = createInlineStyleMap(t, ''); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { styleMap.set('transition-duration', '1s', 'var(--A)'); }); }, 'Setting a list-valued property with a var ref() and other values ' + diff --git a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/properties/resources/testsuite.js b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/properties/resources/testsuite.js index 3ca0b55f3f1..27042c787a1 100644 --- a/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/properties/resources/testsuite.js +++ b/tests/wpt/web-platform-tests/css/css-typed-om/the-stylepropertymap/properties/resources/testsuite.js @@ -357,7 +357,7 @@ function testPropertyInvalid(propertyName, examples, description) { test(t => { let styleMap = createInlineStyleMap(t); for (const example of examples) { - assert_throws(new TypeError(), () => styleMap.set(propertyName, example.input)); + assert_throws_js(TypeError, () => styleMap.set(propertyName, example.input)); } }, `Setting '${propertyName}' to ${description} throws TypeError`); } diff --git a/tests/wpt/web-platform-tests/css/css-values/ch-pseudo-recalc-on-font-load.html b/tests/wpt/web-platform-tests/css/css-values/ch-pseudo-recalc-on-font-load.html new file mode 100644 index 00000000000..6a60bdfa64d --- /dev/null +++ b/tests/wpt/web-platform-tests/css/css-values/ch-pseudo-recalc-on-font-load.html @@ -0,0 +1,88 @@ + + +Length unit 'ch' used in pseudo elements should be recalculated after loading a web font + + + + + + + +
+
+
text
+
text
+
  • + + diff --git a/tests/wpt/web-platform-tests/css/cssom-view/elementFromPoint-parameters.html b/tests/wpt/web-platform-tests/css/cssom-view/elementFromPoint-parameters.html index 899e411bdd3..35afec994ee 100644 --- a/tests/wpt/web-platform-tests/css/cssom-view/elementFromPoint-parameters.html +++ b/tests/wpt/web-platform-tests/css/cssom-view/elementFromPoint-parameters.html @@ -7,10 +7,10 @@ document.elementsFromPoint() are mandatory and of type double. diff --git a/tests/wpt/web-platform-tests/css/cssom/insertRule-import-no-index.html b/tests/wpt/web-platform-tests/css/cssom/insertRule-import-no-index.html index ad3622f86aa..45481e71f4f 100644 --- a/tests/wpt/web-platform-tests/css/cssom/insertRule-import-no-index.html +++ b/tests/wpt/web-platform-tests/css/cssom/insertRule-import-no-index.html @@ -18,13 +18,13 @@ var sheet = document.getElementById("styleElement").sheet; test(function() { assert_equals(sheet.cssRules.length, 1); - assert_throws("HierarchyRequestError", function() { sheet.insertRule("p { color: green; }"); }); + assert_throws_dom("HierarchyRequestError", function() { sheet.insertRule("p { color: green; }"); }); assert_equals(sheet.cssRules.length, 1); }, "insertRule with import and omitted index argument"); test(function() { assert_equals(sheet.cssRules.length, 1); - assert_throws("HierarchyRequestError", function() { sheet.insertRule("p { color: yellow; }", undefined); }); + assert_throws_dom("HierarchyRequestError", function() { sheet.insertRule("p { color: yellow; }", undefined); }); assert_equals(sheet.cssRules.length, 1); assert_equals(sheet.cssRules.item(0).cssText, "@import url(\"support/a-green.css\");"); }, "insertRule with import and undefined index argument"); diff --git a/tests/wpt/web-platform-tests/css/cssom/insertRule-namespace-no-index.html b/tests/wpt/web-platform-tests/css/cssom/insertRule-namespace-no-index.html index c1628eed85f..3265159736e 100644 --- a/tests/wpt/web-platform-tests/css/cssom/insertRule-namespace-no-index.html +++ b/tests/wpt/web-platform-tests/css/cssom/insertRule-namespace-no-index.html @@ -20,13 +20,13 @@ var sheet = document.getElementById("styleElement").sheet; test(function() { assert_equals(sheet.cssRules.length, 3); - assert_throws("HierarchyRequestError", function() { sheet.insertRule("p { color: green; }"); }); + assert_throws_dom("HierarchyRequestError", function() { sheet.insertRule("p { color: green; }"); }); assert_equals(sheet.cssRules.length, 3); }, "insertRule with namespace and omitted index argument"); test(function() { assert_equals(sheet.cssRules.length, 3); - assert_throws("HierarchyRequestError", function() { sheet.insertRule("p { color: yellow; }", undefined); }); + assert_throws_dom("HierarchyRequestError", function() { sheet.insertRule("p { color: yellow; }", undefined); }); assert_equals(sheet.cssRules.length, 3); }, "insertRule with namespace and undefined index argument"); diff --git a/tests/wpt/web-platform-tests/css/cssom/insertRule-syntax-error-01.html b/tests/wpt/web-platform-tests/css/cssom/insertRule-syntax-error-01.html index 170213c8bad..4461a9a9432 100644 --- a/tests/wpt/web-platform-tests/css/cssom/insertRule-syntax-error-01.html +++ b/tests/wpt/web-platform-tests/css/cssom/insertRule-syntax-error-01.html @@ -8,7 +8,7 @@ p { color: green; }

    This text should be green.

    diff --git a/tests/wpt/web-platform-tests/css/cssom/medialist-interfaces-002.html b/tests/wpt/web-platform-tests/css/cssom/medialist-interfaces-002.html index 210ace1393a..0d2ca2e9c71 100644 --- a/tests/wpt/web-platform-tests/css/cssom/medialist-interfaces-002.html +++ b/tests/wpt/web-platform-tests/css/cssom/medialist-interfaces-002.html @@ -59,7 +59,7 @@ media_list.appendMedium("all"); - assert_throws("NotFoundError", () => media_list.deleteMedium("screen")); + assert_throws_dom("NotFoundError", () => media_list.deleteMedium("screen")); assert_equals(media_list.length, 1); assert_equals(media_list.item(0), "all"); diff --git a/tests/wpt/web-platform-tests/css/cssom/stylesheet-same-origin.sub.html b/tests/wpt/web-platform-tests/css/cssom/stylesheet-same-origin.sub.html index ef714670f54..6ad55190dab 100644 --- a/tests/wpt/web-platform-tests/css/cssom/stylesheet-same-origin.sub.html +++ b/tests/wpt/web-platform-tests/css/cssom/stylesheet-same-origin.sub.html @@ -35,18 +35,18 @@ } function doOriginDirtyCheck(sheet) { - assert_throws("SecurityError", + assert_throws_dom("SecurityError", function () { sheet.cssRules; }, 'stylesheet.cssRules should throw SecurityError.'); - assert_throws("SecurityError", + assert_throws_dom("SecurityError", function () { sheet.insertRule("#test { margin: 10px; }", 1); }, 'stylesheet.insertRule should throw SecurityError.'); - assert_throws("SecurityError", + assert_throws_dom("SecurityError", function () { sheet.deleteRule(0); }, diff --git a/tests/wpt/web-platform-tests/css/filter-effects/svgfeblendelement-mode-001.html b/tests/wpt/web-platform-tests/css/filter-effects/svgfeblendelement-mode-001.html index 8c9e3ea0580..f27a23f51a2 100644 --- a/tests/wpt/web-platform-tests/css/filter-effects/svgfeblendelement-mode-001.html +++ b/tests/wpt/web-platform-tests/css/filter-effects/svgfeblendelement-mode-001.html @@ -57,15 +57,15 @@ test(function() { assert_equals(element.mode.baseVal, SVGFEBlendElement.SVG_FEBLEND_MODE_LIGHTEN); assert_equals(element.getAttribute('mode'), "lighten"); - assert_throws(new TypeError(), function() { element.mode.baseVal = 17; }); + assert_throws_js(TypeError, function() { element.mode.baseVal = 17; }); assert_equals(element.mode.baseVal, SVGFEBlendElement.SVG_FEBLEND_MODE_LIGHTEN); assert_equals(element.getAttribute('mode'), "lighten"); - assert_throws(new TypeError(), function() { element.mode.baseVal = -1; }); + assert_throws_js(TypeError, function() { element.mode.baseVal = -1; }); assert_equals(element.mode.baseVal, SVGFEBlendElement.SVG_FEBLEND_MODE_LIGHTEN); assert_equals(element.getAttribute('mode'), "lighten"); - assert_throws(new TypeError(), function() { element.mode.baseVal = 0; }); + assert_throws_js(TypeError, function() { element.mode.baseVal = 0; }); assert_equals(element.mode.baseVal, SVGFEBlendElement.SVG_FEBLEND_MODE_LIGHTEN); assert_equals(element.getAttribute('mode'), "lighten"); }, document.title + ", setter, invalid value"); diff --git a/tests/wpt/web-platform-tests/css/geometry/DOMMatrix-001.html b/tests/wpt/web-platform-tests/css/geometry/DOMMatrix-001.html index a42adb4425f..1752c2c5cae 100644 --- a/tests/wpt/web-platform-tests/css/geometry/DOMMatrix-001.html +++ b/tests/wpt/web-platform-tests/css/geometry/DOMMatrix-001.html @@ -139,7 +139,7 @@ 'unset', ].forEach(function(string) { test(function() { - assert_throws('SyntaxError', function() { new self[constr](string); }); + assert_throws_dom('SyntaxError', function() { new self[constr](string); }); }, `new ${constr}(${format_value(string)})`); }); @@ -178,7 +178,7 @@ ['scale(2, 2), translateX(5px) translateY(5px)', ].forEach(function(string) { test(function() { - assert_throws("SyntaxError", function() { new self[constr](string); }); + assert_throws_dom("SyntaxError", function() { new self[constr](string); }); }, `new ${constr}(${format_value(string)})`); }); @@ -195,7 +195,7 @@ [], // 0 elements ].forEach(function(sequence) { test(function() { - assert_throws(new TypeError(), function() { new self[constr](sequence); }); + assert_throws_js(TypeError, function() { new self[constr](sequence); }); }, `new ${constr}(sequence) ${sequence.length} elements`); }); }); diff --git a/tests/wpt/web-platform-tests/css/geometry/DOMMatrix-css-string.worker.js b/tests/wpt/web-platform-tests/css/geometry/DOMMatrix-css-string.worker.js index 42f919d3f09..d11638b26a6 100644 --- a/tests/wpt/web-platform-tests/css/geometry/DOMMatrix-css-string.worker.js +++ b/tests/wpt/web-platform-tests/css/geometry/DOMMatrix-css-string.worker.js @@ -5,12 +5,12 @@ importScripts("/resources/testharness.js"); ['DOMMatrix', 'DOMMatrixReadOnly'].forEach(constr => { test(() => { assert_true(constr in self, `${constr} should exist`); - assert_throws(new TypeError(), () => new self[constr]('matrix(1,0,0,1,0,0)') ); + assert_throws_js(TypeError, () => new self[constr]('matrix(1,0,0,1,0,0)') ); }, `${constr} constructor with string argument in worker`); test(() => { assert_true(constr in self, `${constr} should exist`); - assert_throws(new TypeError(), () => new self[constr]('') ); + assert_throws_js(TypeError, () => new self[constr]('') ); }, `${constr} constructor with empty string argument in worker`); test(() => { diff --git a/tests/wpt/web-platform-tests/css/geometry/DOMMatrix-stringifier.html b/tests/wpt/web-platform-tests/css/geometry/DOMMatrix-stringifier.html index 126c4443175..5a39238bef5 100644 --- a/tests/wpt/web-platform-tests/css/geometry/DOMMatrix-stringifier.html +++ b/tests/wpt/web-platform-tests/css/geometry/DOMMatrix-stringifier.html @@ -22,12 +22,12 @@ [NaN, Infinity, -Infinity].forEach(num => { test(() => { const matrix = new self[constr]([1, 0, 0, 1, 0, num]); - assert_throws("InvalidStateError", () => String(matrix)); + assert_throws_dom("InvalidStateError", () => String(matrix)); }, `${prefix} ${num} (2d)`); test(() => { const matrix = new self[constr]([1, 0, 0, 0, 0, 1, 0, 0, 0, 0, 1, 0, 0, num, 0, 1]); - assert_throws("InvalidStateError", () => String(matrix)); + assert_throws_dom("InvalidStateError", () => String(matrix)); }, `${prefix} ${num} (3d)`); }); diff --git a/tests/wpt/web-platform-tests/css/geometry/DOMMatrix2DInit-validate-fixup.html b/tests/wpt/web-platform-tests/css/geometry/DOMMatrix2DInit-validate-fixup.html index 7ef4ca8b060..480d67a481d 100644 --- a/tests/wpt/web-platform-tests/css/geometry/DOMMatrix2DInit-validate-fixup.html +++ b/tests/wpt/web-platform-tests/css/geometry/DOMMatrix2DInit-validate-fixup.html @@ -51,11 +51,11 @@ var emptyCanvasURL = window.canvas.toDataURL(); ].forEach(dict => { test(() => { ctx.resetTransform(); - assert_throws(new TypeError(), () => ctx.setTransform(dict)); + assert_throws_js(TypeError, () => ctx.setTransform(dict)); }, `setTransform(${format_dict(dict)}) (invalid)`); test(() => { - assert_throws(new TypeError(), () => drawRectWithAddPathTransform(ctx, dict)); + assert_throws_js(TypeError, () => drawRectWithAddPathTransform(ctx, dict)); }, `addPath(${format_dict(dict)}) (invalid)`); }); diff --git a/tests/wpt/web-platform-tests/css/geometry/DOMMatrixInit-validate-fixup.html b/tests/wpt/web-platform-tests/css/geometry/DOMMatrixInit-validate-fixup.html index 8835c1ba48a..b89b75205eb 100644 --- a/tests/wpt/web-platform-tests/css/geometry/DOMMatrixInit-validate-fixup.html +++ b/tests/wpt/web-platform-tests/css/geometry/DOMMatrixInit-validate-fixup.html @@ -27,7 +27,7 @@ ].forEach(dict => { test(() => { assert_true('fromMatrix' in DOMMatrix, 'fromMatrix should exist'); - assert_throws(new TypeError(), () => DOMMatrix.fromMatrix(dict)); + assert_throws_js(TypeError, () => DOMMatrix.fromMatrix(dict)); }, `${format_dict(dict)} (invalid)`); }); diff --git a/tests/wpt/web-platform-tests/css/geometry/DOMPoint-002.html b/tests/wpt/web-platform-tests/css/geometry/DOMPoint-002.html index b7f5a911772..96276d86f5a 100644 --- a/tests/wpt/web-platform-tests/css/geometry/DOMPoint-002.html +++ b/tests/wpt/web-platform-tests/css/geometry/DOMPoint-002.html @@ -78,7 +78,7 @@ },'test DOMPoint matrixTransform'); test(function() { var point = new DOMPoint(42, 84); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { point.matrixTransform({ is2D: true, m33: 1.0000001 }); }); },'test DOMPoint matrixTransform with inconsistent input'); diff --git a/tests/wpt/web-platform-tests/css/geometry/DOMQuad-001.html b/tests/wpt/web-platform-tests/css/geometry/DOMQuad-001.html index 38c54285d94..331bb615956 100644 --- a/tests/wpt/web-platform-tests/css/geometry/DOMQuad-001.html +++ b/tests/wpt/web-platform-tests/css/geometry/DOMQuad-001.html @@ -28,19 +28,19 @@ checkDOMQuad(function() { return new DOMQuad(); }, initial, 'testConstructor0'); test(function() { - assert_throws(new TypeError(), function() { new DOMQuad(1); }); + assert_throws_js(TypeError, function() { new DOMQuad(1); }); },'testConstructor1'); test(function() { - assert_throws(new TypeError(), function() { new DOMQuad(1, 2); }); + assert_throws_js(TypeError, function() { new DOMQuad(1, 2); }); },'testConstructor2'); test(function() { - assert_throws(new TypeError(), function() { new DOMQuad(1, 2, 3); }); + assert_throws_js(TypeError, function() { new DOMQuad(1, 2, 3); }); },'testConstructor3'); test(function() { - assert_throws(new TypeError(), function() { new DOMQuad(1, 2, 3, 4); }); + assert_throws_js(TypeError, function() { new DOMQuad(1, 2, 3, 4); }); },'testConstructor4'); checkDOMQuad( @@ -85,7 +85,7 @@ checkDOMQuad(function() { return new DOMQuad({}, {}, {}, {}, NaN); }, initial, 'testConstructor14'); test(function() { - assert_throws(new TypeError(), function() { new DOMQuad({}, {}, {}, NaN); }); + assert_throws_js(TypeError, function() { new DOMQuad({}, {}, {}, NaN); }); },'testConstructor15'); checkDOMQuad(function() { diff --git a/tests/wpt/web-platform-tests/css/geometry/DOMQuad-002.html b/tests/wpt/web-platform-tests/css/geometry/DOMQuad-002.html index 9e3ef98895a..5734be1f293 100644 --- a/tests/wpt/web-platform-tests/css/geometry/DOMQuad-002.html +++ b/tests/wpt/web-platform-tests/css/geometry/DOMQuad-002.html @@ -73,15 +73,15 @@ },'test Constructor with four DOMPoint args'); test(function() { - assert_throws(new TypeError(), function() { new DOMQuad(1, 2, 3, 4); }); + assert_throws_js(TypeError, function() { new DOMQuad(1, 2, 3, 4); }); },'test Constructor with invaild integer args'); test(function() { - assert_throws(new TypeError(), function() { new DOMQuad("1", "2", "3", "4"); }); + assert_throws_js(TypeError, function() { new DOMQuad("1", "2", "3", "4"); }); },'test Constructor with invaild string args'); test(function() { - assert_throws(new TypeError(), function() { new DOMQuad({}, {}, {}, NaN); }); + assert_throws_js(TypeError, function() { new DOMQuad({}, {}, {}, NaN); }); },'test Constructor with NaN'); test(function() { diff --git a/tests/wpt/web-platform-tests/css/geometry/spec-examples.html b/tests/wpt/web-platform-tests/css/geometry/spec-examples.html index 4e97fb5f217..61efa2a89bf 100644 --- a/tests/wpt/web-platform-tests/css/geometry/spec-examples.html +++ b/tests/wpt/web-platform-tests/css/geometry/spec-examples.html @@ -76,7 +76,7 @@ test(() => { test(() => { // This example will throw an exception because there are non-finite values in the matrix. var matrix = new DOMMatrix([NaN, NaN, NaN, NaN, NaN, NaN, NaN, NaN, NaN, NaN, NaN, NaN, NaN, NaN, NaN, NaN]); - assert_throws("InvalidStateError", () => { var string = matrix + " Batman!"; }); + assert_throws_dom("InvalidStateError", () => { var string = matrix + " Batman!"; }); }, 'DOMMatrix NaN'); test(() => { diff --git a/tests/wpt/web-platform-tests/css/motion/parsing/offset-path-parsing-valid.html b/tests/wpt/web-platform-tests/css/motion/parsing/offset-path-parsing-valid.html index 0ed360f6e36..fce99f572e9 100644 --- a/tests/wpt/web-platform-tests/css/motion/parsing/offset-path-parsing-valid.html +++ b/tests/wpt/web-platform-tests/css/motion/parsing/offset-path-parsing-valid.html @@ -28,6 +28,10 @@ test_valid_value("offset-path", 'path("M 0 0 L 100 100 m 0 100 l 100 0 Z l 160 2 test_valid_value("offset-path", 'path("m 10 20 l 20 30 Z l 50 60 Z m 70 80 l 90 60 Z t 70 120")'); test_valid_value("offset-path", 'path("m 10 170 h 90 v 30 m 0 0 s 1 2 3 4 z c 9 8 7 6 5 4")', 'path("m 10 170 h 90 v 30 m 0 0 s 1 2 3 4 Z c 9 8 7 6 5 4")'); test_valid_value("offset-path", 'path("m 10 20 a 10 20 30 1 0 40 50 a 110 120 30 1 1 140 50")'); +// See https://github.com/w3c/fxtf-drafts/issues/392. If empty path string, +// Blink serializes it as none, but Gecko serializes as path(""). +test_valid_value("offset-path", 'path("")', ['none', 'path("")']); +test_valid_value("offset-path", 'path(" ")', ['none', 'path("")']); test_valid_value("offset-path", 'url("http://www.example.com/index.html#polyline1")'); diff --git a/tests/wpt/web-platform-tests/css/selectors/attribute-selectors/attribute-case/syntax.html b/tests/wpt/web-platform-tests/css/selectors/attribute-selectors/attribute-case/syntax.html index e5acde100b0..0eda7374053 100644 --- a/tests/wpt/web-platform-tests/css/selectors/attribute-selectors/attribute-case/syntax.html +++ b/tests/wpt/web-platform-tests/css/selectors/attribute-selectors/attribute-case/syntax.html @@ -135,7 +135,7 @@ onload = function() { assert_equals(global.getComputedStyle(elm).visibility, 'visible', 'invalid selector matched'); }, s + ' in ' + global.mode); test(function() { - assert_throws("SyntaxError", function() { + assert_throws_dom("SyntaxError", function() { global.document.querySelector(s); }, 'invalid selector'); }, s + ' with querySelector in ' + global.mode); diff --git a/tests/wpt/web-platform-tests/css/selectors/user-invalid.html b/tests/wpt/web-platform-tests/css/selectors/user-invalid.html index f0c3d93cbea..05cf2b67903 100644 --- a/tests/wpt/web-platform-tests/css/selectors/user-invalid.html +++ b/tests/wpt/web-platform-tests/css/selectors/user-invalid.html @@ -15,6 +15,6 @@ test(() => { test(() => { const input = document.querySelector('input'); // matches() will throw if the selector isn't suppported - assert_throws("SyntaxError", () => input.matches(':user-error')); + assert_throws_dom("SyntaxError", () => input.matches(':user-error')); }, ':user-error selector should not be supported'); diff --git a/tests/wpt/web-platform-tests/css/selectors/webkit-pseudo-element.html b/tests/wpt/web-platform-tests/css/selectors/webkit-pseudo-element.html index 5ba98eba21b..30103fa72bf 100644 --- a/tests/wpt/web-platform-tests/css/selectors/webkit-pseudo-element.html +++ b/tests/wpt/web-platform-tests/css/selectors/webkit-pseudo-element.html @@ -41,8 +41,8 @@ span::-webkit-something-invalid, #test, ::-WeBkIt-sOmEtHiNg-NoNeXiSt123, ::-webk test(() => { let sheet = document.getElementById("style").sheet; assert_equals(sheet.cssRules.length, 2); - assert_throws("SyntaxError", () => document.querySelector("span::-webkitfoo")); - assert_throws("SyntaxError", () => document.querySelectorAll("span::-webkitfoo")); + assert_throws_dom("SyntaxError", () => document.querySelector("span::-webkitfoo")); + assert_throws_dom("SyntaxError", () => document.querySelectorAll("span::-webkitfoo")); }, "webkit-prefix without dash is invalid"); diff --git a/tests/wpt/web-platform-tests/css/support/parsing-testcommon.js b/tests/wpt/web-platform-tests/css/support/parsing-testcommon.js index 647bc125df9..bcb9d7cdd60 100644 --- a/tests/wpt/web-platform-tests/css/support/parsing-testcommon.js +++ b/tests/wpt/web-platform-tests/css/support/parsing-testcommon.js @@ -79,7 +79,7 @@ function test_invalid_selector(selector) { const stringifiedSelector = JSON.stringify(selector); test(function(){ - assert_throws( + assert_throws_dom( DOMException.SYNTAX_ERR, () => document.querySelector(selector), stringifiedSelector + " should throw in querySelector"); @@ -89,7 +89,7 @@ function test_invalid_selector(selector) { const {sheet} = style; document.head.removeChild(style); - assert_throws( + assert_throws_dom( DOMException.SYNTAX_ERR, () => sheet.insertRule(selector + "{}"), stringifiedSelector + " should throw in insertRule"); diff --git a/tests/wpt/web-platform-tests/custom-elements/CustomElementRegistry.html b/tests/wpt/web-platform-tests/custom-elements/CustomElementRegistry.html index c288e823270..cc81e3a2cd3 100644 --- a/tests/wpt/web-platform-tests/custom-elements/CustomElementRegistry.html +++ b/tests/wpt/web-platform-tests/custom-elements/CustomElementRegistry.html @@ -17,13 +17,13 @@ test(function () { }, 'CustomElementRegistry interface must have define as a method'); test(function () { - assert_throws({'name': 'TypeError'}, function () { customElements.define('badname', 1); }, + assert_throws_js(TypeError, function () { customElements.define('badname', 1); }, 'customElements.define must throw a TypeError when the element interface is a number'); - assert_throws({'name': 'TypeError'}, function () { customElements.define('badname', '123'); }, + assert_throws_js(TypeError, function () { customElements.define('badname', '123'); }, 'customElements.define must throw a TypeError when the element interface is a string'); - assert_throws({'name': 'TypeError'}, function () { customElements.define('badname', {}); }, + assert_throws_js(TypeError, function () { customElements.define('badname', {}); }, 'customElements.define must throw a TypeError when the element interface is an object'); - assert_throws({'name': 'TypeError'}, function () { customElements.define('badname', []); }, + assert_throws_js(TypeError, function () { customElements.define('badname', []); }, 'customElements.define must throw a TypeError when the element interface is an array'); }, 'customElements.define must throw when the element interface is not a constructor'); @@ -34,13 +34,13 @@ test(function () { test(function () { class MyCustomElement extends HTMLElement {}; - assert_throws({'name': 'SyntaxError'}, function () { customElements.define(null, MyCustomElement); }, + assert_throws_dom('SyntaxError', function () { customElements.define(null, MyCustomElement); }, 'customElements.define must throw a SyntaxError if the tag name is null'); - assert_throws({'name': 'SyntaxError'}, function () { customElements.define('', MyCustomElement); }, + assert_throws_dom('SyntaxError', function () { customElements.define('', MyCustomElement); }, 'customElements.define must throw a SyntaxError if the tag name is empty'); - assert_throws({'name': 'SyntaxError'}, function () { customElements.define('abc', MyCustomElement); }, + assert_throws_dom('SyntaxError', function () { customElements.define('abc', MyCustomElement); }, 'customElements.define must throw a SyntaxError if the tag name does not contain "-"'); - assert_throws({'name': 'SyntaxError'}, function () { customElements.define('a-Bc', MyCustomElement); }, + assert_throws_dom('SyntaxError', function () { customElements.define('a-Bc', MyCustomElement); }, 'customElements.define must throw a SyntaxError if the tag name contains an upper case letter'); var builtinTagNames = [ @@ -55,7 +55,7 @@ test(function () { ]; for (var tagName of builtinTagNames) { - assert_throws({'name': 'SyntaxError'}, function () { customElements.define(tagName, MyCustomElement); }, + assert_throws_dom('SyntaxError', function () { customElements.define(tagName, MyCustomElement); }, 'customElements.define must throw a SyntaxError if the tag name is "' + tagName + '"'); } @@ -73,7 +73,7 @@ test(function () { }) customElements.define('some-custom-element', SomeCustomElement); - assert_throws({'name': 'NotSupportedError'}, function () { customElements.define('some-custom-element', OtherCustomElement); }, + assert_throws_dom('NotSupportedError', function () { customElements.define('some-custom-element', OtherCustomElement); }, 'customElements.define must throw a NotSupportedError if the specified tag name is already used'); assert_array_equals(calls, [], 'customElements.define must validate the custom element name before getting the prototype of the constructor'); @@ -83,7 +83,7 @@ test(function () { class AnotherCustomElement extends HTMLElement {}; customElements.define('another-custom-element', AnotherCustomElement); - assert_throws({'name': 'NotSupportedError'}, function () { customElements.define('some-other-element', AnotherCustomElement); }, + assert_throws_dom('NotSupportedError', function () { customElements.define('some-other-element', AnotherCustomElement); }, 'customElements.define must throw a NotSupportedError if the specified class already defines an element'); }, 'customElements.define must throw a NotSupportedError when there is already a custom element with the same class'); @@ -105,7 +105,7 @@ test(function () { } }); - assert_throws({'name': 'NotSupportedError'}, function () { customElements.define('outer-custom-element', OuterCustomElement); }, + assert_throws_dom('NotSupportedError', function () { customElements.define('outer-custom-element', OuterCustomElement); }, 'customElements.define must throw a NotSupportedError if the specified class already defines an element'); assert_array_equals(outerCalls, ['prototype'], 'customElements.define must get "prototype"'); assert_array_equals(innerCalls, [], @@ -124,7 +124,7 @@ test(function () { } }); - assert_throws({'name': 'TypeError'}, function () { + assert_throws_js(TypeError, function () { customElements.define('element-with-bad-inner-constructor', ElementWithBadInnerConstructor); }, 'customElements.define must throw a NotSupportedError if IsConstructor(constructor) is false'); @@ -141,7 +141,7 @@ test(function () { } }); - assert_throws({'name': 'SyntaxError'}, function () { + assert_throws_dom('SyntaxError', function () { customElements.define('element-with-bad-inner-name', ElementWithBadInnerName); }, 'customElements.define must throw a SyntaxError if the specified name is not a valid custom element name'); @@ -213,7 +213,7 @@ test(function () { } }); - assert_throws({'name': 'SyntaxError'}, function () { + assert_throws_dom('SyntaxError', function () { customElements.define('element-with-bad-inner-name', ElementWithBadInnerName); }, 'customElements.define must throw a SyntaxError if the specified name is not a valid custom element name'); @@ -233,12 +233,13 @@ test(function () { }, 'customElements.define must get "prototype", "disabledFeatures", and "formAssociated" property of the constructor'); test(function () { + var err = {name: 'expectedError'} var proxy = new Proxy(class extends HTMLElement { }, { get: function (target, name) { - throw {name: 'expectedError'}; + throw err; } }); - assert_throws({'name': 'expectedError'}, function () { customElements.define('element-with-string-prototype', proxy); }); + assert_throws_exactly(err, function () { customElements.define('element-with-string-prototype', proxy); }); }, 'customElements.define must rethrow an exception thrown while getting "prototype" property of the constructor'); test(function () { @@ -248,16 +249,16 @@ test(function () { }); returnedValue = null; - assert_throws({'name': 'TypeError'}, function () { customElements.define('element-with-string-prototype', proxy); }, + assert_throws_js(TypeError, function () { customElements.define('element-with-string-prototype', proxy); }, 'customElements.define must throw when "prototype" property of the constructor is null'); returnedValue = undefined; - assert_throws({'name': 'TypeError'}, function () { customElements.define('element-with-string-prototype', proxy); }, + assert_throws_js(TypeError, function () { customElements.define('element-with-string-prototype', proxy); }, 'customElements.define must throw when "prototype" property of the constructor is undefined'); returnedValue = 'hello'; - assert_throws({'name': 'TypeError'}, function () { customElements.define('element-with-string-prototype', proxy); }, + assert_throws_js(TypeError, function () { customElements.define('element-with-string-prototype', proxy); }, 'customElements.define must throw when "prototype" property of the constructor is a string'); returnedValue = 1; - assert_throws({'name': 'TypeError'}, function () { customElements.define('element-with-string-prototype', proxy); }, + assert_throws_js(TypeError, function () { customElements.define('element-with-string-prototype', proxy); }, 'customElements.define must throw when "prototype" property of the constructor is a number'); }, 'customElements.define must throw when "prototype" property of the constructor is not an object'); @@ -278,15 +279,16 @@ test(function () { test(function () { var constructor = function () {} var calls = []; + var err = {name: 'expectedError'} constructor.prototype = new Proxy(constructor.prototype, { get: function (target, name) { calls.push(name); if (name == 'disconnectedCallback') - throw {name: 'expectedError'}; + throw err; return target[name]; } }); - assert_throws({'name': 'expectedError'}, function () { customElements.define('element-with-throwing-callback', constructor); }); + assert_throws_exactly(err, function () { customElements.define('element-with-throwing-callback', constructor); }); assert_array_equals(calls, ['connectedCallback', 'disconnectedCallback'], 'customElements.define must not get callbacks after one of the get throws'); }, 'customElements.define must rethrow an exception thrown while getting callbacks on the constructor prototype'); @@ -302,7 +304,7 @@ test(function () { return target[name]; } }); - assert_throws({'name': 'TypeError'}, function () { customElements.define('element-with-throwing-callback', constructor); }); + assert_throws_js(TypeError, function () { customElements.define('element-with-throwing-callback', constructor); }); assert_array_equals(calls, ['connectedCallback', 'disconnectedCallback', 'adoptedCallback'], 'customElements.define must not get callbacks after one of the conversion throws'); }, 'customElements.define must rethrow an exception thrown while converting a callback value to Function callback type'); @@ -341,15 +343,16 @@ test(function () { var constructor = function () {} constructor.prototype.attributeChangedCallback = function () { }; var calls = []; + var err = {name: 'expectedError'}; var proxy = new Proxy(constructor, { get: function (target, name) { calls.push(name); if (name == 'observedAttributes') - throw {name: 'expectedError'}; + throw err; return target[name]; } }); - assert_throws({'name': 'expectedError'}, function () { customElements.define('element-with-throwing-observed-attributes', proxy); }); + assert_throws_exactly(err, function () { customElements.define('element-with-throwing-observed-attributes', proxy); }); assert_array_equals(calls, ['prototype', 'observedAttributes'], 'customElements.define must get "prototype" and "observedAttributes" on the constructor'); }, 'customElements.define must rethrow an exception thrown while getting observedAttributes on the constructor prototype'); @@ -366,26 +369,27 @@ test(function () { return target[name]; } }); - assert_throws({'name': 'TypeError'}, function () { customElements.define('element-with-invalid-observed-attributes', proxy); }); + assert_throws_js(TypeError, function () { customElements.define('element-with-invalid-observed-attributes', proxy); }); assert_array_equals(calls, ['prototype', 'observedAttributes'], 'customElements.define must get "prototype" and "observedAttributes" on the constructor'); }, 'customElements.define must rethrow an exception thrown while converting the value of observedAttributes to sequence'); -test(function () { + test(function () { + var err = {name: 'SomeError'}; var constructor = function () {} constructor.prototype.attributeChangedCallback = function () { }; constructor.observedAttributes = {[Symbol.iterator]: function *() { yield 'foo'; - throw {name: 'SomeError'}; + throw err; }}; - assert_throws({'name': 'SomeError'}, function () { customElements.define('element-with-generator-observed-attributes', constructor); }); + assert_throws_exactly(err, function () { customElements.define('element-with-generator-observed-attributes', constructor); }); }, 'customElements.define must rethrow an exception thrown while iterating over observedAttributes to sequence'); test(function () { var constructor = function () {} constructor.prototype.attributeChangedCallback = function () { }; constructor.observedAttributes = {[Symbol.iterator]: 1}; - assert_throws({'name': 'TypeError'}, function () { customElements.define('element-with-observed-attributes-with-uncallable-iterator', constructor); }); + assert_throws_js(TypeError, function () { customElements.define('element-with-observed-attributes-with-uncallable-iterator', constructor); }); }, 'customElements.define must rethrow an exception thrown while retrieving Symbol.iterator on observedAttributes'); test(function () { @@ -397,15 +401,16 @@ test(function () { test(function () { var constructor = function () {} var calls = []; + var err = {name: 'expectedError'} var proxy = new Proxy(constructor, { get: function (target, name) { calls.push(name); if (name == 'disabledFeatures') - throw {name: 'expectedError'}; + throw err; return target[name]; } }); - assert_throws({'name': 'expectedError'}, () => customElements.define('element-with-throwing-disabled-features', proxy)); + assert_throws_exactly(err, () => customElements.define('element-with-throwing-disabled-features', proxy)); assert_array_equals(calls, ['prototype', 'disabledFeatures'], 'customElements.define must get "prototype" and "disabledFeatures" on the constructor'); }, 'customElements.define must rethrow an exception thrown while getting disabledFeatures on the constructor prototype'); @@ -421,38 +426,40 @@ test(function () { return target[name]; } }); - assert_throws({'name': 'TypeError'}, () => customElements.define('element-with-invalid-disabled-features', proxy)); + assert_throws_js(TypeError, () => customElements.define('element-with-invalid-disabled-features', proxy)); assert_array_equals(calls, ['prototype', 'disabledFeatures'], 'customElements.define must get "prototype" and "disabledFeatures" on the constructor'); }, 'customElements.define must rethrow an exception thrown while converting the value of disabledFeatures to sequence'); test(function () { var constructor = function () {} + var err = {name: 'SomeError'}; constructor.disabledFeatures = {[Symbol.iterator]: function *() { yield 'foo'; - throw {name: 'SomeError'}; + throw err; }}; - assert_throws({'name': 'SomeError'}, () => customElements.define('element-with-generator-disabled-features', constructor)); + assert_throws_exactly(err, () => customElements.define('element-with-generator-disabled-features', constructor)); }, 'customElements.define must rethrow an exception thrown while iterating over disabledFeatures to sequence'); test(function () { var constructor = function () {} constructor.disabledFeatures = {[Symbol.iterator]: 1}; - assert_throws({'name': 'TypeError'}, () => customElements.define('element-with-disabled-features-with-uncallable-iterator', constructor)); + assert_throws_js(TypeError, () => customElements.define('element-with-disabled-features-with-uncallable-iterator', constructor)); }, 'customElements.define must rethrow an exception thrown while retrieving Symbol.iterator on disabledFeatures'); test(function () { var constructor = function () {} var calls = []; + var err = {name: 'expectedError'}; var proxy = new Proxy(constructor, { get: function (target, name) { calls.push(name); if (name == 'formAssociated') - throw {name: 'expectedError'}; + throw err; return target[name]; } }); - assert_throws({'name': 'expectedError'}, + assert_throws_exactly(err, () => customElements.define('element-with-throwing-form-associated', proxy)); assert_array_equals(calls, ['prototype', 'disabledFeatures', 'formAssociated'], 'customElements.define must get "prototype", "disabledFeatures", and ' + @@ -503,15 +510,16 @@ test(function () { } }); var calls = []; + var err = {name: 'expectedError'}; constructor.prototype = new Proxy(constructor.prototype, { get: function (target, name) { calls.push(name); if (name == 'formDisabledCallback') - throw {name: 'expectedError'}; + throw err; return target[name]; } }); - assert_throws({'name': 'expectedError'}, + assert_throws_exactly(err, () => customElements.define('element-with-throwing-callback-2', proxy)); assert_array_equals(calls, ['connectedCallback', 'disconnectedCallback', 'adoptedCallback', 'attributeChangedCallback', @@ -528,7 +536,7 @@ test(function () { return target[name]; } }); - assert_throws({'name': 'TypeError'}, + assert_throws_js(TypeError, () => customElements.define('element-with-throwing-callback-3', proxy)); assert_array_equals(calls2, ['connectedCallback', 'disconnectedCallback', 'adoptedCallback', 'attributeChangedCallback', diff --git a/tests/wpt/web-platform-tests/custom-elements/Document-createElement.html b/tests/wpt/web-platform-tests/custom-elements/Document-createElement.html index 8173c761388..64b6f25b5e7 100644 --- a/tests/wpt/web-platform-tests/custom-elements/Document-createElement.html +++ b/tests/wpt/web-platform-tests/custom-elements/Document-createElement.html @@ -350,7 +350,7 @@ test(function () { }; customElements.define('throw-custom-element', ThrowCustomElement); - assert_throws(exceptionToThrow, function () { new ThrowCustomElement; }); + assert_throws_exactly(exceptionToThrow, function () { new ThrowCustomElement; }); var instance; assert_reports(exceptionToThrow, function () { instance = document.createElement('throw-custom-element'); }); assert_equals(instance.localName, 'throw-custom-element'); @@ -375,7 +375,7 @@ test(function () { }; customElements.define('throw-custom-builtin-element', ThrowCustomBuiltinElement, { extends: 'div' }); - assert_throws(exceptionToThrow, function () { new ThrowCustomBuiltinElement; }); + assert_throws_exactly(exceptionToThrow, function () { new ThrowCustomBuiltinElement; }); var instance; assert_reports(exceptionToThrow, function () { instance = document.createElement('div', { is: 'throw-custom-builtin-element' }); }); assert_equals(instance.localName, 'div'); diff --git a/tests/wpt/web-platform-tests/custom-elements/HTMLElement-attachInternals.html b/tests/wpt/web-platform-tests/custom-elements/HTMLElement-attachInternals.html index 22c9545215c..9331869f8fe 100644 --- a/tests/wpt/web-platform-tests/custom-elements/HTMLElement-attachInternals.html +++ b/tests/wpt/web-platform-tests/custom-elements/HTMLElement-attachInternals.html @@ -14,19 +14,19 @@ test(() => { let element = new MyElement1(); assert_true(element.attachInternals() instanceof ElementInternals, 'New - 1st call'); - assert_throws('NotSupportedError', () => { element.attachInternals(); }, + assert_throws_dom('NotSupportedError', () => { element.attachInternals(); }, 'New - 2nd call'); element = document.createElement('my-element1'); assert_true(element.attachInternals() instanceof ElementInternals, 'createElement - 1st call'); - assert_throws('NotSupportedError', () => { element.attachInternals(); }, + assert_throws_dom('NotSupportedError', () => { element.attachInternals(); }, 'createElement - 2nd call'); container.innerHTML = ''; assert_true(container.firstChild.attachInternals() instanceof ElementInternals, 'Parser - 1st call'); - assert_throws('NotSupportedError', () => { + assert_throws_dom('NotSupportedError', () => { container.firstChild.attachInternals(); }, 'Parser - 2nd call'); }, 'Successful attachInternals() and the second call.'); @@ -35,21 +35,21 @@ test(() => { class MyDiv extends HTMLDivElement {} customElements.define('my-div', MyDiv, { extends: 'div' }); const customizedBuiltin = document.createElement('div', { is: 'my-div'}); - assert_throws('NotSupportedError', () => { customizedBuiltin.attachInternals() }); + assert_throws_dom('NotSupportedError', () => { customizedBuiltin.attachInternals() }); }, 'attachInternals() throws a NotSupportedError if it is called for ' + 'a customized built-in element'); test(() => { const builtin = document.createElement('div'); - assert_throws('NotSupportedError', () => { builtin.attachInternals() }); + assert_throws_dom('NotSupportedError', () => { builtin.attachInternals() }); const doc = document.implementation.createDocument('foo', null); const span = doc.appendChild(doc.createElementNS('http://www.w3.org/1999/xhtml', 'html:span')); assert_true(span instanceof HTMLElement); - assert_throws('NotSupportedError', () => { span.attachInternals(); }); + assert_throws_dom('NotSupportedError', () => { span.attachInternals(); }); const undefinedCustom = document.createElement('undefined-element'); - assert_throws('NotSupportedError', () => { undefinedCustom.attachInternals() }); + assert_throws_dom('NotSupportedError', () => { undefinedCustom.attachInternals() }); }, 'If a custom element definition for the local name of the element doesn\'t' + ' exist, throw an NotSupportedError'); @@ -60,13 +60,13 @@ test(() => { customElements.define('my-element2', MyElement2); const container = document.querySelector('#container'); - assert_throws('NotSupportedError', () => { + assert_throws_dom('NotSupportedError', () => { (new MyElement2).attachInternals(); }); - assert_throws('NotSupportedError', () => { + assert_throws_dom('NotSupportedError', () => { document.createElement('my-element2').attachInternals(); }); - assert_throws('NotSupportedError', () => { + assert_throws_dom('NotSupportedError', () => { container.innerHTML = ''; container.firstChild.attachInternals(); }); diff --git a/tests/wpt/web-platform-tests/custom-elements/HTMLElement-constructor.html b/tests/wpt/web-platform-tests/custom-elements/HTMLElement-constructor.html index a0bfa909bae..8e33137d4ff 100644 --- a/tests/wpt/web-platform-tests/custom-elements/HTMLElement-constructor.html +++ b/tests/wpt/web-platform-tests/custom-elements/HTMLElement-constructor.html @@ -14,29 +14,29 @@ test(function () { customElements.define('html-custom-element', HTMLElement); - assert_throws({'name': 'TypeError'}, function () { new HTMLElement(); }); + assert_throws_js(TypeError, function () { new HTMLElement(); }); }, 'HTMLElement constructor must throw a TypeError when NewTarget is equal to itself'); test(function () { customElements.define('html-proxy-custom-element', new Proxy(HTMLElement, {})); - assert_throws({'name': 'TypeError'}, function () { new HTMLElement(); }); + assert_throws_js(TypeError, function () { new HTMLElement(); }); }, 'HTMLElement constructor must throw a TypeError when NewTarget is equal to itself via a Proxy object'); test(function () { class SomeCustomElement extends HTMLElement {}; - assert_throws({'name': 'TypeError'}, function () { new SomeCustomElement; }); + assert_throws_js(TypeError, function () { new SomeCustomElement; }); }, 'HTMLElement constructor must throw TypeError when it has not been defined by customElements.define'); test(function () { class SomeCustomElement extends HTMLParagraphElement {}; customElements.define('some-custom-element', SomeCustomElement); - assert_throws({'name': 'TypeError'}, function () { new SomeCustomElement(); }); + assert_throws_js(TypeError, function () { new SomeCustomElement(); }); }, 'Custom element constructor must throw TypeError when it does not extend HTMLElement'); test(function () { class SomeCustomButtonElement extends HTMLButtonElement {}; customElements.define('some-custom-button-element', SomeCustomButtonElement, { extends: "p" }); - assert_throws({'name': 'TypeError'}, function () { new SomeCustomButtonElement(); }); + assert_throws_js(TypeError, function () { new SomeCustomButtonElement(); }); }, 'Custom element constructor must throw TypeError when it does not extend the proper element interface'); test(function () { @@ -178,7 +178,7 @@ test(function() { // define() gets the prototype of the constructor it's passed, so // reset the counter. getCount = 0; - assert_throws({'name': 'TypeError'}, + assert_throws_js(TypeError, function () { new countingProxy() }, "Should not be able to construct an HTMLElement named 'button'"); assert_equals(getCount, 0, "Should never have gotten .prototype"); @@ -200,7 +200,7 @@ test(function() { // define() gets the prototype of the constructor it's passed, so // reset the counter. getCount = 0; - assert_throws({'name': 'TypeError'}, + assert_throws_js(TypeError, function () { Reflect.construct(HTMLElement, [], countingProxy) }, "Should not be able to construct an HTMLElement named 'button'"); assert_equals(getCount, 0, "Should never have gotten .prototype"); @@ -219,7 +219,7 @@ test(function() { }); // Purposefully don't register it. - assert_throws({'name': 'TypeError'}, + assert_throws_js(TypeError, function () { new countingProxy() }, "Should not be able to construct an HTMLElement named 'button'"); assert_equals(getCount, 0, "Should never have gotten .prototype"); @@ -238,7 +238,7 @@ test(function() { }); // Purposefully don't register it. - assert_throws({'name': 'TypeError'}, + assert_throws_js(TypeError, function () { Reflect.construct(HTMLElement, [], countingProxy) }, "Should not be able to construct an HTMLElement named 'button'"); assert_equals(getCount, 0, "Should never have gotten .prototype"); diff --git a/tests/wpt/web-platform-tests/custom-elements/custom-element-registry/define.html b/tests/wpt/web-platform-tests/custom-elements/custom-element-registry/define.html index e5d71ec6eab..61717b2e200 100644 --- a/tests/wpt/web-platform-tests/custom-elements/custom-element-registry/define.html +++ b/tests/wpt/web-platform-tests/custom-elements/custom-element-registry/define.html @@ -25,7 +25,7 @@ if (!testable) return; - const expectTypeError = TypeError.prototype; + const expectTypeError = testWindow.TypeError; // Following errors are DOMException, not JavaScript errors. const expectSyntaxError = 'SYNTAX_ERR'; const expectNotSupportedError = 'NOT_SUPPORTED_ERR'; @@ -33,12 +33,12 @@ // 1. If IsConstructor(constructor) is false, // then throw a TypeError and abort these steps. test(() => { - assert_throws(expectTypeError, () => { + assert_throws_js(expectTypeError, () => { customElements.define(); }); }, 'If no arguments, should throw a TypeError'); test(() => { - assert_throws(expectTypeError, () => { + assert_throws_js(expectTypeError, () => { customElements.define('test-define-one-arg'); }); }, 'If one argument, should throw a TypeError'); @@ -51,7 +51,7 @@ [ 'method', ({ m() { } }).m ], // IsConstructor returns false for methods ].forEach(t => { test(() => { - assert_throws(expectTypeError, () => { + assert_throws_js(expectTypeError, () => { customElements.define(`test-define-constructor-${t[0]}`, t[1]); }); }, `If constructor is ${t[0]}, should throw a TypeError`); @@ -105,7 +105,7 @@ }); invalidCustomElementNames.forEach(name => { test(() => { - assert_throws(expectSyntaxError, () => { + assert_throws_dom(expectSyntaxError, () => { customElements.define(name, class {}); }); }, `Element names: defining an element named ${name} should throw a SyntaxError`); @@ -115,7 +115,7 @@ // then throw a NotSupportedError and abort these steps. test(() => { customElements.define('test-define-dup-name', class {}); - assert_throws(expectNotSupportedError, () => { + assert_throws_dom(expectNotSupportedError, () => { customElements.define('test-define-dup-name', class {}); }); }, 'If the name is already defined, should throw a NotSupportedError'); @@ -125,7 +125,7 @@ test(() => { class TestDupConstructor {}; customElements.define('test-define-dup-constructor', TestDupConstructor); - assert_throws(expectNotSupportedError, () => { + assert_throws_dom(expectNotSupportedError, () => { customElements.define('test-define-dup-ctor2', TestDupConstructor); }); }, 'If the constructor is already defined, should throw a NotSupportedError'); @@ -134,7 +134,7 @@ // then throw a NotSupportedError. validCustomElementNames.forEach(name => { test(() => { - assert_throws(expectNotSupportedError, () => { + assert_throws_dom(expectNotSupportedError, () => { customElements.define('test-define-extend-valid-name', class {}, { extends: name }); }); }, `If extends is ${name}, should throw a NotSupportedError`); @@ -154,20 +154,20 @@ 'elementnametobeunknownelement', ].forEach(name => { test(() => { - assert_throws(expectNotSupportedError, () => { + assert_throws_dom(expectNotSupportedError, () => { customElements.define('test-define-extend-' + name, class {}, { extends: name }); }); }, `If extends is ${name}, should throw a NotSupportedError`); }); // 12.1. Let prototype be Get(constructor, "prototype"). Rethrow any exceptions. + const err = new Error('check this is rethrown'); + err.name = 'rethrown'; function assert_rethrown(func, description) { - assert_throws({ name: 'rethrown' }, func, description); + assert_throws_exactly(err, func, description); } function throw_rethrown_error() { - const e = new Error('check this is rethrown'); - e.name = 'rethrown'; - throw e; + throw err; } test(() => { // Hack for prototype to throw while IsConstructor is true. @@ -184,14 +184,14 @@ // then throw a TypeError exception. test(() => { const c = (function () { }).bind({}); // prototype is undefined. - assert_throws(expectTypeError, () => { + assert_throws_js(expectTypeError, () => { customElements.define('test-define-constructor-prototype-undefined', c); }); }, 'If Type(constructor.prototype) is undefined, should throw a TypeError'); test(() => { function c() {}; c.prototype = 'string'; - assert_throws(expectTypeError, () => { + assert_throws_js(expectTypeError, () => { customElements.define('test-define-constructor-prototype-string', c); }); }, 'If Type(constructor.prototype) is string, should throw a TypeError'); @@ -232,7 +232,7 @@ if (data.success) { customElements.define(`test-define-${name.toLowerCase()}-${data.name}`, C); } else { - assert_throws(expectTypeError, () => { + assert_throws_js(expectTypeError, () => { customElements.define(`test-define-${name.toLowerCase()}-${data.name}`, C); }); } diff --git a/tests/wpt/web-platform-tests/custom-elements/form-associated/ElementInternals-NotSupportedError.html b/tests/wpt/web-platform-tests/custom-elements/form-associated/ElementInternals-NotSupportedError.html index 0d8a5ffc8c3..51be7183c1e 100644 --- a/tests/wpt/web-platform-tests/custom-elements/form-associated/ElementInternals-NotSupportedError.html +++ b/tests/wpt/web-platform-tests/custom-elements/form-associated/ElementInternals-NotSupportedError.html @@ -9,15 +9,15 @@ test(() => { const element = new NotFormAssociatedElement(); const i = element.attachInternals(); - assert_throws('NotSupportedError', () => i.setFormValue('')); - assert_throws('NotSupportedError', () => i.form); - assert_throws('NotSupportedError', () => i.setValidity({})); - assert_throws('NotSupportedError', () => i.willValidate); - assert_throws('NotSupportedError', () => i.validity); - assert_throws('NotSupportedError', () => i.validationMessage); - assert_throws('NotSupportedError', () => i.checkValidity()); - assert_throws('NotSupportedError', () => i.reportValidity()); - assert_throws('NotSupportedError', () => i.labels); + assert_throws_dom('NotSupportedError', () => i.setFormValue('')); + assert_throws_dom('NotSupportedError', () => i.form); + assert_throws_dom('NotSupportedError', () => i.setValidity({})); + assert_throws_dom('NotSupportedError', () => i.willValidate); + assert_throws_dom('NotSupportedError', () => i.validity); + assert_throws_dom('NotSupportedError', () => i.validationMessage); + assert_throws_dom('NotSupportedError', () => i.checkValidity()); + assert_throws_dom('NotSupportedError', () => i.reportValidity()); + assert_throws_dom('NotSupportedError', () => i.labels); }, 'Form-related operations and attributes should throw NotSupportedErrors' + ' for non-form-associated custom elements.'); diff --git a/tests/wpt/web-platform-tests/custom-elements/form-associated/ElementInternals-validation.html b/tests/wpt/web-platform-tests/custom-elements/form-associated/ElementInternals-validation.html index d7116147691..f67e96465bd 100644 --- a/tests/wpt/web-platform-tests/custom-elements/form-associated/ElementInternals-validation.html +++ b/tests/wpt/web-platform-tests/custom-elements/form-associated/ElementInternals-validation.html @@ -115,7 +115,7 @@ test(() => { assert_true(validity.valid); assert_equals(control.i.validationMessage, ''); - assert_throws(new TypeError(), () => { control.i.setValidity({valueMissing: true}); }, + assert_throws_js(TypeError, () => { control.i.setValidity({valueMissing: true}); }, 'setValidity() requires the second argument if the first argument contains true'); }, 'validity and setValidity()'); @@ -125,11 +125,11 @@ test(() => { const flags = {valueMissing: true}; const m = 'non-empty message'; - assert_throws('NotFoundError', () => { + assert_throws_dom('NotFoundError', () => { control.i.setValidity(flags, m, document.body); }, 'Not a descendant'); - assert_throws('NotFoundError', () => { + assert_throws_dom('NotFoundError', () => { control.i.setValidity(flags, m, control); }, 'Self'); diff --git a/tests/wpt/web-platform-tests/custom-elements/htmlconstructor/newtarget.html b/tests/wpt/web-platform-tests/custom-elements/htmlconstructor/newtarget.html index 8d30682c10c..b95d7ade0bb 100644 --- a/tests/wpt/web-platform-tests/custom-elements/htmlconstructor/newtarget.html +++ b/tests/wpt/web-platform-tests/custom-elements/htmlconstructor/newtarget.html @@ -40,9 +40,10 @@ test_with_window(w => { // We have to not throw during define(), but throw during super() let throws = false; + let err = { name: "prototype throws" }; function TestElement() { throws = true; - assert_throws({ name: "prototype throws" }, () => { + assert_throws_exactly(err, () => { Reflect.construct(w.HTMLElement, [], new.target); }); } @@ -50,7 +51,7 @@ test_with_window(w => { const ElementWithDynamicPrototype = new Proxy(TestElement, { get: function (target, name) { if (throws && name == "prototype") - throw { name: "prototype throws" }; + throw err; return target[name]; } }); @@ -202,7 +203,7 @@ test_with_window(w => { // define() gets the prototype of the constructor it's passed, so // reset the counter. getCount = 0; - assert_throws({'name': 'TypeError'}, + assert_throws_js(TypeError, function () { new countingProxy() }, "Should not be able to construct an HTMLParagraphElement not named 'p'"); assert_equals(getCount, 0, "Should never have gotten .prototype"); @@ -223,7 +224,7 @@ test_with_window(w => { // define() gets the prototype of the constructor it's passed, so // reset the counter. getCount = 0; - assert_throws({'name': 'TypeError'}, + assert_throws_js(TypeError, function () { Reflect.construct(HTMLParagraphElement, [], countingProxy) }, "Should not be able to construct an HTMLParagraphElement not named 'p'"); assert_equals(getCount, 0, "Should never have gotten .prototype"); diff --git a/tests/wpt/web-platform-tests/custom-elements/reactions/with-exceptions.html b/tests/wpt/web-platform-tests/custom-elements/reactions/with-exceptions.html index 82e0f59c930..e7cdee789d4 100644 --- a/tests/wpt/web-platform-tests/custom-elements/reactions/with-exceptions.html +++ b/tests/wpt/web-platform-tests/custom-elements/reactions/with-exceptions.html @@ -25,7 +25,7 @@ test_with_window((contentWindow, contentDocument) => { contentDocument.documentElement.appendChild(text); const element = contentDocument.createElement("custom-element"); contentDocument.documentElement.appendChild(element); - assert_throws("HierarchyRequestError", () => text.before("", contentDocument.documentElement)); + assert_throws_dom("HierarchyRequestError", () => text.before("", contentDocument.documentElement)); assert_true(reactionRan); }, "Reaction must run even after the exception is thrown"); diff --git a/tests/wpt/web-platform-tests/custom-elements/throw-on-dynamic-markup-insertion-counter-construct.html b/tests/wpt/web-platform-tests/custom-elements/throw-on-dynamic-markup-insertion-counter-construct.html index 5938a0aeb9f..85359504014 100644 --- a/tests/wpt/web-platform-tests/custom-elements/throw-on-dynamic-markup-insertion-counter-construct.html +++ b/tests/wpt/web-platform-tests/custom-elements/throw-on-dynamic-markup-insertion-counter-construct.html @@ -45,12 +45,12 @@ promise_test(async function () { const result = await construct_custom_element_in_parser(this, (document) => document.open()); - assert_throws('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); + assert_throws_dom('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); }, 'document.open() must throw an InvalidStateError when synchronously constructing a custom element'); promise_test(async function () { const result = await construct_custom_element_in_parser(this, (document) => document.open('text/html')); - assert_throws('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); + assert_throws_dom('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); }, 'document.open("text/html") must throw an InvalidStateError when synchronously constructing a custom element'); // https://html.spec.whatwg.org/multipage/dynamic-markup-insertion.html#dom-document-open-window @@ -63,19 +63,19 @@ promise_test(async function () { const result = await construct_custom_element_in_parser(this, (document) => document.close()); - assert_throws('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); + assert_throws_dom('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); }, 'document.close() must throw an InvalidStateError when synchronously constructing a custom element'); promise_test(async function () { const result = await construct_custom_element_in_parser(this, (document) => document.write('some text')); - assert_throws('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); + assert_throws_dom('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); assert_equals(result.document.querySelector('b'), null, 'Must not insert new content'); assert_false(result.document.documentElement.innerHTML.includes('some text'), 'Must not insert new content'); }, 'document.write must throw an InvalidStateError when synchronously constructing a custom element'); promise_test(async function () { const result = await construct_custom_element_in_parser(this, (document) => document.writeln('some text')); - assert_throws('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); + assert_throws_dom('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); assert_equals(result.document.querySelector('b'), null, 'Must not insert new content'); assert_false(result.document.documentElement.innerHTML.includes('some text'), 'Must not insert new content'); }, 'document.writeln must throw an InvalidStateError when synchronously constructing a custom element'); diff --git a/tests/wpt/web-platform-tests/custom-elements/throw-on-dynamic-markup-insertion-counter-reactions.html b/tests/wpt/web-platform-tests/custom-elements/throw-on-dynamic-markup-insertion-counter-reactions.html index b9f9f55c705..49335bf9b42 100644 --- a/tests/wpt/web-platform-tests/custom-elements/throw-on-dynamic-markup-insertion-counter-reactions.html +++ b/tests/wpt/web-platform-tests/custom-elements/throw-on-dynamic-markup-insertion-counter-reactions.html @@ -45,12 +45,12 @@ async function custom_element_reactions_in_parser(test, call_function) promise_test(async function () { const result = await custom_element_reactions_in_parser(this, (document) => document.open()); - assert_throws('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); + assert_throws_dom('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); }, 'document.open() must throw an InvalidStateError when processing custom element reactions for a synchronous constructed custom element'); promise_test(async function () { const result = await custom_element_reactions_in_parser(this, (document) => document.open('text/html')); - assert_throws('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); + assert_throws_dom('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); }, 'document.open("text/html") must throw an InvalidStateError when processing custom element reactions for a synchronous constructed custom element'); // https://html.spec.whatwg.org/multipage/dynamic-markup-insertion.html#dom-document-open-window @@ -63,19 +63,19 @@ promise_test(async function () { promise_test(async function () { const result = await custom_element_reactions_in_parser(this, (document) => document.close()); - assert_throws('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); + assert_throws_dom('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); }, 'document.close() must throw an InvalidStateError when processing custom element reactions for a synchronous constructed custom element'); promise_test(async function () { const result = await custom_element_reactions_in_parser(this, (document) => document.write('some text')); - assert_throws('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); + assert_throws_dom('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); assert_equals(result.document.querySelector('b'), null, 'Must not insert new content'); assert_false(result.document.documentElement.innerHTML.includes('some text'), 'Must not insert new content'); }, 'document.write must throw an InvalidStateError when processing custom element reactions for a synchronous constructed custom element'); promise_test(async function () { const result = await custom_element_reactions_in_parser(this, (document) => document.writeln('some text')); - assert_throws('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); + assert_throws_dom('InvalidStateError', () => { throw result.exception; }, 'Must throw an InvalidStateError'); assert_equals(result.document.querySelector('b'), null, 'Must not insert new content'); assert_false(result.document.documentElement.innerHTML.includes('some text'), 'Must not insert new content'); }, 'document.writeln must throw an InvalidStateError when processing custom element reactions for a synchronous constructed custom element'); diff --git a/tests/wpt/web-platform-tests/dom/collections/HTMLCollection-as-prototype.html b/tests/wpt/web-platform-tests/dom/collections/HTMLCollection-as-prototype.html index 75546a77c5e..d572d35c041 100644 --- a/tests/wpt/web-platform-tests/dom/collections/HTMLCollection-as-prototype.html +++ b/tests/wpt/web-platform-tests/dom/collections/HTMLCollection-as-prototype.html @@ -7,7 +7,7 @@ diff --git a/tests/wpt/web-platform-tests/dom/nodes/Document-createAttribute.html b/tests/wpt/web-platform-tests/dom/nodes/Document-createAttribute.html index b494257958f..b3dc8b60b9b 100644 --- a/tests/wpt/web-platform-tests/dom/nodes/Document-createAttribute.html +++ b/tests/wpt/web-platform-tests/dom/nodes/Document-createAttribute.html @@ -14,13 +14,13 @@ setup(function() { invalid_names.forEach(function(name) { test(function() { - assert_throws("INVALID_CHARACTER_ERR", function() { + assert_throws_dom("INVALID_CHARACTER_ERR", function() { document.createAttribute(name, "test"); }); }, "HTML document.createAttribute(" + format_value(name) + ") should throw"); test(function() { - assert_throws("INVALID_CHARACTER_ERR", function() { + assert_throws_dom("INVALID_CHARACTER_ERR", function() { xml_document.createAttribute(name, "test"); }); }, "XML document.createAttribute(" + format_value(name) + ") should throw"); diff --git a/tests/wpt/web-platform-tests/dom/nodes/Document-createElement.html b/tests/wpt/web-platform-tests/dom/nodes/Document-createElement.html index a74962752e7..653108ca11a 100644 --- a/tests/wpt/web-platform-tests/dom/nodes/Document-createElement.html +++ b/tests/wpt/web-platform-tests/dom/nodes/Document-createElement.html @@ -146,7 +146,7 @@ invalid.forEach(function(arg) { window.addEventListener("load", function() { testObj.step(function() { var doc = getWin(desc).document; - assert_throws("InvalidCharacterError", + assert_throws_dom("InvalidCharacterError", function() { doc.createElement(arg) }) }); testObj.done(); diff --git a/tests/wpt/web-platform-tests/dom/nodes/Document-createElementNS.html b/tests/wpt/web-platform-tests/dom/nodes/Document-createElementNS.html index 6df8c785b8b..43cf800b4cc 100644 --- a/tests/wpt/web-platform-tests/dom/nodes/Document-createElementNS.html +++ b/tests/wpt/web-platform-tests/dom/nodes/Document-createElementNS.html @@ -50,7 +50,7 @@ function runTest(t, i, desc) { } var namespace = t[0], qualifiedName = t[1], expected = t[2] if (expected != null) { - assert_throws(expected, function() { doc.createElementNS(namespace, qualifiedName) }) + assert_throws_dom(expected, function() { doc.createElementNS(namespace, qualifiedName) }) } else { var element = doc.createElementNS(namespace, qualifiedName) assert_not_equals(element, null) diff --git a/tests/wpt/web-platform-tests/dom/nodes/Document-createEvent.https.html b/tests/wpt/web-platform-tests/dom/nodes/Document-createEvent.https.html index bdc1895879b..b4fb8cd0a31 100644 --- a/tests/wpt/web-platform-tests/dom/nodes/Document-createEvent.https.html +++ b/tests/wpt/web-platform-tests/dom/nodes/Document-createEvent.https.html @@ -42,7 +42,7 @@ for (var alias in aliases) { var plural = alias + "s"; if (!(plural in aliases)) { test(function () { - assert_throws("NOT_SUPPORTED_ERR", function () { + assert_throws_dom("NOT_SUPPORTED_ERR", function () { var evt = document.createEvent(plural); }); }, 'Should throw NOT_SUPPORTED_ERR for pluralized legacy event interface "' + plural + '"'); @@ -51,14 +51,14 @@ for (var alias in aliases) { } test(function() { - assert_throws("NOT_SUPPORTED_ERR", function() { + assert_throws_dom("NOT_SUPPORTED_ERR", function() { var evt = document.createEvent("foo"); }); - assert_throws("NOT_SUPPORTED_ERR", function() { + assert_throws_dom("NOT_SUPPORTED_ERR", function() { // 'LATIN CAPITAL LETTER I WITH DOT ABOVE' (U+0130) var evt = document.createEvent("U\u0130Event"); }); - assert_throws("NOT_SUPPORTED_ERR", function() { + assert_throws_dom("NOT_SUPPORTED_ERR", function() { // 'LATIN SMALL LETTER DOTLESS I' (U+0131) var evt = document.createEvent("U\u0131Event"); }); @@ -144,7 +144,7 @@ var someNonCreateableEvents = [ ]; someNonCreateableEvents.forEach(function (eventInterface) { test(function () { - assert_throws("NOT_SUPPORTED_ERR", function () { + assert_throws_dom("NOT_SUPPORTED_ERR", function () { var evt = document.createEvent(eventInterface); }); }, 'Should throw NOT_SUPPORTED_ERR for non-legacy event interface "' + eventInterface + '"'); @@ -152,7 +152,7 @@ someNonCreateableEvents.forEach(function (eventInterface) { // SVGEvents is allowed, other plurals are not if (eventInterface !== "SVGEvent") { test(function () { - assert_throws("NOT_SUPPORTED_ERR", function () { + assert_throws_dom("NOT_SUPPORTED_ERR", function () { var evt = document.createEvent(eventInterface + "s"); }); }, 'Should throw NOT_SUPPORTED_ERR for pluralized non-legacy event interface "' + eventInterface + 's"'); diff --git a/tests/wpt/web-platform-tests/dom/nodes/Document-createProcessingInstruction.js b/tests/wpt/web-platform-tests/dom/nodes/Document-createProcessingInstruction.js index 114ac35d9f8..d6cc3725f03 100644 --- a/tests/wpt/web-platform-tests/dom/nodes/Document-createProcessingInstruction.js +++ b/tests/wpt/web-platform-tests/dom/nodes/Document-createProcessingInstruction.js @@ -17,7 +17,7 @@ test(function() { for (var i = 0, il = invalid.length; i < il; i++) { test(function() { - assert_throws("INVALID_CHARACTER_ERR", function() { + assert_throws_dom("INVALID_CHARACTER_ERR", function() { document.createProcessingInstruction(invalid[i][0], invalid[i][1]) }) }, "Should throw an INVALID_CHARACTER_ERR for target " + diff --git a/tests/wpt/web-platform-tests/dom/nodes/Document-createTreeWalker.html b/tests/wpt/web-platform-tests/dom/nodes/Document-createTreeWalker.html index f8f04b068fd..1e8420d8416 100644 --- a/tests/wpt/web-platform-tests/dom/nodes/Document-createTreeWalker.html +++ b/tests/wpt/web-platform-tests/dom/nodes/Document-createTreeWalker.html @@ -6,7 +6,7 @@
    diff --git a/tests/wpt/web-platform-tests/dom/nodes/Node-replaceChild.html b/tests/wpt/web-platform-tests/dom/nodes/Node-replaceChild.html index 3c289a4c14d..e942cfa3ec4 100644 --- a/tests/wpt/web-platform-tests/dom/nodes/Node-replaceChild.html +++ b/tests/wpt/web-platform-tests/dom/nodes/Node-replaceChild.html @@ -15,15 +15,15 @@ // IDL. test(function() { var a = document.createElement("div"); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { a.replaceChild(null, null); }); var b = document.createElement("div"); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { a.replaceChild(b, null); }); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { a.replaceChild(null, b); }); }, "Passing null to replaceChild should throw a TypeError.") @@ -33,16 +33,16 @@ test(function() { var a = document.createElement("div"); var b = document.createElement("div"); var c = document.createElement("div"); - assert_throws("NotFoundError", function() { + assert_throws_dom("NotFoundError", function() { a.replaceChild(b, c); }); var d = document.createElement("div"); d.appendChild(b); - assert_throws("NotFoundError", function() { + assert_throws_dom("NotFoundError", function() { a.replaceChild(b, c); }); - assert_throws("NotFoundError", function() { + assert_throws_dom("NotFoundError", function() { a.replaceChild(b, a); }); }, "If child's parent is not the context node, a NotFoundError exception should be thrown"); @@ -54,7 +54,7 @@ test(function() { var a = document.createElement("div"); var b = document.createElement("div"); nodes.forEach(function(node) { - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { node.replaceChild(a, b); }); }); @@ -65,18 +65,18 @@ test(function() { var a = document.createElement("div"); var b = document.createElement("div"); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { a.replaceChild(a, a); }); a.appendChild(b); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { a.replaceChild(a, b); }); var c = document.createElement("div"); c.appendChild(a); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { a.replaceChild(c, b); }); }, "If node is an inclusive ancestor of the context node, a HierarchyRequestError should be thrown.") @@ -85,11 +85,11 @@ test(function() { test(function() { var doc = document.implementation.createHTMLDocument("title"); var doc2 = document.implementation.createHTMLDocument("title2"); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(doc2, doc.documentElement); }); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(doc.createTextNode("text"), doc.documentElement); }); }, "If the context node is a document, inserting a document or text node should throw a HierarchyRequestError.") @@ -101,20 +101,20 @@ test(function() { var df = doc.createDocumentFragment(); df.appendChild(doc.createElement("a")); df.appendChild(doc.createElement("b")); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(df, doc.documentElement); }); df = doc.createDocumentFragment(); df.appendChild(doc.createTextNode("text")); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(df, doc.documentElement); }); df = doc.createDocumentFragment(); df.appendChild(doc.createComment("comment")); df.appendChild(doc.createTextNode("text")); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(df, doc.documentElement); }); }, "If the context node is a document, inserting a DocumentFragment that contains a text node or too many elements should throw a HierarchyRequestError.") @@ -125,7 +125,7 @@ test(function() { var df = doc.createDocumentFragment(); df.appendChild(doc.createElement("a")); df.appendChild(doc.createElement("b")); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(df, doc.doctype); }); }, "If the context node is a document (without element children), inserting a DocumentFragment that contains multiple elements should throw a HierarchyRequestError.") @@ -139,10 +139,10 @@ test(function() { var df = doc.createDocumentFragment(); df.appendChild(doc.createElement("a")); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(df, comment); }); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(df, doc.doctype); }); }, "If the context node is a document, inserting a DocumentFragment with an element if there already is an element child should throw a HierarchyRequestError.") @@ -155,7 +155,7 @@ test(function() { var df = doc.createDocumentFragment(); df.appendChild(doc.createElement("a")); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(df, comment); }); }, "If the context node is a document, inserting a DocumentFragment with an element before the doctype should throw a HierarchyRequestError.") @@ -167,10 +167,10 @@ test(function() { assert_array_equals(doc.childNodes, [doc.doctype, doc.documentElement, comment]); var a = doc.createElement("a"); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(a, comment); }); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(a, doc.doctype); }); }, "If the context node is a document, inserting an element if there already is an element child should throw a HierarchyRequestError.") @@ -181,7 +181,7 @@ test(function() { assert_array_equals(doc.childNodes, [comment, doc.doctype]); var a = doc.createElement("a"); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(a, comment); }); }, "If the context node is a document, inserting an element before the doctype should throw a HierarchyRequestError.") @@ -193,10 +193,10 @@ test(function() { assert_array_equals(doc.childNodes, [comment, doc.doctype, doc.documentElement]); var doctype = document.implementation.createDocumentType("html", "", ""); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(doctype, comment); }); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(doctype, doc.documentElement); }); }, "If the context node is a document, inserting a doctype if there already is a doctype child should throw a HierarchyRequestError.") @@ -207,7 +207,7 @@ test(function() { assert_array_equals(doc.childNodes, [doc.documentElement, comment]); var doctype = document.implementation.createDocumentType("html", "", ""); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.replaceChild(doctype, comment); }); }, "If the context node is a document, inserting a doctype after the document element should throw a HierarchyRequestError.") @@ -218,12 +218,12 @@ test(function() { var a = df.appendChild(document.createElement("a")); var doc = document.implementation.createHTMLDocument("title"); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { df.replaceChild(doc, a); }); var doctype = document.implementation.createDocumentType("html", "", ""); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { df.replaceChild(doctype, a); }); }, "If the context node is a DocumentFragment, inserting a document or a doctype should throw a HierarchyRequestError.") @@ -232,12 +232,12 @@ test(function() { var a = el.appendChild(document.createElement("a")); var doc = document.implementation.createHTMLDocument("title"); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { el.replaceChild(doc, a); }); var doctype = document.implementation.createDocumentType("html", "", ""); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { el.replaceChild(doctype, a); }); }, "If the context node is an element, inserting a document or a doctype should throw a HierarchyRequestError.") diff --git a/tests/wpt/web-platform-tests/dom/nodes/ParentNode-querySelector-All.js b/tests/wpt/web-platform-tests/dom/nodes/ParentNode-querySelector-All.js index dd789b72da2..3d424f750b9 100644 --- a/tests/wpt/web-platform-tests/dom/nodes/ParentNode-querySelector-All.js +++ b/tests/wpt/web-platform-tests/dom/nodes/ParentNode-querySelector-All.js @@ -102,6 +102,8 @@ function verifyStaticList(type, doc, root) { * null and undefined, and the handling of the empty string. */ function runSpecialSelectorTests(type, root) { + let global = (root.ownerDocument || root).defaultView; + test(function() { // 1 assert_equals(root.querySelectorAll(null).length, 1, "This should find one element with the tag name 'NULL'."); }, type + ".querySelectorAll null") @@ -111,7 +113,7 @@ function runSpecialSelectorTests(type, root) { }, type + ".querySelectorAll undefined") test(function() { // 3 - assert_throws(TypeError(), function() { + assert_throws_js(global.TypeError, function() { root.querySelectorAll(); }, "This should throw a TypeError.") }, type + ".querySelectorAll no parameter") @@ -129,7 +131,7 @@ function runSpecialSelectorTests(type, root) { }, type + ".querySelector undefined") test(function() { // 6 - assert_throws(TypeError(), function() { + assert_throws_js(global.TypeError, function() { root.querySelector(); }, "This should throw a TypeError.") }, type + ".querySelector no parameter") @@ -216,13 +218,13 @@ function runInvalidSelectorTest(type, root, selectors) { var q = s["selector"]; test(function() { - assert_throws("SyntaxError", function() { + assert_throws_dom("SyntaxError", function() { root.querySelector(q) }) }, type + ".querySelector: " + n + ": " + q); test(function() { - assert_throws("SyntaxError", function() { + assert_throws_dom("SyntaxError", function() { root.querySelectorAll(q) }) }, type + ".querySelectorAll: " + n + ": " + q); diff --git a/tests/wpt/web-platform-tests/dom/nodes/Text-splitText.html b/tests/wpt/web-platform-tests/dom/nodes/Text-splitText.html index aec1cee52ed..2dd23018cb4 100644 --- a/tests/wpt/web-platform-tests/dom/nodes/Text-splitText.html +++ b/tests/wpt/web-platform-tests/dom/nodes/Text-splitText.html @@ -8,7 +8,7 @@ diff --git a/tests/wpt/web-platform-tests/dom/ranges/Range-comparePoint.html b/tests/wpt/web-platform-tests/dom/ranges/Range-comparePoint.html index 95264796be8..e18ac95c4ca 100644 --- a/tests/wpt/web-platform-tests/dom/ranges/Range-comparePoint.html +++ b/tests/wpt/web-platform-tests/dom/ranges/Range-comparePoint.html @@ -41,7 +41,7 @@ for (var i = 0; i < testPoints.length; i++) { // throw a "WrongDocumentError" exception and terminate these // steps." if (furthestAncestor(node) !== furthestAncestor(range.startContainer)) { - assert_throws("WRONG_DOCUMENT_ERR", function() { + assert_throws_dom("WRONG_DOCUMENT_ERR", function() { range.comparePoint(node, offset); }, "Must throw WrongDocumentError if node and range have different roots"); return; @@ -50,7 +50,7 @@ for (var i = 0; i < testPoints.length; i++) { // "If node is a doctype, throw an "InvalidNodeTypeError" exception // and terminate these steps." if (node.nodeType == Node.DOCUMENT_TYPE_NODE) { - assert_throws("INVALID_NODE_TYPE_ERR", function() { + assert_throws_dom("INVALID_NODE_TYPE_ERR", function() { range.comparePoint(node, offset); }, "Must throw InvalidNodeTypeError if node is a doctype"); return; @@ -59,7 +59,7 @@ for (var i = 0; i < testPoints.length; i++) { // "If offset is greater than node's length, throw an // "IndexSizeError" exception and terminate these steps." if (normalizedOffset > nodeLength(node)) { - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { range.comparePoint(node, offset); }, "Must throw IndexSizeError if offset is greater than length"); return; diff --git a/tests/wpt/web-platform-tests/dom/ranges/Range-extractContents.html b/tests/wpt/web-platform-tests/dom/ranges/Range-extractContents.html index 098837f0ce5..b43769ebc01 100644 --- a/tests/wpt/web-platform-tests/dom/ranges/Range-extractContents.html +++ b/tests/wpt/web-platform-tests/dom/ranges/Range-extractContents.html @@ -95,7 +95,7 @@ function testExtractContents(i) { expectedFrag = myExtractContents(expectedRange); if (typeof expectedFrag == "string") { - assert_throws(expectedFrag, function() { + assert_throws_dom(expectedFrag, function() { actualRange.extractContents(); }); } else { diff --git a/tests/wpt/web-platform-tests/dom/ranges/Range-insertNode.html b/tests/wpt/web-platform-tests/dom/ranges/Range-insertNode.html index 4c4073b2156..aca3a23ff5d 100644 --- a/tests/wpt/web-platform-tests/dom/ranges/Range-insertNode.html +++ b/tests/wpt/web-platform-tests/dom/ranges/Range-insertNode.html @@ -138,7 +138,7 @@ function testInsertNode(i, j) { throw e; } if (typeof result == "string") { - assert_throws(result, function() { + assert_throws_dom(result, function() { try { actualRange.insertNode(actualNode); } catch (e) { diff --git a/tests/wpt/web-platform-tests/dom/ranges/Range-intersectsNode-binding.html b/tests/wpt/web-platform-tests/dom/ranges/Range-intersectsNode-binding.html index 729388428ec..57d159b0303 100644 --- a/tests/wpt/web-platform-tests/dom/ranges/Range-intersectsNode-binding.html +++ b/tests/wpt/web-platform-tests/dom/ranges/Range-intersectsNode-binding.html @@ -8,18 +8,18 @@ diff --git a/tests/wpt/web-platform-tests/dom/ranges/Range-isPointInRange.html b/tests/wpt/web-platform-tests/dom/ranges/Range-isPointInRange.html index fa87442b8ab..80db97e844c 100644 --- a/tests/wpt/web-platform-tests/dom/ranges/Range-isPointInRange.html +++ b/tests/wpt/web-platform-tests/dom/ranges/Range-isPointInRange.html @@ -48,7 +48,7 @@ for (var i = 0; i < testPoints.length; i++) { // "If node is a doctype, throw an "InvalidNodeTypeError" exception // and terminate these steps." if (node.nodeType == Node.DOCUMENT_TYPE_NODE) { - assert_throws("INVALID_NODE_TYPE_ERR", function() { + assert_throws_dom("INVALID_NODE_TYPE_ERR", function() { range.isPointInRange(node, offset); }, "Must throw InvalidNodeTypeError if node is a doctype"); return; @@ -57,7 +57,7 @@ for (var i = 0; i < testPoints.length; i++) { // "If offset is greater than node's length, throw an // "IndexSizeError" exception and terminate these steps." if (normalizedOffset > nodeLength(node)) { - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { range.isPointInRange(node, offset); }, "Must throw IndexSizeError if offset is greater than length"); return; diff --git a/tests/wpt/web-platform-tests/dom/ranges/Range-selectNode.html b/tests/wpt/web-platform-tests/dom/ranges/Range-selectNode.html index 6311a84b9e6..fe9b1f7860b 100644 --- a/tests/wpt/web-platform-tests/dom/ranges/Range-selectNode.html +++ b/tests/wpt/web-platform-tests/dom/ranges/Range-selectNode.html @@ -14,17 +14,17 @@ function testSelectNode(range, node) { range.collapsed; } catch (e) { // Range is detached - assert_throws("INVALID_STATE_ERR", function () { + assert_throws_dom("INVALID_STATE_ERR", function () { range.selectNode(node); }, "selectNode() on a detached node must throw INVALID_STATE_ERR"); - assert_throws("INVALID_STATE_ERR", function () { + assert_throws_dom("INVALID_STATE_ERR", function () { range.selectNodeContents(node); }, "selectNodeContents() on a detached node must throw INVALID_STATE_ERR"); return; } if (!node.parentNode) { - assert_throws("INVALID_NODE_TYPE_ERR", function() { + assert_throws_dom("INVALID_NODE_TYPE_ERR", function() { range.selectNode(node); }, "selectNode() on a node with no parent must throw INVALID_NODE_TYPE_ERR"); } else { @@ -45,7 +45,7 @@ function testSelectNode(range, node) { } if (node.nodeType == Node.DOCUMENT_TYPE_NODE) { - assert_throws("INVALID_NODE_TYPE_ERR", function () { + assert_throws_dom("INVALID_NODE_TYPE_ERR", function () { range.selectNodeContents(node); }, "selectNodeContents() on a doctype must throw INVALID_NODE_TYPE_ERR"); } else { diff --git a/tests/wpt/web-platform-tests/dom/ranges/Range-set.html b/tests/wpt/web-platform-tests/dom/ranges/Range-set.html index 5b43c04f418..694fc607497 100644 --- a/tests/wpt/web-platform-tests/dom/ranges/Range-set.html +++ b/tests/wpt/web-platform-tests/dom/ranges/Range-set.html @@ -12,14 +12,14 @@ function testSetStart(range, node, offset) { if (node.nodeType == Node.DOCUMENT_TYPE_NODE) { - assert_throws("INVALID_NODE_TYPE_ERR", function() { + assert_throws_dom("INVALID_NODE_TYPE_ERR", function() { range.setStart(node, offset); }, "setStart() to a doctype must throw INVALID_NODE_TYPE_ERR"); return; } if (offset < 0 || offset > nodeLength(node)) { - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { range.setStart(node, offset); }, "setStart() to a too-large offset must throw INDEX_SIZE_ERR"); return; @@ -51,14 +51,14 @@ function testSetStart(range, node, offset) { function testSetEnd(range, node, offset) { if (node.nodeType == Node.DOCUMENT_TYPE_NODE) { - assert_throws("INVALID_NODE_TYPE_ERR", function() { + assert_throws_dom("INVALID_NODE_TYPE_ERR", function() { range.setEnd(node, offset); }, "setEnd() to a doctype must throw INVALID_NODE_TYPE_ERR"); return; } if (offset < 0 || offset > nodeLength(node)) { - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { range.setEnd(node, offset); }, "setEnd() to a too-large offset must throw INDEX_SIZE_ERR"); return; @@ -91,7 +91,7 @@ function testSetEnd(range, node, offset) { function testSetStartBefore(range, node) { var parent = node.parentNode; if (parent === null) { - assert_throws("INVALID_NODE_TYPE_ERR", function () { + assert_throws_dom("INVALID_NODE_TYPE_ERR", function () { range.setStartBefore(node); }, "setStartBefore() to a node with null parent must throw INVALID_NODE_TYPE_ERR"); return; @@ -108,7 +108,7 @@ function testSetStartBefore(range, node) { function testSetStartAfter(range, node) { var parent = node.parentNode; if (parent === null) { - assert_throws("INVALID_NODE_TYPE_ERR", function () { + assert_throws_dom("INVALID_NODE_TYPE_ERR", function () { range.setStartAfter(node); }, "setStartAfter() to a node with null parent must throw INVALID_NODE_TYPE_ERR"); return; @@ -125,7 +125,7 @@ function testSetStartAfter(range, node) { function testSetEndBefore(range, node) { var parent = node.parentNode; if (parent === null) { - assert_throws("INVALID_NODE_TYPE_ERR", function () { + assert_throws_dom("INVALID_NODE_TYPE_ERR", function () { range.setEndBefore(node); }, "setEndBefore() to a node with null parent must throw INVALID_NODE_TYPE_ERR"); return; @@ -142,7 +142,7 @@ function testSetEndBefore(range, node) { function testSetEndAfter(range, node) { var parent = node.parentNode; if (parent === null) { - assert_throws("INVALID_NODE_TYPE_ERR", function () { + assert_throws_dom("INVALID_NODE_TYPE_ERR", function () { range.setEndAfter(node); }, "setEndAfter() to a node with null parent must throw INVALID_NODE_TYPE_ERR"); return; diff --git a/tests/wpt/web-platform-tests/dom/ranges/Range-surroundContents.html b/tests/wpt/web-platform-tests/dom/ranges/Range-surroundContents.html index e8cc11b24e7..c4ff0509f8f 100644 --- a/tests/wpt/web-platform-tests/dom/ranges/Range-surroundContents.html +++ b/tests/wpt/web-platform-tests/dom/ranges/Range-surroundContents.html @@ -181,7 +181,7 @@ function testSurroundContents(i, j) { throw e; } if (typeof result == "string") { - assert_throws(result, function() { + assert_throws_dom(result, function() { try { actualRange.surroundContents(actualNode); } catch (e) { diff --git a/tests/wpt/web-platform-tests/dom/ranges/StaticRange-constructor.html b/tests/wpt/web-platform-tests/dom/ranges/StaticRange-constructor.html index 55a969415ce..6aae93f49b9 100644 --- a/tests/wpt/web-platform-tests/dom/ranges/StaticRange-constructor.html +++ b/tests/wpt/web-platform-tests/dom/ranges/StaticRange-constructor.html @@ -158,42 +158,42 @@ test(function() { }, 'Construct static range with endpoints in disconnected documents'); test(function() { - assert_throws('INVALID_NODE_TYPE_ERR', function() { + assert_throws_dom('INVALID_NODE_TYPE_ERR', function() { const staticRange = new StaticRange({startContainer: document.doctype, startOffset: 0, endContainer: document.doctype, endOffset: 0}); }, 'throw a InvalidNodeTypeError when a DocumentType is passed as a startContainer or endContainer'); - assert_throws('INVALID_NODE_TYPE_ERR', function() { + assert_throws_dom('INVALID_NODE_TYPE_ERR', function() { const testAttrNode = testDiv.getAttributeNode('id'); const staticRange = new StaticRange({startContainer: testAttrNode, startOffset: 0, endContainer: testAttrNode, endOffset: 0}); }, 'throw a InvalidNodeTypeError when a Attr is passed as a startContainer or endContainer'); }, 'Throw on DocumentType or Attr container'); test(function () { - assert_throws({'name': 'TypeError'}, function () { + assert_throws_js(TypeError, function () { const staticRange = new StaticRange(); }, 'throw a TypeError when no argument is passed'); - assert_throws({'name': 'TypeError'}, function () { + assert_throws_js(TypeError, function () { const staticRange = new StaticRange({startOffset: 0, endContainer: testDiv, endOffset: 0}); }, 'throw a TypeError when a startContainer is not passed'); - assert_throws({'name': 'TypeError'}, function () { + assert_throws_js(TypeError, function () { const staticRange = new StaticRange({startContainer: testDiv, endContainer: testDiv, endOffset: 0}); }, 'throw a TypeError when a startOffset is not passed'); - assert_throws({'name': 'TypeError'}, function () { + assert_throws_js(TypeError, function () { const staticRange = new StaticRange({startContainer: testDiv, startOffset: 0, endOffset: 0}); }, 'throw a TypeError when an endContainer is not passed'); - assert_throws({'name': 'TypeError'}, function () { + assert_throws_js(TypeError, function () { const staticRange = new StaticRange({startContainer: testDiv, startOffset: 0, endContainer: testDiv}); }, 'throw a TypeError when an endOffset is not passed'); - assert_throws({'name': 'TypeError'}, function () { + assert_throws_js(TypeError, function () { const staticRange = new StaticRange({startContainer: null, startOffset: 0, endContainer: testDiv, endOffset: 0}); }, 'throw a TypeError when a null startContainer is passed'); - assert_throws({'name': 'TypeError'}, function () { + assert_throws_js(TypeError, function () { const staticRange = new StaticRange({startContainer: testDiv, startOffset: 0, endContainer: null, endOffset: 0}); }, 'throw a TypeError when a null endContainer is passed'); }, 'Throw on missing or invalid arguments'); diff --git a/tests/wpt/web-platform-tests/dom/traversal/NodeIterator.html b/tests/wpt/web-platform-tests/dom/traversal/NodeIterator.html index 3db5dec0707..fb81676cc5b 100644 --- a/tests/wpt/web-platform-tests/dom/traversal/NodeIterator.html +++ b/tests/wpt/web-platform-tests/dom/traversal/NodeIterator.html @@ -47,9 +47,10 @@ test(function() { }, "createNodeIterator() with undefined as arguments"); test(function() { + var err = {name: "failed"}; var iter = document.createNodeIterator(document, NodeFilter.SHOW_ALL, - function() { throw {name: "failed"} }); - assert_throws({name: "failed"}, function() { iter.nextNode() }); + function() { throw err; }); + assert_throws_exactly(err, function() { iter.nextNode() }); }, "Propagate exception from filter function"); test(function() { @@ -64,9 +65,9 @@ test(function() { }); iter.nextNode(); iter.nextNode(); - assert_throws("InvalidStateError", function() { iter.nextNode() }); + assert_throws_dom("InvalidStateError", function() { iter.nextNode() }); depth--; - assert_throws("InvalidStateError", function() { iter.previousNode() }); + assert_throws_dom("InvalidStateError", function() { iter.previousNode() }); }, "Recursive filters need to throw"); function testIterator(root, whatToShow, filter) { diff --git a/tests/wpt/web-platform-tests/dom/traversal/TreeWalker-acceptNode-filter.html b/tests/wpt/web-platform-tests/dom/traversal/TreeWalker-acceptNode-filter.html index 5d521f016f4..8b5ff9a9bba 100644 --- a/tests/wpt/web-platform-tests/dom/traversal/TreeWalker-acceptNode-filter.html +++ b/tests/wpt/web-platform-tests/dom/traversal/TreeWalker-acceptNode-filter.html @@ -88,18 +88,18 @@ test(function() test(function() { var walker = document.createTreeWalker(testElement, NodeFilter.SHOW_ELEMENT, {}); - assert_throws(new TypeError(), function () { walker.firstChild(); }); + assert_throws_js(TypeError, function () { walker.firstChild(); }); assert_node(walker.currentNode, { type: Element, id: 'root' }); - assert_throws(new TypeError(), function () { walker.nextNode(); }); + assert_throws_js(TypeError, function () { walker.nextNode(); }); assert_node(walker.currentNode, { type: Element, id: 'root' }); }, 'Testing with object lacking acceptNode property'); test(function() { var walker = document.createTreeWalker(testElement, NodeFilter.SHOW_ELEMENT, { acceptNode: "foo" }); - assert_throws(new TypeError(), function () { walker.firstChild(); }); + assert_throws_js(TypeError, function () { walker.firstChild(); }); assert_node(walker.currentNode, { type: Element, id: 'root' }); - assert_throws(new TypeError(), function () { walker.nextNode(); }); + assert_throws_js(TypeError, function () { walker.nextNode(); }); assert_node(walker.currentNode, { type: Element, id: 'root' }); }, 'Testing with object with non-function acceptNode property'); @@ -119,9 +119,9 @@ test(function() function(node) { throw test_error; }); - assert_throws(test_error, function () { walker.firstChild(); }); + assert_throws_exactly(test_error, function () { walker.firstChild(); }); assert_node(walker.currentNode, { type: Element, id: 'root' }); - assert_throws(test_error, function () { walker.nextNode(); }); + assert_throws_exactly(test_error, function () { walker.nextNode(); }); assert_node(walker.currentNode, { type: Element, id: 'root' }); }, 'Testing with filter function that throws'); @@ -134,9 +134,9 @@ test(function() { }; var walker = document.createTreeWalker(testElement, NodeFilter.SHOW_ELEMENT, filter); - assert_throws(testError, function() { walker.firstChild(); }); + assert_throws_exactly(testError, function() { walker.firstChild(); }); assert_node(walker.currentNode, { type: Element, id: 'root' }); - assert_throws(testError, function() { walker.nextNode(); }); + assert_throws_exactly(testError, function() { walker.nextNode(); }); assert_node(walker.currentNode, { type: Element, id: 'root' }); }, "rethrows errors when getting `acceptNode`"); @@ -166,9 +166,9 @@ test(function() throw test_error; } }); - assert_throws(test_error, function () { walker.firstChild(); }); + assert_throws_exactly(test_error, function () { walker.firstChild(); }); assert_node(walker.currentNode, { type: Element, id: 'root' }); - assert_throws(test_error, function () { walker.nextNode(); }); + assert_throws_exactly(test_error, function () { walker.nextNode(); }); assert_node(walker.currentNode, { type: Element, id: 'root' }); }, 'Testing with filter object that throws'); diff --git a/tests/wpt/web-platform-tests/dom/traversal/TreeWalker-basic.html b/tests/wpt/web-platform-tests/dom/traversal/TreeWalker-basic.html index 100cb10de3e..4e14ac421ef 100644 --- a/tests/wpt/web-platform-tests/dom/traversal/TreeWalker-basic.html +++ b/tests/wpt/web-platform-tests/dom/traversal/TreeWalker-basic.html @@ -106,11 +106,11 @@ test(function () test(function () { - assert_throws(new TypeError(), function () { document.createTreeWalker(); }); - assert_throws(new TypeError(), function () { document.createTreeWalker(null); }); - assert_throws(new TypeError(), function () { document.createTreeWalker(undefined); }); - assert_throws(new TypeError(), function () { document.createTreeWalker(new Object()); }); - assert_throws(new TypeError(), function () { document.createTreeWalker(1); }); + assert_throws_js(TypeError, function () { document.createTreeWalker(); }); + assert_throws_js(TypeError, function () { document.createTreeWalker(null); }); + assert_throws_js(TypeError, function () { document.createTreeWalker(undefined); }); + assert_throws_js(TypeError, function () { document.createTreeWalker(new Object()); }); + assert_throws_js(TypeError, function () { document.createTreeWalker(1); }); }, 'Give an invalid root node to document.createTreeWalker().'); test(function () diff --git a/tests/wpt/web-platform-tests/dom/traversal/TreeWalker.html b/tests/wpt/web-platform-tests/dom/traversal/TreeWalker.html index 2570c9a2006..093c7814470 100644 --- a/tests/wpt/web-platform-tests/dom/traversal/TreeWalker.html +++ b/tests/wpt/web-platform-tests/dom/traversal/TreeWalker.html @@ -22,19 +22,19 @@ test(function() { return NodeFilter.FILTER_ACCEPT; }); walker.currentNode = document.body; - assert_throws("InvalidStateError", function() { walker.parentNode() }); + assert_throws_dom("InvalidStateError", function() { walker.parentNode() }); depth--; - assert_throws("InvalidStateError", function() { walker.firstChild() }); + assert_throws_dom("InvalidStateError", function() { walker.firstChild() }); depth--; - assert_throws("InvalidStateError", function() { walker.lastChild() }); + assert_throws_dom("InvalidStateError", function() { walker.lastChild() }); depth--; - assert_throws("InvalidStateError", function() { walker.previousSibling() }); + assert_throws_dom("InvalidStateError", function() { walker.previousSibling() }); depth--; - assert_throws("InvalidStateError", function() { walker.nextSibling() }); + assert_throws_dom("InvalidStateError", function() { walker.nextSibling() }); depth--; - assert_throws("InvalidStateError", function() { walker.previousNode() }); + assert_throws_dom("InvalidStateError", function() { walker.previousNode() }); depth--; - assert_throws("InvalidStateError", function() { walker.nextNode() }); + assert_throws_dom("InvalidStateError", function() { walker.nextNode() }); }, "Recursive filters need to throw"); function filterNode(node, whatToShow, filter) { diff --git a/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-html.html b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-html.html index 2660d1d6c87..5e1dd1291de 100644 --- a/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-html.html +++ b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-html.html @@ -72,7 +72,7 @@ test(function() { }, 'DOMParser should handle the content of as raw text'); test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { new DOMParser().parseFromString("", "text/foo-this-is-invalid"); }) }, "DOMParser throws on an invalid enum value") diff --git a/tests/wpt/web-platform-tests/domparsing/createContextualFragment.html b/tests/wpt/web-platform-tests/domparsing/createContextualFragment.html index a885a5dcb5a..170c0c464d9 100644 --- a/tests/wpt/web-platform-tests/domparsing/createContextualFragment.html +++ b/tests/wpt/web-platform-tests/domparsing/createContextualFragment.html @@ -17,7 +17,7 @@ test(function() { test(function() { var range = document.createRange(); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { range.createContextualFragment(); }); }, "Must throw TypeError when calling without arguments"); diff --git a/tests/wpt/web-platform-tests/domparsing/innerhtml-01.xhtml b/tests/wpt/web-platform-tests/domparsing/innerhtml-01.xhtml index 432cfbf41f5..08345ac58b8 100644 --- a/tests/wpt/web-platform-tests/domparsing/innerhtml-01.xhtml +++ b/tests/wpt/web-platform-tests/domparsing/innerhtml-01.xhtml @@ -13,13 +13,13 @@ <script> test(function() { document.documentElement.appendChild(document.createElement("test:test")); - assert_throws("INVALID_STATE_ERR", function() { + assert_throws_dom("INVALID_STATE_ERR", function() { document.documentElement.innerHTML; }, "getting element with \":\" in its local name"); }); test(function() { document.title = "\f"; - assert_throws("INVALID_STATE_ERR", function() { + assert_throws_dom("INVALID_STATE_ERR", function() { document.getElementsByTagName("title")[0].innerHTML; }, "Getting a Text node whose data contains characters that are not matched by the XML Char production"); }); diff --git a/tests/wpt/web-platform-tests/domparsing/innerhtml-05.xhtml b/tests/wpt/web-platform-tests/domparsing/innerhtml-05.xhtml index da2d8515952..3afb6815231 100644 --- a/tests/wpt/web-platform-tests/domparsing/innerhtml-05.xhtml +++ b/tests/wpt/web-platform-tests/domparsing/innerhtml-05.xhtml @@ -15,7 +15,7 @@ var t = async_test(); window.onload = t.step_func(function() { var foo = window[0].document.documentElement.firstChild; - assert_throws('SyntaxError', function() { + assert_throws_dom('SyntaxError', function() { foo.innerHTML = 'x<\/foo--><\!--y'; // This is ridiculous. }); diff --git a/tests/wpt/web-platform-tests/domparsing/insert_adjacent_html-xhtml.xhtml b/tests/wpt/web-platform-tests/domparsing/insert_adjacent_html-xhtml.xhtml index eadf10e2c1f..f02f425c47d 100644 --- a/tests/wpt/web-platform-tests/domparsing/insert_adjacent_html-xhtml.xhtml +++ b/tests/wpt/web-platform-tests/domparsing/insert_adjacent_html-xhtml.xhtml @@ -49,9 +49,9 @@ testPositions(content, "without next sibling"); testPositions(content, "again, with next sibling"); test(function() { - assert_throws("SYNTAX_ERR", function() {content.insertAdjacentHTML("bar", "foo")}); - assert_throws("SYNTAX_ERR", function() {content.insertAdjacentHTML("beforebegİn", "foo")}); - assert_throws("SYNTAX_ERR", function() {content.insertAdjacentHTML("beforebegın", "foo")}); + assert_throws_dom("SYNTAX_ERR", function() {content.insertAdjacentHTML("bar", "foo")}); + assert_throws_dom("SYNTAX_ERR", function() {content.insertAdjacentHTML("beforebegİn", "foo")}); + assert_throws_dom("SYNTAX_ERR", function() {content.insertAdjacentHTML("beforebegın", "foo")}); }, "Should throw when inserting with invalid position string"); var parentElement = document.createElement("div"); @@ -82,7 +82,7 @@ testPositions(content2, "test again, now that there's a next sibling"); // XML-only: test(function() { - assert_throws("SYNTAX_ERR", function() {content.insertAdjacentHTML("beforeend", "<p>")}); + assert_throws_dom("SYNTAX_ERR", function() {content.insertAdjacentHTML("beforeend", "<p>")}); }); ]]></script> diff --git a/tests/wpt/web-platform-tests/domparsing/insert_adjacent_html.html b/tests/wpt/web-platform-tests/domparsing/insert_adjacent_html.html index dfe624f03ad..d8b38748198 100644 --- a/tests/wpt/web-platform-tests/domparsing/insert_adjacent_html.html +++ b/tests/wpt/web-platform-tests/domparsing/insert_adjacent_html.html @@ -50,9 +50,9 @@ testPositions(content, "without next sibling"); testPositions(content, "again, with next sibling"); test(function() { - assert_throws("SYNTAX_ERR", function() {content.insertAdjacentHTML("bar", "foo")}); - assert_throws("SYNTAX_ERR", function() {content.insertAdjacentHTML("beforebegİn", "foo")}); - assert_throws("SYNTAX_ERR", function() {content.insertAdjacentHTML("beforebegın", "foo")}); + assert_throws_dom("SYNTAX_ERR", function() {content.insertAdjacentHTML("bar", "foo")}); + assert_throws_dom("SYNTAX_ERR", function() {content.insertAdjacentHTML("beforebegİn", "foo")}); + assert_throws_dom("SYNTAX_ERR", function() {content.insertAdjacentHTML("beforebegın", "foo")}); }, "Should throw when inserting with invalid position string"); var parentElement = document.createElement("div"); diff --git a/tests/wpt/web-platform-tests/domparsing/insert_adjacent_html.js b/tests/wpt/web-platform-tests/domparsing/insert_adjacent_html.js index 2451228d193..2980037433d 100644 --- a/tests/wpt/web-platform-tests/domparsing/insert_adjacent_html.js +++ b/tests/wpt/web-platform-tests/domparsing/insert_adjacent_html.js @@ -1,31 +1,31 @@ function testThrowingNoParent(element, desc) { test(function() { - assert_throws("NO_MODIFICATION_ALLOWED_ERR", + assert_throws_dom("NO_MODIFICATION_ALLOWED_ERR", function() { element.insertAdjacentHTML("afterend", "") } ); - assert_throws("NO_MODIFICATION_ALLOWED_ERR", + assert_throws_dom("NO_MODIFICATION_ALLOWED_ERR", function() { element.insertAdjacentHTML("beforebegin", "") } ); - assert_throws("NO_MODIFICATION_ALLOWED_ERR", + assert_throws_dom("NO_MODIFICATION_ALLOWED_ERR", function() { element.insertAdjacentHTML("afterend", "foo") } ); - assert_throws("NO_MODIFICATION_ALLOWED_ERR", + assert_throws_dom("NO_MODIFICATION_ALLOWED_ERR", function() { element.insertAdjacentHTML("beforebegin", "foo") } ); }, "When the parent node is " + desc + ", insertAdjacentHTML should throw for beforebegin and afterend (text)"); test(function() { - assert_throws("NO_MODIFICATION_ALLOWED_ERR", + assert_throws_dom("NO_MODIFICATION_ALLOWED_ERR", function() { element.insertAdjacentHTML("afterend", "<!-- fail -->") } ); - assert_throws("NO_MODIFICATION_ALLOWED_ERR", + assert_throws_dom("NO_MODIFICATION_ALLOWED_ERR", function() { element.insertAdjacentHTML("beforebegin", "<!-- fail -->") } ); }, "When the parent node is " + desc + ", insertAdjacentHTML should throw for beforebegin and afterend (comments)"); test(function() { - assert_throws("NO_MODIFICATION_ALLOWED_ERR", + assert_throws_dom("NO_MODIFICATION_ALLOWED_ERR", function() { element.insertAdjacentHTML("afterend", "<div></div>") } ); - assert_throws("NO_MODIFICATION_ALLOWED_ERR", + assert_throws_dom("NO_MODIFICATION_ALLOWED_ERR", function() { element.insertAdjacentHTML("beforebegin", "<div></div>") } ); }, "When the parent node is " + desc + ", insertAdjacentHTML should throw for beforebegin and afterend (elements)"); diff --git a/tests/wpt/web-platform-tests/domparsing/outerhtml-01.html b/tests/wpt/web-platform-tests/domparsing/outerhtml-01.html index 2e8072e49f9..d9a38b70458 100644 --- a/tests/wpt/web-platform-tests/domparsing/outerhtml-01.html +++ b/tests/wpt/web-platform-tests/domparsing/outerhtml-01.html @@ -7,7 +7,7 @@ <div id="log"></div> <script> test(function() { - assert_throws("NO_MODIFICATION_ALLOWED_ERR", function() { + assert_throws_dom("NO_MODIFICATION_ALLOWED_ERR", function() { document.documentElement.outerHTML = "<html><p>FAIL: Should have thrown an error<\/p><\/html>"; }) }); diff --git a/tests/wpt/web-platform-tests/domxpath/001.html b/tests/wpt/web-platform-tests/domxpath/001.html index c26795a3115..4931417af30 100644 --- a/tests/wpt/web-platform-tests/domxpath/001.html +++ b/tests/wpt/web-platform-tests/domxpath/001.html @@ -30,7 +30,7 @@ function test_xpath_succeeds(path, expected, resolver) { function test_xpath_throws(path, error_code, resolver) { resolver = resolver ? resolver : null; - assert_throws(error_code, function() {document.evaluate(path, document, resolver, XPathResult.ORDERED_NODE_SNAPSHOT_TYPE, null)}) + assert_throws_dom(error_code, function() {document.evaluate(path, document, resolver, XPathResult.ORDERED_NODE_SNAPSHOT_TYPE, null)}) } function ns_resolver(x) { diff --git a/tests/wpt/web-platform-tests/domxpath/002.html b/tests/wpt/web-platform-tests/domxpath/002.html index 95b4afc4c10..c5c1fcc5292 100644 --- a/tests/wpt/web-platform-tests/domxpath/002.html +++ b/tests/wpt/web-platform-tests/domxpath/002.html @@ -28,7 +28,7 @@ function test_xpath_succeeds(path, expected, resolver) { function test_xpath_throws(path, error_code, resolver) { resolver = resolver ? resolver : null; - assert_throws(error_code, function() {document.evaluate(path, document, resolver, XPathResult.ORDERED_NODE_SNAPSHOT_TYPE, null)}) + assert_throws_dom(error_code, function() {document.evaluate(path, document, resolver, XPathResult.ORDERED_NODE_SNAPSHOT_TYPE, null)}) } function ns_resolver(x) { diff --git a/tests/wpt/web-platform-tests/domxpath/evaluator-constructor.html b/tests/wpt/web-platform-tests/domxpath/evaluator-constructor.html index 8239d9c395e..8350ceb4499 100644 --- a/tests/wpt/web-platform-tests/domxpath/evaluator-constructor.html +++ b/tests/wpt/web-platform-tests/domxpath/evaluator-constructor.html @@ -11,6 +11,6 @@ test(function() { assert_true(x instanceof XPathEvaluator); }, "Constructor with 'new'"); test(function() { - assert_throws(new TypeError(), "var x = XPathEvaluator()"); + assert_throws_js(TypeError, "var x = XPathEvaluator()"); }, "Constructor without 'new'"); </script> diff --git a/tests/wpt/web-platform-tests/domxpath/lexical-structure.html b/tests/wpt/web-platform-tests/domxpath/lexical-structure.html index f93820b0e41..05961ab226b 100644 --- a/tests/wpt/web-platform-tests/domxpath/lexical-structure.html +++ b/tests/wpt/web-platform-tests/domxpath/lexical-structure.html @@ -13,17 +13,17 @@ test(() => { parse(' \'a"bc\' '); parse(' "a\'bc" '); - assert_throws(new SyntaxError(), () => { parse(' \u2019xyz\u2019 '); }); + assert_throws_dom('SyntaxError', () => { parse(' \u2019xyz\u2019 '); }); }, 'Literal: Only \' and " should be handled as literal quotes.'); // https://www.w3.org/TR/1999/REC-xpath-19991116/#NT-ExprWhitespace test(() => { parse(' \t\r\n.\r\n\t '); - assert_throws(new SyntaxError(), () => { parse('\x0B\x0C .'); }); - assert_throws(new SyntaxError(), () => { parse('\x0E\x0F .'); }); - assert_throws(new SyntaxError(), () => { parse('\u3000 .'); }); - assert_throws(new SyntaxError(), () => { parse('\u2029 .'); }); + assert_throws_dom('SyntaxError', () => { parse('\x0B\x0C .'); }); + assert_throws_dom('SyntaxError', () => { parse('\x0E\x0F .'); }); + assert_throws_dom('SyntaxError', () => { parse('\u3000 .'); }); + assert_throws_dom('SyntaxError', () => { parse('\u2029 .'); }); }, 'ExprWhitespace: Only #x20 #x9 #xD or #xA must be handled as a whitespace.'); </script> </body> diff --git a/tests/wpt/web-platform-tests/editing/other/non-html-document.html b/tests/wpt/web-platform-tests/editing/other/non-html-document.html index 5c4786e2fc1..ffd2e6f5946 100644 --- a/tests/wpt/web-platform-tests/editing/other/non-html-document.html +++ b/tests/wpt/web-platform-tests/editing/other/non-html-document.html @@ -17,7 +17,7 @@ test(function() { () => xmldoc.queryCommandSupported("bold"), () => xmldoc.queryCommandValue("bold"), ]) { - assert_throws("InvalidStateError", f); + assert_throws_dom("InvalidStateError", f); } }, "editing APIs on an XML document should be disabled"); diff --git a/tests/wpt/web-platform-tests/element-timing/background-image-data-uri.html b/tests/wpt/web-platform-tests/element-timing/background-image-data-uri.html index 3cac0f56db8..540668ae3c3 100644 --- a/tests/wpt/web-platform-tests/element-timing/background-image-data-uri.html +++ b/tests/wpt/web-platform-tests/element-timing/background-image-data-uri.html @@ -18,9 +18,7 @@ body { <script> let beforeRender = performance.now(); async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/background-image-multiple-elements.html b/tests/wpt/web-platform-tests/element-timing/background-image-multiple-elements.html index 44755d49f5c..61a284a5df3 100644 --- a/tests/wpt/web-platform-tests/element-timing/background-image-multiple-elements.html +++ b/tests/wpt/web-platform-tests/element-timing/background-image-multiple-elements.html @@ -23,9 +23,7 @@ body { <script src="resources/element-timing-helpers.js"></script> <script> async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); let beforeRender = performance.now(); let numObservedElements = 0; let observedDiv1 = false; diff --git a/tests/wpt/web-platform-tests/element-timing/background-image-stretched.html b/tests/wpt/web-platform-tests/element-timing/background-image-stretched.html index 0cd56333f50..d5534c3257a 100644 --- a/tests/wpt/web-platform-tests/element-timing/background-image-stretched.html +++ b/tests/wpt/web-platform-tests/element-timing/background-image-stretched.html @@ -18,9 +18,7 @@ body { <script> let beforeRender = performance.now(); async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/buffer-before-onload.html b/tests/wpt/web-platform-tests/element-timing/buffer-before-onload.html index d675c75ba1a..79dd64e2977 100644 --- a/tests/wpt/web-platform-tests/element-timing/buffer-before-onload.html +++ b/tests/wpt/web-platform-tests/element-timing/buffer-before-onload.html @@ -13,9 +13,7 @@ is available from the observer with the buffered flag set to true. */ async_test(function(t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); beforeRender = performance.now(); const img = document.createElement('img'); img.src = 'resources/square20.jpg'; diff --git a/tests/wpt/web-platform-tests/element-timing/buffered-flag.html b/tests/wpt/web-platform-tests/element-timing/buffered-flag.html index 19c387d26b9..1fca1178792 100644 --- a/tests/wpt/web-platform-tests/element-timing/buffered-flag.html +++ b/tests/wpt/web-platform-tests/element-timing/buffered-flag.html @@ -12,11 +12,9 @@ body { <script src="resources/element-timing-helpers.js"></script> <script> async_test(t => { + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const beforeRender = performance.now(); const img = document.createElement('img'); - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } // Initial observer used to know when entry has been dispatched new PerformanceObserver(() => { // Second observer should require buffered flag to receive the already-dispatched entry. diff --git a/tests/wpt/web-platform-tests/element-timing/cross-origin-element.sub.html b/tests/wpt/web-platform-tests/element-timing/cross-origin-element.sub.html index eef69a1d423..b5b06f30469 100644 --- a/tests/wpt/web-platform-tests/element-timing/cross-origin-element.sub.html +++ b/tests/wpt/web-platform-tests/element-timing/cross-origin-element.sub.html @@ -12,9 +12,7 @@ body { <script src="resources/element-timing-helpers.js"></script> <script> async_test((t) => { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); let img; const pathname = 'http://{{domains[www]}}:{{ports[http][1]}}' + '/element-timing/resources/square100.png'; diff --git a/tests/wpt/web-platform-tests/element-timing/cross-origin-iframe-element.sub.html b/tests/wpt/web-platform-tests/element-timing/cross-origin-iframe-element.sub.html index 7296cfccfda..b183fe289aa 100644 --- a/tests/wpt/web-platform-tests/element-timing/cross-origin-iframe-element.sub.html +++ b/tests/wpt/web-platform-tests/element-timing/cross-origin-iframe-element.sub.html @@ -7,9 +7,7 @@ <script src="resources/element-timing-helpers.js"></script> <script> async_test((t) => { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done((entryList) => { assert_unreached("We should not observe a cross origin element."); diff --git a/tests/wpt/web-platform-tests/element-timing/css-generated-text.html b/tests/wpt/web-platform-tests/element-timing/css-generated-text.html index 1e3a812d1bc..4b7dea73ca8 100644 --- a/tests/wpt/web-platform-tests/element-timing/css-generated-text.html +++ b/tests/wpt/web-platform-tests/element-timing/css-generated-text.html @@ -17,9 +17,7 @@ body { <script> async_test(function (t) { const beforeRender = performance.now(); - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/disconnect-image.html b/tests/wpt/web-platform-tests/element-timing/disconnect-image.html index fa42397557b..9c2be0e45ac 100644 --- a/tests/wpt/web-platform-tests/element-timing/disconnect-image.html +++ b/tests/wpt/web-platform-tests/element-timing/disconnect-image.html @@ -9,9 +9,7 @@ let beforeRender; let img; async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/element-only-when-fully-active.html b/tests/wpt/web-platform-tests/element-timing/element-only-when-fully-active.html index 5608685a342..001430516dc 100644 --- a/tests/wpt/web-platform-tests/element-timing/element-only-when-fully-active.html +++ b/tests/wpt/web-platform-tests/element-timing/element-only-when-fully-active.html @@ -7,6 +7,9 @@ <iframe src="resources/iframe-stores-entry.html" id="ifr"></iframe> <script> let t = async_test('Only expose element attribute for fully active documents'); + t.step(() => { + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); + }); window.triggerTest = t.step_func_done(elementEntry => { assert_not_equals(elementEntry.element, null); const iframe = document.getElementById('ifr'); diff --git a/tests/wpt/web-platform-tests/element-timing/first-letter-background.html b/tests/wpt/web-platform-tests/element-timing/first-letter-background.html index 51e82d473e1..911f0d0f3a1 100644 --- a/tests/wpt/web-platform-tests/element-timing/first-letter-background.html +++ b/tests/wpt/web-platform-tests/element-timing/first-letter-background.html @@ -13,9 +13,7 @@ <script> let beforeRender = performance.now(); async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const div = document.getElementById('target'); let textObserved = false; let imageObserved = false; diff --git a/tests/wpt/web-platform-tests/element-timing/fixed-id-identifier.html b/tests/wpt/web-platform-tests/element-timing/fixed-id-identifier.html index 00d6d4dd94c..ae8303f021d 100644 --- a/tests/wpt/web-platform-tests/element-timing/fixed-id-identifier.html +++ b/tests/wpt/web-platform-tests/element-timing/fixed-id-identifier.html @@ -8,9 +8,7 @@ <p elementtiming='my_identifier' id='my_id'>Text</p> <script> async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/image-TAO.sub.html b/tests/wpt/web-platform-tests/element-timing/image-TAO.sub.html index 0906b361394..ee2b0617900 100644 --- a/tests/wpt/web-platform-tests/element-timing/image-TAO.sub.html +++ b/tests/wpt/web-platform-tests/element-timing/image-TAO.sub.html @@ -7,9 +7,7 @@ <script src="resources/element-timing-helpers.js"></script> <script> async_test(t => { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const beforeRender = performance.now(); const remote_img = 'http://{{domains[www]}}:{{ports[http][1]}}/element-timing/resources/TAOImage.py?' + 'origin=' + window.location.origin +'&tao='; diff --git a/tests/wpt/web-platform-tests/element-timing/image-carousel.html b/tests/wpt/web-platform-tests/element-timing/image-carousel.html index dc5d8e8dde8..ce6ac951e24 100644 --- a/tests/wpt/web-platform-tests/element-timing/image-carousel.html +++ b/tests/wpt/web-platform-tests/element-timing/image-carousel.html @@ -26,9 +26,7 @@ body { <script> async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const beforeRenderTimes = []; let entry_count = 0; const entry_count_per_element = [0, 0]; diff --git a/tests/wpt/web-platform-tests/element-timing/image-clipped-svg.html b/tests/wpt/web-platform-tests/element-timing/image-clipped-svg.html index 15c78a4cec5..c8e4a67cea6 100644 --- a/tests/wpt/web-platform-tests/element-timing/image-clipped-svg.html +++ b/tests/wpt/web-platform-tests/element-timing/image-clipped-svg.html @@ -7,9 +7,7 @@ <script> let beforeRender; async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/image-data-uri.html b/tests/wpt/web-platform-tests/element-timing/image-data-uri.html index e698bcf1a5d..afe203ae1bf 100644 --- a/tests/wpt/web-platform-tests/element-timing/image-data-uri.html +++ b/tests/wpt/web-platform-tests/element-timing/image-data-uri.html @@ -16,9 +16,7 @@ body { <script> let beforeRender = performance.now(); async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/image-not-added.html b/tests/wpt/web-platform-tests/element-timing/image-not-added.html index e65d1814b0e..83a6cc60844 100644 --- a/tests/wpt/web-platform-tests/element-timing/image-not-added.html +++ b/tests/wpt/web-platform-tests/element-timing/image-not-added.html @@ -5,9 +5,7 @@ <script src="/resources/testharnessreport.js"></script> <script> async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(() => { // The image should not have caused an entry, so fail test. diff --git a/tests/wpt/web-platform-tests/element-timing/image-not-fully-visible.html b/tests/wpt/web-platform-tests/element-timing/image-not-fully-visible.html index ece7770467d..c51c24a965a 100644 --- a/tests/wpt/web-platform-tests/element-timing/image-not-fully-visible.html +++ b/tests/wpt/web-platform-tests/element-timing/image-not-fully-visible.html @@ -14,9 +14,7 @@ body { let beforeRender; let img; async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/image-rect-iframe.html b/tests/wpt/web-platform-tests/element-timing/image-rect-iframe.html index 7441405d747..a97ed5a8507 100644 --- a/tests/wpt/web-platform-tests/element-timing/image-rect-iframe.html +++ b/tests/wpt/web-platform-tests/element-timing/image-rect-iframe.html @@ -11,9 +11,7 @@ body { <script src="/resources/testharnessreport.js"></script> <script> async_test((t) => { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); on_event(window, 'message', e => { assert_equals(e.data.length, 1); assert_equals(e.data.entryType, 'element'); diff --git a/tests/wpt/web-platform-tests/element-timing/image-src-change.html b/tests/wpt/web-platform-tests/element-timing/image-src-change.html index 89b8e1d3f74..e9e13742a65 100644 --- a/tests/wpt/web-platform-tests/element-timing/image-src-change.html +++ b/tests/wpt/web-platform-tests/element-timing/image-src-change.html @@ -13,9 +13,7 @@ body { <img src='resources/square100.png' elementtiming='my_image' id='my_id'/> <script> async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); let beforeRender = performance.now(); const img = document.getElementById('my_id'); let firstCallback = true; diff --git a/tests/wpt/web-platform-tests/element-timing/image-with-css-scale.html b/tests/wpt/web-platform-tests/element-timing/image-with-css-scale.html index 2dbbc067248..9bd71086a75 100644 --- a/tests/wpt/web-platform-tests/element-timing/image-with-css-scale.html +++ b/tests/wpt/web-platform-tests/element-timing/image-with-css-scale.html @@ -21,9 +21,7 @@ body { <script> const beforeRender = performance.now(); async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/image-with-rotation.html b/tests/wpt/web-platform-tests/element-timing/image-with-rotation.html index fcffe4acfa5..64ff942f0cd 100644 --- a/tests/wpt/web-platform-tests/element-timing/image-with-rotation.html +++ b/tests/wpt/web-platform-tests/element-timing/image-with-rotation.html @@ -21,9 +21,7 @@ body { <script> const beforeRender = performance.now(); async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/images-repeated-resource.html b/tests/wpt/web-platform-tests/element-timing/images-repeated-resource.html index e3fe9b90db1..6090e75f26e 100644 --- a/tests/wpt/web-platform-tests/element-timing/images-repeated-resource.html +++ b/tests/wpt/web-platform-tests/element-timing/images-repeated-resource.html @@ -20,9 +20,7 @@ body { let img; let img2; async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/invisible-images.html b/tests/wpt/web-platform-tests/element-timing/invisible-images.html index 06d9bfd07a0..8225996e255 100644 --- a/tests/wpt/web-platform-tests/element-timing/invisible-images.html +++ b/tests/wpt/web-platform-tests/element-timing/invisible-images.html @@ -16,9 +16,7 @@ </style> <script> async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done((entries) => { // The image should not have caused an entry, so fail test. diff --git a/tests/wpt/web-platform-tests/element-timing/multiple-background-images.html b/tests/wpt/web-platform-tests/element-timing/multiple-background-images.html index b29e66c04a7..c2a32c3c8e6 100644 --- a/tests/wpt/web-platform-tests/element-timing/multiple-background-images.html +++ b/tests/wpt/web-platform-tests/element-timing/multiple-background-images.html @@ -18,9 +18,7 @@ body { <script> let beforeRender = performance.now(); async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); let numObservedElements = 0; let observedCircle = false; let observedSquare = false; diff --git a/tests/wpt/web-platform-tests/element-timing/observe-background-image.html b/tests/wpt/web-platform-tests/element-timing/observe-background-image.html index afc6b5b38d7..e02714b7021 100644 --- a/tests/wpt/web-platform-tests/element-timing/observe-background-image.html +++ b/tests/wpt/web-platform-tests/element-timing/observe-background-image.html @@ -18,9 +18,7 @@ body { <script> let beforeRender = performance.now(); async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/observe-child-element.html b/tests/wpt/web-platform-tests/element-timing/observe-child-element.html index 33e92a9abdd..4293e814eb9 100644 --- a/tests/wpt/web-platform-tests/element-timing/observe-child-element.html +++ b/tests/wpt/web-platform-tests/element-timing/observe-child-element.html @@ -12,9 +12,7 @@ body { <script src="resources/element-timing-helpers.js"></script> <script> async_test((t) => { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done((entryList) => { assert_unreached("Should not have received an entry!"); diff --git a/tests/wpt/web-platform-tests/element-timing/observe-elementtiming.html b/tests/wpt/web-platform-tests/element-timing/observe-elementtiming.html index 164cc4f580a..ee8960bd728 100644 --- a/tests/wpt/web-platform-tests/element-timing/observe-elementtiming.html +++ b/tests/wpt/web-platform-tests/element-timing/observe-elementtiming.html @@ -14,9 +14,7 @@ body { let beforeRender; let img; async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/observe-empty-attribute.html b/tests/wpt/web-platform-tests/element-timing/observe-empty-attribute.html index c115a24cf62..25d3492f73b 100644 --- a/tests/wpt/web-platform-tests/element-timing/observe-empty-attribute.html +++ b/tests/wpt/web-platform-tests/element-timing/observe-empty-attribute.html @@ -7,9 +7,7 @@ <script> let beforeRender; async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); let observedImage = false; let observedText = false; const observer = new PerformanceObserver( diff --git a/tests/wpt/web-platform-tests/element-timing/observe-multiple-images.html b/tests/wpt/web-platform-tests/element-timing/observe-multiple-images.html index 6b5c5d9e3cb..9a0657aa60f 100644 --- a/tests/wpt/web-platform-tests/element-timing/observe-multiple-images.html +++ b/tests/wpt/web-platform-tests/element-timing/observe-multiple-images.html @@ -22,9 +22,7 @@ body { <script> let beforeRender, image1Observed=0, image2Observed=0, image3Observed=0; async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func(function(entryList) { entryList.getEntries().forEach( entry => { diff --git a/tests/wpt/web-platform-tests/element-timing/observe-shadow-image.html b/tests/wpt/web-platform-tests/element-timing/observe-shadow-image.html index 3e1960dde3b..1c12c5fe031 100644 --- a/tests/wpt/web-platform-tests/element-timing/observe-shadow-image.html +++ b/tests/wpt/web-platform-tests/element-timing/observe-shadow-image.html @@ -12,9 +12,7 @@ body { <div id='target'></div> <script> async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_unreached('Should not observe elements in shadow trees!'); diff --git a/tests/wpt/web-platform-tests/element-timing/observe-shadow-text.html b/tests/wpt/web-platform-tests/element-timing/observe-shadow-text.html index cc0cf0bd823..3167a1225c5 100644 --- a/tests/wpt/web-platform-tests/element-timing/observe-shadow-text.html +++ b/tests/wpt/web-platform-tests/element-timing/observe-shadow-text.html @@ -12,9 +12,7 @@ body { <div id='target'></div> <script> async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_unreached('Should not observe text elements in shadow trees!'); diff --git a/tests/wpt/web-platform-tests/element-timing/observe-svg-image.html b/tests/wpt/web-platform-tests/element-timing/observe-svg-image.html index 8a0f61d6699..83ca4f40aae 100644 --- a/tests/wpt/web-platform-tests/element-timing/observe-svg-image.html +++ b/tests/wpt/web-platform-tests/element-timing/observe-svg-image.html @@ -7,9 +7,7 @@ <script> let beforeRender; async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/observe-text.html b/tests/wpt/web-platform-tests/element-timing/observe-text.html index 4508db3a544..a054b261726 100644 --- a/tests/wpt/web-platform-tests/element-timing/observe-text.html +++ b/tests/wpt/web-platform-tests/element-timing/observe-text.html @@ -15,9 +15,7 @@ p { <script src="resources/element-timing-helpers.js"></script> <script> async_test((t) => { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); let paragraph; let beforeRender; const observer = new PerformanceObserver( diff --git a/tests/wpt/web-platform-tests/element-timing/observe-video-poster.html b/tests/wpt/web-platform-tests/element-timing/observe-video-poster.html index a6348377099..f64da173c6f 100644 --- a/tests/wpt/web-platform-tests/element-timing/observe-video-poster.html +++ b/tests/wpt/web-platform-tests/element-timing/observe-video-poster.html @@ -7,9 +7,7 @@ <script> let beforeRender; async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/progressively-loaded-image.html b/tests/wpt/web-platform-tests/element-timing/progressively-loaded-image.html index f156e1a32c4..0d59052cf3a 100644 --- a/tests/wpt/web-platform-tests/element-timing/progressively-loaded-image.html +++ b/tests/wpt/web-platform-tests/element-timing/progressively-loaded-image.html @@ -14,9 +14,7 @@ let numInitial = 75; let sleep = 500; async_test(function(t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const img_src = 'resources/progressive-image.py?name=square20.jpg&numInitial=' + numInitial + '&sleep=' + sleep; const observer = new PerformanceObserver( diff --git a/tests/wpt/web-platform-tests/element-timing/rectangular-image.html b/tests/wpt/web-platform-tests/element-timing/rectangular-image.html index 0c09911c502..a97c549a9aa 100644 --- a/tests/wpt/web-platform-tests/element-timing/rectangular-image.html +++ b/tests/wpt/web-platform-tests/element-timing/rectangular-image.html @@ -14,9 +14,7 @@ body { let beforeRender; let img; async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/element-timing/redirects-tao-star.html b/tests/wpt/web-platform-tests/element-timing/redirects-tao-star.html index a93fcd50ac3..f8e4d19bd07 100644 --- a/tests/wpt/web-platform-tests/element-timing/redirects-tao-star.html +++ b/tests/wpt/web-platform-tests/element-timing/redirects-tao-star.html @@ -11,9 +11,7 @@ <body> <script> async_test(t => { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); let destUrl = get_host_info().HTTP_REMOTE_ORIGIN + '/resource-timing/resources/multi_redirect.py?'; destUrl += 'page_origin=' + get_host_info().HTTP_ORIGIN; diff --git a/tests/wpt/web-platform-tests/element-timing/retrievability.html b/tests/wpt/web-platform-tests/element-timing/retrievability.html index 3ac04d82785..5c6113bdc93 100644 --- a/tests/wpt/web-platform-tests/element-timing/retrievability.html +++ b/tests/wpt/web-platform-tests/element-timing/retrievability.html @@ -7,9 +7,7 @@ <script> let img; async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const beforeRender = performance.now(); new PerformanceObserver( t.step_func_done(function(entryList) { diff --git a/tests/wpt/web-platform-tests/element-timing/scroll-to-text.html b/tests/wpt/web-platform-tests/element-timing/scroll-to-text.html index ed332740323..ca06e91c530 100644 --- a/tests/wpt/web-platform-tests/element-timing/scroll-to-text.html +++ b/tests/wpt/web-platform-tests/element-timing/scroll-to-text.html @@ -15,9 +15,7 @@ <p elementtiming='observeMe'>Test text</p> <script> async_test((t) => { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver(t.step_func_done(() => {})); observer.observe({type: 'element', buffered: true}); window.onload = () => { diff --git a/tests/wpt/web-platform-tests/element-timing/text-with-display-style.html b/tests/wpt/web-platform-tests/element-timing/text-with-display-style.html index 03939473be3..faf644fd8d2 100644 --- a/tests/wpt/web-platform-tests/element-timing/text-with-display-style.html +++ b/tests/wpt/web-platform-tests/element-timing/text-with-display-style.html @@ -21,9 +21,7 @@ h3 { <h3 id='title3' elementtiming='h3'>I am h3</h3> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const beforeRender = performance.now(); let observedFlex = false; let observedGrid = false; diff --git a/tests/wpt/web-platform-tests/element-timing/toJSON.html b/tests/wpt/web-platform-tests/element-timing/toJSON.html index d9889347081..ba13a0fa907 100644 --- a/tests/wpt/web-platform-tests/element-timing/toJSON.html +++ b/tests/wpt/web-platform-tests/element-timing/toJSON.html @@ -8,9 +8,7 @@ <img elementtiming='img' src="resources/square100.png"/> <script> async_test(function (t) { - if (!window.PerformanceElementTiming) { - assert_unreached("PerformanceElementTiming is not implemented"); - } + assert_precondition(window.PerformanceElementTiming, "PerformanceElementTiming is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { assert_equals(entryList.getEntries().length, 1); diff --git a/tests/wpt/web-platform-tests/encoding/api-invalid-label.any.js b/tests/wpt/web-platform-tests/encoding/api-invalid-label.any.js index 38c0e9a55fd..2dafb67c07d 100644 --- a/tests/wpt/web-platform-tests/encoding/api-invalid-label.any.js +++ b/tests/wpt/web-platform-tests/encoding/api-invalid-label.any.js @@ -19,6 +19,6 @@ setup(function() { tests.forEach(function(input) { test(function() { - assert_throws(new RangeError(), function() { new TextDecoder(input); }); + assert_throws_js(RangeError, function() { new TextDecoder(input); }); }, 'Invalid label ' + format_value(input) + ' should be rejected by TextDecoder.'); }); diff --git a/tests/wpt/web-platform-tests/encoding/api-replacement-encodings.any.js b/tests/wpt/web-platform-tests/encoding/api-replacement-encodings.any.js index 6d1e494ac39..9031cf6638c 100644 --- a/tests/wpt/web-platform-tests/encoding/api-replacement-encodings.any.js +++ b/tests/wpt/web-platform-tests/encoding/api-replacement-encodings.any.js @@ -7,7 +7,7 @@ encodings_table.forEach(function(section) { }).forEach(function(encoding) { encoding.labels.forEach(function(label) { test(function() { - assert_throws(new RangeError(), function() { new TextDecoder(label); }); + assert_throws_js(RangeError, function() { new TextDecoder(label); }); }, 'Label for "replacement" should be rejected by API: ' + label); }); }); diff --git a/tests/wpt/web-platform-tests/encoding/encodeInto.any.js b/tests/wpt/web-platform-tests/encoding/encodeInto.any.js index 7ea0b80eeb4..7e18c812499 100644 --- a/tests/wpt/web-platform-tests/encoding/encodeInto.any.js +++ b/tests/wpt/web-platform-tests/encoding/encodeInto.any.js @@ -128,14 +128,14 @@ Float64Array].forEach(view => { ["ArrayBuffer", "SharedArrayBuffer"].forEach((arrayBufferOrSharedArrayBuffer) => { test(() => { - assert_throws(new TypeError(), () => new TextEncoder().encodeInto("", new view(new self[arrayBufferOrSharedArrayBuffer](0)))); + assert_throws_js(TypeError, () => new TextEncoder().encodeInto("", new view(new self[arrayBufferOrSharedArrayBuffer](0)))); }, "Invalid encodeInto() destination: " + view.name + ", backed by: " + arrayBufferOrSharedArrayBuffer); }); }); ["ArrayBuffer", "SharedArrayBuffer"].forEach((arrayBufferOrSharedArrayBuffer) => { test(() => { - assert_throws(new TypeError(), () => new TextEncoder().encodeInto("", new self[arrayBufferOrSharedArrayBuffer](10))); + assert_throws_js(TypeError, () => new TextEncoder().encodeInto("", new self[arrayBufferOrSharedArrayBuffer](10))); }, "Invalid encodeInto() destination: " + arrayBufferOrSharedArrayBuffer); }); diff --git a/tests/wpt/web-platform-tests/encoding/streams/decode-attributes.any.js b/tests/wpt/web-platform-tests/encoding/streams/decode-attributes.any.js index 21b70201271..3fe442bf133 100644 --- a/tests/wpt/web-platform-tests/encoding/streams/decode-attributes.any.js +++ b/tests/wpt/web-platform-tests/encoding/streams/decode-attributes.any.js @@ -46,25 +46,25 @@ for (const trueValue of [true, 1, {}, [], 'yes']) { } test(() => { - assert_throws(new RangeError(), () => new TextDecoderStream(''), + assert_throws_js(RangeError, () => new TextDecoderStream(''), 'the constructor should throw'); }, 'constructing with an invalid encoding should throw'); test(() => { - assert_throws(new TypeError(), () => new TextDecoderStream({ + assert_throws_js(TypeError, () => new TextDecoderStream({ toString() { return {}; } }), 'the constructor should throw'); }, 'constructing with a non-stringifiable encoding should throw'); test(() => { - assert_throws(new Error(), + assert_throws_js(Error, () => new TextDecoderStream('utf-8', { get fatal() { throw new Error(); } }), 'the constructor should throw'); }, 'a throwing fatal member should cause the constructor to throw'); test(() => { - assert_throws(new Error(), + assert_throws_js(Error, () => new TextDecoderStream('utf-8', { get ignoreBOM() { throw new Error(); } }), 'the constructor should throw'); diff --git a/tests/wpt/web-platform-tests/encoding/textdecoder-fatal-single-byte.any.js b/tests/wpt/web-platform-tests/encoding/textdecoder-fatal-single-byte.any.js index d3e9ae9c9a7..87e3707be4b 100644 --- a/tests/wpt/web-platform-tests/encoding/textdecoder-fatal-single-byte.any.js +++ b/tests/wpt/web-platform-tests/encoding/textdecoder-fatal-single-byte.any.js @@ -37,7 +37,7 @@ singleByteEncodings.forEach(function(t) { for (var i = 0; i < 256; ++i) { if (t.bad.indexOf(i) != -1) { test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { new TextDecoder(t.encoding, {fatal: true}).decode(new Uint8Array([i])); }); }, 'Throw due to fatal flag: ' + t.encoding + ' doesn\'t have a pointer ' + i); diff --git a/tests/wpt/web-platform-tests/encoding/textdecoder-fatal-streaming.any.js b/tests/wpt/web-platform-tests/encoding/textdecoder-fatal-streaming.any.js index e4fa64dbd7c..0d58b2e1d7d 100644 --- a/tests/wpt/web-platform-tests/encoding/textdecoder-fatal-streaming.any.js +++ b/tests/wpt/web-platform-tests/encoding/textdecoder-fatal-streaming.any.js @@ -7,7 +7,7 @@ test(function() { {encoding: 'utf-16be', sequence: [0x00]} ].forEach(function(testCase) { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { var decoder = new TextDecoder(testCase.encoding, {fatal: true}); decoder.decode(new Uint8Array(testCase.sequence)); }, 'Unterminated ' + testCase.encoding + ' sequence should throw if fatal flag is set'); @@ -28,12 +28,12 @@ test(function() { assert_equals(decoder.decode(odd, {stream: true}), ''); assert_equals(decoder.decode(odd), '\u0000'); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { decoder.decode(even, {stream: true}); decoder.decode(odd) }); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { decoder.decode(odd, {stream: true}); decoder.decode(even); }); diff --git a/tests/wpt/web-platform-tests/encoding/textdecoder-fatal.any.js b/tests/wpt/web-platform-tests/encoding/textdecoder-fatal.any.js index ba8aa5d06c3..5ee4b65ebe3 100644 --- a/tests/wpt/web-platform-tests/encoding/textdecoder-fatal.any.js +++ b/tests/wpt/web-platform-tests/encoding/textdecoder-fatal.any.js @@ -51,7 +51,7 @@ var bad = [ bad.forEach(function(t) { test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { new TextDecoder(t.encoding, {fatal: true}).decode(new Uint8Array(t.input)) }); }, 'Fatal flag: ' + t.encoding + ' - ' + t.name); diff --git a/tests/wpt/web-platform-tests/encoding/textdecoder-utf16-surrogates.any.js b/tests/wpt/web-platform-tests/encoding/textdecoder-utf16-surrogates.any.js index 3b8418703da..b08ea56cee3 100644 --- a/tests/wpt/web-platform-tests/encoding/textdecoder-utf16-surrogates.any.js +++ b/tests/wpt/web-platform-tests/encoding/textdecoder-utf16-surrogates.any.js @@ -38,7 +38,7 @@ bad.forEach(function(t) { assert_equals(new TextDecoder(t.encoding).decode(new Uint8Array(t.input)), t.expected); }, t.encoding + ' - ' + t.name); test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { new TextDecoder(t.encoding, {fatal: true}).decode(new Uint8Array(t.input)) }); }, t.encoding + ' - ' + t.name + ' (fatal flag set)'); diff --git a/tests/wpt/web-platform-tests/entries-api/filesystemfileentry-file-manual.html b/tests/wpt/web-platform-tests/entries-api/filesystemfileentry-file-manual.html index d6c62f30a3c..7ac29c0b13c 100644 --- a/tests/wpt/web-platform-tests/entries-api/filesystemfileentry-file-manual.html +++ b/tests/wpt/web-platform-tests/entries-api/filesystemfileentry-file-manual.html @@ -12,7 +12,7 @@ file_entry_test('file.txt', (t, entry) => { assert_idl_attribute(entry, 'file', 'FileSystemFileEntry has a file() method'); assert_equals(typeof entry.file, 'function', 'FileSystemFileEntry has a file() method'); - assert_throws(TypeError(), () => entry.file(), 'file() has a required argument'); + assert_throws_js(TypeError, () => entry.file(), 'file() has a required argument'); entry.file(t.step_func(file => { assert_class_string(file, 'File', 'file() should yield a File'); diff --git a/tests/wpt/web-platform-tests/eventsource/eventsource-constructor-url-bogus.any.js b/tests/wpt/web-platform-tests/eventsource/eventsource-constructor-url-bogus.any.js index eb92837a71d..53c3205e8a5 100644 --- a/tests/wpt/web-platform-tests/eventsource/eventsource-constructor-url-bogus.any.js +++ b/tests/wpt/web-platform-tests/eventsource/eventsource-constructor-url-bogus.any.js @@ -2,7 +2,7 @@ // META: title=EventSource: constructor (invalid URL) test(() => { - assert_throws('SyntaxError', () => { new EventSource("http://this is invalid/"); }); + assert_throws_dom('SyntaxError', () => { new EventSource("http://this is invalid/"); }); }); done(); diff --git a/tests/wpt/web-platform-tests/feature-policy/payment-disabled-by-feature-policy.https.sub.html b/tests/wpt/web-platform-tests/feature-policy/payment-disabled-by-feature-policy.https.sub.html index 98e434a2a5c..b82eb4f1ef5 100644 --- a/tests/wpt/web-platform-tests/feature-policy/payment-disabled-by-feature-policy.https.sub.html +++ b/tests/wpt/web-platform-tests/feature-policy/payment-disabled-by-feature-policy.https.sub.html @@ -15,7 +15,7 @@ var details = { total: { label: 'Test', amount: { currency: 'USD', value: '5.00' } } }; - assert_throws('SecurityError', () => { + assert_throws_dom('SecurityError', () => { new PaymentRequest(supportedInstruments, details); }); }, header + ' disallows the top-level document.'); diff --git a/tests/wpt/web-platform-tests/feature-policy/reporting/document-write-reporting.html b/tests/wpt/web-platform-tests/feature-policy/reporting/document-write-reporting.html index e67bff0773e..50af640e08e 100644 --- a/tests/wpt/web-platform-tests/feature-policy/reporting/document-write-reporting.html +++ b/tests/wpt/web-platform-tests/feature-policy/reporting/document-write-reporting.html @@ -23,7 +23,7 @@ new ReportingObserver(t.step_func_done(check_report_format), {types: ['feature-policy-violation']}).observe(); t.step_func(() => { - assert_throws('NotAllowedError', + assert_throws_dom('NotAllowedError', () => document.write("This should not succeed"), "document.write should throw an exception when disabled"); })(); diff --git a/tests/wpt/web-platform-tests/feature-policy/reporting/generic-sensor-reporting.https.html b/tests/wpt/web-platform-tests/feature-policy/reporting/generic-sensor-reporting.https.html index 4ccfcbf0d21..9a5d404d345 100644 --- a/tests/wpt/web-platform-tests/feature-policy/reporting/generic-sensor-reporting.https.html +++ b/tests/wpt/web-platform-tests/feature-policy/reporting/generic-sensor-reporting.https.html @@ -45,10 +45,10 @@ var check_report_format = function(reports, observer) { async_test(t => { new ReportingObserver(t.step_func(check_report_format), {types: ['feature-policy-violation']}).observe(); - assert_throws("SecurityError", () => new Accelerometer(), "Constructing sensors should be blocked by policy"); - assert_throws("SecurityError", () => new AmbientLightSensor(), "Constructing sensors should be blocked by policy"); - assert_throws("SecurityError", () => new Gyroscope(), "Constructing sensors should be blocked by policy"); - assert_throws("SecurityError", () => new Magnetometer(), "Constructing sensors should be blocked by policy"); + assert_throws_dom("SecurityError", () => new Accelerometer(), "Constructing sensors should be blocked by policy"); + assert_throws_dom("SecurityError", () => new AmbientLightSensor(), "Constructing sensors should be blocked by policy"); + assert_throws_dom("SecurityError", () => new Gyroscope(), "Constructing sensors should be blocked by policy"); + assert_throws_dom("SecurityError", () => new Magnetometer(), "Constructing sensors should be blocked by policy"); }, "Generic Sensor Report Format"); </script> </body> diff --git a/tests/wpt/web-platform-tests/feature-policy/reporting/payment-reporting.https.html b/tests/wpt/web-platform-tests/feature-policy/reporting/payment-reporting.https.html index 80d0b0f0906..417dfed7dce 100644 --- a/tests/wpt/web-platform-tests/feature-policy/reporting/payment-reporting.https.html +++ b/tests/wpt/web-platform-tests/feature-policy/reporting/payment-reporting.https.html @@ -25,7 +25,7 @@ new ReportingObserver(t.step_func_done(check_report_format), {types: ['feature-policy-violation']}).observe(); t.step_func(() => { - assert_throws('SecurityError', + assert_throws_dom('SecurityError', () => new PaymentRequest( [{ supportedMethods: 'basic-card' }], { total: { label: 'Total', amount: { currency: 'USD', value: 0 }}}, diff --git a/tests/wpt/web-platform-tests/feature-policy/reporting/sync-xhr-reporting.html b/tests/wpt/web-platform-tests/feature-policy/reporting/sync-xhr-reporting.html index 9e526b904d4..dbdcc126ec4 100644 --- a/tests/wpt/web-platform-tests/feature-policy/reporting/sync-xhr-reporting.html +++ b/tests/wpt/web-platform-tests/feature-policy/reporting/sync-xhr-reporting.html @@ -27,7 +27,7 @@ new ReportingObserver(t.step_func_done(check_report_format), t.step_func(() => { var xhr = new XMLHttpRequest(); xhr.open("GET", document.location.href, false); - assert_throws('NetworkError', + assert_throws_dom('NetworkError', () => xhr.send(), "Synchronous XHR.send should throw an exception when disabled"); })(); diff --git a/tests/wpt/web-platform-tests/fetch/api/headers/header-values-normalize.html b/tests/wpt/web-platform-tests/fetch/api/headers/header-values-normalize.html index 64be98af934..079b641721a 100644 --- a/tests/wpt/web-platform-tests/fetch/api/headers/header-values-normalize.html +++ b/tests/wpt/web-platform-tests/fetch/api/headers/header-values-normalize.html @@ -36,9 +36,9 @@ for(let i = 0; i < 0x21; i++) { let xhr = new XMLHttpRequest() xhr.open("POST", url) if(fail) { - assert_throws("SyntaxError", () => xhr.setRequestHeader("val1", val1)) - assert_throws("SyntaxError", () => xhr.setRequestHeader("val2", val2)) - assert_throws("SyntaxError", () => xhr.setRequestHeader("val3", val3)) + assert_throws_dom("SyntaxError", () => xhr.setRequestHeader("val1", val1)) + assert_throws_dom("SyntaxError", () => xhr.setRequestHeader("val2", val2)) + assert_throws_dom("SyntaxError", () => xhr.setRequestHeader("val3", val3)) t.done() } else { xhr.setRequestHeader("val1", val1) diff --git a/tests/wpt/web-platform-tests/fetch/api/headers/header-values.html b/tests/wpt/web-platform-tests/fetch/api/headers/header-values.html index 6dfe0d3a789..491288eff7c 100644 --- a/tests/wpt/web-platform-tests/fetch/api/headers/header-values.html +++ b/tests/wpt/web-platform-tests/fetch/api/headers/header-values.html @@ -12,7 +12,7 @@ test(() => { let xhr = new XMLHttpRequest() xhr.open("POST", "/") - assert_throws("SyntaxError", () => xhr.setRequestHeader("value-test", val)) + assert_throws_dom("SyntaxError", () => xhr.setRequestHeader("value-test", val)) }, "XMLHttpRequest with value " + encodeURI(val) + " needs to throw") promise_test(t => promise_rejects(t, new TypeError(), fetch("/", { headers: {"value-test": val} })), "fetch() with value " + encodeURI(val) + " needs to throw") diff --git a/tests/wpt/web-platform-tests/fetch/api/headers/headers-basic.html b/tests/wpt/web-platform-tests/fetch/api/headers/headers-basic.html index 1d3f4d462b8..254ef051c12 100644 --- a/tests/wpt/web-platform-tests/fetch/api/headers/headers-basic.html +++ b/tests/wpt/web-platform-tests/fetch/api/headers/headers-basic.html @@ -25,7 +25,7 @@ var parameters = [null, 1]; parameters.forEach(function(parameter) { test(function() { - assert_throws(new TypeError(), function() { new Headers(parameter) }); + assert_throws_js(TypeError, function() { new Headers(parameter) }); }, "Create headers with " + parameter + " should throw"); }); diff --git a/tests/wpt/web-platform-tests/fetch/api/headers/headers-errors.html b/tests/wpt/web-platform-tests/fetch/api/headers/headers-errors.html index 194ff32f155..7f9916d87fe 100644 --- a/tests/wpt/web-platform-tests/fetch/api/headers/headers-errors.html +++ b/tests/wpt/web-platform-tests/fetch/api/headers/headers-errors.html @@ -12,19 +12,19 @@ <script> test(function() { - assert_throws(new TypeError() , function() { new Headers([["name"]]); }); + assert_throws_js(TypeError, function() { new Headers([["name"]]); }); }, "Create headers giving an array having one string as init argument"); test(function() { - assert_throws(new TypeError() , function() { new Headers([["invalid", "invalidValue1", "invalidValue2"]]); }); + assert_throws_js(TypeError, function() { new Headers([["invalid", "invalidValue1", "invalidValue2"]]); }); }, "Create headers giving an array having three strings as init argument"); test(function() { - assert_throws(new TypeError() , function() { new Headers([["invalidĀ", "Value1"]]); }); + assert_throws_js(TypeError, function() { new Headers([["invalidĀ", "Value1"]]); }); }, "Create headers giving bad header name as init argument"); test(function() { - assert_throws(new TypeError() , function() { new Headers([["name", "invalidValueĀ"]]); }); + assert_throws_js(TypeError, function() { new Headers([["name", "invalidValueĀ"]]); }); }, "Create headers giving bad header value as init argument"); var badNames = ["invalidĀ", {}]; @@ -33,57 +33,57 @@ badNames.forEach(function(name) { test(function() { var headers = new Headers(); - assert_throws(new TypeError() , function() { headers.get(name); }); + assert_throws_js(TypeError, function() { headers.get(name); }); }, "Check headers get with an invalid name " + name); }); badNames.forEach(function(name) { test(function() { var headers = new Headers(); - assert_throws(new TypeError() , function() { headers.delete(name); }); + assert_throws_js(TypeError, function() { headers.delete(name); }); }, "Check headers delete with an invalid name " + name); }); badNames.forEach(function(name) { test(function() { var headers = new Headers(); - assert_throws(new TypeError() , function() { headers.has(name); }); + assert_throws_js(TypeError, function() { headers.has(name); }); }, "Check headers has with an invalid name " + name); }); badNames.forEach(function(name) { test(function() { var headers = new Headers(); - assert_throws(new TypeError() , function() { headers.set(name, "Value1"); }); + assert_throws_js(TypeError, function() { headers.set(name, "Value1"); }); }, "Check headers set with an invalid name " + name); }); badValues.forEach(function(value) { test(function() { var headers = new Headers(); - assert_throws(new TypeError() , function() { headers.set("name", value); }); + assert_throws_js(TypeError, function() { headers.set("name", value); }); }, "Check headers set with an invalid value " + value); }); badNames.forEach(function(name) { test(function() { var headers = new Headers(); - assert_throws(new TypeError() , function() { headers.append("invalidĀ", "Value1"); }); + assert_throws_js(TypeError, function() { headers.append("invalidĀ", "Value1"); }); }, "Check headers append with an invalid name " + name); }); badValues.forEach(function(value) { test(function() { var headers = new Headers(); - assert_throws(new TypeError() , function() { headers.append("name", value); }); + assert_throws_js(TypeError, function() { headers.append("name", value); }); }, "Check headers append with an invalid value " + value); }); test(function() { var headers = new Headers([["name", "value"]]); - assert_throws(new TypeError() , function() { headers.forEach(); }); - assert_throws(new TypeError() , function() { headers.forEach(undefined); }); - assert_throws(new TypeError() , function() { headers.forEach(1); }); + assert_throws_js(TypeError, function() { headers.forEach(); }); + assert_throws_js(TypeError, function() { headers.forEach(undefined); }); + assert_throws_js(TypeError, function() { headers.forEach(1); }); }, "Headers forEach throws if argument is not callable"); test(function() { diff --git a/tests/wpt/web-platform-tests/fetch/api/headers/headers-record.html b/tests/wpt/web-platform-tests/fetch/api/headers/headers-record.html index 34acc3b1c55..0a217c3ddb2 100644 --- a/tests/wpt/web-platform-tests/fetch/api/headers/headers-record.html +++ b/tests/wpt/web-platform-tests/fetch/api/headers/headers-record.html @@ -256,7 +256,7 @@ test(function() { var proxy = new Proxy(lyingProxy, loggingHandler); // Returning duplicate keys from ownKeys() throws a TypeError. - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { var h = new Headers(proxy); }); assert_equals(log.length, 2); @@ -279,7 +279,7 @@ test(function() { }, c: "d" }; var proxy = new Proxy(record, loggingHandler); - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { var h = new Headers(proxy); }); assert_equals(log.length, 7); diff --git a/tests/wpt/web-platform-tests/fetch/api/request/request-cache.js b/tests/wpt/web-platform-tests/fetch/api/request/request-cache.js index 009d4408a56..f2fbecf4969 100644 --- a/tests/wpt/web-platform-tests/fetch/api/request/request-cache.js +++ b/tests/wpt/web-platform-tests/fetch/api/request/request-cache.js @@ -154,7 +154,7 @@ function make_test(type, info) { assert_equals(text, expected_response_text(type, identifier, init, content)); }, function(reason) { if ("response" in info && info.response[idx] === "error") { - assert_throws(new TypeError(), function() { throw reason; }); + assert_throws_js(TypeError, function() { throw reason; }); } else { throw reason; } diff --git a/tests/wpt/web-platform-tests/fetch/api/request/request-disturbed.html b/tests/wpt/web-platform-tests/fetch/api/request/request-disturbed.html index d247a7ff2db..27614e7e742 100644 --- a/tests/wpt/web-platform-tests/fetch/api/request/request-disturbed.html +++ b/tests/wpt/web-platform-tests/fetch/api/request/request-disturbed.html @@ -40,12 +40,12 @@ test(function() { assert_true(bodyConsumed.bodyUsed , "bodyUsed is true when request is disturbed"); - assert_throws(new TypeError(), function() { bodyConsumed.clone(); }); + assert_throws_js(TypeError, function() { bodyConsumed.clone(); }); }, "Check cloning a disturbed request"); test(function() { assert_true(bodyConsumed.bodyUsed , "bodyUsed is true when request is disturbed"); - assert_throws(new TypeError(), function() { new Request(bodyConsumed); }); + assert_throws_js(TypeError, function() { new Request(bodyConsumed); }); }, "Check creating a new request from a disturbed request"); promise_test(function() { @@ -100,13 +100,13 @@ assert_false(req.bodyUsed, 'Request should not be flagged as used if it has not been ' + 'consumed.'); - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { new Request(req, {method: 'GET'}); }, 'A get request may not have body.'); assert_false(req.bodyUsed, 'After the GET case'); - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { new Request(req, {method: 'CONNECT'}); }, 'Request() with a forbidden method must throw.'); diff --git a/tests/wpt/web-platform-tests/fetch/api/request/request-error.html b/tests/wpt/web-platform-tests/fetch/api/request/request-error.html index 70be9fb0e7c..622ba3f4c28 100644 --- a/tests/wpt/web-platform-tests/fetch/api/request/request-error.html +++ b/tests/wpt/web-platform-tests/fetch/api/request/request-error.html @@ -15,8 +15,8 @@ // badRequestArgTests is from response-error.js for (const { args, testName } of badRequestArgTests) { test(() => { - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => new Request(...args), "Expect TypeError exception" ); diff --git a/tests/wpt/web-platform-tests/fetch/api/request/request-init-002.html b/tests/wpt/web-platform-tests/fetch/api/request/request-init-002.html index 221b415a3c1..14be2774220 100644 --- a/tests/wpt/web-platform-tests/fetch/api/request/request-init-002.html +++ b/tests/wpt/web-platform-tests/fetch/api/request/request-init-002.html @@ -31,8 +31,8 @@ promise_test(function(test) { var request = new Request("", makeRequestInit(body, "POST")); if (body) { - assert_throws(new TypeError(), function() { new Request("", makeRequestInit(body, "GET")); }); - assert_throws(new TypeError(), function() { new Request("", makeRequestInit(body, "HEAD")); }); + assert_throws_js(TypeError, function() { new Request("", makeRequestInit(body, "GET")); }); + assert_throws_js(TypeError, function() { new Request("", makeRequestInit(body, "HEAD")); }); } else { new Request("", makeRequestInit(body, "GET")); // should not throw } diff --git a/tests/wpt/web-platform-tests/fetch/api/request/request-init-stream.any.js b/tests/wpt/web-platform-tests/fetch/api/request/request-init-stream.any.js index df5fb26a0d8..e7ffa729d15 100644 --- a/tests/wpt/web-platform-tests/fetch/api/request/request-init-stream.any.js +++ b/tests/wpt/web-platform-tests/fetch/api/request/request-init-stream.any.js @@ -3,7 +3,7 @@ "use strict"; async function assert_request(test, input, init) { - assert_throws(new TypeError(), () => new Request(input, init), "new Request()"); + assert_throws_js(TypeError, () => new Request(input, init), "new Request()"); await promise_rejects_js(test, TypeError, fetch(input, init), "fetch()"); } diff --git a/tests/wpt/web-platform-tests/fetch/api/request/request-keepalive.html b/tests/wpt/web-platform-tests/fetch/api/request/request-keepalive.html index 602fabc4db3..e165422166e 100644 --- a/tests/wpt/web-platform-tests/fetch/api/request/request-keepalive.html +++ b/tests/wpt/web-platform-tests/fetch/api/request/request-keepalive.html @@ -21,7 +21,7 @@ test(() => { test(() => { const init = {method: 'POST', keepalive: true, body: new ReadableStream()}; - assert_throws(new TypeError(), () => {new Request('/', init)}); + assert_throws_js(TypeError, () => {new Request('/', init)}); }, 'keepalive flag with stream body'); </script> </body> diff --git a/tests/wpt/web-platform-tests/fetch/api/response/response-clone.html b/tests/wpt/web-platform-tests/fetch/api/response/response-clone.html index f586c81bac7..f5ebd7940e1 100644 --- a/tests/wpt/web-platform-tests/fetch/api/response/response-clone.html +++ b/tests/wpt/web-platform-tests/fetch/api/response/response-clone.html @@ -58,7 +58,7 @@ var disturbedResponse = new Response("data"); return disturbedResponse.text().then(function() { assert_true(disturbedResponse.bodyUsed, "response is disturbed"); - assert_throws(new TypeError() , function() { disturbedResponse.clone(); }, + assert_throws_js(TypeError, function() { disturbedResponse.clone(); }, "Expect TypeError exception"); }); }, "Cannot clone a disturbed response"); diff --git a/tests/wpt/web-platform-tests/fetch/api/response/response-error.html b/tests/wpt/web-platform-tests/fetch/api/response/response-error.html index 1e68f6d01c6..7cbb1383459 100644 --- a/tests/wpt/web-platform-tests/fetch/api/response/response-error.html +++ b/tests/wpt/web-platform-tests/fetch/api/response/response-error.html @@ -13,7 +13,7 @@ var invalidStatus = [0, 100, 199, 600, 1000]; invalidStatus.forEach(function(status) { test(function() { - assert_throws(new RangeError() , function() { new Response("", { "status" : status }); }, + assert_throws_js(RangeError, function() { new Response("", { "status" : status }); }, "Expect RangeError exception when status is " + status); },"Throws RangeError when responseInit's status is " + status); }); @@ -21,7 +21,7 @@ var invalidStatusText = ["\n", "Ā"]; invalidStatusText.forEach(function(statusText) { test(function() { - assert_throws(new TypeError() , function() { new Response("", { "statusText" : statusText }); }, + assert_throws_js(TypeError, function() { new Response("", { "statusText" : statusText }); }, "Expect TypeError exception " + statusText); },"Throws TypeError when responseInit's statusText is " + statusText); }); @@ -29,7 +29,7 @@ var nullBodyStatus = [204, 205, 304]; nullBodyStatus.forEach(function(status) { test(function() { - assert_throws(new TypeError() , + assert_throws_js(TypeError, function() { new Response("body", {"status" : status }); }, "Expect TypeError exception "); },"Throws TypeError when building a response with body and a body status of " + status); diff --git a/tests/wpt/web-platform-tests/fetch/api/response/response-from-stream.any.js b/tests/wpt/web-platform-tests/fetch/api/response/response-from-stream.any.js index 93b29b42867..ea5192bfb10 100644 --- a/tests/wpt/web-platform-tests/fetch/api/response/response-from-stream.any.js +++ b/tests/wpt/web-platform-tests/fetch/api/response/response-from-stream.any.js @@ -5,13 +5,13 @@ test(() => { const stream = new ReadableStream(); stream.getReader(); - assert_throws(new TypeError(), () => new Response(stream)); + assert_throws_js(TypeError, () => new Response(stream)); }, "Constructing a Response with a stream on which getReader() is called"); test(() => { const stream = new ReadableStream(); stream.getReader().read(); - assert_throws(new TypeError(), () => new Response(stream)); + assert_throws_js(TypeError, () => new Response(stream)); }, "Constructing a Response with a stream on which read() is called"); promise_test(async () => { @@ -19,5 +19,5 @@ promise_test(async () => { reader = stream.getReader(); await reader.read(); reader.releaseLock(); - assert_throws(new TypeError(), () => new Response(stream)); + assert_throws_js(TypeError, () => new Response(stream)); }, "Constructing a Response with a stream on which read() and releaseLock() are called"); diff --git a/tests/wpt/web-platform-tests/fetch/api/response/response-static-redirect.html b/tests/wpt/web-platform-tests/fetch/api/response/response-static-redirect.html index a7492229fd0..f647b6debeb 100644 --- a/tests/wpt/web-platform-tests/fetch/api/response/response-static-redirect.html +++ b/tests/wpt/web-platform-tests/fetch/api/response/response-static-redirect.html @@ -37,14 +37,14 @@ test(function() { var invalidUrl = "http://:This is not an url"; - assert_throws(new TypeError(), function() { Response.redirect(invalidUrl); }, + assert_throws_js(TypeError, function() { Response.redirect(invalidUrl); }, "Expect TypeError exception"); }, "Check error returned when giving invalid url to redirect()"); var invalidRedirectStatus = [200, 309, 400, 500]; invalidRedirectStatus.forEach(function(invalidStatus) { test(function() { - assert_throws(new RangeError() , function() { Response.redirect(url, invalidStatus); }, + assert_throws_js(RangeError, function() { Response.redirect(url, invalidStatus); }, "Expect RangeError exception"); }, "Check error returned when giving invalid status to redirect(), status = " + invalidStatus); }); diff --git a/tests/wpt/web-platform-tests/fetch/api/response/response-stream-disturbed-5.html b/tests/wpt/web-platform-tests/fetch/api/response/response-stream-disturbed-5.html index 546b7b88801..830a41bc809 100644 --- a/tests/wpt/web-platform-tests/fetch/api/response/response-stream-disturbed-5.html +++ b/tests/wpt/web-platform-tests/fetch/api/response/response-stream-disturbed-5.html @@ -16,7 +16,7 @@ promise_test(function() { return fetch("../resources/data.json").then(function(response) { response.blob(); assert_not_equals(response.body, null); - assert_throws(new TypeError(), function() { response.body.getReader(); }); + assert_throws_js(TypeError, function() { response.body.getReader(); }); }); }, "Getting a body reader after consuming as blob"); @@ -24,7 +24,7 @@ promise_test(function() { return fetch("../resources/data.json").then(function(response) { response.text(); assert_not_equals(response.body, null); - assert_throws(new TypeError(), function() { response.body.getReader(); }); + assert_throws_js(TypeError, function() { response.body.getReader(); }); }); }, "Getting a body reader after consuming as text"); @@ -32,7 +32,7 @@ promise_test(function() { return fetch("../resources/data.json").then(function(response) { response.json(); assert_not_equals(response.body, null); - assert_throws(new TypeError(), function() { response.body.getReader(); }); + assert_throws_js(TypeError, function() { response.body.getReader(); }); }); }, "Getting a body reader after consuming as json"); @@ -40,7 +40,7 @@ promise_test(function() { return fetch("../resources/data.json").then(function(response) { response.arrayBuffer(); assert_not_equals(response.body, null); - assert_throws(new TypeError(), function() { response.body.getReader(); }); + assert_throws_js(TypeError, function() { response.body.getReader(); }); }); }, "Getting a body reader after consuming as arrayBuffer"); diff --git a/tests/wpt/web-platform-tests/fetch/http-cache/http-cache.js b/tests/wpt/web-platform-tests/fetch/http-cache/http-cache.js index ce49ad85363..2ab51165f35 100644 --- a/tests/wpt/web-platform-tests/fetch/http-cache/http-cache.js +++ b/tests/wpt/web-platform-tests/fetch/http-cache/http-cache.js @@ -59,7 +59,7 @@ function makeFetchFunctions(requests, uuid) { .then(makeCheckResponse(idx, config)) .then(makeCheckResponseBody(config, uuid), function (reason) { if ('expected_type' in config && config.expected_type === 'error') { - assert_throws(new TypeError(), function () { throw reason }) + assert_throws_js(TypeError, function () { throw reason }) } else { throw reason } diff --git a/tests/wpt/web-platform-tests/fetch/images/canvas-remote-read-remote-image-redirect.html b/tests/wpt/web-platform-tests/fetch/images/canvas-remote-read-remote-image-redirect.html index 32a387288af..4a887f3d331 100644 --- a/tests/wpt/web-platform-tests/fetch/images/canvas-remote-read-remote-image-redirect.html +++ b/tests/wpt/web-platform-tests/fetch/images/canvas-remote-read-remote-image-redirect.html @@ -15,7 +15,7 @@ image.onload = function() { const context = canvas.getContext("2d"); context.drawImage(image, 0, 0, 100, 100); - assert_throws("SecurityError", () => { + assert_throws_dom("SecurityError", () => { context.getImageData(0, 0, 100, 100); }); done(); diff --git a/tests/wpt/web-platform-tests/fullscreen/rendering/fullscreen-pseudo-class-support.html b/tests/wpt/web-platform-tests/fullscreen/rendering/fullscreen-pseudo-class-support.html index ccd3f0e22be..fb2ff318b9e 100644 --- a/tests/wpt/web-platform-tests/fullscreen/rendering/fullscreen-pseudo-class-support.html +++ b/tests/wpt/web-platform-tests/fullscreen/rendering/fullscreen-pseudo-class-support.html @@ -12,8 +12,8 @@ // would fail. test(t => { // precondition is to throw for unknown pseudo-classes: - assert_throws(new SyntaxError(), () => document.body.matches(':halfscreen')); - assert_throws(new SyntaxError(), () => document.querySelector(':halfscreen')); + assert_throws_dom("SyntaxError", () => document.body.matches(':halfscreen')); + assert_throws_dom("SyntaxError", () => document.querySelector(':halfscreen')); // the actual test: assert_false(document.body.matches(':fullscreen')); assert_equals(document.querySelector(':fullscreen'), null); diff --git a/tests/wpt/web-platform-tests/generic-sensor/generic-sensor-feature-policy-test.sub.js b/tests/wpt/web-platform-tests/generic-sensor/generic-sensor-feature-policy-test.sub.js index fabd4a7ded3..2a1fba9f83c 100644 --- a/tests/wpt/web-platform-tests/generic-sensor/generic-sensor-feature-policy-test.sub.js +++ b/tests/wpt/web-platform-tests/generic-sensor/generic-sensor-feature-policy-test.sub.js @@ -29,7 +29,7 @@ function run_fp_tests_disabled(sensorName) { test(() => { assert_true(sensorName in self); - assert_throws("SecurityError", () => {new sensorType()}); + assert_throws_dom("SecurityError", () => {new sensorType()}); }, `${sensorName}: ${header} disallows the top-level document.`); async_test(t => { diff --git a/tests/wpt/web-platform-tests/generic-sensor/generic-sensor-tests.js b/tests/wpt/web-platform-tests/generic-sensor/generic-sensor-tests.js index f0d37fb9f24..0cb3cb224a1 100644 --- a/tests/wpt/web-platform-tests/generic-sensor/generic-sensor-tests.js +++ b/tests/wpt/web-platform-tests/generic-sensor/generic-sensor-tests.js @@ -465,12 +465,12 @@ function runGenericSensorTests(sensorName, // Re-enable after https://github.com/w3c/sensors/issues/361 is fixed. // test(() => { -// assert_throws("NotSupportedError", +// assert_throws_dom("NotSupportedError", // () => { new sensorType({invalid: 1}) }); -// assert_throws("NotSupportedError", +// assert_throws_dom("NotSupportedError", // () => { new sensorType({frequency: 60, invalid: 1}) }); // if (!expectedRemappedReadings) { -// assert_throws("NotSupportedError", +// assert_throws_dom("NotSupportedError", // () => { new sensorType({referenceFrame: "screen"}) }); // } // }, `${sensorName}: throw 'NotSupportedError' for an unsupported sensor\ @@ -486,7 +486,7 @@ function runGenericSensorTests(sensorName, {} ]; invalidFreqs.map(freq => { - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => { new sensorType({frequency: freq}) }, `when freq is ${freq}`); }); @@ -538,7 +538,7 @@ function runGenericSensorTests(sensorName, true ]; invalidRefFrames.map(refFrame => { - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => { new sensorType({referenceFrame: refFrame}) }, `when refFrame is ${refFrame}`); }); diff --git a/tests/wpt/web-platform-tests/geolocation-API/getCurrentPosition_TypeError.html b/tests/wpt/web-platform-tests/geolocation-API/getCurrentPosition_TypeError.html index a2e57846979..6726e8ab6c7 100644 --- a/tests/wpt/web-platform-tests/geolocation-API/getCurrentPosition_TypeError.html +++ b/tests/wpt/web-platform-tests/geolocation-API/getCurrentPosition_TypeError.html @@ -11,42 +11,42 @@ <script> // Rewrite http://dev.w3.org/geo/api/test-suite/t.html?00027 test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { geo.getCurrentPosition(); }); }, 'Call getCurrentPosition without arguments, check that exception is thrown'); // Rewrite http://dev.w3.org/geo/api/test-suite/t.html?00011 test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { geo.getCurrentPosition(null); }); }, 'Call getCurrentPosition with null success callback, check that exception is thrown'); // Rewrite http://dev.w3.org/geo/api/test-suite/t.html?00013 test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { geo.getCurrentPosition(null, null); }); }, 'Call getCurrentPosition with null success and error callbacks, check that exception is thrown'); // Rewrite http://dev.w3.org/geo/api/test-suite/t.html?00028 test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { geo.getCurrentPosition(3); }); }, 'Call getCurrentPosition() with wrong type for first argument. Exception expected.'); // Rewrite http://dev.w3.org/geo/api/test-suite/t.html?00029 test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { geo.getCurrentPosition(dummyFunction, 4); }); }, 'Call getCurrentPosition() with wrong type for second argument. Exception expected.'); // Rewrite http://dev.w3.org/geo/api/test-suite/t.html?00030 test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { geo.getCurrentPosition(dummyFunction, dummyFunction, 4); }); }, 'Call getCurrentPosition() with wrong type for third argument. Exception expected.'); diff --git a/tests/wpt/web-platform-tests/geolocation-API/watchPosition_TypeError.html b/tests/wpt/web-platform-tests/geolocation-API/watchPosition_TypeError.html index 9d7efd5e7b9..dd8287f5713 100644 --- a/tests/wpt/web-platform-tests/geolocation-API/watchPosition_TypeError.html +++ b/tests/wpt/web-platform-tests/geolocation-API/watchPosition_TypeError.html @@ -11,42 +11,42 @@ <script> // Rewrite http://dev.w3.org/geo/api/test-suite/t.html?00058 test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { geo.watchPosition(); }); }, 'Call watchPosition without arguments, check that exception is thrown'); // Rewrite http://dev.w3.org/geo/api/test-suite/t.html?00015 test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { geo.watchPosition(null); }); }, 'Call watchPosition with null success callback, check that exception is thrown'); // Rewrite http://dev.w3.org/geo/api/test-suite/t.html?00017 test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { geo.watchPosition(null, null); }); }, 'Call watchPosition with null success and error callbacks, check that exception is thrown'); // Rewrite http://dev.w3.org/geo/api/test-suite/t.html?00059 test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { geo.watchPosition(3); }); }, 'Call watchPosition() with wrong type for first argument. Exception expected.'); // Rewrite http://dev.w3.org/geo/api/test-suite/t.html?00060 test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { geo.watchPosition(dummyFunction, 4); }); }, 'Call watchPosition() with wrong type for second argument. Exception expected.'); // Rewrite http://dev.w3.org/geo/api/test-suite/t.html?00061 test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { geo.watchPosition(dummyFunction, dummyFunction, 4); }); }, 'Call watchPosition() with wrong type for third argument. Exception expected.'); diff --git a/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/001.html b/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/001.html index ac8c8000777..da93e0dafc7 100644 --- a/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/001.html +++ b/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/001.html @@ -82,19 +82,19 @@ function reportload() { function tests4() { test(function () { //Firefox 4 beta 11 has a messed up error object, which does not have the right error type or .SECURITY_ERR property - assert_throws('SECURITY_ERR',function () { history.pushState('','','//exa mple'); }); + assert_throws_dom('SECURITY_ERR',function () { history.pushState('','','//exa mple'); }); }, 'pushState must not be allowed to create invalid URLs'); test(function () { - assert_throws('SECURITY_ERR',function () { history.pushState('','','http://www.example.com/'); }); + assert_throws_dom('SECURITY_ERR',function () { history.pushState('','','http://www.example.com/'); }); }, 'pushState must not be allowed to create cross-origin URLs'); test(function () { - assert_throws('SECURITY_ERR',function () { history.pushState('','','about:blank'); }); + assert_throws_dom('SECURITY_ERR',function () { history.pushState('','','about:blank'); }); }, 'pushState must not be allowed to create cross-origin URLs (about:blank)'); test(function () { - assert_throws('SECURITY_ERR',function () { history.pushState('','','data:text/html,'); }); + assert_throws_dom('SECURITY_ERR',function () { history.pushState('','','data:text/html,'); }); }, 'pushState must not be allowed to create cross-origin URLs (data:URI)'); test(function () { - assert_throws('SECURITY_ERR',function () { iframe.contentWindow.history.pushState('','','http://www.example.com/'); },iframe.contentWindow); + assert_throws_dom('SECURITY_ERR',function () { iframe.contentWindow.history.pushState('','','http://www.example.com/'); },iframe.contentWindow); }, 'security errors are expected to be thrown in the context of the document that owns the history object'); test(function () { iframe.contentWindow.location.hash = 'test2'; @@ -164,12 +164,12 @@ function reportload() { assert_equals( iframe.contentWindow.location.href, newURL ); }, 'pushState must be able to set absolute URLs to the same host'); test(function () { - assert_throws( 'DATA_CLONE_ERR', function () { + assert_throws_dom( 'DATA_CLONE_ERR', function () { history.pushState({dummy:function () {}},''); } ); }, 'pushState must not be able to use a function as data'); test(function () { - assert_throws( 'DATA_CLONE_ERR', function () { + assert_throws_dom( 'DATA_CLONE_ERR', function () { history.pushState({dummy:window},''); } ); }, 'pushState must not be able to use a DOM node as data'); @@ -180,7 +180,7 @@ function reportload() { } }, 'pushState must be able to use an error object as data'); test(function () { - assert_throws( 'DATA_CLONE_ERR', function () { + assert_throws_dom( 'DATA_CLONE_ERR', function () { iframe.contentWindow.history.pushState(document,''); }, iframe.contentWindow ); }, 'security errors are expected to be thrown in the context of the document that owns the history object (2)'); diff --git a/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/002.html b/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/002.html index 431f6a58634..dba28b0471c 100644 --- a/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/002.html +++ b/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/002.html @@ -87,19 +87,19 @@ function reportload() { assert_equals( iframe.contentWindow.location.hash.replace(/^#/,''), 'test2' ); }, 'replaceState must replace the existing state without altering the forward history'); test(function () { - assert_throws('SECURITY_ERR',function () { history.replaceState('','','//exa mple'); }); + assert_throws_dom('SECURITY_ERR',function () { history.replaceState('','','//exa mple'); }); }, 'replaceState must not be allowed to create invalid URLs'); test(function () { - assert_throws('SECURITY_ERR',function () { history.replaceState('','','http://www.example.com/'); }); + assert_throws_dom('SECURITY_ERR',function () { history.replaceState('','','http://www.example.com/'); }); }, 'replaceState must not be allowed to create cross-origin URLs'); test(function () { - assert_throws('SECURITY_ERR',function () { history.replaceState('','','about:blank'); }); + assert_throws_dom('SECURITY_ERR',function () { history.replaceState('','','about:blank'); }); }, 'replaceState must not be allowed to create cross-origin URLs (about:blank)'); test(function () { - assert_throws('SECURITY_ERR',function () { history.replaceState('','','data:text/html,'); }); + assert_throws_dom('SECURITY_ERR',function () { history.replaceState('','','data:text/html,'); }); }, 'replaceState must not be allowed to create cross-origin URLs (data:URI)'); test(function () { - assert_throws('SECURITY_ERR',function () { iframe.contentWindow.history.replaceState('','','http://www.example.com/'); },iframe.contentWindow); + assert_throws_dom('SECURITY_ERR',function () { iframe.contentWindow.history.replaceState('','','http://www.example.com/'); },iframe.contentWindow); }, 'security errors are expected to be thrown in the context of the document that owns the history object'); test(function () { //avoids browsers running .go synchronously when only a hash change is involved @@ -145,12 +145,12 @@ function reportload() { assert_false( hashchng ); }, 'replaceState must not fire hashchange events'); test(function () { - assert_throws( 'DATA_CLONE_ERR', function () { + assert_throws_dom( 'DATA_CLONE_ERR', function () { history.replaceState({dummy:function () {}},''); } ); }, 'replaceState must not be able to use a function as data'); test(function () { - assert_throws( 'DATA_CLONE_ERR', function () { + assert_throws_dom( 'DATA_CLONE_ERR', function () { history.replaceState({dummy:window},''); } ); }, 'replaceState must not be able to use a DOM node as data'); @@ -161,7 +161,7 @@ function reportload() { } }, 'replaceState must be able to use an error object as data'); test(function () { - assert_throws( 'DATA_CLONE_ERR', function () { + assert_throws_dom( 'DATA_CLONE_ERR', function () { iframe.contentWindow.history.replaceState(document,''); }, iframe.contentWindow ); }, 'security errors are expected to be thrown in the context of the document that owns the history object (2)'); diff --git a/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/history_properties_only_fully_active.html b/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/history_properties_only_fully_active.html index 0404a6b2e02..bc09507f0ad 100644 --- a/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/history_properties_only_fully_active.html +++ b/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/history_properties_only_fully_active.html @@ -10,13 +10,13 @@ var ifr = document.getElementById("child"); var cached_history = ifr.contentWindow.history; ifr.remove(); - assert_throws("SecurityError", function() { cached_history.length; }); - assert_throws("SecurityError", function() { cached_history.scrollRestoration; }); - assert_throws("SecurityError", function() { cached_history.state; }); - assert_throws("SecurityError", function() { cached_history.go(0); }); - assert_throws("SecurityError", function() { cached_history.back(); }); - assert_throws("SecurityError", function() { cached_history.forward(); }); - assert_throws("SecurityError", function() { cached_history.pushState(1, document.title, "?x=1"); }); - assert_throws("SecurityError", function() { cached_history.replaceState(2, document.title, "?x=2"); }); + assert_throws_dom("SecurityError", function() { cached_history.length; }); + assert_throws_dom("SecurityError", function() { cached_history.scrollRestoration; }); + assert_throws_dom("SecurityError", function() { cached_history.state; }); + assert_throws_dom("SecurityError", function() { cached_history.go(0); }); + assert_throws_dom("SecurityError", function() { cached_history.back(); }); + assert_throws_dom("SecurityError", function() { cached_history.forward(); }); + assert_throws_dom("SecurityError", function() { cached_history.pushState(1, document.title, "?x=1"); }); + assert_throws_dom("SecurityError", function() { cached_history.replaceState(2, document.title, "?x=2"); }); }); </script> diff --git a/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/history_pushstate_err.html b/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/history_pushstate_err.html index 82afc04f2dd..6fa0a8589d8 100644 --- a/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/history_pushstate_err.html +++ b/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/history_pushstate_err.html @@ -9,7 +9,7 @@ <div id="log"></div> <script> test(function () { - assert_throws("SecurityError", function () { + assert_throws_dom("SecurityError", function () { window.history.pushState(1, document.title, 'http://www.microsoft.com/test.html'); }); }, "history pushState SECURITY_ERR"); diff --git a/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/history_replacestate_err.html b/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/history_replacestate_err.html index 3060cf1f128..15d2181820c 100644 --- a/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/history_replacestate_err.html +++ b/tests/wpt/web-platform-tests/html/browsers/history/the-history-interface/history_replacestate_err.html @@ -9,7 +9,7 @@ <div id="log"></div> <script> test(function () { - assert_throws("SecurityError", function () { + assert_throws_dom("SecurityError", function () { window.history.replaceState(1, document.title, 'http://www.microsoft.com/test.html'); }); }, "history replaceState SECURITY_ERR"); diff --git a/tests/wpt/web-platform-tests/html/browsers/history/the-location-interface/location-protocol-setter.html b/tests/wpt/web-platform-tests/html/browsers/history/the-location-interface/location-protocol-setter.html index ef92f7ab0f8..1afef4628d4 100644 --- a/tests/wpt/web-platform-tests/html/browsers/history/the-location-interface/location-protocol-setter.html +++ b/tests/wpt/web-platform-tests/html/browsers/history/the-location-interface/location-protocol-setter.html @@ -86,7 +86,7 @@ onmessage = (e) => { ] ;broken.forEach((val) => { test(() => { - assert_throws("SyntaxError", () => { location.protocol = val }) + assert_throws_dom("SyntaxError", () => { location.protocol = val }) }, encodeURI(val) + " (percent-encoded) is not a scheme") }) let c = 0 diff --git a/tests/wpt/web-platform-tests/html/browsers/history/the-location-interface/location-prototype-setting-same-origin-domain.sub.html b/tests/wpt/web-platform-tests/html/browsers/history/the-location-interface/location-prototype-setting-same-origin-domain.sub.html index 570dfccd40f..8ec7585daa1 100644 --- a/tests/wpt/web-platform-tests/html/browsers/history/the-location-interface/location-prototype-setting-same-origin-domain.sub.html +++ b/tests/wpt/web-platform-tests/html/browsers/history/the-location-interface/location-prototype-setting-same-origin-domain.sub.html @@ -23,7 +23,7 @@ window.onload = () => { assert_not_equals(origProto, null); }, "Same-origin-domain prerequisite check: the original prototype is accessible"); - testSettingImmutablePrototype("Same-origin-domain", targetLocation, origProto, { isSameOriginDomain: true }); + testSettingImmutablePrototype("Same-origin-domain", targetLocation, origProto, { isSameOriginDomain: true }, frames[0]); done(); }; diff --git a/tests/wpt/web-platform-tests/html/browsers/history/the-location-interface/location_assign.html b/tests/wpt/web-platform-tests/html/browsers/history/the-location-interface/location_assign.html index 7e18804c283..55f26d5660a 100644 --- a/tests/wpt/web-platform-tests/html/browsers/history/the-location-interface/location_assign.html +++ b/tests/wpt/web-platform-tests/html/browsers/history/the-location-interface/location_assign.html @@ -18,7 +18,7 @@ test(function () { var href = location.href; - assert_throws('SYNTAX_ERR', function() { location.assign("http://:"); }); + assert_throws_dom('SYNTAX_ERR', function() { location.assign("http://:"); }); assert_equals(location.href, href); }, "URL that fails to parse"); </script> diff --git a/tests/wpt/web-platform-tests/html/browsers/offline/application-cache-api/api_swapcache_error.https.html b/tests/wpt/web-platform-tests/html/browsers/offline/application-cache-api/api_swapcache_error.https.html index 02e7b3cd8c0..4e069d73f7f 100644 --- a/tests/wpt/web-platform-tests/html/browsers/offline/application-cache-api/api_swapcache_error.https.html +++ b/tests/wpt/web-platform-tests/html/browsers/offline/application-cache-api/api_swapcache_error.https.html @@ -12,7 +12,7 @@ var cache = window.applicationCache; test(function() { - assert_throws("INVALID_STATE_ERR", function(){cache.swapCache();}); + assert_throws_dom("INVALID_STATE_ERR", function(){cache.swapCache();}); }, "INVALID_STATE_ERR error test") </script> </body> diff --git a/tests/wpt/web-platform-tests/html/browsers/offline/application-cache-api/api_update_error.https.html b/tests/wpt/web-platform-tests/html/browsers/offline/application-cache-api/api_update_error.https.html index 469baea8bad..46386939c5c 100644 --- a/tests/wpt/web-platform-tests/html/browsers/offline/application-cache-api/api_update_error.https.html +++ b/tests/wpt/web-platform-tests/html/browsers/offline/application-cache-api/api_update_error.https.html @@ -11,7 +11,7 @@ <script> var cache = window.applicationCache; test(function() { - assert_throws("INVALID_STATE_ERR", function(){cache.update();}); + assert_throws_dom("INVALID_STATE_ERR", function(){cache.update();}); }, "INVALID_STATE_ERR error test") </script> diff --git a/tests/wpt/web-platform-tests/html/browsers/origin/cross-origin-objects/cross-origin-due-to-document-domain-only.html b/tests/wpt/web-platform-tests/html/browsers/origin/cross-origin-objects/cross-origin-due-to-document-domain-only.html index 919a05ed2a2..425374faec0 100644 --- a/tests/wpt/web-platform-tests/html/browsers/origin/cross-origin-objects/cross-origin-due-to-document-domain-only.html +++ b/tests/wpt/web-platform-tests/html/browsers/origin/cross-origin-objects/cross-origin-due-to-document-domain-only.html @@ -18,12 +18,12 @@ async_test(t => { assert_equals(frame.contentWindow, innerSelf); assert_equals(frame.contentDocument, innerDocument); innerSelf.setDocumentDomain(); - assert_throws("SecurityError", () => innerSelf.expandosForever); - assert_throws("SecurityError", () => innerLocation.expandosForever); - assert_throws("SecurityError", () => innerLocation.host); + assert_throws_dom("SecurityError", () => innerSelf.expandosForever); + assert_throws_dom("SecurityError", () => innerLocation.expandosForever); + assert_throws_dom("SecurityError", () => innerLocation.host); assert_equals(innerSelf.parent, self); - assert_throws("SecurityError", () => innerSelf.frameElement); - assert_throws("SecurityError", () => innerLocation.reload()); + assert_throws_dom("SecurityError", () => innerSelf.frameElement); + assert_throws_dom("SecurityError", () => innerLocation.reload()); assert_equals(frame.contentWindow, innerSelf); assert_equals(frame.contentDocument, null); // Cross-origin Document object obtained before it became cross-origin has no protections diff --git a/tests/wpt/web-platform-tests/html/browsers/origin/cross-origin-objects/cross-origin-objects.html b/tests/wpt/web-platform-tests/html/browsers/origin/cross-origin-objects/cross-origin-objects.html index 2c92d5e51ad..46fc568a0ee 100644 --- a/tests/wpt/web-platform-tests/html/browsers/origin/cross-origin-objects/cross-origin-objects.html +++ b/tests/wpt/web-platform-tests/html/browsers/origin/cross-origin-objects/cross-origin-objects.html @@ -145,7 +145,7 @@ addTest(function(win) { assert_equals(B.parent, window, "window.parent works same-origin"); assert_equals(win.parent, window, "window.parent works cross-origin"); assert_equals(B.location.pathname, path, "location.href works same-origin"); - assert_throws("SecurityError", function() { win.location.pathname; }, "location.pathname throws cross-origin"); + assert_throws_dom("SecurityError", function() { win.location.pathname; }, "location.pathname throws cross-origin"); assert_equals(B.frames, 'override', "Overrides visible in the same-origin case"); assert_equals(win.frames, win, "Overrides invisible in the cross-origin case"); assert_equals(B.focus, 'override', "Overrides visible in the same-origin case"); @@ -221,14 +221,14 @@ addTest(function(win) { Object.getOwnPropertyDescriptor(win, prop); // Shouldn't throw. assert_true(Object.prototype.hasOwnProperty.call(win, prop), "hasOwnProperty for " + String(prop)); } else { - assert_throws("SecurityError", function() { win[prop]; }, "Should throw when accessing " + String(prop) + " on Window"); - assert_throws("SecurityError", function() { Object.getOwnPropertyDescriptor(win, prop); }, + assert_throws_dom("SecurityError", function() { win[prop]; }, "Should throw when accessing " + String(prop) + " on Window"); + assert_throws_dom("SecurityError", function() { Object.getOwnPropertyDescriptor(win, prop); }, "Should throw when accessing property descriptor for " + prop + " on Window"); - assert_throws("SecurityError", function() { Object.prototype.hasOwnProperty.call(win, prop); }, + assert_throws_dom("SecurityError", function() { Object.prototype.hasOwnProperty.call(win, prop); }, "Should throw when invoking hasOwnProperty for " + prop + " on Window"); } if (prop != 'location') - assert_throws("SecurityError", function() { win[prop] = undefined; }, "Should throw when writing to " + prop + " on Window"); + assert_throws_dom("SecurityError", function() { win[prop] = undefined; }, "Should throw when writing to " + prop + " on Window"); } for (var prop of windowAllowlists.namedFrames) { win[prop]; // Shouldn't throw. @@ -240,21 +240,21 @@ addTest(function(win) { win.location[prop]; // Shouldn't throw. Object.getOwnPropertyDescriptor(win.location, prop); // Shouldn't throw. assert_true(Object.prototype.hasOwnProperty.call(win.location, prop), "hasOwnProperty for " + prop); - assert_throws("SecurityError", function() { win.location[prop] = undefined; }, "Should throw when writing to " + prop + " on Location"); + assert_throws_dom("SecurityError", function() { win.location[prop] = undefined; }, "Should throw when writing to " + prop + " on Location"); } else if (prop == 'href') { Object.getOwnPropertyDescriptor(win.location, prop); // Shouldn't throw. assert_true(Object.prototype.hasOwnProperty.call(win.location, prop), "hasOwnProperty for " + prop); - assert_throws("SecurityError", function() { win.location[prop] }, + assert_throws_dom("SecurityError", function() { win.location[prop] }, "Should throw reading href on Location"); } else { - assert_throws("SecurityError", function() { win.location[prop]; }, "Should throw when accessing " + prop + " on Location"); - assert_throws("SecurityError", function() { Object.getOwnPropertyDescriptor(win.location, prop); }, + assert_throws_dom("SecurityError", function() { win.location[prop]; }, "Should throw when accessing " + prop + " on Location"); + assert_throws_dom("SecurityError", function() { Object.getOwnPropertyDescriptor(win.location, prop); }, "Should throw when accessing property descriptor for " + prop + " on Location"); - assert_throws("SecurityError", function() { Object.prototype.hasOwnProperty.call(win.location, prop); }, + assert_throws_dom("SecurityError", function() { Object.prototype.hasOwnProperty.call(win.location, prop); }, "Should throw when invoking hasOwnProperty for " + prop + " on Location"); - assert_throws("SecurityError", function() { win.location[prop] = undefined; }, "Should throw when writing to " + prop + " on Location"); + assert_throws_dom("SecurityError", function() { win.location[prop] = undefined; }, "Should throw when writing to " + prop + " on Location"); } } }, "Only certain properties are accessible cross-origin"); @@ -278,7 +278,7 @@ addPromiseTest(async function(win, test_obj) { `Should throw when calling ${objName}.${prop} with cross-origin this object`); } else if (!allowedlists.methods.includes(prop)) { for (let args of methodArgs.get(prop) || [[]]) { - assert_throws("SecurityError", desc.value.bind(otherObj, ...args), + assert_throws_dom("SecurityError", desc.value.bind(otherObj, ...args), `Should throw when calling ${objName}.${prop} with cross-origin this object`); } @@ -293,7 +293,7 @@ addPromiseTest(async function(win, test_obj) { if (allowedlists.getters.includes(prop)) { desc.get.call(otherObj); // Shouldn't throw. } else { - assert_throws("SecurityError", desc.get.bind(otherObj), + assert_throws_dom("SecurityError", desc.get.bind(otherObj), `Should throw when calling ${objName}.${prop} getter with cross-origin this object`); } } @@ -301,7 +301,7 @@ addPromiseTest(async function(win, test_obj) { if (allowedlists.setters.includes(prop)) { desc.set.call(otherObj, "javascript:undefined"); // Shouldn't throw. } else { - assert_throws("SecurityError", desc.set.bind(otherObj, "foo"), + assert_throws_dom("SecurityError", desc.set.bind(otherObj, "foo"), `Should throw when calling ${objName}.${prop} setter with cross-origin this object`); } } @@ -326,8 +326,8 @@ addTest(function(win) { var protoGetter = Object.getOwnPropertyDescriptor(Object.prototype, '__proto__').get; assert_equals(protoGetter.call(win), null, "cross-origin Window proto is null"); assert_equals(protoGetter.call(win.location), null, "cross-origin Location proto is null (__proto__)"); - assert_throws("SecurityError", function() { win.__proto__; }, "__proto__ property not available cross-origin"); - assert_throws("SecurityError", function() { win.location.__proto__; }, "__proto__ property not available cross-origin"); + assert_throws_dom("SecurityError", function() { win.__proto__; }, "__proto__ property not available cross-origin"); + assert_throws_dom("SecurityError", function() { win.location.__proto__; }, "__proto__ property not available cross-origin"); }, "[[GetPrototypeOf]] should return null"); @@ -335,8 +335,8 @@ addTest(function(win) { * [[SetPrototypeOf]] */ addTest(function(win) { - assert_throws("SecurityError", function() { win.__proto__ = new Object(); }, "proto set on cross-origin Window"); - assert_throws("SecurityError", function() { win.location.__proto__ = new Object(); }, "proto set on cross-origin Location"); + assert_throws_dom("SecurityError", function() { win.__proto__ = new Object(); }, "proto set on cross-origin Window"); + assert_throws_dom("SecurityError", function() { win.location.__proto__ = new Object(); }, "proto set on cross-origin Location"); var setters = [Object.getOwnPropertyDescriptor(Object.prototype, '__proto__').set]; if (Object.setPrototypeOf) setters.push(function(p) { Object.setPrototypeOf(this, p); }); @@ -443,7 +443,7 @@ addThenTest(function(win) { addTest(function(win) { assert_equals(typeof Object.getOwnPropertyDescriptor(win, '0').value, "object"); assert_equals(typeof Object.getOwnPropertyDescriptor(win, '1').value, "object"); - assert_throws("SecurityError", function() { + assert_throws_dom("SecurityError", function() { Object.getOwnPropertyDescriptor(win, '2'); }); }, "[[GetOwnProperty]] - Should be able to get a property descriptor for an indexed property only if it corresponds to a child window."); @@ -452,17 +452,17 @@ addTest(function(win) { * [[Delete]] */ addTest(function(win) { - assert_throws("SecurityError", function() { delete win[0]; }, "Can't delete cross-origin indexed property"); - assert_throws("SecurityError", function() { delete win[100]; }, "Can't delete cross-origin indexed property"); - assert_throws("SecurityError", function() { delete win.location; }, "Can't delete cross-origin property"); - assert_throws("SecurityError", function() { delete win.parent; }, "Can't delete cross-origin property"); - assert_throws("SecurityError", function() { delete win.length; }, "Can't delete cross-origin property"); - assert_throws("SecurityError", function() { delete win.document; }, "Can't delete cross-origin property"); - assert_throws("SecurityError", function() { delete win.foopy; }, "Can't delete cross-origin property"); - assert_throws("SecurityError", function() { delete win.location.href; }, "Can't delete cross-origin property"); - assert_throws("SecurityError", function() { delete win.location.replace; }, "Can't delete cross-origin property"); - assert_throws("SecurityError", function() { delete win.location.port; }, "Can't delete cross-origin property"); - assert_throws("SecurityError", function() { delete win.location.foopy; }, "Can't delete cross-origin property"); + assert_throws_dom("SecurityError", function() { delete win[0]; }, "Can't delete cross-origin indexed property"); + assert_throws_dom("SecurityError", function() { delete win[100]; }, "Can't delete cross-origin indexed property"); + assert_throws_dom("SecurityError", function() { delete win.location; }, "Can't delete cross-origin property"); + assert_throws_dom("SecurityError", function() { delete win.parent; }, "Can't delete cross-origin property"); + assert_throws_dom("SecurityError", function() { delete win.length; }, "Can't delete cross-origin property"); + assert_throws_dom("SecurityError", function() { delete win.document; }, "Can't delete cross-origin property"); + assert_throws_dom("SecurityError", function() { delete win.foopy; }, "Can't delete cross-origin property"); + assert_throws_dom("SecurityError", function() { delete win.location.href; }, "Can't delete cross-origin property"); + assert_throws_dom("SecurityError", function() { delete win.location.replace; }, "Can't delete cross-origin property"); + assert_throws_dom("SecurityError", function() { delete win.location.port; }, "Can't delete cross-origin property"); + assert_throws_dom("SecurityError", function() { delete win.location.foopy; }, "Can't delete cross-origin property"); }, "[[Delete]] Should throw on cross-origin objects"); /* @@ -471,8 +471,8 @@ addTest(function(win) { function checkDefine(obj, prop) { var valueDesc = { configurable: true, enumerable: false, writable: false, value: 2 }; var accessorDesc = { configurable: true, enumerable: false, get: function() {} }; - assert_throws("SecurityError", function() { Object.defineProperty(obj, prop, valueDesc); }, "Can't define cross-origin value property " + prop); - assert_throws("SecurityError", function() { Object.defineProperty(obj, prop, accessorDesc); }, "Can't define cross-origin accessor property " + prop); + assert_throws_dom("SecurityError", function() { Object.defineProperty(obj, prop, valueDesc); }, "Can't define cross-origin value property " + prop); + assert_throws_dom("SecurityError", function() { Object.defineProperty(obj, prop, accessorDesc); }, "Can't define cross-origin accessor property " + prop); } addTest(function(win) { checkDefine(win, 'length'); @@ -670,10 +670,10 @@ addTest(function(win) { // Check that applying it to a cross-origin window throws instead of doing // the [LenientThis] behavior. - assert_throws("SecurityError", () => { + assert_throws_dom("SecurityError", () => { desc.get.call(win); }, "Should throw when getting cross-origin"); - assert_throws("SecurityError", () => { + assert_throws_dom("SecurityError", () => { desc.set.call(win, f); }, "Should throw when setting cross-origin"); }, "LenientThis behavior"); diff --git a/tests/wpt/web-platform-tests/html/browsers/origin/origin-of-data-document.html b/tests/wpt/web-platform-tests/html/browsers/origin/origin-of-data-document.html index d6b6d533a22..448f47fa244 100644 --- a/tests/wpt/web-platform-tests/html/browsers/origin/origin-of-data-document.html +++ b/tests/wpt/web-platform-tests/html/browsers/origin/origin-of-data-document.html @@ -17,7 +17,7 @@ window.addEventListener("message", t.step_func_done(function (e) { assert_equals(e.origin, "null", "Messages sent from a 'data:' URL should have an opaque origin (which serializes to 'null')."); - assert_throws("SecurityError", function () { + assert_throws_dom("SecurityError", function () { var couldAccessCrossOriginProperty = e.source.location.href; }, "The 'data:' frame should be cross-origin: 'window.location.href'"); assert_equals(i.contentDocument, null, "The 'data:' iframe should be unable to access its contentDocument."); diff --git a/tests/wpt/web-platform-tests/html/browsers/origin/relaxing-the-same-origin-restriction/document_domain_setter.html b/tests/wpt/web-platform-tests/html/browsers/origin/relaxing-the-same-origin-restriction/document_domain_setter.html index a55d85dfdf2..77f438c0166 100644 --- a/tests/wpt/web-platform-tests/html/browsers/origin/relaxing-the-same-origin-restriction/document_domain_setter.html +++ b/tests/wpt/web-platform-tests/html/browsers/origin/relaxing-the-same-origin-restriction/document_domain_setter.html @@ -20,10 +20,10 @@ iframe.src = iframe_url; test(function() { - assert_throws("SecurityError", function() { document.domain = SUFFIX_HOST; }); - assert_throws("SecurityError", function() { document.domain = "." + SUFFIX_HOST; }); - assert_throws("SecurityError", function() { document.domain = REMOTE_HOST; }); - assert_throws("SecurityError", function() { document.domain = "example.com"; }); + assert_throws_dom("SecurityError", function() { document.domain = SUFFIX_HOST; }); + assert_throws_dom("SecurityError", function() { document.domain = "." + SUFFIX_HOST; }); + assert_throws_dom("SecurityError", function() { document.domain = REMOTE_HOST; }); + assert_throws_dom("SecurityError", function() { document.domain = "example.com"; }); }, "failed setting of document.domain"); async_test(function(t) { @@ -31,17 +31,17 @@ // Before setting document.domain, the iframe is not // same-origin-domain, so security checks fail. assert_equals(iframe.contentDocument, null); - assert_throws("SecurityError", () => iframe.contentWindow.frameElement); - assert_throws("SecurityError", function() { iframe.contentWindow.location.origin; }); - assert_throws("SecurityError", function() { iframe.contentWindow.location.href; }); - assert_throws("SecurityError", function() { iframe.contentWindow.location.protocol; }); - assert_throws("SecurityError", function() { iframe.contentWindow.location.host; }); - assert_throws("SecurityError", function() { iframe.contentWindow.location.port; }); - assert_throws("SecurityError", function() { iframe.contentWindow.location.hostname; }); - assert_throws("SecurityError", function() { iframe.contentWindow.location.pathname; }); - assert_throws("SecurityError", function() { iframe.contentWindow.location.hash; }); - assert_throws("SecurityError", function() { iframe.contentWindow.location.search; }); - assert_throws("SecurityError", function() { iframe.contentWindow.location.toString(); }); + assert_throws_dom("SecurityError", () => iframe.contentWindow.frameElement); + assert_throws_dom("SecurityError", function() { iframe.contentWindow.location.origin; }); + assert_throws_dom("SecurityError", function() { iframe.contentWindow.location.href; }); + assert_throws_dom("SecurityError", function() { iframe.contentWindow.location.protocol; }); + assert_throws_dom("SecurityError", function() { iframe.contentWindow.location.host; }); + assert_throws_dom("SecurityError", function() { iframe.contentWindow.location.port; }); + assert_throws_dom("SecurityError", function() { iframe.contentWindow.location.hostname; }); + assert_throws_dom("SecurityError", function() { iframe.contentWindow.location.pathname; }); + assert_throws_dom("SecurityError", function() { iframe.contentWindow.location.hash; }); + assert_throws_dom("SecurityError", function() { iframe.contentWindow.location.search; }); + assert_throws_dom("SecurityError", function() { iframe.contentWindow.location.toString(); }); // Set document.domain document.domain = ORIGINAL_HOST; // After setting document.domain, the iframe is @@ -61,14 +61,14 @@ assert_equals(iframe.contentWindow.location.toString(), iframe_url.toString()); // document.open checks for same-origin, not same-origin-domain, // https://github.com/whatwg/html/issues/2282 - assert_throws("SecurityError", function() { iframe.contentDocument.open(); }); + assert_throws_dom("SecurityError", function() { iframe.contentDocument.open(); }); })); }, "same-origin-domain iframe"); test(() => { - assert_throws("SecurityError", () => { (new Document).domain = document.domain }); - assert_throws("SecurityError", () => { document.implementation.createHTMLDocument().domain = document.domain }); - assert_throws("SecurityError", () => { document.implementation.createDocument(null, "").domain = document.domain }); + assert_throws_dom("SecurityError", () => { (new Document).domain = document.domain }); + assert_throws_dom("SecurityError", () => { document.implementation.createHTMLDocument().domain = document.domain }); + assert_throws_dom("SecurityError", () => { document.implementation.createDocument(null, "").domain = document.domain }); }, "failed setting of document.domain for documents without browsing context"); </script> </body> diff --git a/tests/wpt/web-platform-tests/html/browsers/origin/relaxing-the-same-origin-restriction/sandboxed-document_domain.html b/tests/wpt/web-platform-tests/html/browsers/origin/relaxing-the-same-origin-restriction/sandboxed-document_domain.html index 824795f80b1..ae1a0ccd560 100644 --- a/tests/wpt/web-platform-tests/html/browsers/origin/relaxing-the-same-origin-restriction/sandboxed-document_domain.html +++ b/tests/wpt/web-platform-tests/html/browsers/origin/relaxing-the-same-origin-restriction/sandboxed-document_domain.html @@ -4,18 +4,18 @@ <script src="/resources/testharnessreport.js"></script> <script> test(() => { - assert_throws("SecurityError", () => { document.domain = document.domain }); + assert_throws_dom("SecurityError", () => { document.domain = document.domain }); }); test(() => { - assert_throws("SecurityError", () => { (new Document).domain = document.domain }); + assert_throws_dom("SecurityError", () => { (new Document).domain = document.domain }); }); test(() => { - assert_throws("SecurityError", () => { document.implementation.createHTMLDocument().domain = document.domain }); + assert_throws_dom("SecurityError", () => { document.implementation.createHTMLDocument().domain = document.domain }); }); test(() => { - assert_throws("SecurityError", () => { document.implementation.createDocument(null, "").domain = document.domain }); + assert_throws_dom("SecurityError", () => { document.implementation.createDocument(null, "").domain = document.domain }); }); test(() => { - assert_throws("SecurityError", () => { document.createElement("template").content.ownerDocument.domain = document.domain }); + assert_throws_dom("SecurityError", () => { document.createElement("template").content.ownerDocument.domain = document.domain }); }); </script> diff --git a/tests/wpt/web-platform-tests/html/browsers/sandboxing/sandbox-disallow-same-origin.html b/tests/wpt/web-platform-tests/html/browsers/sandboxing/sandbox-disallow-same-origin.html index d1bd00747f9..0dae0137ac9 100644 --- a/tests/wpt/web-platform-tests/html/browsers/sandboxing/sandbox-disallow-same-origin.html +++ b/tests/wpt/web-platform-tests/html/browsers/sandboxing/sandbox-disallow-same-origin.html @@ -19,7 +19,7 @@ } function loaded() { t.step(() => { - assert_throws("SecurityError", () => { + assert_throws_dom("SecurityError", () => { document.getElementById('sandboxedframe').contentWindow.document; }); assert_equals(called, 0); diff --git a/tests/wpt/web-platform-tests/html/browsers/sandboxing/sandbox-disallow-scripts-via-unsandboxed-popup.tentative.html b/tests/wpt/web-platform-tests/html/browsers/sandboxing/sandbox-disallow-scripts-via-unsandboxed-popup.tentative.html index 0bb98c55382..3c8c0b346a6 100644 --- a/tests/wpt/web-platform-tests/html/browsers/sandboxing/sandbox-disallow-scripts-via-unsandboxed-popup.tentative.html +++ b/tests/wpt/web-platform-tests/html/browsers/sandboxing/sandbox-disallow-scripts-via-unsandboxed-popup.tentative.html @@ -6,9 +6,9 @@ async_test(t => { let i = document.createElement('iframe'); i.sandbox = "allow-same-origin allow-popups allow-popups-to-escape-sandbox"; - i.srcdoc = `<a target='_blank' + i.srcdoc = `<a target='_blank' rel='opener' href="javascript:window.opener.top.postMessage('FAIL', '*');">Click me!</a> - <a target='_blank' + <a target='_blank' rel='opener' href="./resources/post-done-to-opener.html">Click me next!</a>`; i.onload = _ => { diff --git a/tests/wpt/web-platform-tests/html/browsers/the-window-object/security-window/window-security.https.html b/tests/wpt/web-platform-tests/html/browsers/the-window-object/security-window/window-security.https.html index 1fb0ed7c1e6..ad8f177f37d 100644 --- a/tests/wpt/web-platform-tests/html/browsers/the-window-object/security-window/window-security.https.html +++ b/tests/wpt/web-platform-tests/html/browsers/the-window-object/security-window/window-security.https.html @@ -139,7 +139,7 @@ function fr_load() { ].forEach(function (item) { test(function () { assert_true(item.name in window, "window." + item.name + " should exist."); - assert_throws("SecurityError", function () { + assert_throws_dom("SecurityError", function () { if (item.isMethod) if (item.args) fr.contentWindow[item.name](item.args[0], item.args[1]); diff --git a/tests/wpt/web-platform-tests/html/browsers/the-window-object/window-indexed-properties-strict.html b/tests/wpt/web-platform-tests/html/browsers/the-window-object/window-indexed-properties-strict.html index e059b122616..faf214d12d5 100644 --- a/tests/wpt/web-platform-tests/html/browsers/the-window-object/window-indexed-properties-strict.html +++ b/tests/wpt/web-platform-tests/html/browsers/the-window-object/window-indexed-properties-strict.html @@ -20,24 +20,24 @@ test(function() { }); test(function() { "use strict"; - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { window[0] = "foo"; }); - assert_throws(new TypeError(), () => Object.defineProperty(window, 0, { value: "bar" })) - assert_throws(new TypeError(), () => Object.defineProperty(window, 0, { get() { return "baz" } })) - assert_throws(new TypeError(), () => Object.defineProperty(window, 0, { set(v) { return "qux" } })) + assert_throws_js(TypeError, () => Object.defineProperty(window, 0, { value: "bar" })) + assert_throws_js(TypeError, () => Object.defineProperty(window, 0, { get() { return "baz" } })) + assert_throws_js(TypeError, () => Object.defineProperty(window, 0, { set(v) { return "qux" } })) assert_equals(window[0], document.getElementsByTagName("iframe")[0].contentWindow); - assert_throws(new TypeError(), () => delete window[0]); + assert_throws_js(TypeError, () => delete window[0]); }); test(function() { "use strict"; - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { window[1] = "foo"; }); - assert_throws(new TypeError(), () => Object.defineProperty(window, 1, { value: "bar" })) - assert_throws(new TypeError(), () => Object.defineProperty(window, 1, { get() { return "baz" } })) - assert_throws(new TypeError(), () => Object.defineProperty(window, 1, { set(v) { return "qux" } })) + assert_throws_js(TypeError, () => Object.defineProperty(window, 1, { value: "bar" })) + assert_throws_js(TypeError, () => Object.defineProperty(window, 1, { get() { return "baz" } })) + assert_throws_js(TypeError, () => Object.defineProperty(window, 1, { set(v) { return "qux" } })) assert_equals(window[1], undefined); assert_equals(Object.getOwnPropertyDescriptor(window, 1), undefined); assert_equals(delete window[1], true); diff --git a/tests/wpt/web-platform-tests/html/browsers/the-window-object/window-indexed-properties.html b/tests/wpt/web-platform-tests/html/browsers/the-window-object/window-indexed-properties.html index 49247179738..0f896cb636e 100644 --- a/tests/wpt/web-platform-tests/html/browsers/the-window-object/window-indexed-properties.html +++ b/tests/wpt/web-platform-tests/html/browsers/the-window-object/window-indexed-properties.html @@ -25,18 +25,18 @@ test(() => { }, "Ensure indexed properties have the correct configuration"); test(function() { window[0] = "foo"; - assert_throws(new TypeError(), () => Object.defineProperty(window, 0, { value: "bar" })) - assert_throws(new TypeError(), () => Object.defineProperty(window, 0, { get() { return "baz" } })) - assert_throws(new TypeError(), () => Object.defineProperty(window, 0, { set() { return "quz" } })) + assert_throws_js(TypeError, () => Object.defineProperty(window, 0, { value: "bar" })) + assert_throws_js(TypeError, () => Object.defineProperty(window, 0, { get() { return "baz" } })) + assert_throws_js(TypeError, () => Object.defineProperty(window, 0, { set() { return "quz" } })) assert_equals(window[0], document.getElementsByTagName("iframe")[0].contentWindow); assert_equals(delete window[0], false); }); test(function() { window[1] = "foo"; - assert_throws(new TypeError(), () => Object.defineProperty(window, 1, { value: "bar" })) - assert_throws(new TypeError(), () => Object.defineProperty(window, 1, { get() { return "baz" } })) - assert_throws(new TypeError(), () => Object.defineProperty(window, 1, { set(v) { return "quz" } })) + assert_throws_js(TypeError, () => Object.defineProperty(window, 1, { value: "bar" })) + assert_throws_js(TypeError, () => Object.defineProperty(window, 1, { get() { return "baz" } })) + assert_throws_js(TypeError, () => Object.defineProperty(window, 1, { set(v) { return "quz" } })) assert_equals(window[1], undefined); assert_equals(Object.getOwnPropertyDescriptor(window, 1), undefined); assert_equals(delete window[1], true); diff --git a/tests/wpt/web-platform-tests/html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-same-origin-domain.sub.html b/tests/wpt/web-platform-tests/html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-same-origin-domain.sub.html index 83d11a20e09..fb18822ac5b 100644 --- a/tests/wpt/web-platform-tests/html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-same-origin-domain.sub.html +++ b/tests/wpt/web-platform-tests/html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-same-origin-domain.sub.html @@ -23,7 +23,7 @@ window.onload = () => { assert_not_equals(origProto, null); }, "Same-origin-domain prerequisite check: the original prototype is accessible"); - testSettingImmutablePrototype("Same-origin-domain", target, origProto, { isSameOriginDomain: true }); + testSettingImmutablePrototype("Same-origin-domain", target, origProto, { isSameOriginDomain: true }, frames[0]); done(); }; diff --git a/tests/wpt/web-platform-tests/html/browsers/windows/document-domain-nested-navigate.window.js b/tests/wpt/web-platform-tests/html/browsers/windows/document-domain-nested-navigate.window.js index b639c819267..f51eed5ca94 100644 --- a/tests/wpt/web-platform-tests/html/browsers/windows/document-domain-nested-navigate.window.js +++ b/tests/wpt/web-platform-tests/html/browsers/windows/document-domain-nested-navigate.window.js @@ -6,7 +6,7 @@ async_test(t => { document.domain = document.domain; frame.src = "/common/blank.html"; frame.onload = t.step_func(() => { - assert_throws("SecurityError", () => window[0].document); + assert_throws_dom("SecurityError", () => window[0].document); frame.src = "about:blank"; frame.onload = t.step_func_done(() => { // Ensure we can access the child browsing context after navigation to non-initial about:blank diff --git a/tests/wpt/web-platform-tests/html/browsers/windows/nested-browsing-contexts/frameElement.sub.html b/tests/wpt/web-platform-tests/html/browsers/windows/nested-browsing-contexts/frameElement.sub.html index 2f5b1c466f8..7ea11820811 100644 --- a/tests/wpt/web-platform-tests/html/browsers/windows/nested-browsing-contexts/frameElement.sub.html +++ b/tests/wpt/web-platform-tests/html/browsers/windows/nested-browsing-contexts/frameElement.sub.html @@ -41,7 +41,7 @@ var t2 = async_test("The SecurityError must be thrown if the window accesses to frameElement attribute of a Window which does not have the same effective script origin"); window.addEventListener("load", t2.step_func_done(function() { - assert_throws("SecurityError", function() { + assert_throws_dom("SecurityError", function() { frames["iframe_2"].frameElement; }, "The SecurityError exception should be thrown."); diff --git a/tests/wpt/web-platform-tests/html/cross-origin-embedder-policy/require-corp-about-blank.html b/tests/wpt/web-platform-tests/html/cross-origin-embedder-policy/require-corp-about-blank.html index b94cb57b95f..5c51df71ae5 100644 --- a/tests/wpt/web-platform-tests/html/cross-origin-embedder-policy/require-corp-about-blank.html +++ b/tests/wpt/web-platform-tests/html/cross-origin-embedder-policy/require-corp-about-blank.html @@ -27,7 +27,6 @@ promise_test(async t => { iframe_B.src = "about:blank"; iframe_C.src = "/common/blank.html"; let iframe_B_loaded = new Promise(resolve => iframe_B.onload = resolve); - let iframe_C_loaded = new Promise(resolve => iframe_C.onload = resolve); document.body.appendChild(iframe_B); // The about:blank frame must be able to load. @@ -35,13 +34,16 @@ promise_test(async t => { assert_not_equals(iframe_B.contentDocument, null); iframe_B.contentDocument.body.appendChild(iframe_C); - // The document nested under about:blank must not load because it does not - // specify the Cross-Origin-Embedder-Policy: require-corp header. - // An error page must be displayed instead. - await iframe_C_loaded; - assert_equals(iframe_C.contentDocument, null); - - t.done(); + t.step_timeout(() => { + // The document nested under about:blank must not load because it does not + // specify the Cross-Origin-Embedder-Policy: require-corp header. + // An error page must be displayed instead. + // See https://github.com/whatwg/html/issues/125 for why a timeout is used + // here. Long term all network error handling should be similar and have a + // reliable event. + assert_equals(iframe_C.contentDocument, null); + t.done(); + }, 500); }, "A(B(C)) A=require-corp, B=about:blank, C=no-require-corp => C can't load"); </script> diff --git a/tests/wpt/web-platform-tests/html/cross-origin-embedder-policy/require-corp-about-srcdoc.html b/tests/wpt/web-platform-tests/html/cross-origin-embedder-policy/require-corp-about-srcdoc.html index a832db1cebb..4d1c1f86464 100644 --- a/tests/wpt/web-platform-tests/html/cross-origin-embedder-policy/require-corp-about-srcdoc.html +++ b/tests/wpt/web-platform-tests/html/cross-origin-embedder-policy/require-corp-about-srcdoc.html @@ -28,7 +28,6 @@ promise_test(async t => { iframe_B.srcdoc = "dummy content"; iframe_C.src = "/common/blank.html"; let iframe_B_loaded = new Promise(resolve => iframe_B.onload = resolve); - let iframe_C_loaded = new Promise(resolve => iframe_C.onload = resolve); document.body.appendChild(iframe_B); // The about:srcdoc frame must be able to load. @@ -37,13 +36,17 @@ promise_test(async t => { assert_equals(iframe_B.contentDocument.body.innerText, "dummy content"); iframe_B.contentDocument.body.appendChild(iframe_C); - // The document nested under about:srcdoc must not load because it does not - // specify the Cross-Origin-Embedder-Policy: require-corp header. - // An error page must be displayed instead. - await iframe_C_loaded; - assert_equals(iframe_C.contentDocument, null); - t.done(); + t.step_timeout(() => { + // The document nested under about:srcdoc must not load because it does not + // specify the Cross-Origin-Embedder-Policy: require-corp header. + // An error page must be displayed instead. + // See https://github.com/whatwg/html/issues/125 for why a timeout is used + // here. Long term all network error handling should be similar and have a + // reliable event. + assert_equals(iframe_C.contentDocument, null); + t.done(); + }, 500); }, "A(B(C)) A=require-corp, B=about:srcdoc, C=no-require-corp => C can't load"); </script> diff --git a/tests/wpt/web-platform-tests/html/dom/documents/dom-tree-accessors/Document.body.html b/tests/wpt/web-platform-tests/html/dom/documents/dom-tree-accessors/Document.body.html index f4212502956..77de1d93b5e 100644 --- a/tests/wpt/web-platform-tests/html/dom/documents/dom-tree-accessors/Document.body.html +++ b/tests/wpt/web-platform-tests/html/dom/documents/dom-tree-accessors/Document.body.html @@ -128,20 +128,20 @@ test(function() { var originalBody = document.body; test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { document.body = "text" }) assert_equals(document.body, originalBody); }, "Setting document.body to a string.") test(function() { - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { document.body = document.createElement("div") }) assert_equals(document.body, originalBody); }, "Setting document.body to a div element.") test(function() { var doc = createDocument(); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { doc.body = doc.createElement("body") }) assert_equals(doc.body, null); diff --git a/tests/wpt/web-platform-tests/html/dom/elements/global-attributes/dataset-set.html b/tests/wpt/web-platform-tests/html/dom/elements/global-attributes/dataset-set.html index dbce5de309a..a5bc177f504 100644 --- a/tests/wpt/web-platform-tests/html/dom/elements/global-attributes/dataset-set.html +++ b/tests/wpt/web-platform-tests/html/dom/elements/global-attributes/dataset-set.html @@ -30,11 +30,11 @@ "Setting element.dataset[''] should also change the value of element.getAttribute('data-')"); test(function() { assert_true(testSet('\xE0', 'data-\xE0')); }, "Setting element.dataset['\xE0'] should also change the value of element.getAttribute('data-\xE0')"); - test(function() { assert_throws('SYNTAX_ERR', function() { testSet('-foo', 'dummy') }); }, + test(function() { assert_throws_dom('SYNTAX_ERR', function() { testSet('-foo', 'dummy') }); }, "Setting element.dataset['-foo'] should throw a SYNTAX_ERR"); - test(function() { assert_throws('INVALID_CHARACTER_ERR', function() { testSet('foo\x20', 'dummy') }); }, + test(function() { assert_throws_dom('INVALID_CHARACTER_ERR', function() { testSet('foo\x20', 'dummy') }); }, "Setting element.dataset['foo\x20'] should throw an INVALID_CHARACTER_ERR"); - test(function() { assert_throws('INVALID_CHARACTER_ERR', function() { testSet('\u037Efoo', 'dummy') }); }, + test(function() { assert_throws_dom('INVALID_CHARACTER_ERR', function() { testSet('\u037Efoo', 'dummy') }); }, "Setting element.dataset['\u037Efoo'] should throw an INVALID_CHARACTER_ERR"); test(function() { assert_true(testSet('\u0BC6foo', 'data-\u0BC6foo')); }, "Setting element.dataset['\u0BC6foo'] should also change the value of element.getAttribute('\u0BC6foo')"); diff --git a/tests/wpt/web-platform-tests/html/editing/dnd/datastore/datatransfer-types.html b/tests/wpt/web-platform-tests/html/editing/dnd/datastore/datatransfer-types.html index d0842ae75c4..3da94d78c64 100644 --- a/tests/wpt/web-platform-tests/html/editing/dnd/datastore/datatransfer-types.html +++ b/tests/wpt/web-platform-tests/html/editing/dnd/datastore/datatransfer-types.html @@ -56,7 +56,7 @@ test(() => { // Failing to add a new item via DataTransferItemList does not // change the underlying data store. old_types = dt.types; - assert_throws("NotSupportedError", () => { + assert_throws_dom("NotSupportedError", () => { dt.items.add("bar", "text/plain"); }, "Adding an item whose type is already present throws an exception"); assert_equals(dt.items.length, 1); diff --git a/tests/wpt/web-platform-tests/html/editing/dnd/synthetic/001.html b/tests/wpt/web-platform-tests/html/editing/dnd/synthetic/001.html index ddad72095b2..f90c345740d 100644 --- a/tests/wpt/web-platform-tests/html/editing/dnd/synthetic/001.html +++ b/tests/wpt/web-platform-tests/html/editing/dnd/synthetic/001.html @@ -12,7 +12,7 @@ test(function() { assert_own_property(window,'DragEvent'); }, 'window.DragEvent should be exposed' ); test(function() { - assert_throws('NOT_SUPPORTED_ERR', function() { + assert_throws_dom('NOT_SUPPORTED_ERR', function() { var evt = document.createEvent('DragEvent'); }); }, 'createEvent should not be able to create a DragEvent' ); @@ -52,7 +52,7 @@ test(function() { assert_true(ranlistener); }, 'DragEvent constructor with undefined as the dataTransfer parameter should be able to fire the event' ); test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { var evt = new DragEvent('dragstart', {dataTransfer:{}}); }); }, 'DragEvent constructor with custom object as the dataTransfer parameter should throw TypeError' ); diff --git a/tests/wpt/web-platform-tests/html/editing/dnd/target-origin/001-manual.html b/tests/wpt/web-platform-tests/html/editing/dnd/target-origin/001-manual.html index 4622c76a92f..ff8572e937b 100644 --- a/tests/wpt/web-platform-tests/html/editing/dnd/target-origin/001-manual.html +++ b/tests/wpt/web-platform-tests/html/editing/dnd/target-origin/001-manual.html @@ -15,10 +15,10 @@ window.onload = function () { assert_true( !!e.dataTransfer.allowTargetOrigin ); }, 'allowTargetOrigin should be supported' ); test(function() { - assert_throws( new TypeError(), function () { e.dataTransfer.allowTargetOrigin(); } ); + assert_throws_js( TypeError, function () { e.dataTransfer.allowTargetOrigin(); } ); }, 'no parameter should throw TypeError' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin(''); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin(''); } ); }, 'empty string should be an invalid URL' ); test(function() { e.dataTransfer.allowTargetOrigin('*'); @@ -27,58 +27,58 @@ window.onload = function () { e.dataTransfer.allowTargetOrigin('/'); }, '/ should be a valid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('/foo'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('/foo'); } ); }, '/foo should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('foo'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('foo'); } ); }, 'foo should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('//foo'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('//foo'); } ); }, '//foo should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('http://'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('http://'); } ); }, 'http:// should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('http://*'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('http://*'); } ); }, 'http://* should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('http://foo*'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('http://foo*'); } ); }, 'http://foo* should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('http://foo.*'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('http://foo.*'); } ); }, 'http://foo.* should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('http://*.foo'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('http://*.foo'); } ); }, 'http://*.foo should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('http://foo:bar'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('http://foo:bar'); } ); }, 'http://foo:bar should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('http://foo:bar@'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('http://foo:bar@'); } ); }, 'http://foo:bar@ should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('file:'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('file:'); } ); }, 'file: should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('file://'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('file://'); } ); }, 'file:// should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('data:'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('data:'); } ); }, 'data: should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('data:text/html'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('data:text/html'); } ); }, 'data:text/html should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('file://localhost/'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('file://localhost/'); } ); }, 'file://localhost/ should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('file:///'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('file:///'); } ); }, 'file:/// should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('data:text/html,'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('data:text/html,'); } ); }, 'data:text/html, should be an invalid URL' ); test(function() { - assert_throws( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('javascript:'); } ); + assert_throws_dom( 'SYNTAX_ERR', function () { e.dataTransfer.allowTargetOrigin('javascript:'); } ); }, 'javascript: should be an invalid URL' ); test(function() { e.dataTransfer.allowTargetOrigin('http://foo'); diff --git a/tests/wpt/web-platform-tests/html/editing/dnd/target-origin/002-manual.html b/tests/wpt/web-platform-tests/html/editing/dnd/target-origin/002-manual.html index d1615090660..d7e6c83a2ad 100644 --- a/tests/wpt/web-platform-tests/html/editing/dnd/target-origin/002-manual.html +++ b/tests/wpt/web-platform-tests/html/editing/dnd/target-origin/002-manual.html @@ -39,7 +39,7 @@ window.onload = function () { assert_true( !!e.dataTransfer.allowTargetOrigin ); }, 'allowTargetOrigin should exist in '+e.type ); test(function() { - assert_throws( 'SECURITY_ERR', function () { e.dataTransfer.allowTargetOrigin('*'); } ); + assert_throws_dom( 'SECURITY_ERR', function () { e.dataTransfer.allowTargetOrigin('*'); } ); }, 'allowTargetOrigin should throw a SECURITY_ERR in '+e.type ); }; fuchsia.ondragenter = fuchsia.ondragover = fuchsia.ondrop = function (e) { @@ -50,7 +50,7 @@ window.onload = function () { assert_true( !!e.dataTransfer.allowTargetOrigin ); }, 'allowTargetOrigin should exist in '+e.type ); test(function() { - assert_throws( 'SECURITY_ERR', function () { e.dataTransfer.allowTargetOrigin('*'); } ); + assert_throws_dom( 'SECURITY_ERR', function () { e.dataTransfer.allowTargetOrigin('*'); } ); }, 'allowTargetOrigin should throw a SECURITY_ERR in '+e.type ); }; orange.ondragend = function (e) { @@ -60,7 +60,7 @@ window.onload = function () { assert_true( !!e.dataTransfer.allowTargetOrigin ); }, 'allowTargetOrigin should exist in '+e.type ); test(function() { - assert_throws( 'SECURITY_ERR', function () { e.dataTransfer.allowTargetOrigin('*'); } ); + assert_throws_dom( 'SECURITY_ERR', function () { e.dataTransfer.allowTargetOrigin('*'); } ); }, 'allowTargetOrigin should throw a SECURITY_ERR in '+e.type ); test(function() { var failtxt = '- Reload and try again'; diff --git a/tests/wpt/web-platform-tests/html/editing/editing-0/contenteditable/contentEditable-invalidvalue.html b/tests/wpt/web-platform-tests/html/editing/editing-0/contenteditable/contentEditable-invalidvalue.html index 85b71043e16..b8c17c3a416 100644 --- a/tests/wpt/web-platform-tests/html/editing/editing-0/contenteditable/contentEditable-invalidvalue.html +++ b/tests/wpt/web-platform-tests/html/editing/editing-0/contenteditable/contentEditable-invalidvalue.html @@ -9,7 +9,7 @@ <script> var el = document.createElement("div"); test(function(){ - assert_throws("SyntaxError", function() { + assert_throws_dom("SyntaxError", function() { el.contentEditable = "foobar"; }); }, "setting contentEditable to an invalid value throws a SyntaxError Exception"); diff --git a/tests/wpt/web-platform-tests/html/editing/editing-0/making-entire-documents-editable-the-designmode-idl-attribute/user-interaction-editing-designMode-svg.svg b/tests/wpt/web-platform-tests/html/editing/editing-0/making-entire-documents-editable-the-designmode-idl-attribute/user-interaction-editing-designMode-svg.svg index 6fb8a054481..fd2fde0fbe1 100644 --- a/tests/wpt/web-platform-tests/html/editing/editing-0/making-entire-documents-editable-the-designmode-idl-attribute/user-interaction-editing-designMode-svg.svg +++ b/tests/wpt/web-platform-tests/html/editing/editing-0/making-entire-documents-editable-the-designmode-idl-attribute/user-interaction-editing-designMode-svg.svg @@ -14,20 +14,20 @@ <script type="text/javascript"><![CDATA[ test(function() { assert_equals(document.designMode, "off", "check for designMode value"); - assert_throws("InvalidStateError", function() { document.queryCommandSupported("delete") }); - assert_throws("InvalidStateError", function() { document.queryCommandEnabled("delete") }); + assert_throws_dom("InvalidStateError", function() { document.queryCommandSupported("delete") }); + assert_throws_dom("InvalidStateError", function() { document.queryCommandEnabled("delete") }); }, "initial designMode attribute"); document.designMode="on"; test(function() { assert_equals(document.designMode, "on", "check for designMode value"); - assert_throws("InvalidStateError", function() { document.queryCommandSupported("delete") }); - assert_throws("InvalidStateError", function() { document.queryCommandEnabled("delete") }); + assert_throws_dom("InvalidStateError", function() { document.queryCommandSupported("delete") }); + assert_throws_dom("InvalidStateError", function() { document.queryCommandEnabled("delete") }); }, "set designMode = \"on\""); document.designMode="off"; test(function() { assert_equals(document.designMode,"off", "check for designMode value"); - assert_throws("InvalidStateError", function() { document.queryCommandSupported("delete") }); - assert_throws("InvalidStateError", function() { document.queryCommandEnabled("delete") }); + assert_throws_dom("InvalidStateError", function() { document.queryCommandSupported("delete") }); + assert_throws_dom("InvalidStateError", function() { document.queryCommandEnabled("delete") }); }, "set designMode = \"off\""); ]]></script> </body> diff --git a/tests/wpt/web-platform-tests/html/editing/editing-0/making-entire-documents-editable-the-designmode-idl-attribute/user-interaction-editing-designMode-xml.xml b/tests/wpt/web-platform-tests/html/editing/editing-0/making-entire-documents-editable-the-designmode-idl-attribute/user-interaction-editing-designMode-xml.xml index ea02ecdfd39..f26cd56453b 100644 --- a/tests/wpt/web-platform-tests/html/editing/editing-0/making-entire-documents-editable-the-designmode-idl-attribute/user-interaction-editing-designMode-xml.xml +++ b/tests/wpt/web-platform-tests/html/editing/editing-0/making-entire-documents-editable-the-designmode-idl-attribute/user-interaction-editing-designMode-xml.xml @@ -12,20 +12,20 @@ <script type="text/javascript"><![CDATA[ test(function() { assert_equals(document.designMode, "off", "check for designMode value"); - assert_throws("InvalidStateError", function() { document.queryCommandSupported("delete") }); - assert_throws("InvalidStateError", function() { document.queryCommandEnabled("delete") }); + assert_throws_dom("InvalidStateError", function() { document.queryCommandSupported("delete") }); + assert_throws_dom("InvalidStateError", function() { document.queryCommandEnabled("delete") }); }, "initial designMode attribute"); document.designMode="on"; test(function() { assert_equals(document.designMode, "on", "check for designMode value"); - assert_throws("InvalidStateError", function() { document.queryCommandSupported("delete") }); - assert_throws("InvalidStateError", function() { document.queryCommandEnabled("delete") }); + assert_throws_dom("InvalidStateError", function() { document.queryCommandSupported("delete") }); + assert_throws_dom("InvalidStateError", function() { document.queryCommandEnabled("delete") }); }, "set designMode = \"on\""); document.designMode="off"; test(function() { assert_equals(document.designMode,"off", "check for designMode value"); - assert_throws("InvalidStateError", function() { document.queryCommandSupported("delete") }); - assert_throws("InvalidStateError", function() { document.queryCommandEnabled("delete") }); + assert_throws_dom("InvalidStateError", function() { document.queryCommandSupported("delete") }); + assert_throws_dom("InvalidStateError", function() { document.queryCommandEnabled("delete") }); }, "set designMode = \"off\""); ]]></script> </body> diff --git a/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/domstringlist.html b/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/domstringlist.html index ab5a5c025a3..33f2ed6feff 100644 --- a/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/domstringlist.html +++ b/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/domstringlist.html @@ -36,7 +36,7 @@ dsl_test(['a', 'b', 'c'], (t, dsl) => { assert_equals(dsl.item(2), 'c', 'item method'); assert_equals(dsl.item(3), null, 'item method out of range'); assert_equals(dsl.item(-1), null, 'item method out of range'); - assert_throws(TypeError(), () => dsl.item(), + assert_throws_js(TypeError, () => dsl.item(), 'item method should throw if called without enough args'); }, 'DOMStringList: item() method'); @@ -54,7 +54,7 @@ dsl_test(['a', 'b', 'c'], (t, dsl) => { assert_true(dsl.contains('c'), 'contains method matched'); assert_false(dsl.contains(''), 'contains method unmatched'); assert_false(dsl.contains('d'), 'contains method unmatched'); - assert_throws(TypeError(), () => dsl.contains(), + assert_throws_js(TypeError, () => dsl.contains(), 'contains method should throw if called without enough args'); }, 'DOMStringList: contains() method'); diff --git a/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/historical.html b/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/historical.html index ef8345aa724..91142c864e9 100644 --- a/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/historical.html +++ b/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/historical.html @@ -11,7 +11,7 @@ test(function() { var collection = document.getElementById('form').elements; assert_equals(typeof collection, 'object', 'typeof'); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { collection('foo'); }); }, 'HTMLFormControlsCollection legacycaller should not be supported'); @@ -19,7 +19,7 @@ test(function() { test(function() { var collection = document.getElementById('select').options; assert_equals(typeof collection, 'object', 'typeof'); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { collection('bar'); }); }, 'HTMLOptionsCollection legacycaller should not be supported'); diff --git a/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/htmlallcollection.html b/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/htmlallcollection.html index 095931ad785..14faa2128ed 100644 --- a/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/htmlallcollection.html +++ b/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/htmlallcollection.html @@ -225,12 +225,12 @@ test(function() { }, "legacy caller with no argument"); test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { new document.all("picture"); }, "New should not work on document.all()"); // https://esdiscuss.org/topic/isconstructor#content-11 - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { new (new Proxy(document.all, { construct: function() { return {}; diff --git a/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/htmlformcontrolscollection.html b/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/htmlformcontrolscollection.html index aa9f0a5d5e0..5591e190b39 100644 --- a/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/htmlformcontrolscollection.html +++ b/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/htmlformcontrolscollection.html @@ -54,7 +54,7 @@ test(function () { //getter - name test(function () { - assert_throws(TypeError(), function() { coll1("r1") }); + assert_throws_js(TypeError, function() { coll1("r1") }); }, "HTMLFormControlsCollection is not callable"); test(function () { diff --git a/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/htmloptionscollection.html b/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/htmloptionscollection.html index d39cc460e5b..130716a9cc7 100644 --- a/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/htmloptionscollection.html +++ b/tests/wpt/web-platform-tests/html/infrastructure/common-dom-interfaces/collections/htmloptionscollection.html @@ -209,7 +209,7 @@ test(function() { test(function() { var add = document.createElement("p"); - assert_throws(new TypeError(), function() {b_opts.add(add);}); + assert_throws_js(TypeError, function() {b_opts.add(add);}); }, "Add non-option to collection"); </script> diff --git a/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/no-coop-coep.https.any.js b/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/no-coop-coep.https.any.js index a755865911d..35098892020 100644 --- a/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/no-coop-coep.https.any.js +++ b/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/no-coop-coep.https.any.js @@ -1,19 +1,19 @@ test(() => { const sab = new SharedArrayBuffer(); const channel = new MessageChannel(); - assert_throws("DataCloneError", () => channel.port1.postMessage(sab)); + assert_throws_dom("DataCloneError", () => channel.port1.postMessage(sab)); }, "SharedArrayBuffer over MessageChannel without COOP+COEP"); test(() => { const sab = new SharedArrayBuffer(); const channel = new BroadcastChannel("Is mir egal"); - assert_throws("DataCloneError", () => channel.postMessage(sab)); + assert_throws_dom("DataCloneError", () => channel.postMessage(sab)); }, "SharedArrayBuffer over BroadcastChannel without COOP+COEP"); if (self.GLOBAL.isWindow()) { test(() => { const sab = new SharedArrayBuffer(); - assert_throws("DataCloneError", () => self.postMessage(sab)); + assert_throws_dom("DataCloneError", () => self.postMessage(sab)); }, "SharedArrayBuffer over postMessage() without COOP+COEP"); } diff --git a/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/no-transferring.https.html b/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/no-transferring.https.html index b39e37fd496..dfa57fa2009 100644 --- a/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/no-transferring.https.html +++ b/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/no-transferring.https.html @@ -11,21 +11,21 @@ test(() => { const sab = new SharedArrayBuffer(); - assert_throws("DataCloneError", () => window.postMessage(sab, "*", [sab])); - assert_throws("DataCloneError", () => window.postMessage("test", "*", [sab])); + assert_throws_dom("DataCloneError", () => window.postMessage(sab, "*", [sab])); + assert_throws_dom("DataCloneError", () => window.postMessage("test", "*", [sab])); }, "Trying to transfer a SharedArrayBuffer to this window throws"); test(() => { const sab = new SharedArrayBuffer(); const worker = new Worker("../resources/echo-worker.js"); - assert_throws("DataCloneError", () => worker.postMessage(sab, [sab])); - assert_throws("DataCloneError", () => worker.postMessage("test", [sab])); + assert_throws_dom("DataCloneError", () => worker.postMessage(sab, [sab])); + assert_throws_dom("DataCloneError", () => worker.postMessage("test", [sab])); }, "Trying to transfer a SharedArrayBuffer to a worker throws"); test(() => { const sab = new SharedArrayBuffer(); const channel = new MessageChannel(); - assert_throws("DataCloneError", () => channel.port1.postMessage(sab, [sab])); - assert_throws("DataCloneError", () => channel.port1.postMessage("test", [sab])); + assert_throws_dom("DataCloneError", () => channel.port1.postMessage(sab, [sab])); + assert_throws_dom("DataCloneError", () => channel.port1.postMessage("test", [sab])); }, "Trying to transfer a SharedArrayBuffer through a MessagePort throws"); </script> diff --git a/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-history.https.html b/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-history.https.html index 49d341f47f9..28859f17cb9 100644 --- a/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-history.https.html +++ b/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-history.https.html @@ -13,7 +13,7 @@ for (const method of ["pushState", "replaceState"]) { test(() => { - assert_throws("DataCloneError", () => { + assert_throws_dom("DataCloneError", () => { history[method](new SharedArrayBuffer(), "dummy title"); }); }, `history.${method}(): simple case`); @@ -21,7 +21,7 @@ for (const method of ["pushState", "replaceState"]) { test(() => { let getter1Called = false; let getter2Called = false; - assert_throws("DataCloneError", () => { + assert_throws_dom("DataCloneError", () => { history[method]([ { get x() { getter1Called = true; return 5; } }, new SharedArrayBuffer(), diff --git a/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-idb.any.js b/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-idb.any.js index 4eb25eb8546..0202ec39ac6 100644 --- a/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-idb.any.js +++ b/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-idb.any.js @@ -8,7 +8,7 @@ async_test(t => { const db = e.target.result; const store = db.createObjectStore("store", { keyPath: "key" }); - assert_throws("DataCloneError", () => { + assert_throws_dom("DataCloneError", () => { store.put({ key: 1, property: new SharedArrayBuffer() }); }); t.done(); @@ -25,7 +25,7 @@ async_test(t => { let getter1Called = false; let getter2Called = false; - assert_throws("DataCloneError", () => { + assert_throws_dom("DataCloneError", () => { store.put({ key: 1, property: [ { get x() { getter1Called = true; return 5; } }, new SharedArrayBuffer(), diff --git a/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-notifications-api.any.js b/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-notifications-api.any.js index 2c3fb7be034..ce643e8a7cb 100644 --- a/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-notifications-api.any.js +++ b/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/serialization-via-notifications-api.any.js @@ -1,7 +1,7 @@ "use strict"; test(() => { - assert_throws("DataCloneError", () => { + assert_throws_dom("DataCloneError", () => { new Notification("Bob: Hi", { data: new SharedArrayBuffer() }); }) }, "SharedArrayBuffer cloning via the Notifications API's data member: basic case"); @@ -10,7 +10,7 @@ test(() => { let getter1Called = false; let getter2Called = false; - assert_throws("DataCloneError", () => { + assert_throws_dom("DataCloneError", () => { new Notification("Bob: Hi", { data: [ { get x() { getter1Called = true; return 5; } }, new SharedArrayBuffer(), diff --git a/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/structuredclone_0.html b/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/structuredclone_0.html index fbb48db0383..c8a6d38393c 100644 --- a/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/structuredclone_0.html +++ b/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/structuredclone_0.html @@ -354,7 +354,7 @@ t.step(function() { assert_true(DOMException.hasOwnProperty('DATA_CLONE_ERR'), "DOMException.DATA_CLONE_ERR is present"); assert_equals(DOMException.DATA_CLONE_ERR, 25, "DOMException.DATA_CLONE_ERR === 25"); - assert_throws('DATA_CLONE_ERR', function() {worker.postMessage(window)}); + assert_throws_dom('DATA_CLONE_ERR', function() {worker.postMessage(window)}); }); t.done(); }, @@ -365,7 +365,7 @@ t.step(function() { assert_true(DOMException.hasOwnProperty('DATA_CLONE_ERR'), "DOMException.DATA_CLONE_ERR is present"); assert_equals(DOMException.DATA_CLONE_ERR, 25, "DOMException.DATA_CLONE_ERR === 25"); - assert_throws('DATA_CLONE_ERR', function() {worker.postMessage(document)}); + assert_throws_dom('DATA_CLONE_ERR', function() {worker.postMessage(document)}); }); t.done(); }, diff --git a/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/transfer-errors.window.js b/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/transfer-errors.window.js index bb1c083c41d..b3ecd86b40a 100644 --- a/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/transfer-errors.window.js +++ b/tests/wpt/web-platform-tests/html/infrastructure/safe-passing-of-structured-data/transfer-errors.window.js @@ -1,5 +1,5 @@ function assert_transfer_error(transferList) { - assert_throws("DataCloneError", () => self.postMessage({ get whatever() { throw new Error("You should not have gotten to this point") } }, "*", transferList)); + assert_throws_dom("DataCloneError", () => self.postMessage({ get whatever() { throw new Error("You should not have gotten to this point") } }, "*", transferList)); } test(() => { @@ -17,14 +17,14 @@ function transfer_tests(name, create) { promise_test(async () => { const transferable = await create(); self.postMessage(null, "*", [transferable]); - assert_throws("DataCloneError", () => self.postMessage(null, "*", [transferable])); + assert_throws_dom("DataCloneError", () => self.postMessage(null, "*", [transferable])); }, `Serialize should make the ${name} detached, so it cannot be transferred again`); promise_test(async () => { const transferable = await create(), customError = new Error("hi"); self.postMessage(null, "*", [transferable]); - assert_throws(customError, () => self.postMessage({ get whatever() { throw customError } }, "*", [transferable])); + assert_throws_exactly(customError, () => self.postMessage({ get whatever() { throw customError } }, "*", [transferable])); }, `Serialize should throw before a detached ${name} is found`); promise_test(async () => { @@ -36,7 +36,7 @@ function transfer_tests(name, create) { seen = true; } }; - assert_throws("DataCloneError", () => self.postMessage(message, "*", [transferable])); + assert_throws_dom("DataCloneError", () => self.postMessage(message, "*", [transferable])); assert_true(seen); }, `Cannot transfer ${name} detached while the message was serialized`); } diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/historical.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/historical.html index efdd90f7b15..d98a74df4e1 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/historical.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/historical.html @@ -39,7 +39,7 @@ t('mozSrcObject'); // never in the spec // TextTrackCue constructor: added in r5723, removed in r7742. test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { new TextTrackCue(0, 0, ''); }); }, 'TextTrackCue constructor should not be supported'); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/HTMLElement/HTMLMediaElement/addTextTrack.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/HTMLElement/HTMLMediaElement/addTextTrack.html index 2a76b0a66ba..0e1a48f78a9 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/HTMLElement/HTMLMediaElement/addTextTrack.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/HTMLElement/HTMLMediaElement/addTextTrack.html @@ -6,19 +6,19 @@ <script> var video = document.createElement('video'); test(function(){ - assert_throws(new TypeError(), function(){ + assert_throws_js(TypeError, function(){ video.addTextTrack('foo'); }); - assert_throws(new TypeError(), function(){ + assert_throws_js(TypeError, function(){ video.addTextTrack(undefined); }); - assert_throws(new TypeError(), function(){ + assert_throws_js(TypeError, function(){ video.addTextTrack(null); }); }, document.title + ' bogus first arg'); test(function(){ - assert_throws(new TypeError(), function(){ + assert_throws_js(TypeError, function(){ video.addTextTrack('SUBTITLES'); }); }, document.title + ' uppercase first arg'); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrack/removeCue.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrack/removeCue.html index a05c0b17442..09043458cc5 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrack/removeCue.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrack/removeCue.html @@ -12,18 +12,18 @@ test(function() { var t1 = video.addTextTrack('subtitles'); var t2 = video.addTextTrack('subtitles'); var c1 = new VTTCue(0, 1, 'text1'); - assert_throws("NOT_FOUND_ERR", function() { + assert_throws_dom("NOT_FOUND_ERR", function() { t1.removeCue(c1); }, 'standalone'); t1.addCue(c1); - assert_throws("NOT_FOUND_ERR", function() { + assert_throws_dom("NOT_FOUND_ERR", function() { t2.removeCue(c1); }, 'listed in t1, remove from t2'); t1.removeCue(c1); - assert_throws("NOT_FOUND_ERR", function() { + assert_throws_dom("NOT_FOUND_ERR", function() { t1.removeCue(c1); }, 'standalone, remove from t1'); - assert_throws("NOT_FOUND_ERR", function() { + assert_throws_dom("NOT_FOUND_ERR", function() { t2.removeCue(c1); }, 'standalone, remove from t2'); }, document.title+', two elementless tracks'); @@ -33,10 +33,10 @@ t.step(function(){ var track = document.createElement('track'); track.onload = t.step_func(function(){ var cue = track.track.cues[0]; - assert_throws('NOT_FOUND_ERR', function() { t1.removeCue(cue); }, 'listed in track.track, remove from t1'); + assert_throws_dom('NOT_FOUND_ERR', function() { t1.removeCue(cue); }, 'listed in track.track, remove from t1'); track.track.removeCue(cue); - assert_throws('NOT_FOUND_ERR', function() { track.track.removeCue(cue); }, 'standalone, remove from track.track'); - assert_throws('NOT_FOUND_ERR', function() { t1.removeCue(cue); }, 'standalone, remove from t1'); + assert_throws_dom('NOT_FOUND_ERR', function() { track.track.removeCue(cue); }, 'standalone, remove from track.track'); + assert_throws_dom('NOT_FOUND_ERR', function() { t1.removeCue(cue); }, 'standalone, remove from t1'); t.done(); }); track.onerror = t.step_func(function() { diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/constructor.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/constructor.html index c066f60399b..8ee9adb1c0d 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/constructor.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/constructor.html @@ -13,7 +13,7 @@ }, "TextTrackCue and VTTCue are separate interfaces"); test(function() { - assert_throws(new TypeError(), function() + assert_throws_js(TypeError, function() { new TextTrackCue(0, 0, ""); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/endTime.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/endTime.html index b99a12e05aa..a7c10a3d4df 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/endTime.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/endTime.html @@ -14,9 +14,9 @@ test(function(){ assert_equals(c1.endTime, -1); c1.endTime = c1.endTime; assert_equals(c1.endTime, -1); - assert_throws(new TypeError(), function(){ c1.endTime = NaN; }); - assert_throws(new TypeError(), function(){ c1.endTime = +Infinity; }); - assert_throws(new TypeError(), function(){ c1.endTime = -Infinity; }); + assert_throws_js(TypeError, function(){ c1.endTime = NaN; }); + assert_throws_js(TypeError, function(){ c1.endTime = +Infinity; }); + assert_throws_js(TypeError, function(){ c1.endTime = -Infinity; }); }, document.title+', script-created cue'); var t_parsed = async_test(document.title+', parsed cue'); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/startTime.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/startTime.html index 232a7f23b3e..7fba1df415a 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/startTime.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCue/startTime.html @@ -14,9 +14,9 @@ test(function(){ assert_equals(c1.startTime, -1); c1.startTime = c1.startTime; assert_equals(c1.startTime, -1); - assert_throws(new TypeError(), function(){ c1.startTime = NaN; }); - assert_throws(new TypeError(), function(){ c1.startTime = +Infinity; }); - assert_throws(new TypeError(), function(){ c1.startTime = -Infinity; }); + assert_throws_js(TypeError, function(){ c1.startTime = NaN; }); + assert_throws_js(TypeError, function(){ c1.startTime = +Infinity; }); + assert_throws_js(TypeError, function(){ c1.startTime = -Infinity; }); }, document.title+', script-created cue'); var t_parsed = async_test(document.title+', parsed cue'); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCueList/getter.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCueList/getter.html index d9cd871720e..8056d245433 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCueList/getter.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackCueList/getter.html @@ -36,12 +36,12 @@ test(function(){ 'use strict'; var cues = t1.cues; assert_equals(cues[0], undefined); - assert_throws(new TypeError(), function() { cues[0] = 'foo'; }); + assert_throws_js(TypeError, function() { cues[0] = 'foo'; }); assert_equals(cues[0], undefined); var c1 = new VTTCue(0, 1, 'text1'); t1.addCue(c1); assert_equals(cues[0], c1); - assert_throws(new TypeError(), function() { cues[0] = 'foo'; }); + assert_throws_js(TypeError, function() { cues[0] = 'foo'; }); assert_equals(cues[0], c1); t1.removeCue(c1); }, document.title+', no indexed set/create (strict)'); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackList/getter.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackList/getter.html index 8c5fb375940..9baa4594194 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackList/getter.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TextTrackList/getter.html @@ -25,7 +25,7 @@ test(function(){ test(function(){ 'use strict'; var track_before = video.textTracks[0]; - assert_throws(new TypeError(), function(){ video.textTracks[0] = 'foo'; }); + assert_throws_js(TypeError, function(){ video.textTracks[0] = 'foo'; }); assert_equals(video.textTracks[0], track_before); }, document.title+', no indexed set/create (strict)'); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TrackEvent/createEvent.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TrackEvent/createEvent.html index 9bf763f1fab..1d7eb540c3c 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TrackEvent/createEvent.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/interfaces/TrackEvent/createEvent.html @@ -6,7 +6,7 @@ <script> test(function(){ // https://www.w3.org/Bugs/Public/show_bug.cgi?id=17268 - assert_throws('NOT_SUPPORTED_ERR', function() { + assert_throws_dom('NOT_SUPPORTED_ERR', function() { var ev = document.createEvent('TrackEvent'); }); var ev = new TrackEvent('foo'); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/track/track-element/track-add-remove-cue.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/track/track-element/track-add-remove-cue.html index 773fa4e8fd5..e7389640012 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/track/track-element/track-add-remove-cue.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/track/track-element/track-add-remove-cue.html @@ -32,7 +32,7 @@ async_test(function(t) { assert_equals(textCue.align, "center"); // Remove the unadded track, make sure it throws correctly. - assert_throws("NotFoundError", function() { trackElement.track.removeCue(textCue); }); + assert_throws_dom("NotFoundError", function() { trackElement.track.removeCue(textCue); }); // Add the new cue to a track, make sure it is inserted correctly. trackElement.track.addCue(textCue); @@ -73,7 +73,7 @@ async_test(function(t) { assert_equals(cues[2].startTime, 121); // Try to remove the cue again. - assert_throws("NotFoundError", function() { trackElement.track.removeCue(textCue); }); + assert_throws_dom("NotFoundError", function() { trackElement.track.removeCue(textCue); }); // Add a cue before all the existing cues. trackElement.track.addCue(new VTTCue(0, 31, "I am first")); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/track/track-element/track-addtrack-kind.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/track/track-element/track-addtrack-kind.html index 4503a06bb2c..d058bf29878 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/track/track-element/track-addtrack-kind.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/track/track-element/track-addtrack-kind.html @@ -13,7 +13,7 @@ test(function() { var video = document.createElement("video"); assert_equals(video.textTracks.length, 0); - assert_throws(new TypeError(), function() { video.addTextTrack("kaptions"); }); + assert_throws_js(TypeError, function() { video.addTextTrack("kaptions"); }); assert_equals(video.textTracks.length, 0); addTrack("subtitles"); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/track/track-element/track-cue-mutable.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/track/track-element/track-cue-mutable.html index cb28f6591ce..26a6b84f8a2 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/track/track-element/track-cue-mutable.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/track/track-element/track-cue-mutable.html @@ -70,8 +70,8 @@ // On setting, if the new value is negative or greater than 100, // then throw an IndexSizeError exception. // Otherwise, set the text track cue text position to the new value. - assert_throws("IndexSizeError", function() { textCue.position = -200; }); - assert_throws("IndexSizeError", function() { textCue.position = 110; }); + assert_throws_dom("IndexSizeError", function() { textCue.position = -200; }); + assert_throws_dom("IndexSizeError", function() { textCue.position = 110; }); textCue.position = 11; assert_equals(textCue.position, 11); @@ -79,8 +79,8 @@ // On setting, if the new value is negative or greater than 100, // then throw an IndexSizeError exception. // Otherwise, set the text track cue size to the new value. - assert_throws("IndexSizeError", function() { textCue.size = -200 }); - assert_throws("IndexSizeError", function() { textCue.size = 110 }); + assert_throws_dom("IndexSizeError", function() { textCue.size = -200 }); + assert_throws_dom("IndexSizeError", function() { textCue.size = 110 }); textCue.size = 57; assert_equals(textCue.size, 57); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/volume_nonfinite.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/volume_nonfinite.html index 6e90a2ebcdb..fce50c2e20e 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/volume_nonfinite.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/media-elements/volume_nonfinite.html @@ -9,7 +9,7 @@ [NaN, Infinity, -Infinity].forEach(function(aValue) { test(function() { var el = document.createElement(aElement); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { el.volume = aValue; }); }, "Setting " + aElement + ".volume to " + String(aValue) + " should throw a TypeError"); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-audio-element/audio_constructor.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-audio-element/audio_constructor.html index 57f91572bc5..c5b5b80ac13 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-audio-element/audio_constructor.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-audio-element/audio_constructor.html @@ -39,17 +39,17 @@ test(function() { }, "Prototype of object created with named constructor"); test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { Audio(); }); }, "Calling Audio should throw"); test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { HTMLAudioElement(); }); }, "Calling HTMLAudioElement should throw"); test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { new HTMLAudioElement(); }); }, "Constructing HTMLAudioElement should throw"); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/context.arguments.missing.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/context.arguments.missing.html index f1ef93b93ac..fcda9043fc7 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/context.arguments.missing.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/context.arguments.missing.html @@ -19,7 +19,7 @@ var t = async_test(""); _addTest(function(canvas, ctx) { -assert_throws(new TypeError(), function() { canvas.getContext(); }); +assert_throws_js(TypeError, function() { canvas.getContext(); }); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/historical.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/historical.html index e485e10d991..33044ffb1bd 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/historical.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/historical.html @@ -34,10 +34,10 @@ t("transferControlToProxy", canvas); t("CanvasProxy", window); t("commit", canvas); test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { new CanvasRenderingContext2D(); }, 'no arguments'); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { new CanvasRenderingContext2D(1, 1); }, 'with arguments'); }, "CanvasRenderingContext2D constructors"); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/imagedata.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/imagedata.html index 61331956e49..e124f8ff6ea 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/imagedata.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/imagedata.html @@ -5,13 +5,13 @@ <script src="/resources/testharnessreport.js"></script> <script> test(function() { - assert_throws("IndexSizeError", function() { + assert_throws_dom("IndexSizeError", function() { new ImageData(0, 1); }); }, "ImageData(w, h), width cannot be 0"); test(function() { - assert_throws("IndexSizeError", function() { + assert_throws_dom("IndexSizeError", function() { new ImageData(1, 0); }); }, "ImageData(w, h), height cannot be 0"); @@ -25,25 +25,25 @@ test(function() { }, "ImageData(w, h), exposed attributes check"); test(function() { - assert_throws("InvalidStateError", function() { + assert_throws_dom("InvalidStateError", function() { new ImageData(new Uint8ClampedArray(3), 1); }); }, "ImageData(buffer, w), the buffer size must be a multiple of 4"); test(function() { - assert_throws("IndexSizeError", function() { + assert_throws_dom("IndexSizeError", function() { new ImageData(new Uint8ClampedArray(16), 3); }); }, "ImageData(buffer, w), buffer size must be a multiple of the image width"); test(function() { - assert_throws("IndexSizeError", function() { + assert_throws_dom("IndexSizeError", function() { new ImageData(new Uint8ClampedArray(16), 4, 3); }); }, "ImageData(buffer, w, h), buffer.length == 4 * w * h must be true"); test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { new ImageData(new Int8Array(1), 1); }); }, "ImageData(buffer, w, opt h), Uint8ClampedArray argument type check"); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.canvas.cross.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.canvas.cross.html index 2b237544c19..66873a551f5 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.canvas.cross.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.canvas.cross.html @@ -25,8 +25,8 @@ canvas2.height = 50; var ctx2 = canvas2.getContext('2d'); ctx2.drawImage(document.getElementById('yellow.png'), 0, 0); ctx.drawImage(canvas2, 0, 0); -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); -assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.canvas.redirect.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.canvas.redirect.html index 9daa23bcc20..7e640becc1f 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.canvas.redirect.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.canvas.redirect.html @@ -25,8 +25,8 @@ canvas2.height = 50; var ctx2 = canvas2.getContext('2d'); ctx2.drawImage(document.getElementById('yellow.png'), 0, 0); ctx.drawImage(canvas2, 0, 0); -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); -assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.image.cross.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.image.cross.html index 4cccb91e8ea..f598bbe19d6 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.image.cross.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.image.cross.html @@ -20,8 +20,8 @@ var t = async_test("drawImage of different-origin image makes the canvas origin- _addTest(function(canvas, ctx) { ctx.drawImage(document.getElementById('yellow.png'), 0, 0); -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); -assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.image.redirect.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.image.redirect.html index 349a52810e5..0b7ca3265c1 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.image.redirect.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.drawImage.image.redirect.html @@ -20,8 +20,8 @@ var t = async_test("drawImage of different-origin image makes the canvas origin- _addTest(function(canvas, ctx) { ctx.drawImage(document.getElementById('yellow.png'), 0, 0); -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); -assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.fillStyle.cross.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.fillStyle.cross.html index 70a154fe9c8..8261a29c541 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.fillStyle.cross.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.fillStyle.cross.html @@ -27,8 +27,8 @@ ctx2.drawImage(document.getElementById('yellow.png'), 0, 0); var p = ctx.createPattern(canvas2, 'repeat'); ctx.fillStyle = p; ctx.fillStyle = 'red'; -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); -assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.fillStyle.redirect.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.fillStyle.redirect.html index 4d0be3f84ec..59cd0e0c03d 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.fillStyle.redirect.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.fillStyle.redirect.html @@ -27,8 +27,8 @@ ctx2.drawImage(document.getElementById('yellow.png'), 0, 0); var p = ctx.createPattern(canvas2, 'repeat'); ctx.fillStyle = p; ctx.fillStyle = 'red'; -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); -assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.strokeStyle.cross.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.strokeStyle.cross.html index 8ec69ae1434..b987590fc93 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.strokeStyle.cross.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.strokeStyle.cross.html @@ -27,8 +27,8 @@ ctx2.drawImage(document.getElementById('yellow.png'), 0, 0); var p = ctx.createPattern(canvas2, 'repeat'); ctx.strokeStyle = p; ctx.strokeStyle = 'red'; -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); -assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.strokeStyle.redirect.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.strokeStyle.redirect.html index bb814e12c8f..36237a2945c 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.strokeStyle.redirect.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.canvas.strokeStyle.redirect.html @@ -27,8 +27,8 @@ ctx2.drawImage(document.getElementById('yellow.png'), 0, 0); var p = ctx.createPattern(canvas2, 'repeat'); ctx.strokeStyle = p; ctx.strokeStyle = 'red'; -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); -assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.cross.cross.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.cross.cross.html index 49d4d70beed..9461ad24a6a 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.cross.cross.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.cross.cross.html @@ -26,8 +26,8 @@ var ctx2 = canvas2.getContext('2d'); var p = ctx2.createPattern(document.getElementById('yellow.png'), 'repeat'); ctx.fillStyle = p; ctx.fillRect(0, 0, 100, 50); -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); -assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); canvas2.toDataURL(); ctx2.getImageData(0, 0, 1, 1); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.cross.redirect.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.cross.redirect.html index 7d526ec3949..82838602b9e 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.cross.redirect.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.cross.redirect.html @@ -26,8 +26,8 @@ var ctx2 = canvas2.getContext('2d'); var p = ctx2.createPattern(document.getElementById('yellow.png'), 'repeat'); ctx.fillStyle = p; ctx.fillRect(0, 0, 100, 50); -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); -assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); canvas2.toDataURL(); ctx2.getImageData(0, 0, 1, 1); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.fillStyle.sub.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.fillStyle.sub.html index 70c5f194ff6..3d50bac379c 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.fillStyle.sub.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.fillStyle.sub.html @@ -22,8 +22,8 @@ forEachCanvasSource(get_host_info().HTTP_REMOTE_ORIGIN, const pattern = ctx.createPattern(source, 'repeat'); ctx.fillStyle = pattern; ctx.fillStyle = 'red'; - assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); - assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); + assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); + assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); }); }, `${name}: Setting fillStyle to an origin-unclear pattern makes the canvas origin-unclean`); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.fillStyle.cross.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.fillStyle.cross.html index 28910edc431..f379d3ad76f 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.fillStyle.cross.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.fillStyle.cross.html @@ -22,8 +22,8 @@ _addTest(function(canvas, ctx) { var p = ctx.createPattern(document.getElementById('yellow.png'), 'repeat'); ctx.fillStyle = p; ctx.fillStyle = 'red'; -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); -assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.fillStyle.redirect.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.fillStyle.redirect.html index 9ed99a7436a..a139f2a8cff 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.fillStyle.redirect.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.fillStyle.redirect.html @@ -22,8 +22,8 @@ _addTest(function(canvas, ctx) { var p = ctx.createPattern(document.getElementById('yellow.png'), 'repeat'); ctx.fillStyle = p; ctx.fillStyle = 'red'; -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); -assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.strokeStyle.cross.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.strokeStyle.cross.html index 77749df2bda..25c3ee180c1 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.strokeStyle.cross.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.strokeStyle.cross.html @@ -22,8 +22,8 @@ _addTest(function(canvas, ctx) { var p = ctx.createPattern(document.getElementById('yellow.png'), 'repeat'); ctx.strokeStyle = p; ctx.strokeStyle = 'red'; -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); -assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.strokeStyle.redirect.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.strokeStyle.redirect.html index c57a93038b6..fd359d1f9a4 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.strokeStyle.redirect.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.pattern.image.strokeStyle.redirect.html @@ -22,8 +22,8 @@ _addTest(function(canvas, ctx) { var p = ctx.createPattern(document.getElementById('yellow.png'), 'repeat'); ctx.strokeStyle = p; ctx.strokeStyle = 'red'; -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); -assert_throws("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { ctx.getImageData(0, 0, 1, 1); }); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.reset.cross.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.reset.cross.html index babde24c169..64d25a3c3c1 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.reset.cross.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.reset.cross.html @@ -21,7 +21,7 @@ _addTest(function(canvas, ctx) { canvas.width = 50; ctx.drawImage(document.getElementById('yellow.png'), 0, 0); -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); canvas.width = 100; canvas.toDataURL(); ctx.getImageData(0, 0, 1, 1); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.reset.redirect.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.reset.redirect.html index b895f346211..9feeee4943f 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.reset.redirect.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-canvas-element/security.reset.redirect.html @@ -21,7 +21,7 @@ _addTest(function(canvas, ctx) { canvas.width = 50; ctx.drawImage(document.getElementById('yellow.png'), 0, 0); -assert_throws("SECURITY_ERR", function() { canvas.toDataURL(); }); +assert_throws_dom("SECURITY_ERR", function() { canvas.toDataURL(); }); canvas.width = 100; canvas.toDataURL(); ctx.getImageData(0, 0, 1, 1); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-embed-element/historical.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-embed-element/historical.html index 168a8468e06..9df7280bb60 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-embed-element/historical.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-embed-element/historical.html @@ -8,7 +8,7 @@ test(function() { var elm = document.getElementById('embed'); assert_equals(typeof elm, 'object', 'typeof'); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { elm(); }); }, 'embed legacycaller should not be supported'); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-object-element/historical.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-object-element/historical.html index 2f293d372ec..c7a577a9d41 100644 --- a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-object-element/historical.html +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-object-element/historical.html @@ -8,7 +8,7 @@ test(function() { var elm = document.getElementById('object'); assert_equals(typeof elm, 'object', 'typeof'); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { elm(); }); }, 'object legacycaller should not be supported'); diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/form-submission-0/FormDataEvent.window.js b/tests/wpt/web-platform-tests/html/semantics/forms/form-submission-0/FormDataEvent.window.js index 145b5dd3727..830d536a663 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/form-submission-0/FormDataEvent.window.js +++ b/tests/wpt/web-platform-tests/html/semantics/forms/form-submission-0/FormDataEvent.window.js @@ -2,15 +2,14 @@ test(() => { let fd = new FormData(); - let typeError = new TypeError(); - assert_throws(typeError, () => { new FormDataEvent() }, '0 arguments'); - assert_throws(typeError, () => { new FormDataEvent('foo') }, '1 argument'); - assert_throws(typeError, () => { new FormDataEvent(fd, fd) }, '2 invalid arguments'); - assert_throws(typeError, () => { new FormDataEvent('foo', null) }, 'Null dictionary'); - assert_throws(typeError, () => { new FormDataEvent('foo', undefined) }, 'Undefined dictionary'); - assert_throws(typeError, () => { new FormDataEvent('foo', { formData: null }) }, 'Null formData'); - assert_throws(typeError, () => { new FormDataEvent('foo', { formData: undefined }) }, 'Undefined formData'); - assert_throws(typeError, () => { new FormDataEvent('foo', { formData: 'bar' }) }, 'Wrong type of formData'); + assert_throws_js(TypeError, () => { new FormDataEvent() }, '0 arguments'); + assert_throws_js(TypeError, () => { new FormDataEvent('foo') }, '1 argument'); + assert_throws_js(TypeError, () => { new FormDataEvent(fd, fd) }, '2 invalid arguments'); + assert_throws_js(TypeError, () => { new FormDataEvent('foo', null) }, 'Null dictionary'); + assert_throws_js(TypeError, () => { new FormDataEvent('foo', undefined) }, 'Undefined dictionary'); + assert_throws_js(TypeError, () => { new FormDataEvent('foo', { formData: null }) }, 'Null formData'); + assert_throws_js(TypeError, () => { new FormDataEvent('foo', { formData: undefined }) }, 'Undefined formData'); + assert_throws_js(TypeError, () => { new FormDataEvent('foo', { formData: 'bar' }) }, 'Wrong type of formData'); }, 'Failing FormDataEvent constructor'); test(() => { diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/form-submission-0/SubmitEvent.window.js b/tests/wpt/web-platform-tests/html/semantics/forms/form-submission-0/SubmitEvent.window.js index ca722315d81..5f98fe05155 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/form-submission-0/SubmitEvent.window.js +++ b/tests/wpt/web-platform-tests/html/semantics/forms/form-submission-0/SubmitEvent.window.js @@ -2,9 +2,8 @@ test(() => { let button = document.createElement('button'); - let typeError = new TypeError(); - assert_throws(typeError, () => { new SubmitEvent() }, '0 arguments'); - assert_throws(typeError, () => { new SubmitEvent('foo', { submitter: 'bar' }) }, 'Wrong type of submitter'); + assert_throws_js(TypeError, () => { new SubmitEvent() }, '0 arguments'); + assert_throws_js(TypeError, () => { new SubmitEvent('foo', { submitter: 'bar' }) }, 'Wrong type of submitter'); }, 'Failing SubmitEvent constructor'); test(() => { diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/textfieldselection/selection-not-application.html b/tests/wpt/web-platform-tests/html/semantics/forms/textfieldselection/selection-not-application.html index d205ee838a8..a7d7f1c5518 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/textfieldselection/selection-not-application.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/textfieldselection/selection-not-application.html @@ -32,31 +32,31 @@ }, `selectionDirection on an input[type=${type}] returns null`); test(() => { - assert_throws("InvalidStateError", function(){ + assert_throws_dom("InvalidStateError", function(){ el.selectionStart = 0; }); }, `assigning selectionStart on an input[type=${type}] throws InvalidStateError`); test(() => { - assert_throws("InvalidStateError", function(){ + assert_throws_dom("InvalidStateError", function(){ el.selectionEnd = 0; }); }, `assigning selectionEnd on an input[type=${type}] throws InvalidStateError`); test(() => { - assert_throws("InvalidStateError", function(){ + assert_throws_dom("InvalidStateError", function(){ el.selectionDirection = 'none'; }); }, `assigning selectionDirection on an input[type=${type}] throws InvalidStateError`); test(() => { - assert_throws("InvalidStateError", function(){ + assert_throws_dom("InvalidStateError", function(){ el.setRangeText("foobar"); }); }, `setRangeText on an input[type=${type}] throws InvalidStateError`); test(() => { - assert_throws("InvalidStateError", function(){ + assert_throws_dom("InvalidStateError", function(){ el.setSelectionRange(0, 1); }); }, `setSelectionRange on an input[type=${type}] throws InvalidStateError`); diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/textfieldselection/textfieldselection-setRangeText.html b/tests/wpt/web-platform-tests/html/semantics/forms/textfieldselection/textfieldselection-setRangeText.html index 66b5e30a04e..a5918201b31 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/textfieldselection/textfieldselection-setRangeText.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/textfieldselection/textfieldselection-setRangeText.html @@ -94,13 +94,13 @@ }, element.id + " selectionMode 'preserve'"); test(function(){ - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { element.setRangeText("barfoo", 2, 1); }); }, element.id + " setRangeText with 3rd argument greater than 2nd argument throws an IndexSizeError exception"); test(function(){ - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { element.setRangeText(); }); }, element.id + " setRangeText without argument throws a type error"); diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-form-element/form-indexed-element.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-form-element/form-indexed-element.html index 66f00e7615d..5ea96d3d1b2 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-form-element/form-indexed-element.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-form-element/form-indexed-element.html @@ -36,7 +36,7 @@ test(function(){ delete form[0]; assert_equals(form[0], old_item); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { "use strict"; delete form[0]; }); diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-form-element/form-nameditem.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-form-element/form-nameditem.html index e794f07c03b..7b7d573615e 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-form-element/form-nameditem.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-form-element/form-nameditem.html @@ -145,7 +145,7 @@ test(function() { var form = document.getElementsByTagName("form")[0] var indices = [-1, 0, 1, 2, 3] indices.forEach(function(i) { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { form.radio(i) }) }) @@ -258,18 +258,18 @@ test(function() { form["l1"] = 5; assert_equals(form["l1"], old_item); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { "use strict"; form["l1"] = 5; }); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { Object.defineProperty(form, "l1", { value: 5 }); }); delete form["l1"]; assert_equals(form["l1"], old_item); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { "use strict"; delete form["l1"]; }); @@ -319,7 +319,7 @@ test(function() { delete form["new-name2"]; assert_equals(form["new-name2"], 5); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { "use strict"; delete form["new-name2"]; }); diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-form-element/form-requestsubmit.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-form-element/form-requestsubmit.html index 1c7b7870bdf..62ab12c8dfd 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-form-element/form-requestsubmit.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-form-element/form-requestsubmit.html @@ -14,11 +14,11 @@ test(() => { '<button type="button"></button>' + '</form>'); let form = document.querySelector('form'); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { form.requestSubmit(document.body); }); for (let control of form.elements) { - assert_throws(new TypeError(), () => { form.requestSubmit(control); }); + assert_throws_js(TypeError, () => { form.requestSubmit(control); }); } }, 'Passing an element which is not a submit button should throw'); @@ -31,14 +31,14 @@ test(() => { let form = document.querySelector('form'); let submitButton = document.createElement('button'); submitButton.type = 'submit'; - assert_throws('NotFoundError', () => { + assert_throws_dom('NotFoundError', () => { form.requestSubmit(submitButton); }); let buttons = form.querySelectorAll('input, button'); assert_equals(buttons.length, 2); for (let control of buttons) { - assert_throws('NotFoundError', () => { form.requestSubmit(control) }, + assert_throws_dom('NotFoundError', () => { form.requestSubmit(control) }, control.outerHTML); } }, 'Passing a submit button not owned by the context object should throw'); diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/files.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/files.html index 93088330d37..a4157a3d6ba 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/files.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/files.html @@ -65,7 +65,7 @@ test(() => { i1.files = null; assert_equals(i1.files, files, "files cannot be set to null"); - assert_throws(new TypeError(), () => i1.files = [], "files cannot be set to an array"); - assert_throws(new TypeError(), () => i1.files = [new File([], "x")], "files cannot be set to an array (even when it contains File objects)"); + assert_throws_js(TypeError, () => i1.files = [], "files cannot be set to an array"); + assert_throws_js(TypeError, () => i1.files = [new File([], "x")], "files cannot be set to an array (even when it contains File objects)"); }, "setting <input type=file>.files"); </script> diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/hidden.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/hidden.html index 4aca00d8c6b..9274b5cddb3 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/hidden.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/hidden.html @@ -56,13 +56,13 @@ test( function() { var el = document.getElementById("hidden"); - assert_throws("InvalidStateError", function() { el.stepDown(); }, ""); + assert_throws_dom("InvalidStateError", function() { el.stepDown(); }, ""); }, "stepDown does not apply for hidden"); test( function() { var el = document.getElementById("hidden"); - assert_throws("InvalidStateError", function() { el.stepUp(); }, ""); + assert_throws_dom("InvalidStateError", function() { el.stepUp(); }, ""); }, "stepUp does not apply for hidden"); test(function(){ diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/maxlength.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/maxlength.html index 8f0a2567d40..da5d18d00a9 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/maxlength.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/maxlength.html @@ -39,7 +39,7 @@ test( function() { - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { document.getElementById("assign-negative").maxLength = -5; }); }, "Assigning negative integer throws IndexSizeError"); diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/minlength.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/minlength.html index 7bfdf189a77..6748e30eaf1 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/minlength.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/minlength.html @@ -39,7 +39,7 @@ test( function() { - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { document.getElementById("assign-negative").minLength = -5; }); }, "Assigning negative integer throws IndexSizeError"); diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/selection.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/selection.html index 7d9c1a4fd7e..42c40108d92 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/selection.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/selection.html @@ -130,13 +130,13 @@ test(function() { assert_equals(input.type, type, "the given input type is not supported"); assert_equals(input.selectionStart, null, 'getting input.selectionStart'); - assert_throws("INVALID_STATE_ERR", function() { input.selectionStart = 0; }); + assert_throws_dom("INVALID_STATE_ERR", function() { input.selectionStart = 0; }); assert_equals(input.selectionEnd, null, 'getting input.selectionEnd'); - assert_throws("INVALID_STATE_ERR", function() { input.selectionEnd = 0; }); + assert_throws_dom("INVALID_STATE_ERR", function() { input.selectionEnd = 0; }); assert_equals(input.selectionDirection, null, 'getting input.selectionDirection'); - assert_throws("INVALID_STATE_ERR", function() { input.selectionDirection = "none"; }); - assert_throws("INVALID_STATE_ERR", function() { input.setSelectionRange(0, 0); }); - assert_throws("INVALID_STATE_ERR", function() { input.setRangeText('', 0, 0); }); + assert_throws_dom("INVALID_STATE_ERR", function() { input.selectionDirection = "none"; }); + assert_throws_dom("INVALID_STATE_ERR", function() { input.setSelectionRange(0, 0); }); + assert_throws_dom("INVALID_STATE_ERR", function() { input.setRangeText('', 0, 0); }); }, "input type " + type + " should not support variable-length selections"); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/text.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/text.html index b6d4ceabf4f..f30f9d39fc3 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/text.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/text.html @@ -89,13 +89,13 @@ test( function() { var el = document.getElementById(types[i]); - assert_throws("InvalidStateError", function() { el.stepDown(); }, ""); + assert_throws_dom("InvalidStateError", function() { el.stepDown(); }, ""); }, "stepDown does not apply for " + types[i]); test( function() { var el = document.getElementById(types[i]); - assert_throws("InvalidStateError", function() { el.stepUp(); }, ""); + assert_throws_dom("InvalidStateError", function() { el.stepUp(); }, ""); }, "stepUp does not apply for " + types[i]); } diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/type-change-state.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/type-change-state.html index dc5dcbfdece..a10ea1d2858 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/type-change-state.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/type-change-state.html @@ -103,7 +103,7 @@ var expected = INITIAL_VALUE; input.type = types[i].type; if (types[i].type === "file") { - assert_throws("INVALID_STATE_ERR", function() { + assert_throws_dom("INVALID_STATE_ERR", function() { input.value = expected; }); assert_equals(input.value, ""); diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/valueMode.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/valueMode.html index 5502011794f..ff01bde269c 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/valueMode.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-input-element/valueMode.html @@ -314,7 +314,7 @@ test(function () { } for (const invalidValue of ["foo", 10, undefined]) { - assert_throws("InvalidStateError", () => { + assert_throws_dom("InvalidStateError", () => { input.value = invalidValue; }); assert_equals(input.value, "", `input.value is empty after assigning ${invalidValue}`); diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-meter-element/meter.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-meter-element/meter.html index 1c1ce4f18c2..c7c260c957d 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-meter-element/meter.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-meter-element/meter.html @@ -72,12 +72,12 @@ } test(function() { var meter = document.createElement("meter"); - assert_throws(new TypeError(), function() { meter.value = "foobar"; }, "value attribute"); - assert_throws(new TypeError(), function() { meter.min = "foobar"; }, "min attribute"); - assert_throws(new TypeError(), function() { meter.max = "foobar"; }, "max attribute"); - assert_throws(new TypeError(), function() { meter.low = "foobar"; }, "low attribute"); - assert_throws(new TypeError(), function() { meter.high = "foobar"; }, "high attribute"); - assert_throws(new TypeError(), function() { meter.optimum = "foobar"; }, "optimum attribute"); + assert_throws_js(TypeError, function() { meter.value = "foobar"; }, "value attribute"); + assert_throws_js(TypeError, function() { meter.min = "foobar"; }, "min attribute"); + assert_throws_js(TypeError, function() { meter.max = "foobar"; }, "max attribute"); + assert_throws_js(TypeError, function() { meter.low = "foobar"; }, "low attribute"); + assert_throws_js(TypeError, function() { meter.high = "foobar"; }, "high attribute"); + assert_throws_js(TypeError, function() { meter.optimum = "foobar"; }, "optimum attribute"); }, "Invalid floating-point number values"); </script> diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-select-element/select-add.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-select-element/select-add.html index 84a5442e424..910be348ae7 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-select-element/select-add.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-select-element/select-add.html @@ -28,7 +28,7 @@ test(() => { test(() => { let testselect2 = document.getElementById("testselect2"); let opt2 = document.getElementById("testoption"); - assert_throws("HierarchyRequestError", () => { + assert_throws_dom("HierarchyRequestError", () => { testselect2.add(opt2); }); }, "test that HierarchyRequestError exception must be thrown when element is an ancestor of the element into which it is to be inserted"); diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-textarea-element/textarea-maxlength.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-textarea-element/textarea-maxlength.html index ff4e8f1b65c..3ea67395185 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-textarea-element/textarea-maxlength.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-textarea-element/textarea-maxlength.html @@ -35,7 +35,7 @@ test( function () { - assert_throws("INDEX_SIZE_ERR", function () { + assert_throws_dom("INDEX_SIZE_ERR", function () { document.getElementById("assign-negative").maxLength = -5; }); }, "Assigning negative integer throws IndexSizeError"); diff --git a/tests/wpt/web-platform-tests/html/semantics/forms/the-textarea-element/textarea-minlength.html b/tests/wpt/web-platform-tests/html/semantics/forms/the-textarea-element/textarea-minlength.html index 9a15a129392..2d40901b40d 100644 --- a/tests/wpt/web-platform-tests/html/semantics/forms/the-textarea-element/textarea-minlength.html +++ b/tests/wpt/web-platform-tests/html/semantics/forms/the-textarea-element/textarea-minlength.html @@ -35,7 +35,7 @@ test( function () { - assert_throws("INDEX_SIZE_ERR", function () { + assert_throws_dom("INDEX_SIZE_ERR", function () { document.getElementById("assign-negative").minLength = -5; }); }, "Assigning negative integer throws IndexSizeError"); diff --git a/tests/wpt/web-platform-tests/html/semantics/interactive-elements/the-dialog-element/dialog-showModal.html b/tests/wpt/web-platform-tests/html/semantics/interactive-elements/the-dialog-element/dialog-showModal.html index 267c22145ee..16b55b16270 100644 --- a/tests/wpt/web-platform-tests/html/semantics/interactive-elements/the-dialog-element/dialog-showModal.html +++ b/tests/wpt/web-platform-tests/html/semantics/interactive-elements/the-dialog-element/dialog-showModal.html @@ -71,7 +71,7 @@ test(function(){ this.add_cleanup(function() { d2.close(); }); - assert_throws("INVALID_STATE_ERR", function() { + assert_throws_dom("INVALID_STATE_ERR", function() { d2.showModal(); }); }, "showModal() on a <dialog> that already has an open attribute throws an InvalidStateError exception"); @@ -89,7 +89,7 @@ test(function(){ var d = document.createElement("dialog"); this.add_cleanup(function() { d.close(); }); - assert_throws("INVALID_STATE_ERR", function() { + assert_throws_dom("INVALID_STATE_ERR", function() { d.showModal(); }); }, "showModal() on a <dialog> not in a Document throws an InvalidStateError exception"); diff --git a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-template-element/template-element/template-content-hierarcy.html b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-template-element/template-element/template-content-hierarcy.html index 046395ac7c7..823c0c830fc 100644 --- a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-template-element/template-element/template-content-hierarcy.html +++ b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-template-element/template-element/template-content-hierarcy.html @@ -15,16 +15,16 @@ test(() => { var span = tmpl.content.querySelector('span'); // Hierarchy checks at various combinations. - assert_throws('HierarchyRequestError', () => { + assert_throws_dom('HierarchyRequestError', () => { tmpl.content.appendChild(parent); }, 'Template content should throw if any of ancestor is being appended.'); - assert_throws('HierarchyRequestError', () => { + assert_throws_dom('HierarchyRequestError', () => { tmpl.content.appendChild(tmpl); }, 'Template content should throw if its host is being appended.'); - assert_throws('HierarchyRequestError', () => { + assert_throws_dom('HierarchyRequestError', () => { span.appendChild(parent); }, 'Template content child should throw if any of ancestor is being appended.'); - assert_throws('HierarchyRequestError', () => { + assert_throws_dom('HierarchyRequestError', () => { span.appendChild(tmpl); }, 'Template content child should throw template\'s host is being appended.'); }, "Template content should throw when its ancestor is being appended."); @@ -52,16 +52,16 @@ test(() => { assert_equals(tmpl.content.ownerDocument, tmplContentNodeDocument); // Hierarchy checks at various combinations. - assert_throws('HierarchyRequestError', () => { + assert_throws_dom('HierarchyRequestError', () => { tmpl.content.appendChild(parent); }, 'Template content should throw if any of ancestor is being appended.'); - assert_throws('HierarchyRequestError', () => { + assert_throws_dom('HierarchyRequestError', () => { tmpl.content.appendChild(tmpl); }, 'Template content should throw if its host is being appended.'); - assert_throws('HierarchyRequestError', () => { + assert_throws_dom('HierarchyRequestError', () => { span.appendChild(parent); }, 'Template content child should throw if any of ancestor is being appended.'); - assert_throws('HierarchyRequestError', () => { + assert_throws_dom('HierarchyRequestError', () => { span.appendChild(tmpl); }, 'Template content child should throw template\'s host is being appended.'); diff --git a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/caption-methods.html b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/caption-methods.html index ec95eab39fb..a349ed2b775 100644 --- a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/caption-methods.html +++ b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/caption-methods.html @@ -140,7 +140,7 @@ caption.appendChild(table5) // Node cannot be inserted at the specified point in the hierarchy - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { table5.caption = caption; }); @@ -173,7 +173,7 @@ test(function() { var table8 = document.createElement("table"); var caption = document.createElement("captİon"); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { table8.caption = caption; }); }, "Assigning a non-caption to table.caption") @@ -181,7 +181,7 @@ test(function() { var table9 = document.createElement("table"); var caption = document.createElementNS("http://www.example.com", "caption"); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { table9.caption = caption; }); }, "Assigning a foreign caption to table.caption") diff --git a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/insertRow-method-01.html b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/insertRow-method-01.html index 4e379a1ccc3..8ed7b5fad68 100644 --- a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/insertRow-method-01.html +++ b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/insertRow-method-01.html @@ -14,10 +14,10 @@ <script> test(function() { var table = document.getElementById("test").getElementsByTagName("table")[0]; - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { table.insertRow(-2); }) - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { table.insertRow(2); }) }); diff --git a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/remove-row.html b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/remove-row.html index dc152292e27..43a128c57e9 100644 --- a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/remove-row.html +++ b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/remove-row.html @@ -25,12 +25,12 @@ var el = document.getElementById('element'); test(function() { - assert_throws("IndexSizeError", function() { + assert_throws_dom("IndexSizeError", function() { el.deleteRow(-2) }) }, 'deleteRow function invalid argument'); test(function() { - assert_throws("IndexSizeError", function() { + assert_throws_dom("IndexSizeError", function() { el.deleteRow(el.rows.length) }) }, 'deleteRow function invalid argument bis'); @@ -57,7 +57,7 @@ test(function() { test(function() { assert_equals(el.rows.length, 0); - assert_throws("IndexSizeError", function() { + assert_throws_dom("IndexSizeError", function() { el.deleteRow(0); }); }, 'deleteRow(0) with no rows'); diff --git a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/tFoot.html b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/tFoot.html index e83d193f35f..40220bc1e26 100644 --- a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/tFoot.html +++ b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/tFoot.html @@ -46,11 +46,11 @@ test(function() { assert_equals(t.tFoot.previousSibling, tbody2); assert_equals(t.tFoot.nextSibling, null); - assert_throws(new TypeError(), function(){ + assert_throws_js(TypeError, function(){ t.tFoot = document.createElement("div"); }); - assert_throws("HierarchyRequestError", function(){ + assert_throws_dom("HierarchyRequestError", function(){ t.tFoot = document.createElement("thead"); }); }) diff --git a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/tHead.html b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/tHead.html index 78a874824df..fadebecd6f2 100644 --- a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/tHead.html +++ b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-table-element/tHead.html @@ -45,11 +45,11 @@ test(function() { assert_equals(t.tHead.previousSibling, tcaption); assert_equals(t.tHead.nextSibling, tbody1); - assert_throws(new TypeError(), function(){ + assert_throws_js(TypeError, function(){ t.tHead = document.createElement("div"); }); - assert_throws("HierarchyRequestError", function(){ + assert_throws_dom("HierarchyRequestError", function(){ t.tHead = document.createElement("tbody"); }); @@ -59,7 +59,7 @@ test(function() { var t2 = document.getElementById("t2"); var t2thead = document.getElementById("t2thead"); - assert_throws("HierarchyRequestError", function() { + assert_throws_dom("HierarchyRequestError", function() { t2.tHead = t2thead; }); }); diff --git a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tbody-element/deleteRow.html b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tbody-element/deleteRow.html index 5e50a318739..695c1ea50bf 100644 --- a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tbody-element/deleteRow.html +++ b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tbody-element/deleteRow.html @@ -32,13 +32,13 @@ test(function () { }, "HTMLTableSectionElement deleteRow(-1)"); test(function () { - assert_throws("IndexSizeError", function () { + assert_throws_dom("IndexSizeError", function () { tbody.deleteRow(tbody.rows.length); }); }, "HTMLTableSectionElement deleteRow(rows.length)"); test(function () { - assert_throws("IndexSizeError", function () { + assert_throws_dom("IndexSizeError", function () { tbody.deleteRow(-2); }); }, "HTMLTableSectionElement deleteRow(-2)"); @@ -53,7 +53,7 @@ test(function () { test(function () { assert_equals(tbody.rows.length, 0); - assert_throws("IndexSizeError", function () { + assert_throws_dom("IndexSizeError", function () { tbody.deleteRow(0); }); }, "HTMLTableSectionElement deleteRow(0) with no rows"); diff --git a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tbody-element/insertRow.html b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tbody-element/insertRow.html index 4c13db7aa5f..f5c2227ca60 100644 --- a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tbody-element/insertRow.html +++ b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tbody-element/insertRow.html @@ -42,13 +42,13 @@ test(function () { }, "HTMLTableSectionElement insertRow(rows.length)"); test(function () { - assert_throws("IndexSizeError", function () { + assert_throws_dom("IndexSizeError", function () { tbody.insertRow(-2); }); }, "HTMLTableSectionElement insertRow(-2)"); test(function () { - assert_throws("IndexSizeError", function () { + assert_throws_dom("IndexSizeError", function () { tbody.insertRow(tbody.rows.length + 1); }); }, "HTMLTableSectionElement insertRow(rows.length + 1)"); diff --git a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tr-element/deleteCell.html b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tr-element/deleteCell.html index aa15ef77ec2..9962617a71e 100644 --- a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tr-element/deleteCell.html +++ b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tr-element/deleteCell.html @@ -32,13 +32,13 @@ test(function () { }, "HTMLTableRowElement deleteCell(-1)"); test(function () { - assert_throws("IndexSizeError", function () { + assert_throws_dom("IndexSizeError", function () { tr.deleteCell(-2); }); }, "HTMLTableRowElement deleteCell(-2)"); test(function () { - assert_throws("IndexSizeError", function () { + assert_throws_dom("IndexSizeError", function () { tr.deleteCell(tr.cells.length); }); }, "HTMLTableRowElement deleteCell(cells.length)"); @@ -53,7 +53,7 @@ test(function () { test(function () { assert_equals(tr.cells.length, 0); - assert_throws("IndexSizeError", function () { + assert_throws_dom("IndexSizeError", function () { tr.deleteCell(0); }); }, "HTMLTableRowElement deleteCell(0) with no cells"); diff --git a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tr-element/insertCell.html b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tr-element/insertCell.html index 7c2edc4acbf..11cd213fe7b 100644 --- a/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tr-element/insertCell.html +++ b/tests/wpt/web-platform-tests/html/semantics/tabular-data/the-tr-element/insertCell.html @@ -41,13 +41,13 @@ test(function () { }, "HTMLTableRowElement insertCell()"); test(function () { - assert_throws("IndexSizeError", function () { + assert_throws_dom("IndexSizeError", function () { tr.insertCell(-2); }); }, "HTMLTableRowElement insertCell(-2)"); test(function () { - assert_throws("IndexSizeError", function () { + assert_throws_dom("IndexSizeError", function () { tr.insertCell(tr.cells.length + 1); }); }, "HTMLTableRowElement insertCell(cells.length + 1)"); diff --git a/tests/wpt/web-platform-tests/html/webappapis/atob/base64.html b/tests/wpt/web-platform-tests/html/webappapis/atob/base64.html index c522afdd56c..61c3667dcee 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/atob/base64.html +++ b/tests/wpt/web-platform-tests/html/webappapis/atob/base64.html @@ -87,7 +87,7 @@ function testBtoa(input) { var normalizedInput = String(input); for (var i = 0; i < normalizedInput.length; i++) { if (normalizedInput.charCodeAt(i) > 255) { - assert_throws("InvalidCharacterError", function() { btoa(input); }, + assert_throws_dom("InvalidCharacterError", function() { btoa(input); }, "Code unit " + i + " has value " + normalizedInput.charCodeAt(i) + ", which is greater than 255"); return; } @@ -160,7 +160,7 @@ function runAtobTests(tests) { output = allTests[i][1]; test(() => { if(output === null) { - assert_throws("InvalidCharacterError", () => window.atob(input)); + assert_throws_dom("InvalidCharacterError", () => window.atob(input)); } else { const result = window.atob(input); for(let ii = 0; ii < output.length; ii++) { diff --git a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/closing-the-input-stream/document.close-01.xhtml b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/closing-the-input-stream/document.close-01.xhtml index cccc26bf17e..164d71d1910 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/closing-the-input-stream/document.close-01.xhtml +++ b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/closing-the-input-stream/document.close-01.xhtml @@ -10,7 +10,7 @@ <div id="log"></div> <script> test(function() { - assert_throws("INVALID_STATE_ERR", function() { + assert_throws_dom("INVALID_STATE_ERR", function() { document.close(); }, "document.close in XHTML should throw an INVALID_STATE_ERR "); }, "document.close in XHTML"); diff --git a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/document-write/document.write-01.xhtml b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/document-write/document.write-01.xhtml index ec8702a744e..fc21d4e2bf2 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/document-write/document.write-01.xhtml +++ b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/document-write/document.write-01.xhtml @@ -10,7 +10,7 @@ <div id="log"></div> <script> test(function() { - assert_throws("INVALID_STATE_ERR", function() { + assert_throws_dom("INVALID_STATE_ERR", function() { document.write("Failure: document.write actually worked"); }, "document.write in XHTML should throw an INVALID_STATE_ERR "); }, "document.write in XHTML"); diff --git a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/document-writeln/document.writeln-01.xhtml b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/document-writeln/document.writeln-01.xhtml index 3d59bcd20b4..cb5ec3a33af 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/document-writeln/document.writeln-01.xhtml +++ b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/document-writeln/document.writeln-01.xhtml @@ -10,7 +10,7 @@ <div id="log"></div> <script> test(function() { - assert_throws("INVALID_STATE_ERR", function() { + assert_throws_dom("INVALID_STATE_ERR", function() { document.writeln("Failure: document.writeln actually worked"); }, "document.writeln in XHTML should throw an INVALID_STATE_ERR "); }, "document.writeln in XHTML"); diff --git a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-exception-vs-return-origin.sub.window.js b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-exception-vs-return-origin.sub.window.js index 0e1c54b6832..d60be3b8d60 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-exception-vs-return-origin.sub.window.js +++ b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-exception-vs-return-origin.sub.window.js @@ -14,7 +14,7 @@ async_test(t => { iframe.onload = t.step_func_done(() => { // Since this is called as an event handler on an element of this window, // the entry settings object is that of this browsing context. - assert_throws("InvalidStateError", () => { + assert_throws_dom("InvalidStateError", () => { iframe.contentDocument.open(); }, "opening an XML document should throw an InvalidStateError"); }); @@ -39,7 +39,7 @@ async_test(t => { // IDL algorithm in "create an element", called by "create an element for a // token" in the parser. setEntryToTopLevel(t.step_func_done(() => { - assert_throws("InvalidStateError", () => { + assert_throws_dom("InvalidStateError", () => { iframe.contentDocument.open(); }, "opening a document when the throw-on-dynamic-markup-insertion counter is incremented should throw an InvalidStateError"); })); @@ -60,7 +60,7 @@ async_test(t => { // "Clean up after running script" is executed when the </script> tag is // seen by the HTML parser. setEntryToTopLevel(t.step_func_done(() => { - assert_throws("SecurityError", () => { + assert_throws_dom("SecurityError", () => { iframe.contentDocument.open(); }, "opening a same origin-domain (but not same origin) document should throw a SecurityError"); })); @@ -85,7 +85,7 @@ for (const ev of ["beforeunload", "pagehide", "unload"]) { // "Clean up after running script" is called in the task that // navigates. setEntryToTopLevel(t.step_func_done(() => { - assert_throws("SecurityError", () => { + assert_throws_dom("SecurityError", () => { iframe.contentDocument.open(); }, "opening a same origin-domain (but not same origin) document should throw a SecurityError"); })); diff --git a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-exception-vs-return-xml.window.js b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-exception-vs-return-xml.window.js index 3558397410e..8b1a04fe83a 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-exception-vs-return-xml.window.js +++ b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-exception-vs-return-xml.window.js @@ -2,7 +2,7 @@ async_test(t => { const iframe = document.body.appendChild(document.createElement("iframe")); t.add_cleanup(() => { iframe.remove(); }); self.testSynchronousScript = t.step_func_done(() => { - assert_throws("InvalidStateError", () => { + assert_throws_dom("InvalidStateError", () => { iframe.contentDocument.open(); }, "opening an XML document should throw"); }); @@ -15,7 +15,7 @@ for (const ev of ["beforeunload", "pagehide", "unload"]) { t.add_cleanup(() => { iframe.remove(); }); iframe.addEventListener("load", t.step_func(() => { iframe.contentWindow.addEventListener(ev, t.step_func_done(() => { - assert_throws("InvalidStateError", () => { + assert_throws_dom("InvalidStateError", () => { iframe.contentDocument.open(); }, "opening an XML document should throw"); })); diff --git a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-side-effects-same-origin-domain.sub.window.js b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-side-effects-same-origin-domain.sub.window.js index ef35452e330..9adacb2a99f 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-side-effects-same-origin-domain.sub.window.js +++ b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-side-effects-same-origin-domain.sub.window.js @@ -7,7 +7,7 @@ testInIFrame("http://{{host}}:{{ports[http][1]}}/common/domain-setter.sub.html", const iframe = ctx.iframes[0]; const origURL = iframe.contentDocument.URL; assertDocumentIsReadyForSideEffectsTest(iframe.contentDocument, "same origin-domain (but not same origin) document"); - assert_throws("SecurityError", () => { + assert_throws_dom("SecurityError", () => { ctx.iframes[0].contentDocument.open(); }, "document.open() should throw a SecurityError on a same origin-domain (but not same origin) document"); assertOpenHasNoSideEffects(iframe.contentDocument, origURL, "same origin-domain (but not same origin) document"); diff --git a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-side-effects-xml.window.js b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-side-effects-xml.window.js index b3ea1fdf754..bcc4266319a 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-side-effects-xml.window.js +++ b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/bailout-side-effects-xml.window.js @@ -7,7 +7,7 @@ async_test(t => { iframe.onload = t.step_func_done(() => { const origURL = iframe.contentDocument.URL; assertDocumentIsReadyForSideEffectsTest(iframe.contentDocument, "XML document"); - assert_throws("InvalidStateError", () => { + assert_throws_dom("InvalidStateError", () => { iframe.contentDocument.open(); }, "document.open() should throw on XML documents"); assertOpenHasNoSideEffects(iframe.contentDocument, origURL, "XML document"); diff --git a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/custom-element.window.js b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/custom-element.window.js index be646d15b80..1ad06b3d372 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/custom-element.window.js +++ b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/custom-element.window.js @@ -33,7 +33,7 @@ test(t => { test(t => { err = noError; document.write("<custom-element></custom-element>"); - assert_throws("InvalidStateError", () => { + assert_throws_dom("InvalidStateError", () => { throw err; }); }, "document.open() is forbidden in custom element constructor when creating element from parser"); diff --git a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/document.open-01.xhtml b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/document.open-01.xhtml index 974702ae8cb..c02b3e4db50 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/document.open-01.xhtml +++ b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/document.open-01.xhtml @@ -10,7 +10,7 @@ <div id="log"></div> <script> test(function() { - assert_throws("INVALID_STATE_ERR", function() { + assert_throws_dom("INVALID_STATE_ERR", function() { document.open(); }, "document.open in XHTML should throw an INVALID_STATE_ERR "); }, "document.open in XHTML"); diff --git a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/document.open-02.html b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/document.open-02.html index b56e3a836f4..c7e67a0cf74 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/document.open-02.html +++ b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/document.open-02.html @@ -20,7 +20,7 @@ test(function() { var parser = new DOMParser(); var doc = parser.parseFromString("", "text/html"); assert_equals(doc.defaultView, null); - assert_throws("INVALID_ACCESS_ERR", function() { + assert_throws_dom("INVALID_ACCESS_ERR", function() { doc.open("/resources/testharness.js", "", ""); }); }, "document.open should throw when it has no window and is called with three arguments"); diff --git a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/origin-check-in-document-open-same-origin-domain.sub.html b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/origin-check-in-document-open-same-origin-domain.sub.html index 5e5ca807818..83ce50d6c4d 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/origin-check-in-document-open-same-origin-domain.sub.html +++ b/tests/wpt/web-platform-tests/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/origin-check-in-document-open-same-origin-domain.sub.html @@ -10,13 +10,13 @@ testInIFrame("http://{{host}}:{{ports[http][1]}}/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/resources/set-document-domain.html", (ctx) => { document.domain = document.domain; var doc = ctx.iframes[0].contentDocument; - assert_throws("SecurityError", doc.open.bind(doc), "Opening a same origin-domain (but not same origin) document doesn't throw."); + assert_throws_dom("SecurityError", doc.open.bind(doc), "Opening a same origin-domain (but not same origin) document doesn't throw."); }, "It should not be possible to open same origin-domain (but not same origin) documents."); testInIFrame("http://{{host}}:{{ports[http][1]}}/html/webappapis/dynamic-markup-insertion/opening-the-input-stream/resources/set-document-domain.html", (ctx) => { document.domain = document.domain; var doc = ctx.iframes[0].contentDocument; - assert_throws("SecurityError", doc.write.bind(doc, ""), "Implicitly opening a same origin-domain (but not same origin) document doesn't throw."); + assert_throws_dom("SecurityError", doc.write.bind(doc, ""), "Implicitly opening a same origin-domain (but not same origin) document doesn't throw."); }, "It should not be possible to implicitly open same origin-domain (but not same origin) documents."); </script> </body> diff --git a/tests/wpt/web-platform-tests/html/webappapis/microtask-queuing/queue-microtask.any.js b/tests/wpt/web-platform-tests/html/webappapis/microtask-queuing/queue-microtask.any.js index b39931719a8..e67765fade3 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/microtask-queuing/queue-microtask.any.js +++ b/tests/wpt/web-platform-tests/html/webappapis/microtask-queuing/queue-microtask.any.js @@ -6,12 +6,12 @@ test(() => { }, "It exists and is a function"); test(() => { - assert_throws(new TypeError(), () => queueMicrotask(), "no argument"); - assert_throws(new TypeError(), () => queueMicrotask(undefined), "undefined"); - assert_throws(new TypeError(), () => queueMicrotask(null), "null"); - assert_throws(new TypeError(), () => queueMicrotask(0), "0"); - assert_throws(new TypeError(), () => queueMicrotask({ handleEvent() { } }), "an event handler object"); - assert_throws(new TypeError(), () => queueMicrotask("window.x = 5;"), "a string"); + assert_throws_js(TypeError, () => queueMicrotask(), "no argument"); + assert_throws_js(TypeError, () => queueMicrotask(undefined), "undefined"); + assert_throws_js(TypeError, () => queueMicrotask(null), "null"); + assert_throws_js(TypeError, () => queueMicrotask(0), "0"); + assert_throws_js(TypeError, () => queueMicrotask({ handleEvent() { } }), "an event handler object"); + assert_throws_js(TypeError, () => queueMicrotask("window.x = 5;"), "a string"); }, "It throws when given non-functions"); async_test(t => { diff --git a/tests/wpt/web-platform-tests/html/webappapis/scripting/events/messageevent-constructor.https.html b/tests/wpt/web-platform-tests/html/webappapis/scripting/events/messageevent-constructor.https.html index 70b5ff6e568..c0dc4d231ce 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/scripting/events/messageevent-constructor.https.html +++ b/tests/wpt/web-platform-tests/html/webappapis/scripting/events/messageevent-constructor.https.html @@ -35,7 +35,7 @@ test(function() { }, "MessageEventInit dictionary") test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { new MessageEvent("test", { ports: null }) }) }, "Passing null for ports member") @@ -67,7 +67,7 @@ test(function() { test(function() { var ev = document.createEvent("messageevent") - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { ev.initMessageEvent("test", true, false, "testData", "testOrigin", "testId", window, null) }) }, "Passing null for ports parameter to initMessageEvent") diff --git a/tests/wpt/web-platform-tests/html/webappapis/scripting/processing-model-2/integration-with-the-javascript-agent-formalism/requires-failure.https.any.js b/tests/wpt/web-platform-tests/html/webappapis/scripting/processing-model-2/integration-with-the-javascript-agent-formalism/requires-failure.https.any.js index a890b350198..f195a70fdf9 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/scripting/processing-model-2/integration-with-the-javascript-agent-formalism/requires-failure.https.any.js +++ b/tests/wpt/web-platform-tests/html/webappapis/scripting/processing-model-2/integration-with-the-javascript-agent-formalism/requires-failure.https.any.js @@ -4,7 +4,7 @@ test(() => { const sab = new SharedArrayBuffer(16); const ta = new Int32Array(sab); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { Atomics.wait(ta, 0, 0, 10); }); }, `[[CanBlock]] in a ${self.constructor.name}`); diff --git a/tests/wpt/web-platform-tests/html/webappapis/scripting/processing-model-2/unhandled-promise-rejections/promise-rejection-event-constructor.html b/tests/wpt/web-platform-tests/html/webappapis/scripting/processing-model-2/unhandled-promise-rejections/promise-rejection-event-constructor.html index 17cc35c21b0..88875072128 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/scripting/processing-model-2/unhandled-promise-rejections/promise-rejection-event-constructor.html +++ b/tests/wpt/web-platform-tests/html/webappapis/scripting/processing-model-2/unhandled-promise-rejections/promise-rejection-event-constructor.html @@ -16,7 +16,7 @@ test(function() { assert_equals(new PromiseRejectionEvent('eventType', { promise: p }).reason, undefined); // No promise is passed. - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { new PromiseRejectionEvent('eventType', { bubbles: false }); }, diff --git a/tests/wpt/web-platform-tests/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html b/tests/wpt/web-platform-tests/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html index 2b70f7ae602..c6fbeb65c55 100644 --- a/tests/wpt/web-platform-tests/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html +++ b/tests/wpt/web-platform-tests/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html @@ -53,11 +53,11 @@ const invalid_urls1 = [ for (const url of invalid_urls1) { test(() => { - assert_throws('SYNTAX_ERR', () => { navigator.registerProtocolHandler('mailto', url, 'foo'); }); + assert_throws_dom('SYNTAX_ERR', () => { navigator.registerProtocolHandler('mailto', url, 'foo'); }); }, 'registerProtocolHandler: Invalid URL "' + url + '" should throw SYNTAX_ERR.'); test(() => { - assert_throws('SYNTAX_ERR', () => { navigator.unregisterProtocolHandler('mailto', url); }); + assert_throws_dom('SYNTAX_ERR', () => { navigator.unregisterProtocolHandler('mailto', url); }); }, 'unregisterProtocolHandler: Invalid URL "' + url + '" should throw SYNTAX_ERR.'); } @@ -72,11 +72,11 @@ const invalid_urls2 = [ ]; for (const url of invalid_urls2) { test(() => { - assert_throws('SECURITY_ERR', () => { navigator.registerProtocolHandler('mailto', url, 'foo'); }); + assert_throws_dom('SECURITY_ERR', () => { navigator.registerProtocolHandler('mailto', url, 'foo'); }); }, 'registerProtocolHandler: Invalid URL "' + url + '" should throw SECURITY_ERR.'); test(() => { - assert_throws('SECURITY_ERR', () => { navigator.unregisterProtocolHandler('mailto', url); }); + assert_throws_dom('SECURITY_ERR', () => { navigator.unregisterProtocolHandler('mailto', url); }); }, 'unregisterProtocolHandler: Invalid URL "' + url + '" should throw SECURITY_ERR.'); } @@ -130,11 +130,11 @@ const denylist = [ ]; for (const scheme of denylist) { test(() => { - assert_throws('SECURITY_ERR', () => { navigator.registerProtocolHandler(scheme, location.href + '/%s', 'foo'); }); + assert_throws_dom('SECURITY_ERR', () => { navigator.registerProtocolHandler(scheme, location.href + '/%s', 'foo'); }); }, 'registerProtocolHandler: Attempting to override the "' + scheme + '" protocol should throw SECURITY_ERR.'); test(() => { - assert_throws('SECURITY_ERR', () => { navigator.unregisterProtocolHandler(scheme, location.href + '/%s'); }); + assert_throws_dom('SECURITY_ERR', () => { navigator.unregisterProtocolHandler(scheme, location.href + '/%s'); }); }, 'unregisterProtocolHandler: Attempting to override the "' + scheme + '" protocol should throw SECURITY_ERR.'); } diff --git a/tests/wpt/web-platform-tests/imagebitmap-renderingcontext/transferFromImageBitmap-detached.html b/tests/wpt/web-platform-tests/imagebitmap-renderingcontext/transferFromImageBitmap-detached.html index c0ae84148af..40bf6eeb568 100644 --- a/tests/wpt/web-platform-tests/imagebitmap-renderingcontext/transferFromImageBitmap-detached.html +++ b/tests/wpt/web-platform-tests/imagebitmap-renderingcontext/transferFromImageBitmap-detached.html @@ -19,7 +19,7 @@ promise_test(function() { // The image should be detached after transferFromImageBitmap. assert_equals(image.width, 0); assert_equals(image.height, 0); - assert_throws("InvalidStateError", function() { dstCtx.transferFromImageBitmap(image); }); + assert_throws_dom("InvalidStateError", function() { dstCtx.transferFromImageBitmap(image); }); } var srcCanvas = document.createElement('canvas'); diff --git a/tests/wpt/web-platform-tests/import-maps/resources/jest-test-helper.js b/tests/wpt/web-platform-tests/import-maps/resources/jest-test-helper.js index 8fa7b65adb5..ee62af853cd 100644 --- a/tests/wpt/web-platform-tests/import-maps/resources/jest-test-helper.js +++ b/tests/wpt/web-platform-tests/import-maps/resources/jest-test-helper.js @@ -37,7 +37,7 @@ function expect(v) { toThrow: expected => { if (expected.test && expected.test('not yet implemented')) { // We override /not yet implemented/ expectation. - assert_throws(TypeError(), v); + assert_throws_js(TypeError, v); } else { assert_throws(expected(), v); } diff --git a/tests/wpt/web-platform-tests/interfaces/css-regions.idl b/tests/wpt/web-platform-tests/interfaces/css-regions.idl deleted file mode 100644 index f7cf3d31a11..00000000000 --- a/tests/wpt/web-platform-tests/interfaces/css-regions.idl +++ /dev/null @@ -1,33 +0,0 @@ -// GENERATED CONTENT - DO NOT EDIT -// Content was automatically extracted by Reffy into reffy-reports -// (https://github.com/tidoust/reffy-reports) -// Source: CSS Regions Module Level 1 (https://drafts.csswg.org/css-regions/) - -partial interface Document { - readonly attribute NamedFlowMap namedFlows; -}; - -[Exposed=Window, - MapClass=(CSSOMString, NamedFlow)] interface NamedFlowMap { - NamedFlow? get(CSSOMString flowName); - boolean has(CSSOMString flowName); - NamedFlowMap set(CSSOMString flowName, NamedFlow flowValue); - boolean delete(CSSOMString flowName); -}; - -[Exposed=Window] -interface NamedFlow : EventTarget { - readonly attribute CSSOMString name; - readonly attribute boolean overset; - sequence<Region> getRegions(); - readonly attribute short firstEmptyRegionIndex; - sequence<Node> getContent(); - sequence<Region> getRegionsByContent(Node node); -}; - -interface mixin Region { - readonly attribute CSSOMString regionOverset; - sequence<Range>? getRegionFlowRanges(); -}; - -Element includes Region; diff --git a/tests/wpt/web-platform-tests/intersection-observer/observer-exceptions.html b/tests/wpt/web-platform-tests/intersection-observer/observer-exceptions.html index f8d089b75b4..126790f290d 100644 --- a/tests/wpt/web-platform-tests/intersection-observer/observer-exceptions.html +++ b/tests/wpt/web-platform-tests/intersection-observer/observer-exceptions.html @@ -5,55 +5,55 @@ <script> test(function () { - assert_throws(RangeError(), function() { + assert_throws_js(RangeError, function() { new IntersectionObserver(e => {}, {threshold: [1.1]}) }) }, "IntersectionObserver constructor with { threshold: [1.1] }"); test(function () { - assert_throws(TypeError(), function() { + assert_throws_js(TypeError, function() { new IntersectionObserver(e => {}, {threshold: ["foo"]}) }) }, 'IntersectionObserver constructor with { threshold: ["foo"] }'); test(function () { - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { new IntersectionObserver(e => {}, {rootMargin: "1"}) }) }, 'IntersectionObserver constructor with { rootMargin: "1" }'); test(function () { - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { new IntersectionObserver(e => {}, {rootMargin: "2em"}) }) }, 'IntersectionObserver constructor with { rootMargin: "2em" }'); test(function () { - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { new IntersectionObserver(e => {}, {rootMargin: "auto"}) }) }, 'IntersectionObserver constructor with { rootMargin: "auto" }'); test(function () { - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { new IntersectionObserver(e => {}, {rootMargin: "calc(1px + 2px)"}) }) }, 'IntersectionObserver constructor with { rootMargin: "calc(1px + 2px)" }'); test(function () { - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { new IntersectionObserver(e => {}, {rootMargin: "1px !important"}) }) }, 'IntersectionObserver constructor with { rootMargin: "1px !important" }'); test(function () { - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { new IntersectionObserver(e => {}, {rootMargin: "1px 1px 1px 1px 1px"}) }) }, 'IntersectionObserver constructor with { rootMargin: "1px 1px 1px 1px 1px" }'); test(function () { - assert_throws(TypeError(), function() { + assert_throws_js(TypeError, function() { let observer = new IntersectionObserver(c => {}, {}); observer.observe("foo"); }) diff --git a/tests/wpt/web-platform-tests/js/builtins/Array.prototype.join-order.html b/tests/wpt/web-platform-tests/js/builtins/Array.prototype.join-order.html index e5589803a68..13d49a8d192 100644 --- a/tests/wpt/web-platform-tests/js/builtins/Array.prototype.join-order.html +++ b/tests/wpt/web-platform-tests/js/builtins/Array.prototype.join-order.html @@ -11,12 +11,12 @@ var test_error = { name: "test" }; // Step 1. test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { [].join.call(null, { toString: function() { assert_unreached(); } }); }); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { [].join.call(undefined, { toString: function() { assert_unreached(); } }); diff --git a/tests/wpt/web-platform-tests/js/builtins/Object.prototype.hasOwnProperty-prototype-chain.html b/tests/wpt/web-platform-tests/js/builtins/Object.prototype.hasOwnProperty-prototype-chain.html index 402f1ae6fd5..e64d0b71632 100644 --- a/tests/wpt/web-platform-tests/js/builtins/Object.prototype.hasOwnProperty-prototype-chain.html +++ b/tests/wpt/web-platform-tests/js/builtins/Object.prototype.hasOwnProperty-prototype-chain.html @@ -34,7 +34,7 @@ test(function() { test(function() { [null, undefined].forEach(function(that) { - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { that.hasOwnProperty('hasOwnProperty'); }); }); }); diff --git a/tests/wpt/web-platform-tests/js/builtins/WeakMap.prototype-properties.html b/tests/wpt/web-platform-tests/js/builtins/WeakMap.prototype-properties.html index ecf4a8e311e..2c2bddfeb71 100644 --- a/tests/wpt/web-platform-tests/js/builtins/WeakMap.prototype-properties.html +++ b/tests/wpt/web-platform-tests/js/builtins/WeakMap.prototype-properties.html @@ -25,16 +25,16 @@ function test_length(fun, expected) { function test_thisval(fun, args) { // Step 1-2 test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { WeakMap.prototype[fun].apply(null, args); }); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { WeakMap.prototype[fun].apply(undefined, args); }); }, "WeakMap.prototype." + fun + ": ToObject on this") // Step 3 test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { WeakMap.prototype[fun].apply({}, args); }); }, "WeakMap.prototype." + fun + ": this has no [[WeakMapData]] internal property") diff --git a/tests/wpt/web-platform-tests/kv-storage/interface.https.html b/tests/wpt/web-platform-tests/kv-storage/interface.https.html index a5eba425b6d..d98b1c876d3 100644 --- a/tests/wpt/web-platform-tests/kv-storage/interface.https.html +++ b/tests/wpt/web-platform-tests/kv-storage/interface.https.html @@ -79,9 +79,9 @@ test(() => { assert_equals(descriptor.value.name, methodName, `${methodName} function object should have the right name`); - assert_throws(new TypeError(), () => descriptor.value.call(StorageArea.prototype), + assert_throws_js(TypeError, () => descriptor.value.call(StorageArea.prototype), `${methodName} should throw when called on the prototype directly`); - assert_throws(new TypeError(), () => descriptor.value.call({}), + assert_throws_js(TypeError, () => descriptor.value.call({}), `${methodName} should throw when called on an empty object`); } @@ -140,29 +140,30 @@ promise_test(async t => { await frameLoadPromise(iframe); const OtherStorageArea = iframe.contentWindow.StorageArea; + const TypeError = iframe.contentWindow.TypeError; - await promise_rejects(t, new TypeError(), + await promise_rejects_js(t, TypeError, OtherStorageArea.prototype.set.call(storage, "testkey", "testvalue"), `set() must reject cross-realm`); - await promise_rejects(t, new TypeError(), + await promise_rejects_js(t, TypeError, OtherStorageArea.prototype.get.call(storage, "testkey"), `get() must reject cross-realm`); - await promise_rejects(t, new TypeError(), + await promise_rejects_js(t, TypeError, OtherStorageArea.prototype.delete.call(storage, "testkey"), `delete() must reject cross-realm`); - await promise_rejects(t, new TypeError(), OtherStorageArea.prototype.clear.call(storage), + await promise_rejects_js(t, TypeError, OtherStorageArea.prototype.clear.call(storage), `clear() must reject cross-realm`); - assert_throws(new TypeError(), () => OtherStorageArea.prototype.keys.call(storage), + assert_throws_js(TypeError, () => OtherStorageArea.prototype.keys.call(storage), `keys() must throw cross-realm`); - assert_throws(new TypeError(), () => OtherStorageArea.prototype.values.call(storage), + assert_throws_js(TypeError, () => OtherStorageArea.prototype.values.call(storage), `values() must throw cross-realm`); - assert_throws(new TypeError(), () => OtherStorageArea.prototype.entries.call(storage), + assert_throws_js(TypeError, () => OtherStorageArea.prototype.entries.call(storage), `entries() must throw cross-realm`); const otherBackingStoreGetter = Object.getOwnPropertyDescriptor(OtherStorageArea.prototype, "backingStore").get; - assert_throws(new TypeError(), () => otherBackingStoreGetter.call(storage), + assert_throws_js(TypeError, () => otherBackingStoreGetter.call(storage), `backingStore must throw cross-realm`); }, "Same-realm brand checks"); diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/contracted-image.html b/tests/wpt/web-platform-tests/largest-contentful-paint/contracted-image.html index 2d4a84bf35c..ed6adfb2c7c 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/contracted-image.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/contracted-image.html @@ -13,9 +13,7 @@ <script src="resources/largest-contentful-paint-helpers.js"></script> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); const beforeLoad = performance.now(); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/cross-origin-image.sub.html b/tests/wpt/web-platform-tests/largest-contentful-paint/cross-origin-image.sub.html index 58e636e51b9..be0c8a1e11e 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/cross-origin-image.sub.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/cross-origin-image.sub.html @@ -7,9 +7,7 @@ <script src="resources/largest-contentful-paint-helpers.js"></script> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); const beforeLoad = performance.now(); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/expanded-image.html b/tests/wpt/web-platform-tests/largest-contentful-paint/expanded-image.html index 6f7043dd8e4..e0b3545c21c 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/expanded-image.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/expanded-image.html @@ -13,9 +13,7 @@ <script src="resources/largest-contentful-paint-helpers.js"></script> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); const beforeLoad = performance.now(); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/first-letter-background.html b/tests/wpt/web-platform-tests/largest-contentful-paint/first-letter-background.html index 44d2a1a9680..5269e468558 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/first-letter-background.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/first-letter-background.html @@ -12,9 +12,7 @@ <script src="resources/largest-contentful-paint-helpers.js"></script> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); const beforeLoad = performance.now(); const observer = new PerformanceObserver( t.step_func(function(entryList) { diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/first-paint-equals-lcp-text.html b/tests/wpt/web-platform-tests/largest-contentful-paint/first-paint-equals-lcp-text.html index a49a83f346d..7a01cb15943 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/first-paint-equals-lcp-text.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/first-paint-equals-lcp-text.html @@ -6,12 +6,8 @@ <script src="/resources/testharnessreport.js"></script> <script> async_test(function (t) { - if (!window.PerformancePaintTiming) { - assert_unreached("PerformancePaintTiming is not implemented"); - } - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.PerformancePaintTiming, "PerformancePaintTiming is not implemented"); + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); let firstPaintTime = 0; let firstContentfulPaintTime = 0; let largestContentfulPaintTime = 0; diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/iframe-content-not-observed.html b/tests/wpt/web-platform-tests/largest-contentful-paint/iframe-content-not-observed.html index 7cb23ddbd20..ea8e0d79f38 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/iframe-content-not-observed.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/iframe-content-not-observed.html @@ -8,9 +8,7 @@ <body> <script> async_test((t) => { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); const observer = new PerformanceObserver( t.step_func_done(entryList => { assert_unreached("Should not have received an entry!"); diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/image-src-change.html b/tests/wpt/web-platform-tests/largest-contentful-paint/image-src-change.html index 5ec860fa06f..cbe46f402b4 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/image-src-change.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/image-src-change.html @@ -8,9 +8,7 @@ <img src='/images/blue.png' id='image_id'/> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); let beforeLoad = performance.now(); let firstCallback = true; const observer = new PerformanceObserver( diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/invisible-images.html b/tests/wpt/web-platform-tests/largest-contentful-paint/invisible-images.html index d536f86dcf6..49324663f22 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/invisible-images.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/invisible-images.html @@ -19,9 +19,7 @@ <body> <script> async_test(t => { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); const observer = new PerformanceObserver( t.step_func(entryList => { entryList.getEntries().forEach(entry => { diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/larger-image.html b/tests/wpt/web-platform-tests/largest-contentful-paint/larger-image.html index 094c2096752..a571b8afe79 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/larger-image.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/larger-image.html @@ -13,9 +13,7 @@ <p>More text!</p> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); const beforeLoad = performance.now(); const observer = new PerformanceObserver( t.step_func(entryList => { diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/larger-text.html b/tests/wpt/web-platform-tests/largest-contentful-paint/larger-text.html index 973832ca6c8..af8bbc06b32 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/larger-text.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/larger-text.html @@ -18,9 +18,7 @@ <img src='/images/green-2x2.png'/> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); let beforeRender; const observer = new PerformanceObserver( t.step_func(entryList => { diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/loadTime-after-appendChild.html b/tests/wpt/web-platform-tests/largest-contentful-paint/loadTime-after-appendChild.html index 0e40127b576..f320b03df4d 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/loadTime-after-appendChild.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/loadTime-after-appendChild.html @@ -7,9 +7,7 @@ <script src="resources/largest-contentful-paint-helpers.js"></script> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); let beforeLoad; const observer = new PerformanceObserver( t.step_func_done(entryList => { diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/observe-after-untrusted-scroll.html b/tests/wpt/web-platform-tests/largest-contentful-paint/observe-after-untrusted-scroll.html index 1b2cd1d25b5..4a1a214c833 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/observe-after-untrusted-scroll.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/observe-after-untrusted-scroll.html @@ -7,9 +7,7 @@ <script src="resources/largest-contentful-paint-helpers.js"></script> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); const beforeLoad = performance.now(); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/observe-image.html b/tests/wpt/web-platform-tests/largest-contentful-paint/observe-image.html index 5856795cac4..58eb5364a92 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/observe-image.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/observe-image.html @@ -7,9 +7,7 @@ <script src="resources/largest-contentful-paint-helpers.js"></script> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); const beforeLoad = performance.now(); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/observe-text.html b/tests/wpt/web-platform-tests/largest-contentful-paint/observe-text.html index a2a376fde33..402fcd80195 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/observe-text.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/observe-text.html @@ -11,9 +11,7 @@ p { </style> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); let beforeRender; const observer = new PerformanceObserver( t.step_func_done(function(entryList) { diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/repeated-image.html b/tests/wpt/web-platform-tests/largest-contentful-paint/repeated-image.html index 82d662d330a..8c3c8909099 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/repeated-image.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/repeated-image.html @@ -13,9 +13,7 @@ <script src="resources/largest-contentful-paint-helpers.js"></script> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); let beforeLoad = performance.now(); let firstCallback = true; const url = window.location.origin + '/images/black-rectangle.png'; diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/text-with-display-style.html b/tests/wpt/web-platform-tests/largest-contentful-paint/text-with-display-style.html index 2f1f254d777..24541541a8b 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/text-with-display-style.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/text-with-display-style.html @@ -12,9 +12,7 @@ <h1 id='title'>I am a title!</h1> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); let beforeRender; /* In this test, we first observe a header with style 'display: flex'. * Once observed, we remove it and add a header with style 'display: grid'. diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/toJSON.html b/tests/wpt/web-platform-tests/largest-contentful-paint/toJSON.html index 7defcce1b6f..25be5eb2dc9 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/toJSON.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/toJSON.html @@ -7,9 +7,7 @@ <p>Text!</p> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { const entry = entryList.getEntries()[0]; diff --git a/tests/wpt/web-platform-tests/largest-contentful-paint/video-poster.html b/tests/wpt/web-platform-tests/largest-contentful-paint/video-poster.html index 9ad9c4cdfd0..535f30e2565 100644 --- a/tests/wpt/web-platform-tests/largest-contentful-paint/video-poster.html +++ b/tests/wpt/web-platform-tests/largest-contentful-paint/video-poster.html @@ -6,9 +6,7 @@ <script src="resources/largest-contentful-paint-helpers.js"></script> <script> async_test(function (t) { - if (!window.LargestContentfulPaint) { - assert_unreached("LargestContentfulPaint is not implemented"); - } + assert_precondition(window.LargestContentfulPaint, "LargestContentfulPaint is not implemented"); const beforeLoad = performance.now(); const observer = new PerformanceObserver( t.step_func_done(function(entryList) { diff --git a/tests/wpt/web-platform-tests/lint.whitelist b/tests/wpt/web-platform-tests/lint.whitelist index 1b102e4e03c..e428d2f4f19 100644 --- a/tests/wpt/web-platform-tests/lint.whitelist +++ b/tests/wpt/web-platform-tests/lint.whitelist @@ -384,7 +384,6 @@ INDENT TABS: css/css-images/support/1x1-green.svg INDENT TABS: css/css-masking/* INDENT TABS: css/css-multicol/* INDENT TABS: css/css-page/* -INDENT TABS: css/css-regions/* INDENT TABS: css/css-round-display/* INDENT TABS: css/css-text/* INDENT TABS: css/css-text-decor/* @@ -400,9 +399,6 @@ INDENT TABS: css/WOFF2/* ## Things we're stopping from getting worse -CONSOLE: css/css-regions/elements/support/Three.js -CONSOLE: css/css-regions/interactivity/selection/support/js/selection-test-helper.js -CONSOLE: css/css-regions/stacking-context/javascript-stacking-context-002.html CONSOLE: css/css-shapes/shape-outside/supported-shapes/support/test-utils.js CONSOLE: css/css-values/viewport-units-css2-001.html CONSOLE: css/css-writing-modes/orthogonal-parent-shrink-to-fit-001*.html @@ -475,9 +471,6 @@ CSS-COLLIDING-SUPPORT-NAME: css/*/LOCK # These are all the current "merge mismatch" errors the build system produces CSS-COLLIDING-SUPPORT-NAME: css/css-flexbox/support/200x200-green.png CSS-COLLIDING-SUPPORT-NAME: css/css-grid/grid-items/support/200x200-green.png -CSS-COLLIDING-SUPPORT-NAME: css/css-scroll-snap/support/common.css -CSS-COLLIDING-SUPPORT-NAME: css/css-regions/contentEditable/support/common.css -CSS-COLLIDING-SUPPORT-NAME: css/css-regions/interactivity/full-screen/support/common.css CSS-COLLIDING-SUPPORT-NAME: css/css-backgrounds/support/pattern-grg-rgr-grg.png CSS-COLLIDING-SUPPORT-NAME: css/css-multicol/support/pattern-grg-rgr-grg.png CSS-COLLIDING-SUPPORT-NAME: css/css-transitions/support/pattern-grg-rgr-grg.png @@ -492,8 +485,6 @@ CSS-COLLIDING-SUPPORT-NAME: css/css-flexbox/support/solidblue.png CSS-COLLIDING-SUPPORT-NAME: css/vendor-imports/mozilla/mozilla-central-reftests/flexbox/support/solidblue.png CSS-COLLIDING-SUPPORT-NAME: css/css-writing-modes/support/swatch-fuchsia.png CSS-COLLIDING-SUPPORT-NAME: css/CSS2/support/swatch-fuchsia.png -CSS-COLLIDING-SUPPORT-NAME: css/css-regions/interactivity/full-screen/support/util.js -CSS-COLLIDING-SUPPORT-NAME: css/css-regions/interactivity/resizing/support/util.js # More duplicated copies of the above CSS-COLLIDING-SUPPORT-NAME: css/support/pattern-rgr-grg-rgr.png @@ -508,7 +499,6 @@ CSS-COLLIDING-SUPPORT-NAME: css/CSS2/support/pattern-rgr-grg-rgr.png CSS-COLLIDING-SUPPORT-NAME: css/cssom/support/pattern-rgr-grg-rgr.png CSS-COLLIDING-SUPPORT-NAME: css/css-style-attr/support/pattern-rgr-grg-rgr.png CSS-COLLIDING-SUPPORT-NAME: css/CSS2/borders/support/pattern-rgr-grg-rgr.png -CSS-COLLIDING-SUPPORT-NAME: css/css-regions/support/pattern-rgr-grg-rgr.png CSS-COLLIDING-SUPPORT-NAME: css/CSS2/zindex/support/pattern-rgr-grg-rgr.png CSS-COLLIDING-SUPPORT-NAME: css/CSS2/text/support/pattern-rgr-grg-rgr.png CSS-COLLIDING-SUPPORT-NAME: css/css-values/support/pattern-rgr-grg-rgr.png @@ -534,7 +524,6 @@ CSS-COLLIDING-SUPPORT-NAME: css/css-fonts/support/pattern-grg-rgr-grg.png CSS-COLLIDING-SUPPORT-NAME: css/css-transforms/support/pattern-grg-rgr-grg.png CSS-COLLIDING-SUPPORT-NAME: css/cssom-view/support/pattern-grg-rgr-grg.png CSS-COLLIDING-SUPPORT-NAME: css/CSS2/fonts/support/pattern-grg-rgr-grg.png -CSS-COLLIDING-SUPPORT-NAME: css/css-regions/support/pattern-grg-rgr-grg.png CSS-COLLIDING-SUPPORT-NAME: css/CSS2/support/pattern-grg-rgr-grg.png CSS-COLLIDING-SUPPORT-NAME: css/CSS2/selectors/support/pattern-grg-rgr-grg.png CSS-COLLIDING-SUPPORT-NAME: css/css-shapes/support/pattern-grg-rgr-grg.png @@ -574,8 +563,6 @@ CSS-COLLIDING-REF-NAME: css/css-masking/clip-path/reference/clip-path-square-002 # Duplicate filename where there's no actual merging # (i.e., we're being more aggressive than the build system at forbidding it) -CSS-COLLIDING-REF-NAME: css/CSS2/positioning/position-relative-001-ref.xht -CSS-COLLIDING-REF-NAME: css/css-regions/positioned-content/reference/position-relative-001-ref.html CSS-COLLIDING-REF-NAME: css/CSS2/text/text-transform-lowercase-001-ref.xht CSS-COLLIDING-REF-NAME: css/css-text/text-transform/reference/text-transform-lowercase-001-ref.xht CSS-COLLIDING-REF-NAME: css/CSS2/text/text-transform-capitalize-003-ref.xht @@ -678,7 +665,6 @@ MISSING-LINK: css/geometry/*.worker.js MISSING-LINK: css/filter-effects/*.any.js # Tests that use WebKit/Blink testing APIs -LAYOUTTESTS APIS: css/css-regions/interactivity/* LAYOUTTESTS APIS: import-maps/resources/jest-test-helper.js LAYOUTTESTS APIS: import-maps/common/resources/common-test-helper.js LAYOUTTESTS APIS: resources/chromium/generic_sensor_mocks.js diff --git a/tests/wpt/web-platform-tests/loading/lazyload/original-crossorigin-applied-tentative.sub.html b/tests/wpt/web-platform-tests/loading/lazyload/original-crossorigin-applied-tentative.sub.html index dc3cff783e1..34470b03525 100644 --- a/tests/wpt/web-platform-tests/loading/lazyload/original-crossorigin-applied-tentative.sub.html +++ b/tests/wpt/web-platform-tests/loading/lazyload/original-crossorigin-applied-tentative.sub.html @@ -32,7 +32,7 @@ Marked as tentative until https://github.com/whatwg/html/pull/3752 is landed. canvas.width = img_element.width; canvas.height = img_element.height; context.drawImage(img_element, 0, 0); - assert_throws('SecurityError', () => canvas.toDataURL()); + assert_throws_dom('SecurityError', () => canvas.toDataURL()); }) ).catch(t.unreached_func("The image load should not fail, trying to load with CORS headers set.")); }, "Test that when deferred image is loaded, it uses the crossorigin attribute specified at parse time."); diff --git a/tests/wpt/web-platform-tests/longtask-timing/long-microtask.window.js b/tests/wpt/web-platform-tests/longtask-timing/long-microtask.window.js index 7b7d1848f8c..9219fdb5c49 100644 --- a/tests/wpt/web-platform-tests/longtask-timing/long-microtask.window.js +++ b/tests/wpt/web-platform-tests/longtask-timing/long-microtask.window.js @@ -1,8 +1,5 @@ async_test(function (t) { - if (typeof PerformanceLongTaskTiming === 'undefined') { - assert_unreached("Longtasks are not supported."); - t.done(); - } + assert_precondition(window.PerformanceLongTaskTiming, 'Longtasks are not supported.'); new PerformanceObserver( t.step_func_done(entryList => { const entries = entryList.getEntries(); diff --git a/tests/wpt/web-platform-tests/longtask-timing/longtask-attributes.html b/tests/wpt/web-platform-tests/longtask-timing/longtask-attributes.html index 8e0da824a87..24540d7c22f 100644 --- a/tests/wpt/web-platform-tests/longtask-timing/longtask-attributes.html +++ b/tests/wpt/web-platform-tests/longtask-timing/longtask-attributes.html @@ -10,10 +10,7 @@ <div id="log"></div> <script> async_test(function (t) { - if (typeof PerformanceLongTaskTiming === 'undefined') { - assert_unreached("Longtasks are not supported."); - t.done(); - } + assert_precondition(window.PerformanceLongTaskTiming, 'Longtasks are not supported.'); const observer = new PerformanceObserver( t.step_func(function (entryList) { const entries = entryList.getEntries(); diff --git a/tests/wpt/web-platform-tests/longtask-timing/longtask-in-childiframe-crossorigin.html b/tests/wpt/web-platform-tests/longtask-timing/longtask-in-childiframe-crossorigin.html index 149cf93e869..20a94a1eef4 100644 --- a/tests/wpt/web-platform-tests/longtask-timing/longtask-in-childiframe-crossorigin.html +++ b/tests/wpt/web-platform-tests/longtask-timing/longtask-in-childiframe-crossorigin.html @@ -10,10 +10,7 @@ <div id="log"></div> <script> async_test(function (t) { - if (typeof PerformanceLongTaskTiming === 'undefined') { - assert_unreached("Longtasks are not supported."); - t.done(); - } + assert_precondition(window.PerformanceLongTaskTiming, 'Longtasks are not supported.'); const observer = new PerformanceObserver( t.step_func(function (entryList) { const entries = entryList.getEntries(); diff --git a/tests/wpt/web-platform-tests/longtask-timing/longtask-in-childiframe.html b/tests/wpt/web-platform-tests/longtask-timing/longtask-in-childiframe.html index 432ead57597..4feae7e55c1 100644 --- a/tests/wpt/web-platform-tests/longtask-timing/longtask-in-childiframe.html +++ b/tests/wpt/web-platform-tests/longtask-timing/longtask-in-childiframe.html @@ -11,10 +11,7 @@ <script> const initialTime = performance.now(); async_test(function (t) { - if (typeof PerformanceLongTaskTiming === 'undefined') { - assert_unreached("Longtasks are not supported."); - t.done(); - } + assert_precondition(window.PerformanceLongTaskTiming, 'Longtasks are not supported.'); const observer = new PerformanceObserver( t.step_func(function (entryList) { const entries = entryList.getEntries(); diff --git a/tests/wpt/web-platform-tests/longtask-timing/longtask-in-externalscript.html b/tests/wpt/web-platform-tests/longtask-timing/longtask-in-externalscript.html index 57c2d5650c0..db5c9db4a16 100644 --- a/tests/wpt/web-platform-tests/longtask-timing/longtask-in-externalscript.html +++ b/tests/wpt/web-platform-tests/longtask-timing/longtask-in-externalscript.html @@ -10,10 +10,7 @@ <div id="log"></div> <script> async_test(function (t) { - if (typeof PerformanceLongTaskTiming === 'undefined') { - assert_unreached("Longtasks are not supported."); - t.done(); - } + assert_precondition(window.PerformanceLongTaskTiming, 'Longtasks are not supported.'); const observer = new PerformanceObserver( t.step_func(function (entryList) { const entries = entryList.getEntries(); diff --git a/tests/wpt/web-platform-tests/longtask-timing/longtask-in-parentiframe.html b/tests/wpt/web-platform-tests/longtask-timing/longtask-in-parentiframe.html index 2da635467a2..c6b7e3e5838 100644 --- a/tests/wpt/web-platform-tests/longtask-timing/longtask-in-parentiframe.html +++ b/tests/wpt/web-platform-tests/longtask-timing/longtask-in-parentiframe.html @@ -8,10 +8,7 @@ <script> const t = async_test(t => { - if (typeof PerformanceLongTaskTiming === 'undefined') { - assert_unreached("Longtasks are not supported."); - t.done(); - } + assert_precondition(window.PerformanceLongTaskTiming, 'Longtasks are not supported.'); window.addEventListener('message', t.step_func(e => { assert_equals(e.data['entryType'], 'longtask'); assert_equals(e.data['frame-attribution'], 'same-origin-ancestor'); diff --git a/tests/wpt/web-platform-tests/longtask-timing/longtask-in-raf.html b/tests/wpt/web-platform-tests/longtask-timing/longtask-in-raf.html index 88ad2ef9892..110ae751ee3 100644 --- a/tests/wpt/web-platform-tests/longtask-timing/longtask-in-raf.html +++ b/tests/wpt/web-platform-tests/longtask-timing/longtask-in-raf.html @@ -10,10 +10,7 @@ <div id="log"></div> <script> async_test(function (t) { - if (typeof PerformanceLongTaskTiming === 'undefined') { - assert_unreached("Longtasks are not supported."); - t.done(); - } + assert_precondition(window.PerformanceLongTaskTiming, 'Longtasks are not supported.'); const observer = new PerformanceObserver( t.step_func(function (entryList) { const entries = entryList.getEntries(); diff --git a/tests/wpt/web-platform-tests/longtask-timing/longtask-in-sibling-iframe-crossorigin.html b/tests/wpt/web-platform-tests/longtask-timing/longtask-in-sibling-iframe-crossorigin.html index 653556333a1..ba9c7170626 100644 --- a/tests/wpt/web-platform-tests/longtask-timing/longtask-in-sibling-iframe-crossorigin.html +++ b/tests/wpt/web-platform-tests/longtask-timing/longtask-in-sibling-iframe-crossorigin.html @@ -8,10 +8,7 @@ <script> async_test(t => { - if (typeof PerformanceLongTaskTiming === 'undefined') { - assert_unreached("Longtasks are not supported."); - t.done(); - } + assert_precondition(window.PerformanceLongTaskTiming, 'Longtasks are not supported.'); window.addEventListener('message', t.step_func(e => { assert_equals(e.data['entryType'], 'longtask'); assert_equals(e.data['frame-attribution'], 'cross-origin-unreachable'); diff --git a/tests/wpt/web-platform-tests/longtask-timing/longtask-in-sibling-iframe.html b/tests/wpt/web-platform-tests/longtask-timing/longtask-in-sibling-iframe.html index 280d387654b..8f530fab069 100644 --- a/tests/wpt/web-platform-tests/longtask-timing/longtask-in-sibling-iframe.html +++ b/tests/wpt/web-platform-tests/longtask-timing/longtask-in-sibling-iframe.html @@ -8,10 +8,7 @@ <script> async_test(t => { - if (typeof PerformanceLongTaskTiming === 'undefined') { - assert_unreached("Longtasks are not supported."); - t.done(); - } + assert_precondition(window.PerformanceLongTaskTiming, 'Longtasks are not supported.'); window.addEventListener('message', t.step_func(e => { assert_equals(e.data['entryType'], 'longtask'); // Ignore any long task that may be produced by the top-level frame. diff --git a/tests/wpt/web-platform-tests/longtask-timing/longtask-tojson.html b/tests/wpt/web-platform-tests/longtask-timing/longtask-tojson.html index 20a97a16b04..6574b62d348 100644 --- a/tests/wpt/web-platform-tests/longtask-timing/longtask-tojson.html +++ b/tests/wpt/web-platform-tests/longtask-timing/longtask-tojson.html @@ -7,10 +7,7 @@ <body> <script> async_test(function (t) { - if (typeof PerformanceLongTaskTiming === 'undefined') { - assert_unreached("Longtasks are not supported."); - t.done(); - } + assert_precondition(window.PerformanceLongTaskTiming, 'Longtasks are not supported.'); const observer = new PerformanceObserver( t.step_func(function (entryList) { const entries = entryList.getEntries(); @@ -74,4 +71,4 @@ }, 'Test toJSON() in PerformanceLongTaskTiming and TaskAttributionTiming'); </script> </body> -</html> \ No newline at end of file +</html> diff --git a/tests/wpt/web-platform-tests/longtask-timing/shared-renderer/longtask-in-new-window.html b/tests/wpt/web-platform-tests/longtask-timing/shared-renderer/longtask-in-new-window.html index 3a68d1451a5..18d36b1e734 100644 --- a/tests/wpt/web-platform-tests/longtask-timing/shared-renderer/longtask-in-new-window.html +++ b/tests/wpt/web-platform-tests/longtask-timing/shared-renderer/longtask-in-new-window.html @@ -11,10 +11,7 @@ This window opens a new window which contains a longtask. We test that the longtask from the new window is not observed by the observer of this window. */ async_test(t => { - if (typeof PerformanceLongTaskTiming === 'undefined') { - assert_unreached("Longtasks are not supported."); - t.done(); - } + assert_precondition(window.PerformanceLongTaskTiming, 'Longtasks are not supported.'); const observer = new PerformanceObserver( t.step_func(function (entryList) { const entries = entryList.getEntries(); diff --git a/tests/wpt/web-platform-tests/longtask-timing/supported-longtask-types.window.js b/tests/wpt/web-platform-tests/longtask-timing/supported-longtask-types.window.js index 3c68c01d32d..aaa6415a8d3 100644 --- a/tests/wpt/web-platform-tests/longtask-timing/supported-longtask-types.window.js +++ b/tests/wpt/web-platform-tests/longtask-timing/supported-longtask-types.window.js @@ -1,6 +1,5 @@ test(() => { - if (typeof PerformanceObserver.supportedEntryTypes === "undefined") - assert_unreached("supportedEntryTypes is not supported."); + assert_precondition(typeof PerformanceObserver.supportedEntryTypes !== "undefined", 'supportedEntryTypes is not supported'); const types = PerformanceObserver.supportedEntryTypes; assert_true(types.includes("longtask"), "There should be 'longtask' in PerformanceObserver.supportedEntryTypes"); @@ -20,19 +19,17 @@ function syncWait(waitDuration) { return syncWait(waitDuration - (performance.now() - startTime)); } -if (typeof PerformanceObserver.supportedEntryTypes !== "undefined") { - const entryType = "longtask"; - if (PerformanceObserver.supportedEntryTypes.includes(entryType)) { - promise_test(async () => { - await new Promise((resolve) => { - new PerformanceObserver(function (list, observer) { - observer.disconnect(); - resolve(); - }).observe({entryTypes: [entryType]}); +const entryType = "longtask"; +promise_test(async () => { + assert_precondition(typeof PerformanceObserver.supportedEntryTypes !== "undefined", 'supportedEntryTypes is not supported'); + assert_precondition(typeof PerformanceObserver.supportedEntryTypes.includes(entryType), `supportedEntryTypes does not include '${entryType}'`); + await new Promise((resolve) => { + new PerformanceObserver(function (list, observer) { + observer.disconnect(); + resolve(); + }).observe({entryTypes: [entryType]}); - // Force the PerformanceEntry. - syncWait(50); - }) - }, `'${entryType}' entries should be observable.`) - } -} + // Force the PerformanceEntry. + syncWait(50); + }) +}, `'${entryType}' entries should be observable.`) diff --git a/tests/wpt/web-platform-tests/mathml/presentation-markup/spaces/space-vertical-align.tentative-ref.html b/tests/wpt/web-platform-tests/mathml/presentation-markup/spaces/space-vertical-align.tentative-ref.html new file mode 100644 index 00000000000..ed30edde962 --- /dev/null +++ b/tests/wpt/web-platform-tests/mathml/presentation-markup/spaces/space-vertical-align.tentative-ref.html @@ -0,0 +1,15 @@ +<!DOCTYPE html> +<html> +<head> +<meta charset="utf-8"> +<title>space and vertical-align (reference)</title> +</head> +<body> + <p>Test passes if you see a green square.</p> + <div style="position: relative;"> + <div style="position: absolute; top: 0px; left: 0px; + background: green; width: 100px; height: 100px;"> + </div> + </div> +</body> +</html> diff --git a/tests/wpt/web-platform-tests/mathml/presentation-markup/spaces/space-vertical-align.tentative.html b/tests/wpt/web-platform-tests/mathml/presentation-markup/spaces/space-vertical-align.tentative.html new file mode 100644 index 00000000000..31fae695da7 --- /dev/null +++ b/tests/wpt/web-platform-tests/mathml/presentation-markup/spaces/space-vertical-align.tentative.html @@ -0,0 +1,22 @@ +<!DOCTYPE html> +<html> +<head> +<meta charset="utf-8"> +<title>space and vertical-align</title> +<link rel="help" href="https://mathml-refresh.github.io/mathml-core/#space-mspace"> +<link rel="match" href="space-vertical-align.tentative-ref.html"/> +<meta name="assert" content="Verify that vertical-align property has no effect on mspace"> +</head> +<body> + <p>Test passes if you see a green square.</p> + <div style="position: relative;"> + <div style="position: absolute; top: 0px; left: 0px; + width: 200px; height: 200px;"> + <math style="position: absolute; top: 0px; left: 0px"> + <mspace width="50px" height="100px" style="background: green;vertical-align:50px"/> + <mspace width="50px" height="100px" style="background: green;vertical-align:50%"/> + </math> + </div> + </div> +</body> +</html> diff --git a/tests/wpt/web-platform-tests/media-source/SourceBuffer-abort-readyState.html b/tests/wpt/web-platform-tests/media-source/SourceBuffer-abort-readyState.html index 159ee60a2d0..5942379d08e 100644 --- a/tests/wpt/web-platform-tests/media-source/SourceBuffer-abort-readyState.html +++ b/tests/wpt/web-platform-tests/media-source/SourceBuffer-abort-readyState.html @@ -53,7 +53,7 @@ function mediaTest(file, mime) { 'mediaSource.readyState is "ended" after endOfStream()'); }); mediaSource.addEventListener('sourceended', t.step_func_done(function(e) { - assert_throws({name: 'InvalidStateError'}, function() { + assert_throws_dom('InvalidStateError', function() { sourceBuffer.abort(); }); })); diff --git a/tests/wpt/web-platform-tests/media-source/SourceBuffer-abort-removed.html b/tests/wpt/web-platform-tests/media-source/SourceBuffer-abort-removed.html index 00d65c133b0..c96412d0630 100644 --- a/tests/wpt/web-platform-tests/media-source/SourceBuffer-abort-removed.html +++ b/tests/wpt/web-platform-tests/media-source/SourceBuffer-abort-removed.html @@ -32,7 +32,7 @@ function mediaTest(mime) { mediaSource.addEventListener('sourceopen', t.step_func_done(function(e) { var sourceBuffer = mediaSource.addSourceBuffer(mime); mediaSource.removeSourceBuffer(sourceBuffer); - assert_throws({name: 'InvalidStateError'}, + assert_throws_dom('InvalidStateError', function() { sourceBuffer.abort(); }, diff --git a/tests/wpt/web-platform-tests/media-source/URL-createObjectURL-null.html b/tests/wpt/web-platform-tests/media-source/URL-createObjectURL-null.html index a4177dd846b..f2f973a776e 100644 --- a/tests/wpt/web-platform-tests/media-source/URL-createObjectURL-null.html +++ b/tests/wpt/web-platform-tests/media-source/URL-createObjectURL-null.html @@ -10,7 +10,7 @@ <div id="log"></div> <script> test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { window.URL.createObjectURL(null); }); }, "URL.createObjectURL(null)"); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-addsourcebuffer.html b/tests/wpt/web-platform-tests/media-source/mediasource-addsourcebuffer.html index 6ada1228490..a95155aefc2 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-addsourcebuffer.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-addsourcebuffer.html @@ -13,7 +13,7 @@ mediasource_test(function(test, mediaElement, mediaSource) { mediaSource.endOfStream(); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { mediaSource.addSourceBuffer(MediaSourceUtil.AUDIO_VIDEO_TYPE); }, "addSourceBuffer() threw an exception when in 'ended' state."); test.done(); @@ -29,7 +29,7 @@ mediasource_test(function(test, mediaElement, mediaSource) { - assert_throws("NotSupportedError", + assert_throws_dom("NotSupportedError", function() { mediaSource.addSourceBuffer(null); }, "addSourceBuffer() threw an exception when passed null."); test.done(); @@ -37,7 +37,7 @@ mediasource_test(function(test, mediaElement, mediaSource) { - assert_throws("NotSupportedError", + assert_throws_dom("NotSupportedError", function() { mediaSource.addSourceBuffer("invalidType"); }, "addSourceBuffer() threw an exception for an unsupported type."); test.done(); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-append-buffer.html b/tests/wpt/web-platform-tests/media-source/mediasource-append-buffer.html index a742ea3916b..750ccaf456f 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-append-buffer.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-append-buffer.html @@ -40,7 +40,7 @@ assert_true(sourceBuffer.updating, "updating attribute is true"); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { sourceBuffer.appendBuffer(mediaData); }, "appendBuffer() throws an exception there is a pending append."); @@ -172,7 +172,7 @@ assert_false(sourceBuffer.updating, "updating attribute is false"); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { sourceBuffer.appendBuffer(mediaData); }, "appendBuffer() throws an exception because it isn't attached to the mediaSource anymore."); @@ -193,7 +193,7 @@ assert_true(sourceBuffer.updating, "updating attribute is true"); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { mediaSource.duration = 1.0; }, "set duration throws an exception when updating attribute is true."); @@ -215,7 +215,7 @@ assert_true(sourceBuffer.updating, "updating attribute is true"); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { mediaSource.endOfStream(); }, "endOfStream() throws an exception when updating attribute is true."); @@ -239,7 +239,7 @@ assert_true(sourceBuffer.updating, "updating attribute is true"); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { sourceBuffer.timestampOffset = 10.0; }, "set timestampOffset throws an exception when updating attribute is true."); @@ -502,7 +502,7 @@ mediaSource.removeSourceBuffer(sourceBuffer); test.waitForExpectedEvents(function() { - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { sourceBuffer.abort(); }, "sourceBuffer.abort() throws an exception for InvalidStateError."); @@ -536,7 +536,7 @@ test.waitForExpectedEvents(function() { assert_equals(mediaSource.readyState, "ended", "readyState is ended."); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { sourceBuffer.abort(); }, "sourceBuffer.abort() throws an exception for InvalidStateError."); test.done(); @@ -571,7 +571,7 @@ test.expectEvent(sourceBuffer, "update", "Append success."); test.expectEvent(sourceBuffer, "updateend", "Append ended."); - assert_throws( { name: "TypeError"} , + assert_throws_js( TypeError, function() { sourceBuffer.appendBuffer(null); }, "appendBuffer(null) throws an exception."); test.done(); @@ -581,7 +581,7 @@ { mediaSource.removeSourceBuffer(sourceBuffer); - assert_throws( { name: "InvalidStateError"} , + assert_throws_dom( "InvalidStateError", function() { sourceBuffer.appendBuffer(mediaData); }, "appendBuffer() throws an exception when called after removeSourceBuffer()."); test.done(); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-appendwindow.html b/tests/wpt/web-platform-tests/media-source/mediasource-appendwindow.html index aebbee418df..9add6340804 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-appendwindow.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-appendwindow.html @@ -114,11 +114,11 @@ mediasource_testafterdataloaded(function(test, mediaElement, mediaSource, segmentInfo, sourceBuffer, mediaData) { mediaSource.removeSourceBuffer(sourceBuffer); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { sourceBuffer.appendWindowStart = 100.0; }, "set appendWindowStart throws an exception when mediasource object is not associated with a buffer."); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { sourceBuffer.appendWindowEnd = 500.0; }, "set appendWindowEnd throws an exception when mediasource object is not associated with a buffer."); test.done(); @@ -131,11 +131,11 @@ sourceBuffer.appendBuffer(mediaData); assert_true(sourceBuffer.updating, "updating attribute is true"); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { sourceBuffer.appendWindowStart = 100.0; }, "set appendWindowStart throws an exception when there is a pending append."); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { sourceBuffer.appendWindowEnd = 500.0; }, "set appendWindowEnd throws an exception when there is a pending append."); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-buffered.html b/tests/wpt/web-platform-tests/media-source/mediasource-buffered.html index 38cd1717eb2..7015fc6b61a 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-buffered.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-buffered.html @@ -222,7 +222,7 @@ test.waitForExpectedEvents(function() { - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { sourceBuffer.buffered; }, "get sourceBuffer.buffered throws an exception for InvalidStateError."); test.done(); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-changetype.html b/tests/wpt/web-platform-tests/media-source/mediasource-changetype.html index 8ce821d08f1..25618cdc1ec 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-changetype.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-changetype.html @@ -29,7 +29,7 @@ mediasource_test(function(test, mediaElement, mediaSource) mediaSource.removeSourceBuffer(sourceBuffer); - assert_throws("InvalidStateError", function() + assert_throws_dom("InvalidStateError", function() { sourceBuffer.changeType(MediaSourceUtil.AUDIO_VIDEO_TYPE); }, "changeType"); @@ -43,7 +43,7 @@ mediasource_test(function(test, mediaElement, mediaSource) sourceBuffer.appendBuffer(new Uint8Array(0)); assert_true(sourceBuffer.updating, "Updating flag set when a buffer is appended."); - assert_throws("InvalidStateError", function() + assert_throws_dom("InvalidStateError", function() { sourceBuffer.changeType(MediaSourceUtil.AUDIO_VIDEO_TYPE); }, "changeType"); @@ -58,7 +58,7 @@ mediasource_test(function(test, mediaElement, mediaSource) var unsupported_type = null; assert_false(MediaSource.isTypeSupported(unsupported_type), "null MIME type is not expected to be supported."); - assert_throws("NotSupportedError", function() + assert_throws_dom("NotSupportedError", function() { sourceBuffer.changeType(unsupported_type); }, "changeType"); @@ -73,7 +73,7 @@ mediasource_test(function(test, mediaElement, mediaSource) var unsupported_type = 'invalidType'; assert_false(MediaSource.isTypeSupported(unsupported_type), unsupported_type + " is not expected to be supported."); - assert_throws("NotSupportedError", function() + assert_throws_dom("NotSupportedError", function() { sourceBuffer.changeType(unsupported_type); }, "changeType"); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-closed.html b/tests/wpt/web-platform-tests/media-source/mediasource-closed.html index 4b22cae8544..79d522f2f9a 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-closed.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-closed.html @@ -22,7 +22,7 @@ test(function () { var mediaSource = new MediaSource(); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { mediaSource.addSourceBuffer(MediaSourceUtil.VIDEO_ONLY_TYPE); }, "addSourceBuffer() throws an exception when closed."); }, "Test addSourceBuffer() while closed."); @@ -37,7 +37,7 @@ assert_equals(mediaSource.sourceBuffers.length, 0, "sourceBuffers is empty"); assert_equals(mediaSource.activeSourceBuffers.length, 0, "activeSourceBuffers is empty"); assert_equals(mediaSource.readyState, "closed", "readyState is 'closed'"); - assert_throws("NotFoundError", + assert_throws_dom("NotFoundError", function() { mediaSource.removeSourceBuffer(sourceBuffer); }, "removeSourceBuffer() throws an exception when closed."); test.done(); @@ -50,7 +50,7 @@ test(function () { var mediaSource = new MediaSource(); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { mediaSource.endOfStream(); }, "endOfStream() throws an exception when closed."); }, "Test endOfStream() while closed."); @@ -58,7 +58,7 @@ test(function () { var mediaSource = new MediaSource(); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { mediaSource.endOfStream("decode"); }, "endOfStream(decode) throws an exception when closed."); }, "Test endOfStream(decode) while closed."); @@ -66,7 +66,7 @@ test(function () { var mediaSource = new MediaSource(); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { mediaSource.endOfStream("network"); }, "endOfStream(network) throws an exception when closed."); }, "Test endOfStream(network) while closed."); @@ -74,7 +74,7 @@ test(function () { var mediaSource = new MediaSource(); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { mediaSource.duration = 10; }, "Setting duration throws an exception when closed."); }, "Test setting duration while closed."); @@ -88,7 +88,7 @@ mediaSource.addEventListener("sourceclose", test.step_func(function (event) { assert_equals(mediaSource.readyState, "closed", "readyState is 'closed'"); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { mediaSource.duration = 10; }, "Setting duration when closed throws an exception"); test.done(); @@ -125,7 +125,7 @@ mediaSource.addEventListener("sourceclose", test.step_func(function (event) { assert_equals(mediaSource.readyState, "closed", "readyState is closed"); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { sourceBuffer.abort(); }, "sourceBuffer.abort() throws INVALID_STATE_ERROR"); test.done(); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-duration.html b/tests/wpt/web-platform-tests/media-source/mediasource-duration.html index 4bc0fb2d74c..b4619da38b9 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-duration.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-duration.html @@ -265,7 +265,7 @@ { assert_false(sourceBuffer.updating, "updating"); - assert_throws("InvalidStateError", function() + assert_throws_dom("InvalidStateError", function() { mediaSource.duration = newDuration; }, "duration"); @@ -301,7 +301,7 @@ assert_equals(sourceBufferVideo.buffered.length, 1); assert_less_than(sourceBufferAudio.buffered.start(0), newDuration); assert_greater_than(sourceBufferVideo.buffered.start(0), newDuration); - assert_throws("InvalidStateError", function () { mediaSource.duration = newDuration; }); + assert_throws_dom("InvalidStateError", function () { mediaSource.duration = newDuration; }); test.done(); }); }); @@ -345,7 +345,7 @@ // Verify the expected error // We assume relocated test video has at least one coded // frame presentation interval which fits in [>2.0,>2.5) - assert_throws("InvalidStateError", function () { mediaSource.duration = newDuration; }); + assert_throws_dom("InvalidStateError", function () { mediaSource.duration = newDuration; }); test.done(); }); }); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-endofstream-invaliderror.html b/tests/wpt/web-platform-tests/media-source/mediasource-endofstream-invaliderror.html index 0327e44cc0d..20a118d7171 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-endofstream-invaliderror.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-endofstream-invaliderror.html @@ -15,7 +15,7 @@ mediaElement.addEventListener('error', test.unreached_func("Unexpected event 'error'")); assert_equals(mediaSource.readyState, 'open'); - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { mediaSource.endOfStream('garbage'); }, 'endOfStream(\'garbage\') throws TypeError'); @@ -28,7 +28,7 @@ mediaElement.addEventListener('error', test.unreached_func("Unexpected event 'error'")); assert_equals(mediaSource.readyState, 'open'); - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { mediaSource.endOfStream(''); }, 'endOfStream(\'\') throws TypeError'); @@ -41,7 +41,7 @@ mediaElement.addEventListener('error', test.unreached_func("Unexpected event 'error'")); assert_equals(mediaSource.readyState, 'open'); - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { mediaSource.endOfStream(null); }, 'endOfStream(null) throws TypeError'); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-liveseekable.html b/tests/wpt/web-platform-tests/media-source/mediasource-liveseekable.html index 3e79a114026..123a41e9e54 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-liveseekable.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-liveseekable.html @@ -10,7 +10,7 @@ test(function(test) { var mediaSource = new MediaSource(); assert_equals(mediaSource.readyState, "closed", "media source is closed."); - assert_throws("InvalidStateError", function() { mediaSource.setLiveSeekableRange(0, 1); }); + assert_throws_dom("InvalidStateError", function() { mediaSource.setLiveSeekableRange(0, 1); }); }, "setLiveSeekableRange throws an InvalidStateError exception if the readyState attribute is not 'open'"); @@ -18,7 +18,7 @@ test(function(test) { var mediaSource = new MediaSource(); assert_equals(mediaSource.readyState, "closed", "media source is closed."); - assert_throws("InvalidStateError", function() { mediaSource.clearLiveSeekableRange(); }); + assert_throws_dom("InvalidStateError", function() { mediaSource.clearLiveSeekableRange(); }); }, "clearLiveSeekableRange throws an InvalidStateError exception if the readyState attribute is not 'open'"); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-remove.html b/tests/wpt/web-platform-tests/media-source/mediasource-remove.html index 454178709f9..6fea5a3e2e5 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-remove.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-remove.html @@ -106,7 +106,7 @@ mediaSource.removeSourceBuffer(sourceBuffer); - assert_throws("InvalidStateError", function() + assert_throws_dom("InvalidStateError", function() { sourceBuffer.remove(1, 2); }, "remove"); @@ -142,7 +142,7 @@ assert_true(sourceBuffer.updating, "updating"); - assert_throws("InvalidStateError", function() + assert_throws_dom("InvalidStateError", function() { sourceBuffer.remove(3, 4); }, "remove"); @@ -166,7 +166,7 @@ assert_true(sourceBuffer.updating, "updating"); - assert_throws("InvalidStateError", function() + assert_throws_dom("InvalidStateError", function() { sourceBuffer.abort(); }, "abort"); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-removesourcebuffer.html b/tests/wpt/web-platform-tests/media-source/mediasource-removesourcebuffer.html index 0388565329f..30ec930cbed 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-removesourcebuffer.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-removesourcebuffer.html @@ -27,7 +27,7 @@ mediasource_test(function(test, mediaElement, mediaSource) { - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { mediaSource.removeSourceBuffer(null); }, "removeSourceBuffer() threw an exception when passed null."); test.done(); @@ -40,7 +40,7 @@ mediaSource.removeSourceBuffer(sourceBuffer); - assert_throws("NotFoundError", + assert_throws_dom("NotFoundError", function() { mediaSource.removeSourceBuffer(sourceBuffer); }, "removeSourceBuffer() threw an exception for a SourceBuffer that was already removed."); @@ -70,10 +70,10 @@ assert_not_equals(sourceBuffer1, sourceBuffer2, "SourceBuffers are different instances"); assert_equals(mediaSource1.sourceBuffers[0], sourceBuffer1); assert_equals(mediaSource2.sourceBuffers[0], sourceBuffer2); - assert_throws("NotFoundError", + assert_throws_dom("NotFoundError", function() { mediaSource1.removeSourceBuffer(sourceBuffer2); }, "MediaSource1.removeSourceBuffer() threw an exception for SourceBuffer2"); - assert_throws("NotFoundError", + assert_throws_dom("NotFoundError", function() { mediaSource2.removeSourceBuffer(sourceBuffer1); }, "MediaSource2.removeSourceBuffer() threw an exception for SourceBuffer1"); mediaSource1.removeSourceBuffer(sourceBuffer1); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-sourcebuffer-mode-timestamps.html b/tests/wpt/web-platform-tests/media-source/mediasource-sourcebuffer-mode-timestamps.html index c5816968b07..c62e5421622 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-sourcebuffer-mode-timestamps.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-sourcebuffer-mode-timestamps.html @@ -32,7 +32,7 @@ function mediaTest(mime) { mediaSource.addEventListener('sourceopen', t.step_func_done(function(e) { var sourceBuffer = mediaSource.addSourceBuffer(mime); assert_equals(sourceBuffer.updating, false, "SourceBuffer.updating is false"); - assert_throws({name: 'TypeError'}, + assert_throws_js(TypeError, function() { sourceBuffer.mode = "segments"; }, diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-sourcebuffer-mode.html b/tests/wpt/web-platform-tests/media-source/mediasource-sourcebuffer-mode.html index 521fa7f92af..2d84fa9753c 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-sourcebuffer-mode.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-sourcebuffer-mode.html @@ -37,7 +37,7 @@ mediasource_testafterdataloaded(function(test, mediaElement, mediaSource, segmentInfo, sourceBuffer, mediaData) { mediaSource.removeSourceBuffer(sourceBuffer); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', function() { sourceBuffer.mode = 'segments'; }, 'Setting valid sourceBuffer.mode on removed SourceBuffer should throw InvalidStateError.'); test.done(); @@ -47,7 +47,7 @@ { sourceBuffer.appendBuffer(mediaData); assert_true(sourceBuffer.updating, 'updating attribute is true'); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', function() { sourceBuffer.mode = 'segments'; }, 'Setting valid sourceBuffer.mode on updating SourceBuffer threw InvalidStateError.'); test.done(); @@ -114,11 +114,11 @@ { assert_false(sourceBuffer.updating, 'updating attribute is false'); assert_equals(sourceBuffer.mode, 'segments'); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', function() { sourceBuffer.mode = 'segments'; }, 'Setting valid sourceBuffer.mode while still parsing media segment threw InvalidStateError.'); assert_equals(sourceBuffer.timestampOffset, 10.123456789); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', function() { sourceBuffer.timestampOffset = 20.0; }, 'Setting valid sourceBuffer.timestampOffset while still parsing media segment threw InvalidStateError.'); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-sourcebuffer-trackdefaults.html b/tests/wpt/web-platform-tests/media-source/mediasource-sourcebuffer-trackdefaults.html index 0eb9d2643af..905d1d0d0ee 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-sourcebuffer-trackdefaults.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-sourcebuffer-trackdefaults.html @@ -43,7 +43,7 @@ sourceBufferTrackDefaultsTest(function(test, mediaElement, mediaSource, sourceBuffer) { mediaSource.removeSourceBuffer(sourceBuffer); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { sourceBuffer.trackDefaults = new TrackDefaultList([]); }, "Exception thrown when setting trackDefaults on SourceBuffer that is removed from MediaSource"); test.done(); @@ -56,7 +56,7 @@ sourceBuffer.appendBuffer(mediaData); assert_true(sourceBuffer.updating, "SourceBuffer is updating"); - assert_throws("InvalidStateError", + assert_throws_dom("InvalidStateError", function() { sourceBuffer.trackDefaults = new TrackDefaultList([]); }, "Exception thrown when setting trackDefaults on SourceBuffer that is updating"); @@ -70,7 +70,7 @@ sourceBufferTrackDefaultsTest(function(test, mediaElement, mediaSource, sourceBuffer) { - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { sourceBuffer.trackDefaults = null; }, "null should be disallowed by trackDefaults setter"); test.done(); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-timestamp-offset.html b/tests/wpt/web-platform-tests/media-source/mediasource-timestamp-offset.html index 22e42928683..05495b71920 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-timestamp-offset.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-timestamp-offset.html @@ -21,7 +21,7 @@ "Initial timestampOffset of a SourceBuffer is 0"); if (expected == "TypeError") { - assert_throws({name: "TypeError"}, + assert_throws_js(TypeError, function() { sourceBuffer.timestampOffset = value; }, "setting timestampOffset to " + description + " throws an exception."); } else { @@ -113,7 +113,7 @@ assert_true(mediaSource.sourceBuffers.length == 0, "MediaSource.sourceBuffers is empty"); assert_true(mediaSource.activeSourceBuffers.length == 0, "MediaSource.activesourceBuffers is empty"); - assert_throws("InvalidStateError", function() + assert_throws_dom("InvalidStateError", function() { sourceBuffer.timestampOffset = 10; }); diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-trackdefault.html b/tests/wpt/web-platform-tests/media-source/mediasource-trackdefault.html index 5fc2e5e97d6..e6c9e76ef91 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-trackdefault.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-trackdefault.html @@ -16,7 +16,7 @@ function checkConstructionFails(type, language, label, kinds, byteStreamTrackID) { - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { new TrackDefault(type, language, label, kinds, byteStreamTrackID); }, "TrackDefault construction threw an exception"); } diff --git a/tests/wpt/web-platform-tests/media-source/mediasource-trackdefaultlist.html b/tests/wpt/web-platform-tests/media-source/mediasource-trackdefaultlist.html index cceda8be460..940260cfd29 100644 --- a/tests/wpt/web-platform-tests/media-source/mediasource-trackdefaultlist.html +++ b/tests/wpt/web-platform-tests/media-source/mediasource-trackdefaultlist.html @@ -32,7 +32,7 @@ trackDefaults[4] = new TrackDefault("audio", "en-US", "label", ["main"], ""); assert_equals(trackDefaults[0].type, trackDefaults[4].type, "same-type conflict setup"); assert_equals(trackDefaults[0].byteStreamTrackID, trackDefaults[4].byteStreamTrackID, "same-byteStreamTrackID conflict setup"); - assert_throws("InvalidAccessError", + assert_throws_dom("InvalidAccessError", function() { new TrackDefaultList(trackDefaults); }, "TrackDefaultList construction should throw exception due to same type and byteStreamTrackID across at least 2 items in trackDefaults"); @@ -40,7 +40,7 @@ trackDefaults[4] = new TrackDefault("video", "en-US", "label", ["main"], "1"); assert_equals(trackDefaults[4].type, trackDefaults[5].type, "same-type conflict setup"); assert_equals(trackDefaults[4].byteStreamTrackID, trackDefaults[5].byteStreamTrackID, "same-byteStreamTrackID conflict setup"); - assert_throws("InvalidAccessError", + assert_throws_dom("InvalidAccessError", function() { new TrackDefaultList(trackDefaults); }, "TrackDefaultList construction should throw exception due to same type and byteStreamTrackID across at least 2 items in trackDefaults"); diff --git a/tests/wpt/web-platform-tests/mediacapture-image/ImageCapture-creation.https.html b/tests/wpt/web-platform-tests/mediacapture-image/ImageCapture-creation.https.html index 387dceee37a..e53915608f0 100644 --- a/tests/wpt/web-platform-tests/mediacapture-image/ImageCapture-creation.https.html +++ b/tests/wpt/web-platform-tests/mediacapture-image/ImageCapture-creation.https.html @@ -61,7 +61,7 @@ var testAudio = async_test(function() { this.step_func(function(stream) { assert_equals(stream.getAudioTracks().length, 1); assert_equals(stream.getVideoTracks().length, 0); - assert_throws("NotSupportedError", + assert_throws_dom("NotSupportedError", function() { var capturer = new ImageCapture(stream.getAudioTracks()[0]); }, @@ -82,11 +82,11 @@ var testParameter = test(function() { "", true ]; - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { var capturer = new ImageCapture(); }, 'an ImageCapturer can not be created with no parameter'); invalidParameters.map(parameter => { - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { var capturer = new ImageCapture(parameter); }, `an ImageCapturer can not be created with a ${parameter} parameter`); }); diff --git a/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-error.html b/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-error.html index 7852ee3a7c1..4daf2d9cd1a 100644 --- a/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-error.html +++ b/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-error.html @@ -76,7 +76,7 @@ let recorder = new MediaRecorder(video); recorder.start(); assert_equals(recorder.state, "recording", "MediaRecorder has been started successfully"); - assert_throws("InvalidStateError", function() { + assert_throws_dom("InvalidStateError", function() { recorder.start(); }); }, "MediaRecorder cannot start recording when MediaRecorder' state is not inactive and an InvalidStateError should be thrown"); diff --git a/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-events-and-exceptions.html b/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-events-and-exceptions.html index cddc07e5079..5dca350dd27 100644 --- a/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-events-and-exceptions.html +++ b/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-events-and-exceptions.html @@ -45,11 +45,11 @@ recorder.onstop = recorderOnUnexpectedEvent; recorder.stop(); assert_equals(recorder.state, "inactive", "stop() is idempotent"); - assert_throws("InvalidStateError", function() { recorder.pause() }, + assert_throws_dom("InvalidStateError", function() { recorder.pause() }, "recorder cannot be pause()ed in |inactive| state"); - assert_throws("InvalidStateError", function() { recorder.resume() }, + assert_throws_dom("InvalidStateError", function() { recorder.resume() }, "recorder cannot be resume()d in |inactive| state"); - assert_throws("InvalidStateError", function() { recorder.requestData() }, + assert_throws_dom("InvalidStateError", function() { recorder.requestData() }, "cannot requestData() if recorder is in |inactive| state"); test.done(); }); @@ -80,7 +80,7 @@ assert_equals(stream.getVideoTracks().length, 1); assert_equals(stream.getVideoTracks()[0].readyState, 'live'); - assert_throws("NotSupportedError", + assert_throws_dom("NotSupportedError", function() { recorder = new MediaRecorder( new MediaStream(), {mimeType : "video/invalid"}); @@ -91,14 +91,14 @@ recorder.stop(); assert_equals(recorder.state, "inactive", "stop() is idempotent"); - assert_throws("InvalidStateError", function(){recorder.pause()}, + assert_throws_dom("InvalidStateError", function(){recorder.pause()}, "recorder cannot be pause()ed in |inactive| state"); - assert_throws("InvalidStateError", function(){recorder.resume()}, + assert_throws_dom("InvalidStateError", function(){recorder.resume()}, "recorder cannot be resume()d in |inactive| state"); - assert_throws("InvalidStateError", function(){recorder.requestData()}, + assert_throws_dom("InvalidStateError", function(){recorder.requestData()}, "cannot requestData() if recorder is in |inactive| state"); - assert_throws("NotSupportedError", + assert_throws_dom("NotSupportedError", function() { recorder.start(); }, diff --git a/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-mimetype.html b/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-mimetype.html index 06841aea9e6..8b98977dda2 100644 --- a/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-mimetype.html +++ b/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-mimetype.html @@ -64,7 +64,7 @@ test(t => { }, "MediaRecorder sets no default mimeType in the constructor for audio/video"); test(t => { - assert_throws("NotSupportedError", + assert_throws_dom("NotSupportedError", () => new MediaRecorder(new MediaStream(), {mimeType: "audio/banana"})); }, "MediaRecorder invalid audio mimeType throws"); @@ -73,7 +73,7 @@ test(t => { }, "MediaRecorder invalid audio mimeType is unsupported"); test(t => { - assert_throws("NotSupportedError", + assert_throws_dom("NotSupportedError", () => new MediaRecorder(new MediaStream(), {mimeType: "video/pineapple"})); }, "MediaRecorder invalid video mimeType throws"); @@ -108,7 +108,7 @@ for (const mimeType of [ }, `Supported mimeType ${mimeType} is set immediately after constructing`); } else { test(t => { - assert_throws("NotSupportedError", + assert_throws_dom("NotSupportedError", () => new MediaRecorder(new MediaStream(), {mimeType})); }, `Unsupported mimeType ${mimeType} throws`); } diff --git a/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-stop.html b/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-stop.html index bda5d871d04..bb39b027f0f 100644 --- a/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-stop.html +++ b/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-stop.html @@ -83,7 +83,7 @@ promise_test(async t => { const recorder = new MediaRecorder(createVideoStream()); - assert_throws("InvalidStateError", () => { recorder.stop(); }); + assert_throws_dom("InvalidStateError", () => { recorder.stop(); }); await Promise.race([ new Promise((_, reject) => recorder.onstop = _ => reject(new Error("onstop should never have been called"))), @@ -95,7 +95,7 @@ recorder.start(); recorder.stop(); let event = await new Promise(r => recorder.onstop = r); - assert_throws("InvalidStateError", () => { recorder.stop(); }); + assert_throws_dom("InvalidStateError", () => { recorder.stop(); }); await Promise.race([ new Promise((_, reject) => recorder.onstop = _ => reject(new Error("onstop should never have been called"))), @@ -108,7 +108,7 @@ recorder.start(); stream.getVideoTracks()[0].stop(); let event = await new Promise(r => recorder.onstop = r); - assert_throws("InvalidStateError", () => { recorder.stop(); }); + assert_throws_dom("InvalidStateError", () => { recorder.stop(); }); await Promise.race([ new Promise((_, reject) => recorder.onstop = _ => reject(new Error("onstop should never have been called"))), diff --git a/tests/wpt/web-platform-tests/mediacapture-streams/historical.https.html b/tests/wpt/web-platform-tests/mediacapture-streams/historical.https.html index 9437c51552a..84326cec0a6 100644 --- a/tests/wpt/web-platform-tests/mediacapture-streams/historical.https.html +++ b/tests/wpt/web-platform-tests/mediacapture-streams/historical.https.html @@ -18,7 +18,7 @@ test(function() { test(() => { const mediaStream = new MediaStream(); - assert_throws(new TypeError(), () => URL.createObjectURL(mediaStream)); + assert_throws_js(TypeError, () => URL.createObjectURL(mediaStream)); }, "Passing MediaStream to URL.createObjectURL() should throw"); test(() => { diff --git a/tests/wpt/web-platform-tests/mediasession/mediametadata.html b/tests/wpt/web-platform-tests/mediasession/mediametadata.html index 11f6a5f9767..ff00e54ee7c 100644 --- a/tests/wpt/web-platform-tests/mediasession/mediametadata.html +++ b/tests/wpt/web-platform-tests/mediasession/mediametadata.html @@ -38,8 +38,8 @@ test(function() { var metadata = new MediaMetadata({}); assert_not_equals(metadata, null); - assert_throws(new TypeError(), _ => new MediaMetadata('foobar')); - assert_throws(new TypeError(), _ => new MediaMetadata(42)); + assert_throws_js(TypeError, _ => new MediaMetadata('foobar')); + assert_throws_js(TypeError, _ => new MediaMetadata(42)); }, 'Test that MediaMetadata is constructed using a dictionary'); test(function() { @@ -113,7 +113,7 @@ test(function() { test(function() { var metadata = new MediaMetadata({ artwork: [ { src: 'http://foo.com/' } ] }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { metadata.artwork.push({ src: 'http://example.com/', sizes: '40x40', type: 'image/png', }); @@ -163,14 +163,14 @@ test(function() { test(function() { var metadata = 42; - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { metadata new MediaMetadata({ artwork: [ { src: 'http://[example.com]' }] }); }); assert_equals(metadata, 42); metadata = new MediaMetadata(); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { metadata.artwork = [ // Valid url. { src: 'http://example.com' }, @@ -189,12 +189,12 @@ test(function() { }, "Test MediaImage default values"); test(function() { - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { new MediaMetadata({ artwork: [ {} ] }); }); var metadata = new MediaMetadata(); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { metadata.artwork = [ { type: 'image/png', sizes: '40x40' } ]; }); }, "Test that MediaImage.src is required") diff --git a/tests/wpt/web-platform-tests/mimesniff/mime-types/parsing.any.js b/tests/wpt/web-platform-tests/mimesniff/mime-types/parsing.any.js index 640a46b9e98..ae396c4f095 100644 --- a/tests/wpt/web-platform-tests/mimesniff/mime-types/parsing.any.js +++ b/tests/wpt/web-platform-tests/mimesniff/mime-types/parsing.any.js @@ -34,8 +34,8 @@ function runTests(tests) { promise_test(() => { const compatibleNess = isByteCompatible(val.input); if(compatibleNess === "incompatible" || compatibleNess === "header-value-incompatible") { - assert_throws(new TypeError(), () => new Request("about:blank", { headers: [["Content-Type", val.input]] })); - assert_throws(new TypeError(), () => new Response(null, { headers: [["Content-Type", val.input]] })); + assert_throws_js(TypeError, () => new Request("about:blank", { headers: [["Content-Type", val.input]] })); + assert_throws_js(TypeError, () => new Response(null, { headers: [["Content-Type", val.input]] })); return Promise.resolve(); } else { return Promise.all([ diff --git a/tests/wpt/web-platform-tests/native-file-system/native_FileSystemBaseHandle-postMessage-MessagePort-manual.https.tentative.html b/tests/wpt/web-platform-tests/native-file-system/native_FileSystemBaseHandle-postMessage-MessagePort-manual.https.tentative.html index 4b575766881..c78b766dab9 100644 --- a/tests/wpt/web-platform-tests/native-file-system/native_FileSystemBaseHandle-postMessage-MessagePort-manual.https.tentative.html +++ b/tests/wpt/web-platform-tests/native-file-system/native_FileSystemBaseHandle-postMessage-MessagePort-manual.https.tentative.html @@ -1,5 +1,6 @@ <!doctype html> <meta charset=utf-8> +<meta name="timeout" content="long"> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> diff --git a/tests/wpt/web-platform-tests/native-file-system/sandboxed_FileSystemBaseHandle-postMessage-MessagePort.tentative.https.window.js b/tests/wpt/web-platform-tests/native-file-system/sandboxed_FileSystemBaseHandle-postMessage-MessagePort.tentative.https.window.js index 043c6b39262..e64e6446399 100644 --- a/tests/wpt/web-platform-tests/native-file-system/sandboxed_FileSystemBaseHandle-postMessage-MessagePort.tentative.https.window.js +++ b/tests/wpt/web-platform-tests/native-file-system/sandboxed_FileSystemBaseHandle-postMessage-MessagePort.tentative.https.window.js @@ -4,4 +4,5 @@ // META: script=resources/messaging-helpers.js // META: script=resources/messaging-blob-helpers.js // META: script=resources/messaging-serialize-helpers.js -// META: script=script-tests/FileSystemBaseHandle-postMessage-MessagePort.js \ No newline at end of file +// META: script=script-tests/FileSystemBaseHandle-postMessage-MessagePort.js +// META: timeout=long diff --git a/tests/wpt/web-platform-tests/notifications/constructor-invalid.html b/tests/wpt/web-platform-tests/notifications/constructor-invalid.html index 88df165e169..1995ccc4f5f 100644 --- a/tests/wpt/web-platform-tests/notifications/constructor-invalid.html +++ b/tests/wpt/web-platform-tests/notifications/constructor-invalid.html @@ -12,7 +12,7 @@ test(function() { this.set_status(this.NOTRUN, "You must allow notifications for this" + " origin before running this test.") } - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { new Notification() }) }, "Called the notification constructor with no arguments.") diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/conformance-requirements/2d.missingargs.html b/tests/wpt/web-platform-tests/offscreen-canvas/conformance-requirements/2d.missingargs.html index 4c810495c8f..77d35fdbf4e 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/conformance-requirements/2d.missingargs.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/conformance-requirements/2d.missingargs.html @@ -20,102 +20,102 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.scale(); }); -assert_throws(new TypeError(), function() { ctx.scale(1); }); -assert_throws(new TypeError(), function() { ctx.rotate(); }); -assert_throws(new TypeError(), function() { ctx.translate(); }); -assert_throws(new TypeError(), function() { ctx.translate(0); }); +assert_throws_js(TypeError, function() { ctx.scale(); }); +assert_throws_js(TypeError, function() { ctx.scale(1); }); +assert_throws_js(TypeError, function() { ctx.rotate(); }); +assert_throws_js(TypeError, function() { ctx.translate(); }); +assert_throws_js(TypeError, function() { ctx.translate(0); }); if (ctx.transform) { // (avoid spurious failures, since the aim here is not to test that all features are supported) - assert_throws(new TypeError(), function() { ctx.transform(); }); - assert_throws(new TypeError(), function() { ctx.transform(1); }); - assert_throws(new TypeError(), function() { ctx.transform(1, 0); }); - assert_throws(new TypeError(), function() { ctx.transform(1, 0, 0); }); - assert_throws(new TypeError(), function() { ctx.transform(1, 0, 0, 1); }); - assert_throws(new TypeError(), function() { ctx.transform(1, 0, 0, 1, 0); }); + assert_throws_js(TypeError, function() { ctx.transform(); }); + assert_throws_js(TypeError, function() { ctx.transform(1); }); + assert_throws_js(TypeError, function() { ctx.transform(1, 0); }); + assert_throws_js(TypeError, function() { ctx.transform(1, 0, 0); }); + assert_throws_js(TypeError, function() { ctx.transform(1, 0, 0, 1); }); + assert_throws_js(TypeError, function() { ctx.transform(1, 0, 0, 1, 0); }); } if (ctx.setTransform) { - assert_throws(new TypeError(), function() { ctx.setTransform(1); }); - assert_throws(new TypeError(), function() { ctx.setTransform(1, 0); }); - assert_throws(new TypeError(), function() { ctx.setTransform(1, 0, 0); }); - assert_throws(new TypeError(), function() { ctx.setTransform(1, 0, 0, 1); }); - assert_throws(new TypeError(), function() { ctx.setTransform(1, 0, 0, 1, 0); }); + assert_throws_js(TypeError, function() { ctx.setTransform(1); }); + assert_throws_js(TypeError, function() { ctx.setTransform(1, 0); }); + assert_throws_js(TypeError, function() { ctx.setTransform(1, 0, 0); }); + assert_throws_js(TypeError, function() { ctx.setTransform(1, 0, 0, 1); }); + assert_throws_js(TypeError, function() { ctx.setTransform(1, 0, 0, 1, 0); }); } -assert_throws(new TypeError(), function() { ctx.createLinearGradient(); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.createPattern(offscreenCanvas); }); -assert_throws(new TypeError(), function() { ctx.clearRect(); }); -assert_throws(new TypeError(), function() { ctx.clearRect(0); }); -assert_throws(new TypeError(), function() { ctx.clearRect(0, 0); }); -assert_throws(new TypeError(), function() { ctx.clearRect(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.fillRect(); }); -assert_throws(new TypeError(), function() { ctx.fillRect(0); }); -assert_throws(new TypeError(), function() { ctx.fillRect(0, 0); }); -assert_throws(new TypeError(), function() { ctx.fillRect(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.strokeRect(); }); -assert_throws(new TypeError(), function() { ctx.strokeRect(0); }); -assert_throws(new TypeError(), function() { ctx.strokeRect(0, 0); }); -assert_throws(new TypeError(), function() { ctx.strokeRect(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.moveTo(); }); -assert_throws(new TypeError(), function() { ctx.moveTo(0); }); -assert_throws(new TypeError(), function() { ctx.lineTo(); }); -assert_throws(new TypeError(), function() { ctx.lineTo(0); }); -assert_throws(new TypeError(), function() { ctx.quadraticCurveTo(); }); -assert_throws(new TypeError(), function() { ctx.quadraticCurveTo(0); }); -assert_throws(new TypeError(), function() { ctx.quadraticCurveTo(0, 0); }); -assert_throws(new TypeError(), function() { ctx.quadraticCurveTo(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.bezierCurveTo(); }); -assert_throws(new TypeError(), function() { ctx.bezierCurveTo(0); }); -assert_throws(new TypeError(), function() { ctx.bezierCurveTo(0, 0); }); -assert_throws(new TypeError(), function() { ctx.bezierCurveTo(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.bezierCurveTo(0, 0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.bezierCurveTo(0, 0, 0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.arcTo(); }); -assert_throws(new TypeError(), function() { ctx.arcTo(0); }); -assert_throws(new TypeError(), function() { ctx.arcTo(0, 0); }); -assert_throws(new TypeError(), function() { ctx.arcTo(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.arcTo(0, 0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.rect(); }); -assert_throws(new TypeError(), function() { ctx.rect(0); }); -assert_throws(new TypeError(), function() { ctx.rect(0, 0); }); -assert_throws(new TypeError(), function() { ctx.rect(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.arc(); }); -assert_throws(new TypeError(), function() { ctx.arc(0); }); -assert_throws(new TypeError(), function() { ctx.arc(0, 0); }); -assert_throws(new TypeError(), function() { ctx.arc(0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.arc(0, 0, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.drawImage(); }); -assert_throws(new TypeError(), function() { ctx.drawImage(offscreenCanvas); }); -assert_throws(new TypeError(), function() { ctx.drawImage(offscreenCanvas, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.createPattern(offscreenCanvas); }); +assert_throws_js(TypeError, function() { ctx.clearRect(); }); +assert_throws_js(TypeError, function() { ctx.clearRect(0); }); +assert_throws_js(TypeError, function() { ctx.clearRect(0, 0); }); +assert_throws_js(TypeError, function() { ctx.clearRect(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.fillRect(); }); +assert_throws_js(TypeError, function() { ctx.fillRect(0); }); +assert_throws_js(TypeError, function() { ctx.fillRect(0, 0); }); +assert_throws_js(TypeError, function() { ctx.fillRect(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.strokeRect(); }); +assert_throws_js(TypeError, function() { ctx.strokeRect(0); }); +assert_throws_js(TypeError, function() { ctx.strokeRect(0, 0); }); +assert_throws_js(TypeError, function() { ctx.strokeRect(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.moveTo(); }); +assert_throws_js(TypeError, function() { ctx.moveTo(0); }); +assert_throws_js(TypeError, function() { ctx.lineTo(); }); +assert_throws_js(TypeError, function() { ctx.lineTo(0); }); +assert_throws_js(TypeError, function() { ctx.quadraticCurveTo(); }); +assert_throws_js(TypeError, function() { ctx.quadraticCurveTo(0); }); +assert_throws_js(TypeError, function() { ctx.quadraticCurveTo(0, 0); }); +assert_throws_js(TypeError, function() { ctx.quadraticCurveTo(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.bezierCurveTo(); }); +assert_throws_js(TypeError, function() { ctx.bezierCurveTo(0); }); +assert_throws_js(TypeError, function() { ctx.bezierCurveTo(0, 0); }); +assert_throws_js(TypeError, function() { ctx.bezierCurveTo(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.bezierCurveTo(0, 0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.bezierCurveTo(0, 0, 0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.arcTo(); }); +assert_throws_js(TypeError, function() { ctx.arcTo(0); }); +assert_throws_js(TypeError, function() { ctx.arcTo(0, 0); }); +assert_throws_js(TypeError, function() { ctx.arcTo(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.arcTo(0, 0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.rect(); }); +assert_throws_js(TypeError, function() { ctx.rect(0); }); +assert_throws_js(TypeError, function() { ctx.rect(0, 0); }); +assert_throws_js(TypeError, function() { ctx.rect(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.arc(); }); +assert_throws_js(TypeError, function() { ctx.arc(0); }); +assert_throws_js(TypeError, function() { ctx.arc(0, 0); }); +assert_throws_js(TypeError, function() { ctx.arc(0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.arc(0, 0, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.drawImage(); }); +assert_throws_js(TypeError, function() { ctx.drawImage(offscreenCanvas); }); +assert_throws_js(TypeError, function() { ctx.drawImage(offscreenCanvas, 0); }); // TODO: n >= 3 args on drawImage could be either a valid overload, // or too few for another overload, or too many for another // overload - what should happen? if (ctx.createImageData) { - assert_throws(new TypeError(), function() { ctx.createImageData(); }); - assert_throws(new TypeError(), function() { ctx.createImageData(1); }); + assert_throws_js(TypeError, function() { ctx.createImageData(); }); + assert_throws_js(TypeError, function() { ctx.createImageData(1); }); } if (ctx.getImageData) { - assert_throws(new TypeError(), function() { ctx.getImageData(); }); - assert_throws(new TypeError(), function() { ctx.getImageData(0); }); - assert_throws(new TypeError(), function() { ctx.getImageData(0, 0); }); - assert_throws(new TypeError(), function() { ctx.getImageData(0, 0, 1); }); + assert_throws_js(TypeError, function() { ctx.getImageData(); }); + assert_throws_js(TypeError, function() { ctx.getImageData(0); }); + assert_throws_js(TypeError, function() { ctx.getImageData(0, 0); }); + assert_throws_js(TypeError, function() { ctx.getImageData(0, 0, 1); }); } if (ctx.putImageData) { var imgdata = ctx.getImageData(0, 0, 1, 1); - assert_throws(new TypeError(), function() { ctx.putImageData(); }); - assert_throws(new TypeError(), function() { ctx.putImageData(imgdata); }); - assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 0); }); + assert_throws_js(TypeError, function() { ctx.putImageData(); }); + assert_throws_js(TypeError, function() { ctx.putImageData(imgdata); }); + assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 0); }); } var g = ctx.createLinearGradient(0, 0, 0, 0); -assert_throws(new TypeError(), function() { g.addColorStop(); }); -assert_throws(new TypeError(), function() { g.addColorStop(0); }); +assert_throws_js(TypeError, function() { g.addColorStop(); }); +assert_throws_js(TypeError, function() { g.addColorStop(0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/conformance-requirements/2d.missingargs.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/conformance-requirements/2d.missingargs.worker.js index b8bc127b877..0fc7c4d2bb5 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/conformance-requirements/2d.missingargs.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/conformance-requirements/2d.missingargs.worker.js @@ -16,102 +16,102 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.scale(); }); -assert_throws(new TypeError(), function() { ctx.scale(1); }); -assert_throws(new TypeError(), function() { ctx.rotate(); }); -assert_throws(new TypeError(), function() { ctx.translate(); }); -assert_throws(new TypeError(), function() { ctx.translate(0); }); +assert_throws_js(TypeError, function() { ctx.scale(); }); +assert_throws_js(TypeError, function() { ctx.scale(1); }); +assert_throws_js(TypeError, function() { ctx.rotate(); }); +assert_throws_js(TypeError, function() { ctx.translate(); }); +assert_throws_js(TypeError, function() { ctx.translate(0); }); if (ctx.transform) { // (avoid spurious failures, since the aim here is not to test that all features are supported) - assert_throws(new TypeError(), function() { ctx.transform(); }); - assert_throws(new TypeError(), function() { ctx.transform(1); }); - assert_throws(new TypeError(), function() { ctx.transform(1, 0); }); - assert_throws(new TypeError(), function() { ctx.transform(1, 0, 0); }); - assert_throws(new TypeError(), function() { ctx.transform(1, 0, 0, 1); }); - assert_throws(new TypeError(), function() { ctx.transform(1, 0, 0, 1, 0); }); + assert_throws_js(TypeError, function() { ctx.transform(); }); + assert_throws_js(TypeError, function() { ctx.transform(1); }); + assert_throws_js(TypeError, function() { ctx.transform(1, 0); }); + assert_throws_js(TypeError, function() { ctx.transform(1, 0, 0); }); + assert_throws_js(TypeError, function() { ctx.transform(1, 0, 0, 1); }); + assert_throws_js(TypeError, function() { ctx.transform(1, 0, 0, 1, 0); }); } if (ctx.setTransform) { - assert_throws(new TypeError(), function() { ctx.setTransform(1); }); - assert_throws(new TypeError(), function() { ctx.setTransform(1, 0); }); - assert_throws(new TypeError(), function() { ctx.setTransform(1, 0, 0); }); - assert_throws(new TypeError(), function() { ctx.setTransform(1, 0, 0, 1); }); - assert_throws(new TypeError(), function() { ctx.setTransform(1, 0, 0, 1, 0); }); + assert_throws_js(TypeError, function() { ctx.setTransform(1); }); + assert_throws_js(TypeError, function() { ctx.setTransform(1, 0); }); + assert_throws_js(TypeError, function() { ctx.setTransform(1, 0, 0); }); + assert_throws_js(TypeError, function() { ctx.setTransform(1, 0, 0, 1); }); + assert_throws_js(TypeError, function() { ctx.setTransform(1, 0, 0, 1, 0); }); } -assert_throws(new TypeError(), function() { ctx.createLinearGradient(); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.createPattern(offscreenCanvas); }); -assert_throws(new TypeError(), function() { ctx.clearRect(); }); -assert_throws(new TypeError(), function() { ctx.clearRect(0); }); -assert_throws(new TypeError(), function() { ctx.clearRect(0, 0); }); -assert_throws(new TypeError(), function() { ctx.clearRect(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.fillRect(); }); -assert_throws(new TypeError(), function() { ctx.fillRect(0); }); -assert_throws(new TypeError(), function() { ctx.fillRect(0, 0); }); -assert_throws(new TypeError(), function() { ctx.fillRect(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.strokeRect(); }); -assert_throws(new TypeError(), function() { ctx.strokeRect(0); }); -assert_throws(new TypeError(), function() { ctx.strokeRect(0, 0); }); -assert_throws(new TypeError(), function() { ctx.strokeRect(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.moveTo(); }); -assert_throws(new TypeError(), function() { ctx.moveTo(0); }); -assert_throws(new TypeError(), function() { ctx.lineTo(); }); -assert_throws(new TypeError(), function() { ctx.lineTo(0); }); -assert_throws(new TypeError(), function() { ctx.quadraticCurveTo(); }); -assert_throws(new TypeError(), function() { ctx.quadraticCurveTo(0); }); -assert_throws(new TypeError(), function() { ctx.quadraticCurveTo(0, 0); }); -assert_throws(new TypeError(), function() { ctx.quadraticCurveTo(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.bezierCurveTo(); }); -assert_throws(new TypeError(), function() { ctx.bezierCurveTo(0); }); -assert_throws(new TypeError(), function() { ctx.bezierCurveTo(0, 0); }); -assert_throws(new TypeError(), function() { ctx.bezierCurveTo(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.bezierCurveTo(0, 0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.bezierCurveTo(0, 0, 0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.arcTo(); }); -assert_throws(new TypeError(), function() { ctx.arcTo(0); }); -assert_throws(new TypeError(), function() { ctx.arcTo(0, 0); }); -assert_throws(new TypeError(), function() { ctx.arcTo(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.arcTo(0, 0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.rect(); }); -assert_throws(new TypeError(), function() { ctx.rect(0); }); -assert_throws(new TypeError(), function() { ctx.rect(0, 0); }); -assert_throws(new TypeError(), function() { ctx.rect(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.arc(); }); -assert_throws(new TypeError(), function() { ctx.arc(0); }); -assert_throws(new TypeError(), function() { ctx.arc(0, 0); }); -assert_throws(new TypeError(), function() { ctx.arc(0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.arc(0, 0, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.drawImage(); }); -assert_throws(new TypeError(), function() { ctx.drawImage(offscreenCanvas); }); -assert_throws(new TypeError(), function() { ctx.drawImage(offscreenCanvas, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.createPattern(offscreenCanvas); }); +assert_throws_js(TypeError, function() { ctx.clearRect(); }); +assert_throws_js(TypeError, function() { ctx.clearRect(0); }); +assert_throws_js(TypeError, function() { ctx.clearRect(0, 0); }); +assert_throws_js(TypeError, function() { ctx.clearRect(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.fillRect(); }); +assert_throws_js(TypeError, function() { ctx.fillRect(0); }); +assert_throws_js(TypeError, function() { ctx.fillRect(0, 0); }); +assert_throws_js(TypeError, function() { ctx.fillRect(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.strokeRect(); }); +assert_throws_js(TypeError, function() { ctx.strokeRect(0); }); +assert_throws_js(TypeError, function() { ctx.strokeRect(0, 0); }); +assert_throws_js(TypeError, function() { ctx.strokeRect(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.moveTo(); }); +assert_throws_js(TypeError, function() { ctx.moveTo(0); }); +assert_throws_js(TypeError, function() { ctx.lineTo(); }); +assert_throws_js(TypeError, function() { ctx.lineTo(0); }); +assert_throws_js(TypeError, function() { ctx.quadraticCurveTo(); }); +assert_throws_js(TypeError, function() { ctx.quadraticCurveTo(0); }); +assert_throws_js(TypeError, function() { ctx.quadraticCurveTo(0, 0); }); +assert_throws_js(TypeError, function() { ctx.quadraticCurveTo(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.bezierCurveTo(); }); +assert_throws_js(TypeError, function() { ctx.bezierCurveTo(0); }); +assert_throws_js(TypeError, function() { ctx.bezierCurveTo(0, 0); }); +assert_throws_js(TypeError, function() { ctx.bezierCurveTo(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.bezierCurveTo(0, 0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.bezierCurveTo(0, 0, 0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.arcTo(); }); +assert_throws_js(TypeError, function() { ctx.arcTo(0); }); +assert_throws_js(TypeError, function() { ctx.arcTo(0, 0); }); +assert_throws_js(TypeError, function() { ctx.arcTo(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.arcTo(0, 0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.rect(); }); +assert_throws_js(TypeError, function() { ctx.rect(0); }); +assert_throws_js(TypeError, function() { ctx.rect(0, 0); }); +assert_throws_js(TypeError, function() { ctx.rect(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.arc(); }); +assert_throws_js(TypeError, function() { ctx.arc(0); }); +assert_throws_js(TypeError, function() { ctx.arc(0, 0); }); +assert_throws_js(TypeError, function() { ctx.arc(0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.arc(0, 0, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.drawImage(); }); +assert_throws_js(TypeError, function() { ctx.drawImage(offscreenCanvas); }); +assert_throws_js(TypeError, function() { ctx.drawImage(offscreenCanvas, 0); }); // TODO: n >= 3 args on drawImage could be either a valid overload, // or too few for another overload, or too many for another // overload - what should happen? if (ctx.createImageData) { - assert_throws(new TypeError(), function() { ctx.createImageData(); }); - assert_throws(new TypeError(), function() { ctx.createImageData(1); }); + assert_throws_js(TypeError, function() { ctx.createImageData(); }); + assert_throws_js(TypeError, function() { ctx.createImageData(1); }); } if (ctx.getImageData) { - assert_throws(new TypeError(), function() { ctx.getImageData(); }); - assert_throws(new TypeError(), function() { ctx.getImageData(0); }); - assert_throws(new TypeError(), function() { ctx.getImageData(0, 0); }); - assert_throws(new TypeError(), function() { ctx.getImageData(0, 0, 1); }); + assert_throws_js(TypeError, function() { ctx.getImageData(); }); + assert_throws_js(TypeError, function() { ctx.getImageData(0); }); + assert_throws_js(TypeError, function() { ctx.getImageData(0, 0); }); + assert_throws_js(TypeError, function() { ctx.getImageData(0, 0, 1); }); } if (ctx.putImageData) { var imgdata = ctx.getImageData(0, 0, 1, 1); - assert_throws(new TypeError(), function() { ctx.putImageData(); }); - assert_throws(new TypeError(), function() { ctx.putImageData(imgdata); }); - assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 0); }); + assert_throws_js(TypeError, function() { ctx.putImageData(); }); + assert_throws_js(TypeError, function() { ctx.putImageData(imgdata); }); + assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 0); }); } var g = ctx.createLinearGradient(0, 0, 0, 0); -assert_throws(new TypeError(), function() { g.addColorStop(); }); -assert_throws(new TypeError(), function() { g.addColorStop(0); }); +assert_throws_js(TypeError, function() { g.addColorStop(); }); +assert_throws_js(TypeError, function() { g.addColorStop(0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.null.html b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.null.html index 0cf9ca26d73..ffc7c9b08b5 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.null.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.null.html @@ -21,7 +21,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.drawImage(null, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.drawImage(null, 0, 0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.null.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.null.worker.js index 8ed0887ecd8..4591facb2ce 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.null.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.null.worker.js @@ -16,7 +16,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.drawImage(null, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.drawImage(null, 0, 0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.wrongtype.html b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.wrongtype.html index 5cb283466bd..c003ae2571d 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.wrongtype.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.wrongtype.html @@ -21,9 +21,9 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.drawImage(undefined, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.drawImage(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.drawImage("", 0, 0); }); +assert_throws_js(TypeError, function() { ctx.drawImage(undefined, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.drawImage(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.drawImage("", 0, 0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.wrongtype.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.wrongtype.worker.js index ffdc2502163..5ab86698b95 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.wrongtype.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.wrongtype.worker.js @@ -16,9 +16,9 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.drawImage(undefined, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.drawImage(0, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.drawImage("", 0, 0); }); +assert_throws_js(TypeError, function() { ctx.drawImage(undefined, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.drawImage(0, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.drawImage("", 0, 0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerocanvas.html b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerocanvas.html index f945cedab15..04d4ccdb122 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerocanvas.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerocanvas.html @@ -22,15 +22,15 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(0, 10); -assert_throws("INVALID_STATE_ERR", function() { ctx.drawImage(offscreenCanvas2, 0, 0); }); +assert_throws_dom("INVALID_STATE_ERR", function() { ctx.drawImage(offscreenCanvas2, 0, 0); }); offscreenCanvas2.width = 10; offscreenCanvas2.height = 0; -assert_throws("INVALID_STATE_ERR", function() { ctx.drawImage(offscreenCanvas2, 0, 0); }); +assert_throws_dom("INVALID_STATE_ERR", function() { ctx.drawImage(offscreenCanvas2, 0, 0); }); offscreenCanvas2.width = 0; offscreenCanvas2.height = 0; -assert_throws("INVALID_STATE_ERR", function() { ctx.drawImage(offscreenCanvas2, 0, 0); }); +assert_throws_dom("INVALID_STATE_ERR", function() { ctx.drawImage(offscreenCanvas2, 0, 0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerocanvas.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerocanvas.worker.js index 1e9d63cf92b..7caae366844 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerocanvas.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerocanvas.worker.js @@ -17,15 +17,15 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(0, 10); -assert_throws("INVALID_STATE_ERR", function() { ctx.drawImage(offscreenCanvas2, 0, 0); }); +assert_throws_dom("INVALID_STATE_ERR", function() { ctx.drawImage(offscreenCanvas2, 0, 0); }); offscreenCanvas2.width = 10; offscreenCanvas2.height = 0; -assert_throws("INVALID_STATE_ERR", function() { ctx.drawImage(offscreenCanvas2, 0, 0); }); +assert_throws_dom("INVALID_STATE_ERR", function() { ctx.drawImage(offscreenCanvas2, 0, 0); }); offscreenCanvas2.width = 0; offscreenCanvas2.height = 0; -assert_throws("INVALID_STATE_ERR", function() { ctx.drawImage(offscreenCanvas2, 0, 0); }); +assert_throws_dom("INVALID_STATE_ERR", function() { ctx.drawImage(offscreenCanvas2, 0, 0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.html b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.html index b941f3aa3aa..8bf00de4238 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.html @@ -34,9 +34,9 @@ var promise = new Promise(function(resolve, reject) { }); promise.then(function(response) { createImageBitmap(response).then(bitmap => { - assert_throws("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 10, 10, 0, 1, 0, 0, 100, 50); }); - assert_throws("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 10, 10, 1, 0, 0, 0, 100, 50); }); - assert_throws("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 10, 10, 0, 0, 0, 0, 100, 50); }); + assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 10, 10, 0, 1, 0, 0, 100, 50); }); + assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 10, 10, 1, 0, 0, 0, 100, 50); }); + assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 10, 10, 0, 0, 0, 0, 100, 50); }); _assertPixelApprox(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255", 2); }, t_fail); }).then(t_pass, t_fail); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.image.html b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.image.html index 1abcb6abf49..94d9bb61a6b 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.image.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.image.html @@ -34,9 +34,9 @@ var promise = new Promise(function(resolve, reject) { }); promise.then(function(response) { createImageBitmap(response).then(bitmap => { - assert_throws("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 0, 0, 100, 50); }); - assert_throws("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 0, 0, 100, 50); }); - assert_throws("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 0, 0, 100, 50); }); + assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 0, 0, 100, 50); }); + assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 0, 0, 100, 50); }); + assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 0, 0, 100, 50); }); _assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255"); }, t_fail); }).then(t_pass, t_fail); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.image.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.image.worker.js index cf472ac4179..60768bc7a04 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.image.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.image.worker.js @@ -29,9 +29,9 @@ var promise = new Promise(function(resolve, reject) { }); promise.then(function(response) { createImageBitmap(response).then(bitmap => { - assert_throws("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 0, 0, 100, 50); }); - assert_throws("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 0, 0, 100, 50); }); - assert_throws("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 0, 0, 100, 50); }); + assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 0, 0, 100, 50); }); + assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 0, 0, 100, 50); }); + assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 0, 0, 100, 50); }); _assertPixel(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255"); }, t_fail); }).then(t_pass, t_fail); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.worker.js index b3b6a59cb7a..be18c26b1ab 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/drawing-images-to-the-canvas/2d.drawImage.zerosource.worker.js @@ -29,9 +29,9 @@ var promise = new Promise(function(resolve, reject) { }); promise.then(function(response) { createImageBitmap(response).then(bitmap => { - assert_throws("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 10, 10, 0, 1, 0, 0, 100, 50); }); - assert_throws("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 10, 10, 1, 0, 0, 0, 100, 50); }); - assert_throws("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 10, 10, 0, 0, 0, 0, 100, 50); }); + assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 10, 10, 0, 1, 0, 0, 100, 50); }); + assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 10, 10, 1, 0, 0, 0, 100, 50); }); + assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.drawImage(bitmap, 10, 10, 0, 0, 0, 0, 100, 50); }); _assertPixelApprox(offscreenCanvas, 50,25, 0,255,0,255, "50,25", "0,255,0,255", 2); }, t_fail); }).then(t_pass, t_fail); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.linear.nonfinite.html b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.linear.nonfinite.html index 51d48ac0fe1..b20299bdc6c 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.linear.nonfinite.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.linear.nonfinite.html @@ -20,29 +20,29 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, 0, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(-Infinity, 0, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(NaN, 0, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, Infinity, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, -Infinity, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, NaN, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, Infinity, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, -Infinity, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, NaN, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, 1, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, 1, -Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, 1, NaN); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, Infinity, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, Infinity, Infinity, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, Infinity, 1, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, 0, Infinity, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, 0, 1, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, Infinity, Infinity, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, Infinity, 1, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, 0, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(-Infinity, 0, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(NaN, 0, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, Infinity, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, -Infinity, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, NaN, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, Infinity, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, -Infinity, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, NaN, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, 1, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, 1, -Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, 1, NaN); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, Infinity, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, Infinity, Infinity, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, Infinity, 1, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, 0, Infinity, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, 0, 1, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, Infinity, Infinity, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, Infinity, 1, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, Infinity, Infinity); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.linear.nonfinite.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.linear.nonfinite.worker.js index c8268b00993..5d9ad688304 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.linear.nonfinite.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.linear.nonfinite.worker.js @@ -16,29 +16,29 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, 0, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(-Infinity, 0, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(NaN, 0, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, Infinity, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, -Infinity, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, NaN, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, Infinity, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, -Infinity, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, NaN, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, 1, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, 1, -Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, 1, NaN); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, Infinity, 1, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, Infinity, Infinity, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, Infinity, 1, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, 0, Infinity, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(Infinity, 0, 1, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, Infinity, Infinity, 0); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, Infinity, 1, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createLinearGradient(0, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, 0, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(-Infinity, 0, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(NaN, 0, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, Infinity, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, -Infinity, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, NaN, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, Infinity, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, -Infinity, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, NaN, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, 1, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, 1, -Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, 1, NaN); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, Infinity, 1, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, Infinity, Infinity, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, Infinity, 1, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, 0, Infinity, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(Infinity, 0, 1, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, Infinity, Infinity, 0); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, Infinity, 1, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createLinearGradient(0, 0, Infinity, Infinity); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidcolour.html b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidcolour.html index 0b72a83527f..e2ad325ebe7 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidcolour.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidcolour.html @@ -21,11 +21,11 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var g = ctx.createLinearGradient(0, 0, 100, 0); -assert_throws("SYNTAX_ERR", function() { g.addColorStop(0, ""); }); -assert_throws("SYNTAX_ERR", function() { g.addColorStop(0, 'null'); }); -assert_throws("SYNTAX_ERR", function() { g.addColorStop(0, 'undefined'); }); -assert_throws("SYNTAX_ERR", function() { g.addColorStop(0, null); }); -assert_throws("SYNTAX_ERR", function() { g.addColorStop(0, undefined); }); +assert_throws_dom("SYNTAX_ERR", function() { g.addColorStop(0, ""); }); +assert_throws_dom("SYNTAX_ERR", function() { g.addColorStop(0, 'null'); }); +assert_throws_dom("SYNTAX_ERR", function() { g.addColorStop(0, 'undefined'); }); +assert_throws_dom("SYNTAX_ERR", function() { g.addColorStop(0, null); }); +assert_throws_dom("SYNTAX_ERR", function() { g.addColorStop(0, undefined); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidcolour.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidcolour.worker.js index 526edbffb60..4fde5680200 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidcolour.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidcolour.worker.js @@ -17,11 +17,11 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var g = ctx.createLinearGradient(0, 0, 100, 0); -assert_throws("SYNTAX_ERR", function() { g.addColorStop(0, ""); }); -assert_throws("SYNTAX_ERR", function() { g.addColorStop(0, 'null'); }); -assert_throws("SYNTAX_ERR", function() { g.addColorStop(0, 'undefined'); }); -assert_throws("SYNTAX_ERR", function() { g.addColorStop(0, null); }); -assert_throws("SYNTAX_ERR", function() { g.addColorStop(0, undefined); }); +assert_throws_dom("SYNTAX_ERR", function() { g.addColorStop(0, ""); }); +assert_throws_dom("SYNTAX_ERR", function() { g.addColorStop(0, 'null'); }); +assert_throws_dom("SYNTAX_ERR", function() { g.addColorStop(0, 'undefined'); }); +assert_throws_dom("SYNTAX_ERR", function() { g.addColorStop(0, null); }); +assert_throws_dom("SYNTAX_ERR", function() { g.addColorStop(0, undefined); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidoffset.html b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidoffset.html index d841895c97e..95c9f304786 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidoffset.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidoffset.html @@ -21,11 +21,11 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var g = ctx.createLinearGradient(0, 0, 100, 0); -assert_throws("INDEX_SIZE_ERR", function() { g.addColorStop(-1, '#000'); }); -assert_throws("INDEX_SIZE_ERR", function() { g.addColorStop(2, '#000'); }); -assert_throws(new TypeError(), function() { g.addColorStop(Infinity, '#000'); }); -assert_throws(new TypeError(), function() { g.addColorStop(-Infinity, '#000'); }); -assert_throws(new TypeError(), function() { g.addColorStop(NaN, '#000'); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { g.addColorStop(-1, '#000'); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { g.addColorStop(2, '#000'); }); +assert_throws_js(TypeError, function() { g.addColorStop(Infinity, '#000'); }); +assert_throws_js(TypeError, function() { g.addColorStop(-Infinity, '#000'); }); +assert_throws_js(TypeError, function() { g.addColorStop(NaN, '#000'); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidoffset.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidoffset.worker.js index 23b5d7a3d85..79cefb3ed20 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidoffset.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.object.invalidoffset.worker.js @@ -17,11 +17,11 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var g = ctx.createLinearGradient(0, 0, 100, 0); -assert_throws("INDEX_SIZE_ERR", function() { g.addColorStop(-1, '#000'); }); -assert_throws("INDEX_SIZE_ERR", function() { g.addColorStop(2, '#000'); }); -assert_throws(new TypeError(), function() { g.addColorStop(Infinity, '#000'); }); -assert_throws(new TypeError(), function() { g.addColorStop(-Infinity, '#000'); }); -assert_throws(new TypeError(), function() { g.addColorStop(NaN, '#000'); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { g.addColorStop(-1, '#000'); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { g.addColorStop(2, '#000'); }); +assert_throws_js(TypeError, function() { g.addColorStop(Infinity, '#000'); }); +assert_throws_js(TypeError, function() { g.addColorStop(-Infinity, '#000'); }); +assert_throws_js(TypeError, function() { g.addColorStop(NaN, '#000'); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.negative.html b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.negative.html index 39cacb901e6..470455eab0b 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.negative.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.negative.html @@ -20,9 +20,9 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("INDEX_SIZE_ERR", function() { ctx.createRadialGradient(0, 0, -0.1, 0, 0, 1); }); -assert_throws("INDEX_SIZE_ERR", function() { ctx.createRadialGradient(0, 0, 1, 0, 0, -0.1); }); -assert_throws("INDEX_SIZE_ERR", function() { ctx.createRadialGradient(0, 0, -0.1, 0, 0, -0.1); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.createRadialGradient(0, 0, -0.1, 0, 0, 1); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.createRadialGradient(0, 0, 1, 0, 0, -0.1); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.createRadialGradient(0, 0, -0.1, 0, 0, -0.1); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.negative.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.negative.worker.js index 979e020796b..8c206b7a856 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.negative.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.negative.worker.js @@ -16,9 +16,9 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("INDEX_SIZE_ERR", function() { ctx.createRadialGradient(0, 0, -0.1, 0, 0, 1); }); -assert_throws("INDEX_SIZE_ERR", function() { ctx.createRadialGradient(0, 0, 1, 0, 0, -0.1); }); -assert_throws("INDEX_SIZE_ERR", function() { ctx.createRadialGradient(0, 0, -0.1, 0, 0, -0.1); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.createRadialGradient(0, 0, -0.1, 0, 0, 1); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.createRadialGradient(0, 0, 1, 0, 0, -0.1); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.createRadialGradient(0, 0, -0.1, 0, 0, -0.1); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.nonfinite.html b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.nonfinite.html index ce657dec4c2..207ebbc10d8 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.nonfinite.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.nonfinite.html @@ -20,81 +20,81 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(-Infinity, 0, 1, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(NaN, 0, 1, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, -Infinity, 1, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, NaN, 1, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, -Infinity, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, NaN, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, -Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, NaN, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, -Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, NaN, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, 0, -Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, 0, NaN); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(-Infinity, 0, 1, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(NaN, 0, 1, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, -Infinity, 1, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, NaN, 1, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, -Infinity, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, NaN, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, -Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, NaN, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, -Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, NaN, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, 0, -Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, 0, NaN); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, Infinity, Infinity); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.nonfinite.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.nonfinite.worker.js index 6a2d6e0eb04..e07060cf2c0 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.nonfinite.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.gradient.radial.nonfinite.worker.js @@ -16,81 +16,81 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(-Infinity, 0, 1, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(NaN, 0, 1, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, -Infinity, 1, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, NaN, 1, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, -Infinity, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, NaN, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, -Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, NaN, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, -Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, NaN, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, 0, -Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, 0, NaN); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(Infinity, 0, 1, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, Infinity, 1, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, 0, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, 0, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, 0, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, Infinity, 0, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, Infinity, Infinity, 1); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, Infinity, 0, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createRadialGradient(0, 0, 1, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(-Infinity, 0, 1, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(NaN, 0, 1, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, -Infinity, 1, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, NaN, 1, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, -Infinity, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, NaN, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, -Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, NaN, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, -Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, NaN, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, 0, -Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, 0, NaN); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, Infinity, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, Infinity, 1, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, Infinity, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(Infinity, 0, 1, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, Infinity, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, Infinity, 1, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, 0, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, 0, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, 0, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, Infinity, 0, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, Infinity, Infinity, 1); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, Infinity, 0, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createRadialGradient(0, 0, 1, 0, Infinity, Infinity); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.basic.zerocanvas.html b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.basic.zerocanvas.html index 2293d21bf7b..e1a0ec00bf3 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.basic.zerocanvas.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.basic.zerocanvas.html @@ -24,17 +24,17 @@ offscreenCanvas.width = 0; offscreenCanvas.height = 10; _assertSame(offscreenCanvas.width, 0, "offscreenCanvas.width", "0"); _assertSame(offscreenCanvas.height, 10, "offscreenCanvas.height", "10"); -assert_throws("INVALID_STATE_ERR", function() { ctx.createPattern(offscreenCanvas, 'repeat'); }); +assert_throws_dom("INVALID_STATE_ERR", function() { ctx.createPattern(offscreenCanvas, 'repeat'); }); offscreenCanvas.width = 10; offscreenCanvas.height = 0; _assertSame(offscreenCanvas.width, 10, "offscreenCanvas.width", "10"); _assertSame(offscreenCanvas.height, 0, "offscreenCanvas.height", "0"); -assert_throws("INVALID_STATE_ERR", function() { ctx.createPattern(offscreenCanvas, 'repeat'); }); +assert_throws_dom("INVALID_STATE_ERR", function() { ctx.createPattern(offscreenCanvas, 'repeat'); }); offscreenCanvas.width = 0; offscreenCanvas.height = 0; _assertSame(offscreenCanvas.width, 0, "offscreenCanvas.width", "0"); _assertSame(offscreenCanvas.height, 0, "offscreenCanvas.height", "0"); -assert_throws("INVALID_STATE_ERR", function() { ctx.createPattern(offscreenCanvas, 'repeat'); }); +assert_throws_dom("INVALID_STATE_ERR", function() { ctx.createPattern(offscreenCanvas, 'repeat'); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.basic.zerocanvas.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.basic.zerocanvas.worker.js index c015002c6ad..3034dee9f79 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.basic.zerocanvas.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.basic.zerocanvas.worker.js @@ -20,17 +20,17 @@ offscreenCanvas.width = 0; offscreenCanvas.height = 10; _assertSame(offscreenCanvas.width, 0, "offscreenCanvas.width", "0"); _assertSame(offscreenCanvas.height, 10, "offscreenCanvas.height", "10"); -assert_throws("INVALID_STATE_ERR", function() { ctx.createPattern(offscreenCanvas, 'repeat'); }); +assert_throws_dom("INVALID_STATE_ERR", function() { ctx.createPattern(offscreenCanvas, 'repeat'); }); offscreenCanvas.width = 10; offscreenCanvas.height = 0; _assertSame(offscreenCanvas.width, 10, "offscreenCanvas.width", "10"); _assertSame(offscreenCanvas.height, 0, "offscreenCanvas.height", "0"); -assert_throws("INVALID_STATE_ERR", function() { ctx.createPattern(offscreenCanvas, 'repeat'); }); +assert_throws_dom("INVALID_STATE_ERR", function() { ctx.createPattern(offscreenCanvas, 'repeat'); }); offscreenCanvas.width = 0; offscreenCanvas.height = 0; _assertSame(offscreenCanvas.width, 0, "offscreenCanvas.width", "0"); _assertSame(offscreenCanvas.height, 0, "offscreenCanvas.height", "0"); -assert_throws("INVALID_STATE_ERR", function() { ctx.createPattern(offscreenCanvas, 'repeat'); }); +assert_throws_dom("INVALID_STATE_ERR", function() { ctx.createPattern(offscreenCanvas, 'repeat'); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.null.html b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.null.html index 193bb9dd4c0..0bf03d53d7f 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.null.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.null.html @@ -20,7 +20,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.createPattern(null, 'repeat'); }); +assert_throws_js(TypeError, function() { ctx.createPattern(null, 'repeat'); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.null.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.null.worker.js index 6b5ad64c7c4..73af4f44af1 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.null.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.null.worker.js @@ -16,7 +16,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.createPattern(null, 'repeat'); }); +assert_throws_js(TypeError, function() { ctx.createPattern(null, 'repeat'); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.string.html b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.string.html index 0722f8f2817..f38cddbcc5d 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.string.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.string.html @@ -20,7 +20,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.createPattern('../images/red.png', 'repeat'); }); +assert_throws_js(TypeError, function() { ctx.createPattern('../images/red.png', 'repeat'); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.string.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.string.worker.js index c64f978c3fa..bade91af85d 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.string.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.string.worker.js @@ -16,7 +16,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.createPattern('../images/red.png', 'repeat'); }); +assert_throws_js(TypeError, function() { ctx.createPattern('../images/red.png', 'repeat'); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.undefined.html b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.undefined.html index 8dff9482813..1d106cc075a 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.undefined.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.undefined.html @@ -20,7 +20,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.createPattern(undefined, 'repeat'); }); +assert_throws_js(TypeError, function() { ctx.createPattern(undefined, 'repeat'); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.undefined.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.undefined.worker.js index 52163c091c5..d53b19aed0c 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.undefined.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.image.undefined.worker.js @@ -16,7 +16,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.createPattern(undefined, 'repeat'); }); +assert_throws_js(TypeError, function() { ctx.createPattern(undefined, 'repeat'); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.case.html b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.case.html index 392dfb66e91..3fa8c333bfb 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.case.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.case.html @@ -20,7 +20,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "Repeat"); }); +assert_throws_dom("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "Repeat"); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.case.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.case.worker.js index 1f7557e483f..9d92417722c 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.case.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.case.worker.js @@ -16,7 +16,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "Repeat"); }); +assert_throws_dom("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "Repeat"); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.nullsuffix.html b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.nullsuffix.html index 4b0f25afbf9..65dc223ec94 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.nullsuffix.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.nullsuffix.html @@ -20,7 +20,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "repeat\0"); }); +assert_throws_dom("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "repeat\0"); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.nullsuffix.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.nullsuffix.worker.js index 3288e128257..de773414fa3 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.nullsuffix.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.nullsuffix.worker.js @@ -16,7 +16,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "repeat\0"); }); +assert_throws_dom("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "repeat\0"); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.undefined.html b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.undefined.html index 0722ae5ddc9..b064877a4be 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.undefined.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.undefined.html @@ -20,7 +20,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, undefined); }); +assert_throws_dom("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, undefined); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.undefined.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.undefined.worker.js index 020adf7c002..7306f85ad79 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.undefined.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.undefined.worker.js @@ -16,7 +16,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, undefined); }); +assert_throws_dom("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, undefined); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognised.html b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognised.html index 03f4659fd77..d0f8e63e7f1 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognised.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognised.html @@ -20,7 +20,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "invalid"); }); +assert_throws_dom("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "invalid"); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognised.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognised.worker.js index 2d7796d0ae3..db19ecae449 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognised.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognised.worker.js @@ -16,7 +16,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "invalid"); }); +assert_throws_dom("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "invalid"); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognisednull.html b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognisednull.html index 5d5b70536c4..8065796e3c1 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognisednull.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognisednull.html @@ -20,7 +20,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "null"); }); +assert_throws_dom("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "null"); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognisednull.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognisednull.worker.js index d16979b6e98..5bb8e81b76c 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognisednull.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/fill-and-stroke-styles/2d.pattern.repeat.unrecognisednull.worker.js @@ -16,7 +16,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "null"); }); +assert_throws_dom("SYNTAX_ERR", function() { ctx.createPattern(offscreenCanvas, "null"); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arc.negative.html b/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arc.negative.html index 38b7b8679ea..96b5bc3ec2a 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arc.negative.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arc.negative.html @@ -20,7 +20,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("INDEX_SIZE_ERR", function() { ctx.arc(0, 0, -1, 0, 0, true); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.arc(0, 0, -1, 0, 0, true); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arc.negative.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arc.negative.worker.js index e8488a0abba..e4bdee93856 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arc.negative.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arc.negative.worker.js @@ -16,7 +16,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("INDEX_SIZE_ERR", function() { ctx.arc(0, 0, -1, 0, 0, true); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.arc(0, 0, -1, 0, 0, true); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arcTo.negative.html b/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arcTo.negative.html index 0bd6eb2dbb5..509dc1df0ba 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arcTo.negative.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arcTo.negative.html @@ -20,7 +20,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("INDEX_SIZE_ERR", function() { ctx.arcTo(0, 0, 0, 0, -1); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.arcTo(0, 0, 0, 0, -1); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arcTo.negative.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arcTo.negative.worker.js index 55ecf54c381..67f3c011821 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arcTo.negative.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/path-objects/2d.path.arcTo.negative.worker.js @@ -16,7 +16,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("INDEX_SIZE_ERR", function() { ctx.arcTo(0, 0, 0, 0, -1); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.arcTo(0, 0, 0, 0, -1); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create1.zero.html b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create1.zero.html index 1000e44c863..9c72eb1c6ce 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create1.zero.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create1.zero.html @@ -20,7 +20,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.createImageData(null); }); +assert_throws_js(TypeError, function() { ctx.createImageData(null); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create1.zero.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create1.zero.worker.js index 693fc5927bf..dc35289fd39 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create1.zero.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create1.zero.worker.js @@ -16,7 +16,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.createImageData(null); }); +assert_throws_js(TypeError, function() { ctx.createImageData(null); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.nonfinite.html b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.nonfinite.html index 6f8afc0303f..ba25bd689e7 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.nonfinite.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.nonfinite.html @@ -20,23 +20,23 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.createImageData(Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.createImageData(-Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.createImageData(NaN, 10); }); -assert_throws(new TypeError(), function() { ctx.createImageData(10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createImageData(10, -Infinity); }); -assert_throws(new TypeError(), function() { ctx.createImageData(10, NaN); }); -assert_throws(new TypeError(), function() { ctx.createImageData(Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createImageData(Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.createImageData(-Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.createImageData(NaN, 10); }); +assert_throws_js(TypeError, function() { ctx.createImageData(10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createImageData(10, -Infinity); }); +assert_throws_js(TypeError, function() { ctx.createImageData(10, NaN); }); +assert_throws_js(TypeError, function() { ctx.createImageData(Infinity, Infinity); }); var posinfobj = { valueOf: function() { return Infinity; } }, neginfobj = { valueOf: function() { return -Infinity; } }, nanobj = { valueOf: function() { return -Infinity; } }; -assert_throws(new TypeError(), function() { ctx.createImageData(posinfobj, 10); }); -assert_throws(new TypeError(), function() { ctx.createImageData(neginfobj, 10); }); -assert_throws(new TypeError(), function() { ctx.createImageData(nanobj, 10); }); -assert_throws(new TypeError(), function() { ctx.createImageData(10, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.createImageData(10, neginfobj); }); -assert_throws(new TypeError(), function() { ctx.createImageData(10, nanobj); }); -assert_throws(new TypeError(), function() { ctx.createImageData(posinfobj, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.createImageData(posinfobj, 10); }); +assert_throws_js(TypeError, function() { ctx.createImageData(neginfobj, 10); }); +assert_throws_js(TypeError, function() { ctx.createImageData(nanobj, 10); }); +assert_throws_js(TypeError, function() { ctx.createImageData(10, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.createImageData(10, neginfobj); }); +assert_throws_js(TypeError, function() { ctx.createImageData(10, nanobj); }); +assert_throws_js(TypeError, function() { ctx.createImageData(posinfobj, posinfobj); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.nonfinite.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.nonfinite.worker.js index 3f588b0ad6b..2c2e9dc2a0d 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.nonfinite.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.nonfinite.worker.js @@ -16,23 +16,23 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.createImageData(Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.createImageData(-Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.createImageData(NaN, 10); }); -assert_throws(new TypeError(), function() { ctx.createImageData(10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.createImageData(10, -Infinity); }); -assert_throws(new TypeError(), function() { ctx.createImageData(10, NaN); }); -assert_throws(new TypeError(), function() { ctx.createImageData(Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createImageData(Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.createImageData(-Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.createImageData(NaN, 10); }); +assert_throws_js(TypeError, function() { ctx.createImageData(10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.createImageData(10, -Infinity); }); +assert_throws_js(TypeError, function() { ctx.createImageData(10, NaN); }); +assert_throws_js(TypeError, function() { ctx.createImageData(Infinity, Infinity); }); var posinfobj = { valueOf: function() { return Infinity; } }, neginfobj = { valueOf: function() { return -Infinity; } }, nanobj = { valueOf: function() { return -Infinity; } }; -assert_throws(new TypeError(), function() { ctx.createImageData(posinfobj, 10); }); -assert_throws(new TypeError(), function() { ctx.createImageData(neginfobj, 10); }); -assert_throws(new TypeError(), function() { ctx.createImageData(nanobj, 10); }); -assert_throws(new TypeError(), function() { ctx.createImageData(10, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.createImageData(10, neginfobj); }); -assert_throws(new TypeError(), function() { ctx.createImageData(10, nanobj); }); -assert_throws(new TypeError(), function() { ctx.createImageData(posinfobj, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.createImageData(posinfobj, 10); }); +assert_throws_js(TypeError, function() { ctx.createImageData(neginfobj, 10); }); +assert_throws_js(TypeError, function() { ctx.createImageData(nanobj, 10); }); +assert_throws_js(TypeError, function() { ctx.createImageData(10, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.createImageData(10, neginfobj); }); +assert_throws_js(TypeError, function() { ctx.createImageData(10, nanobj); }); +assert_throws_js(TypeError, function() { ctx.createImageData(posinfobj, posinfobj); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.zero.html b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.zero.html index 43a216cdc60..5a4553c90a3 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.zero.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.zero.html @@ -20,9 +20,9 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("INDEX_SIZE_ERR", function() { ctx.createImageData(10, 0); }); -assert_throws("INDEX_SIZE_ERR", function() { ctx.createImageData(0, 10); }); -assert_throws("INDEX_SIZE_ERR", function() { ctx.createImageData(0, 0); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.createImageData(10, 0); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.createImageData(0, 10); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.createImageData(0, 0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.zero.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.zero.worker.js index e64977ca161..ad892d90b98 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.zero.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.create2.zero.worker.js @@ -16,9 +16,9 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("INDEX_SIZE_ERR", function() { ctx.createImageData(10, 0); }); -assert_throws("INDEX_SIZE_ERR", function() { ctx.createImageData(0, 10); }); -assert_throws("INDEX_SIZE_ERR", function() { ctx.createImageData(0, 0); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.createImageData(10, 0); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.createImageData(0, 10); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.createImageData(0, 0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.nonfinite.html b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.nonfinite.html index 8d30b552a4a..f40580e2345 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.nonfinite.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.nonfinite.html @@ -20,55 +20,55 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(-Infinity, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(NaN, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, -Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, NaN, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, -Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, NaN, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, 10, -Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, 10, NaN); }); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(-Infinity, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(NaN, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, -Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, NaN, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, -Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, NaN, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, 10, -Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, 10, NaN); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, Infinity, Infinity); }); var posinfobj = { valueOf: function() { return Infinity; } }, neginfobj = { valueOf: function() { return -Infinity; } }, nanobj = { valueOf: function() { return -Infinity; } }; -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(neginfobj, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(nanobj, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, posinfobj, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, neginfobj, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, nanobj, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, posinfobj, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, neginfobj, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, nanobj, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, 10, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, 10, neginfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, 10, nanobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, posinfobj, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, posinfobj, posinfobj, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, posinfobj, posinfobj, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, posinfobj, 10, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, 10, posinfobj, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, 10, posinfobj, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, 10, 10, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, posinfobj, posinfobj, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, posinfobj, posinfobj, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, posinfobj, 10, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, posinfobj, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(neginfobj, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(nanobj, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, posinfobj, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, neginfobj, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, nanobj, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, posinfobj, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, neginfobj, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, nanobj, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, 10, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, 10, neginfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, 10, nanobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, posinfobj, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, posinfobj, posinfobj, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, posinfobj, posinfobj, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, posinfobj, 10, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, 10, posinfobj, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, 10, posinfobj, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, 10, 10, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, posinfobj, posinfobj, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, posinfobj, posinfobj, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, posinfobj, 10, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, posinfobj, posinfobj); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.nonfinite.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.nonfinite.worker.js index b709ca6e99f..754fcf87d73 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.nonfinite.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.nonfinite.worker.js @@ -16,55 +16,55 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(-Infinity, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(NaN, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, -Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, NaN, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, -Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, NaN, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, 10, -Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, 10, NaN); }); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(Infinity, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(-Infinity, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(NaN, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, -Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, NaN, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, -Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, NaN, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, 10, -Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, 10, NaN); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(Infinity, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, Infinity, Infinity); }); var posinfobj = { valueOf: function() { return Infinity; } }, neginfobj = { valueOf: function() { return -Infinity; } }, nanobj = { valueOf: function() { return -Infinity; } }; -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(neginfobj, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(nanobj, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, posinfobj, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, neginfobj, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, nanobj, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, posinfobj, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, neginfobj, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, nanobj, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, 10, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, 10, neginfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, 10, nanobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, posinfobj, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, posinfobj, posinfobj, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, posinfobj, posinfobj, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, posinfobj, 10, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, 10, posinfobj, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, 10, posinfobj, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(posinfobj, 10, 10, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, posinfobj, posinfobj, 10); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, posinfobj, posinfobj, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, posinfobj, 10, posinfobj); }); -assert_throws(new TypeError(), function() { ctx.getImageData(10, 10, posinfobj, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(neginfobj, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(nanobj, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, posinfobj, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, neginfobj, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, nanobj, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, posinfobj, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, neginfobj, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, nanobj, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, 10, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, 10, neginfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, 10, nanobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, posinfobj, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, posinfobj, posinfobj, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, posinfobj, posinfobj, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, posinfobj, 10, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, 10, posinfobj, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, 10, posinfobj, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(posinfobj, 10, 10, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, posinfobj, posinfobj, 10); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, posinfobj, posinfobj, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, posinfobj, 10, posinfobj); }); +assert_throws_js(TypeError, function() { ctx.getImageData(10, 10, posinfobj, posinfobj); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.zero.html b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.zero.html index 3c461358222..6eab6836689 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.zero.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.zero.html @@ -20,9 +20,9 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("INDEX_SIZE_ERR", function() { ctx.getImageData(1, 1, 10, 0); }); -assert_throws("INDEX_SIZE_ERR", function() { ctx.getImageData(1, 1, 0, 10); }); -assert_throws("INDEX_SIZE_ERR", function() { ctx.getImageData(1, 1, 0, 0); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.getImageData(1, 1, 10, 0); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.getImageData(1, 1, 0, 10); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.getImageData(1, 1, 0, 0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.zero.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.zero.worker.js index a5a963db6c1..89d68cc5279 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.zero.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.get.zero.worker.js @@ -16,9 +16,9 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws("INDEX_SIZE_ERR", function() { ctx.getImageData(1, 1, 10, 0); }); -assert_throws("INDEX_SIZE_ERR", function() { ctx.getImageData(1, 1, 0, 10); }); -assert_throws("INDEX_SIZE_ERR", function() { ctx.getImageData(1, 1, 0, 0); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.getImageData(1, 1, 10, 0); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.getImageData(1, 1, 0, 10); }); +assert_throws_dom("INDEX_SIZE_ERR", function() { ctx.getImageData(1, 1, 0, 0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.nonfinite.html b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.nonfinite.html index 9519691b991..357473121f2 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.nonfinite.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.nonfinite.html @@ -21,88 +21,88 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var imgdata = ctx.getImageData(0, 0, 10, 10); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, -Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, NaN, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, -Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, NaN); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, -Infinity, 10, 10, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, NaN, 10, 10, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, -Infinity, 10, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, NaN, 10, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, -Infinity, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, NaN, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, -Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, NaN, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, 10, -Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, 10, NaN, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, 10, 10, -Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, 10, 10, NaN); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, -Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, NaN, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, -Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, NaN); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, -Infinity, 10, 10, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, NaN, 10, 10, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, -Infinity, 10, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, NaN, 10, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, -Infinity, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, NaN, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, -Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, NaN, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, 10, -Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, 10, NaN, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, 10, 10, -Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, 10, 10, NaN); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, 10, Infinity, Infinity); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.nonfinite.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.nonfinite.worker.js index 97b81d71eac..c771a3ccbb5 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.nonfinite.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.nonfinite.worker.js @@ -17,88 +17,88 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var imgdata = ctx.getImageData(0, 0, 10, 10); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, -Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, NaN, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, -Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, NaN); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, -Infinity, 10, 10, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, NaN, 10, 10, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, -Infinity, 10, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, NaN, 10, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, -Infinity, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, NaN, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, -Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, NaN, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, 10, -Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, 10, NaN, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, 10, 10, -Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, 10, 10, NaN); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, 10, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, Infinity, 10); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, Infinity, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, 10, Infinity); }); -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 10, 10, 10, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, -Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, NaN, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, -Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, NaN); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, -Infinity, 10, 10, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, NaN, 10, 10, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, -Infinity, 10, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, NaN, 10, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, -Infinity, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, NaN, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, -Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, NaN, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, 10, -Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, 10, NaN, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, 10, 10, -Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, 10, 10, NaN); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, Infinity, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, Infinity, 10, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, Infinity, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, Infinity, 10, 10, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, Infinity, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, Infinity, 10, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, 10, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, Infinity, 10, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, Infinity, 10); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, Infinity, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, Infinity, 10, Infinity); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 10, 10, 10, 10, Infinity, Infinity); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.null.html b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.null.html index f36f93eeddd..aaf8e11a38e 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.null.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.null.html @@ -20,7 +20,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.putImageData(null, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.putImageData(null, 0, 0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.null.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.null.worker.js index e7c4b3bc011..5f3417156be 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.null.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.null.worker.js @@ -16,7 +16,7 @@ t.step(function() { var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); -assert_throws(new TypeError(), function() { ctx.putImageData(null, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.putImageData(null, 0, 0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.wrongtype.html b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.wrongtype.html index 90700552371..95775e208aa 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.wrongtype.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.wrongtype.html @@ -21,9 +21,9 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var imgdata = { width: 1, height: 1, data: [255, 0, 0, 255] }; -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.putImageData("cheese", 0, 0); }); -assert_throws(new TypeError(), function() { ctx.putImageData(42, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.putImageData("cheese", 0, 0); }); +assert_throws_js(TypeError, function() { ctx.putImageData(42, 0, 0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.wrongtype.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.wrongtype.worker.js index 93dc33c0795..36437c29145 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.wrongtype.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/pixel-manipulation/2d.imageData.put.wrongtype.worker.js @@ -17,9 +17,9 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var imgdata = { width: 1, height: 1, data: [255, 0, 0, 255] }; -assert_throws(new TypeError(), function() { ctx.putImageData(imgdata, 0, 0); }); -assert_throws(new TypeError(), function() { ctx.putImageData("cheese", 0, 0); }); -assert_throws(new TypeError(), function() { ctx.putImageData(42, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.putImageData(imgdata, 0, 0); }); +assert_throws_js(TypeError, function() { ctx.putImageData("cheese", 0, 0); }); +assert_throws_js(TypeError, function() { ctx.putImageData(42, 0, 0); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.arguments.missing.html b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.arguments.missing.html index ae8dd692148..a8c7f5ce5c1 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.arguments.missing.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.arguments.missing.html @@ -21,7 +21,7 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); -assert_throws(new TypeError(), function() { offscreenCanvas2.getContext(); }); +assert_throws_js(TypeError, function() { offscreenCanvas2.getContext(); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.arguments.missing.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.arguments.missing.worker.js index 9dbd97c861a..564790a2391 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.arguments.missing.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.arguments.missing.worker.js @@ -17,7 +17,7 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); -assert_throws(new TypeError(), function() { offscreenCanvas2.getContext(); }); +assert_throws_js(TypeError, function() { offscreenCanvas2.getContext(); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.casesensitive.html b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.casesensitive.html index 56431e2e4fc..3a51e546878 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.casesensitive.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.casesensitive.html @@ -21,7 +21,7 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); -assert_throws(new TypeError(), function() { offscreenCanvas2.getContext('2D'); }); +assert_throws_js(TypeError, function() { offscreenCanvas2.getContext('2D'); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.casesensitive.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.casesensitive.worker.js index b41c1f767f5..e8d8b710a27 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.casesensitive.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.casesensitive.worker.js @@ -17,7 +17,7 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); -assert_throws(new TypeError(), function() { offscreenCanvas2.getContext('2D'); }); +assert_throws_js(TypeError, function() { offscreenCanvas2.getContext('2D'); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.emptystring.html b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.emptystring.html index 92f37506eaa..bb3c20211b8 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.emptystring.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.emptystring.html @@ -21,7 +21,7 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); -assert_throws(new TypeError(), function() { offscreenCanvas2.getContext(""); }); +assert_throws_js(TypeError, function() { offscreenCanvas2.getContext(""); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.emptystring.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.emptystring.worker.js index 54406bb5bfe..fb172b21c2f 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.emptystring.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.emptystring.worker.js @@ -17,7 +17,7 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); -assert_throws(new TypeError(), function() { offscreenCanvas2.getContext(""); }); +assert_throws_js(TypeError, function() { offscreenCanvas2.getContext(""); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badname.html b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badname.html index 8e846714fad..52f6bdade53 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badname.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badname.html @@ -21,7 +21,7 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); -assert_throws(new TypeError(), function() { offscreenCanvas2.getContext('This is not an implemented context in any real browser'); }); +assert_throws_js(TypeError, function() { offscreenCanvas2.getContext('This is not an implemented context in any real browser'); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badname.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badname.worker.js index 855f997118b..d9a08a50e3e 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badname.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badname.worker.js @@ -17,7 +17,7 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); -assert_throws(new TypeError(), function() { offscreenCanvas2.getContext('This is not an implemented context in any real browser'); }); +assert_throws_js(TypeError, function() { offscreenCanvas2.getContext('This is not an implemented context in any real browser'); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badsuffix.html b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badsuffix.html index 5511c4f21ec..1c6c3f0679c 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badsuffix.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badsuffix.html @@ -21,7 +21,7 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); -assert_throws(new TypeError(), function() { offscreenCanvas2.getContext("2d#"); }); +assert_throws_js(TypeError, function() { offscreenCanvas2.getContext("2d#"); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badsuffix.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badsuffix.worker.js index c56ea7eb615..14905a8b675 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badsuffix.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.badsuffix.worker.js @@ -17,7 +17,7 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); -assert_throws(new TypeError(), function() { offscreenCanvas2.getContext("2d#"); }); +assert_throws_js(TypeError, function() { offscreenCanvas2.getContext("2d#"); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.nullsuffix.html b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.nullsuffix.html index b8660ae7fc6..0ce674a837c 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.nullsuffix.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.nullsuffix.html @@ -21,7 +21,7 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); -assert_throws(new TypeError(), function() { offscreenCanvas2.getContext("2d\0"); }); +assert_throws_js(TypeError, function() { offscreenCanvas2.getContext("2d\0"); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.nullsuffix.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.nullsuffix.worker.js index efe45b9196b..def49a23655 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.nullsuffix.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.nullsuffix.worker.js @@ -17,7 +17,7 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); -assert_throws(new TypeError(), function() { offscreenCanvas2.getContext("2d\0"); }); +assert_throws_js(TypeError, function() { offscreenCanvas2.getContext("2d\0"); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.unicode.html b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.unicode.html index 89f2655d563..6e041ad5329 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.unicode.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.unicode.html @@ -21,7 +21,7 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); -assert_throws(new TypeError(), function() { offscreenCanvas2.getContext("2\uFF44"); }); +assert_throws_js(TypeError, function() { offscreenCanvas2.getContext("2\uFF44"); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.unicode.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.unicode.worker.js index a533117562d..918fe58cad7 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.unicode.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/context.unrecognised.unicode.worker.js @@ -17,7 +17,7 @@ var offscreenCanvas = new OffscreenCanvas(100, 50); var ctx = offscreenCanvas.getContext('2d'); var offscreenCanvas2 = new OffscreenCanvas(100, 50); -assert_throws(new TypeError(), function() { offscreenCanvas2.getContext("2\uFF44"); }); +assert_throws_js(TypeError, function() { offscreenCanvas2.getContext("2\uFF44"); }); t.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.constructor.html b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.constructor.html index a1760764dec..cefe39d0fc8 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.constructor.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.constructor.html @@ -24,19 +24,19 @@ test(function() { assert_equals(offscreenCanvas1.width, 0); assert_equals(offscreenCanvas1.height, 0); - assert_throws(new TypeError(), function() { new OffscreenCanvas(-1, -1); }); + assert_throws_js(TypeError, function() { new OffscreenCanvas(-1, -1); }); var offscreenCanvas2 = new OffscreenCanvas(null, null); assert_equals(offscreenCanvas2.width, 0); assert_equals(offscreenCanvas2.height, 0); - assert_throws(new TypeError(), function() { offscreenCanvas2.width = -1; }); - assert_throws(new TypeError(), function() { offscreenCanvas2.height = -1; }); + assert_throws_js(TypeError, function() { offscreenCanvas2.width = -1; }); + assert_throws_js(TypeError, function() { offscreenCanvas2.height = -1; }); var obj = {Name: "John Doe", Age: 30}; - assert_throws(new TypeError(), function() { offscreenCanvas2.width = obj; }); - assert_throws(new TypeError(), function() { offscreenCanvas2.height = obj; }); - assert_throws(new TypeError(), function() { new OffscreenCanvas(obj, obj); }); + assert_throws_js(TypeError, function() { offscreenCanvas2.width = obj; }); + assert_throws_js(TypeError, function() { offscreenCanvas2.height = obj; }); + assert_throws_js(TypeError, function() { new OffscreenCanvas(obj, obj); }); }, "Test that OffscreenCanvas constructor handles invalid arguments correctly"); </script> diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.constructor.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.constructor.worker.js index 285e4e1d948..a9331101350 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.constructor.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.constructor.worker.js @@ -25,19 +25,19 @@ t2.step(function() { assert_equals(offscreenCanvas1.width, 0); assert_equals(offscreenCanvas1.height, 0); - assert_throws(new TypeError(), function() { new OffscreenCanvas(-1, -1); }); + assert_throws_js(TypeError, function() { new OffscreenCanvas(-1, -1); }); var offscreenCanvas2 = new OffscreenCanvas(null, null); assert_equals(offscreenCanvas2.width, 0); assert_equals(offscreenCanvas2.height, 0); - assert_throws(new TypeError(), function() { offscreenCanvas2.width = -1; }); - assert_throws(new TypeError(), function() { offscreenCanvas2.height = -1; }); + assert_throws_js(TypeError, function() { offscreenCanvas2.width = -1; }); + assert_throws_js(TypeError, function() { offscreenCanvas2.height = -1; }); var obj = {Name: "John Doe", Age: 30}; - assert_throws(new TypeError(), function() { offscreenCanvas2.width = obj; }); - assert_throws(new TypeError(), function() { offscreenCanvas2.height = obj; }); - assert_throws(new TypeError(), function() { new OffscreenCanvas(obj, obj); }); + assert_throws_js(TypeError, function() { offscreenCanvas2.width = obj; }); + assert_throws_js(TypeError, function() { offscreenCanvas2.height = obj; }); + assert_throws_js(TypeError, function() { new OffscreenCanvas(obj, obj); }); t2.done(); }); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.getcontext.html b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.getcontext.html index 7aaa0e6c36a..0cb0abcc3b1 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.getcontext.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.getcontext.html @@ -7,7 +7,7 @@ test(function() { var offscreenCanvas = new OffscreenCanvas(1, 1); - assert_throws(new TypeError(), function() { offscreenCanvas.getContext('3d'); }); + assert_throws_js(TypeError, function() { offscreenCanvas.getContext('3d'); }); }, "Test that getContext with un-supported string throws a TypeError."); test(function() { diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.getcontext.worker.js b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.getcontext.worker.js index ced412fb894..d82b5a1c8d7 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.getcontext.worker.js +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.getcontext.worker.js @@ -5,7 +5,7 @@ importScripts("/2dcontext/resources/canvas-tests.js"); test(function() { var offscreenCanvas = new OffscreenCanvas(1, 1); - assert_throws(new TypeError(), function() { offscreenCanvas.getContext('3d'); }); + assert_throws_js(TypeError, function() { offscreenCanvas.getContext('3d'); }); }, "Test that getContext with un-supported string throws a TypeError."); test(function() { diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.resize.html b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.resize.html index 0922727c61e..a0d4263c935 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.resize.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.resize.html @@ -42,8 +42,8 @@ test(function() { placeholder.width = 2; placeholder.height = 2; var offscreen = placeholder.transferControlToOffscreen(); - assert_throws("InvalidStateError", () => { placeholder.width = 1; }); - assert_throws("InvalidStateError", () => { placeholder.height = 1; }); + assert_throws_dom("InvalidStateError", () => { placeholder.width = 1; }); + assert_throws_dom("InvalidStateError", () => { placeholder.height = 1; }); }, "Verify that writing to the width or height attribute of a placeholder canvas throws an exception"); test(function() { @@ -51,8 +51,8 @@ test(function() { placeholder.width = 1; placeholder.height = 1; var offscreen = placeholder.transferControlToOffscreen(); - assert_throws("InvalidStateError", () => { placeholder.width = 1; }); - assert_throws("InvalidStateError", () => { placeholder.height = 1; }); + assert_throws_dom("InvalidStateError", () => { placeholder.width = 1; }); + assert_throws_dom("InvalidStateError", () => { placeholder.height = 1; }); }, "Verify that writing to the width or height attribute of a placeholder canvas throws an exception even when not changing the value of the attribute."); test(function() { diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfer.to.imagebitmap.html b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfer.to.imagebitmap.html index 31187c64e3d..e127a1eef85 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfer.to.imagebitmap.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfer.to.imagebitmap.html @@ -99,13 +99,13 @@ async_test(function(t) { var worker = makeWorker(document.getElementById("myWorker").textContent); var offscreenCanvas = new OffscreenCanvas(10, 10); worker.postMessage(offscreenCanvas, [offscreenCanvas]); - assert_throws("InvalidStateError", function() { offscreenCanvas.transferToImageBitmap(); }); + assert_throws_dom("InvalidStateError", function() { offscreenCanvas.transferToImageBitmap(); }); t.done(); }, "Test that call transferToImageBitmap on a detached OffscreenCanvas throws an exception"); test(function() { var offscreenCanvas = new OffscreenCanvas(10, 10); - assert_throws("InvalidStateError", function() { offscreenCanvas.transferToImageBitmap(); }); + assert_throws_dom("InvalidStateError", function() { offscreenCanvas.transferToImageBitmap(); }); }, "Test that transferToImageBitmap without a context throws an exception"); </script> diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfercontrol.to.offscreen.html b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfercontrol.to.offscreen.html index a13e989cfce..12dc47db171 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfercontrol.to.offscreen.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfercontrol.to.offscreen.html @@ -19,7 +19,7 @@ test(function() { placeholder.width = 100; placeholder.height = 50; var offscreenCanvas = placeholder.transferControlToOffscreen(); - assert_throws("InvalidStateError", function() { placeholder.getContext('2d'); }); + assert_throws_dom("InvalidStateError", function() { placeholder.getContext('2d'); }); }, "Test that calling getContext on a placeholder canvas that has already transferred its control throws an exception"); test(function() { @@ -27,7 +27,7 @@ test(function() { placeholder.width = 100; placeholder.height = 50; var offscreenCanvas = placeholder.transferControlToOffscreen(); - assert_throws("InvalidStateError", function() { placeholder.transferControlToOffscreen(); }); + assert_throws_dom("InvalidStateError", function() { placeholder.transferControlToOffscreen(); }); }, "Test that calling transferControlToOffscreen twice throws an exception"); </script> diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfercontrol.to.offscreen.w.html b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfercontrol.to.offscreen.w.html index 8637c3f7194..5030608c41b 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfercontrol.to.offscreen.w.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transfercontrol.to.offscreen.w.html @@ -55,7 +55,7 @@ async_test(function(t) { var offscreenCanvas = placeholder.transferControlToOffscreen(); var worker = makeWorker(document.getElementById("myWorker").textContent); worker.addEventListener('message', t.step_func_done(function(msg) { - assert_throws("InvalidStateError", function() { placeholder.getContext('2d'); }); + assert_throws_dom("InvalidStateError", function() { placeholder.getContext('2d'); }); })); worker.postMessage({msg: 'test2', data: offscreenCanvas}, [offscreenCanvas]); }, "Test that calling getContext on a placeholder canvas that is transferred its control to an OffscreenCanvas throws an exception, when the OffscreenCanvas is transferred to a worker"); @@ -67,7 +67,7 @@ async_test(function(t) { var offscreenCanvas = placeholder.transferControlToOffscreen(); var worker = makeWorker(document.getElementById("myWorker").textContent); worker.addEventListener('message', t.step_func_done(function(msg) { - assert_throws("InvalidStateError", function() { placeholder.transferControlToOffscreen(); }); + assert_throws_dom("InvalidStateError", function() { placeholder.transferControlToOffscreen(); }); })); worker.postMessage({msg: 'test3', data: offscreenCanvas}, [offscreenCanvas]); }, "Test that calling transferControlToOffscreen twice throws an exception, when its associated OffscreenCanvas is transferred to a worker"); diff --git a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transferrable.html b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transferrable.html index bc2ac3aae05..2ad46411462 100644 --- a/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transferrable.html +++ b/tests/wpt/web-platform-tests/offscreen-canvas/the-offscreen-canvas/offscreencanvas.transferrable.html @@ -44,7 +44,7 @@ test(function() { var worker = makeWorker(document.getElementById("myWorker").textContent); var offscreenCanvas = new OffscreenCanvas(10, 10); var ctx = offscreenCanvas.getContext(contextType); - assert_throws("InvalidStateError", function() { + assert_throws_dom("InvalidStateError", function() { worker.postMessage({offscreenCanvas}, [offscreenCanvas]); }); } @@ -56,7 +56,7 @@ test(function() { var worker = makeWorker(document.getElementById("myWorker").textContent); var offscreenCanvas = new OffscreenCanvas(10, 10); worker.postMessage({offscreenCanvas}, [offscreenCanvas]); - assert_throws("InvalidStateError", function() { + assert_throws_dom("InvalidStateError", function() { worker.postMessage({offscreenCanvas}, [offscreenCanvas]); }); }, "Test that transfer an OffscreenCanvas twice throws exception."); @@ -65,7 +65,7 @@ test(function() { var worker = makeWorker(document.getElementById("myWorker").textContent); var offscreenCanvas = new OffscreenCanvas(10, 10); worker.postMessage({offscreenCanvas}, [offscreenCanvas]); - assert_throws("InvalidStateError", function() { + assert_throws_dom("InvalidStateError", function() { offscreenCanvas.getContext('2d'); }); }, "Test that calling getContext('2d') on a detached OffscreenCanvas throws exception."); @@ -74,7 +74,7 @@ test(function() { var worker = makeWorker(document.getElementById("myWorker").textContent); var offscreenCanvas = new OffscreenCanvas(10, 10); worker.postMessage({offscreenCanvas}, [offscreenCanvas]); - assert_throws("InvalidStateError", function() { + assert_throws_dom("InvalidStateError", function() { offscreenCanvas.getContext('webgl'); }); }, "Test that calling getContext('webgl') on a detached OffscreenCanvas throws exception."); diff --git a/tests/wpt/web-platform-tests/old-tests/submission/Microsoft/history/history_000.htm b/tests/wpt/web-platform-tests/old-tests/submission/Microsoft/history/history_000.htm index 855612b82a9..d592f10dc2f 100644 --- a/tests/wpt/web-platform-tests/old-tests/submission/Microsoft/history/history_000.htm +++ b/tests/wpt/web-platform-tests/old-tests/submission/Microsoft/history/history_000.htm @@ -121,14 +121,14 @@ test(function() { //trigger a security error by replacing the host of the current url with a fake one that is cross-domain var testurl = testframe1.contentWindow.location.href.toString().replace(testframe1.contentWindow.location.host, "fakelocation-push"); - assert_throws("SECURITY_ERR", function() { history.pushState(null, null, testurl); }, "Security_Err 18 should be thrown"); + assert_throws_dom("SECURITY_ERR", function() { history.pushState(null, null, testurl); }, "Security_Err 18 should be thrown"); }, "history.pushState throws DOMException with code SECURITY_ERR (18)"); }, function() { test(function() { //trigger a data clone error by passing invalid SCA data into the function - assert_throws("DATA_CLONE_ERR", function() { history.pushState(document.body, null); }, "pushState should throw an exception DATA_CLONE_ERR with code 25"); + assert_throws_dom("DATA_CLONE_ERR", function() { history.pushState(document.body, null); }, "pushState should throw an exception DATA_CLONE_ERR with code 25"); }, "history.pushState throws DATA_CLONE_ERR(25) for bad state parameter"); }, @@ -200,14 +200,14 @@ test(function() { //trigger a security error by replacing the host of the current url with a fake one that is cross-domain var testurl = testframe1.contentWindow.location.href.toString().replace(testframe1.contentWindow.location.host, "fakelocation-replace"); - assert_throws("SECURITY_ERR", function() { history.replaceState(null, null, testurl); }, "Security_Err 18 should be thrown"); + assert_throws_dom("SECURITY_ERR", function() { history.replaceState(null, null, testurl); }, "Security_Err 18 should be thrown"); }, "history.replaceState throws DOMException with code SECURITY_ERR (18)"); }, function() { test(function() { //trigger a data clone error by passing invalid SCA data into the function - assert_throws("DATA_CLONE_ERR", function() {history.replaceState(document.body, null);}, "replaceState should throw an exception DATA_CLONE_ERR with code 25"); + assert_throws_dom("DATA_CLONE_ERR", function() {history.replaceState(document.body, null);}, "replaceState should throw an exception DATA_CLONE_ERR with code 25"); }, "history.replaceState throws DATA_CLONE_ERR(25) for bad state parameter"); }, diff --git a/tests/wpt/web-platform-tests/orientation-sensor/orientation-sensor-tests.js b/tests/wpt/web-platform-tests/orientation-sensor/orientation-sensor-tests.js index fb6d83faa8b..5d35f3b9afc 100644 --- a/tests/wpt/web-platform-tests/orientation-sensor/orientation-sensor-tests.js +++ b/tests/wpt/web-platform-tests/orientation-sensor/orientation-sensor-tests.js @@ -33,15 +33,15 @@ async function checkPopulateMatrix(t, sensorProvider, sensorType) { const eventWatcher = new EventWatcher(t, sensor, ["reading", "error"]); // Throws with insufficient buffer space. - assert_throws({ name: 'TypeError' }, + assert_throws_js(TypeError, () => sensor.populateMatrix(new Float32Array(15))); // Throws if no orientation data available. - assert_throws({ name: 'NotReadableError' }, + assert_throws_dom('NotReadableError', () => sensor.populateMatrix(new Float32Array(16))); // Throws if passed SharedArrayBuffer view. - assert_throws({ name: 'TypeError' }, + assert_throws_js(TypeError, () => sensor.populateMatrix(new Float32Array(new SharedArrayBuffer(16)))); sensor.start(); diff --git a/tests/wpt/web-platform-tests/paint-timing/basetest.html b/tests/wpt/web-platform-tests/paint-timing/basetest.html index 7f84566d9a8..d4dfe7ed822 100644 --- a/tests/wpt/web-platform-tests/paint-timing/basetest.html +++ b/tests/wpt/web-platform-tests/paint-timing/basetest.html @@ -9,6 +9,7 @@ <script> async_test(function(t) { + assert_precondition(window.PerformancePaintTiming, "Paint Timing isn't supported."); t.step(function() { const bufferedEntries = performance.getEntriesByType('paint'); assert_equals(bufferedEntries.length, 0, "No paint entries yet"); diff --git a/tests/wpt/web-platform-tests/paint-timing/buffered-flag.window.js b/tests/wpt/web-platform-tests/paint-timing/buffered-flag.window.js index 7069eb6ccde..4654c925ca0 100644 --- a/tests/wpt/web-platform-tests/paint-timing/buffered-flag.window.js +++ b/tests/wpt/web-platform-tests/paint-timing/buffered-flag.window.js @@ -1,4 +1,5 @@ async_test(t => { + assert_precondition(window.PerformancePaintTiming, "Paint Timing isn't supported."); // First observer creates second in callback to ensure the entry has been dispatched by the time // the second observer begins observing. let entries_seen = 0; diff --git a/tests/wpt/web-platform-tests/paint-timing/child-painting-first-image.html b/tests/wpt/web-platform-tests/paint-timing/child-painting-first-image.html index 4671604cf09..d78af081ef8 100644 --- a/tests/wpt/web-platform-tests/paint-timing/child-painting-first-image.html +++ b/tests/wpt/web-platform-tests/paint-timing/child-painting-first-image.html @@ -5,6 +5,7 @@ <script> async_test(function (t) { + assert_precondition(window.PerformancePaintTiming, "Paint Timing isn't supported."); window.addEventListener('message', t.step_func(e => { assert_equals(e.data, '2 paint first-paint paint first-contentful-paint'); // When only child frame paints, expect only first-paint. diff --git a/tests/wpt/web-platform-tests/paint-timing/first-contentful-bg-image.html b/tests/wpt/web-platform-tests/paint-timing/first-contentful-bg-image.html index ddcc78fbe55..9c3b2200fb6 100644 --- a/tests/wpt/web-platform-tests/paint-timing/first-contentful-bg-image.html +++ b/tests/wpt/web-platform-tests/paint-timing/first-contentful-bg-image.html @@ -11,6 +11,7 @@ <footer> <script> async_test(function (t) { + assert_precondition(window.PerformancePaintTiming, "Paint Timing isn't supported."); const body = document.getElementsByTagName('body')[0]; body.style.backgroundImage = 'url(resources/circles.png)'; window.onload = function() { diff --git a/tests/wpt/web-platform-tests/paint-timing/first-contentful-canvas.html b/tests/wpt/web-platform-tests/paint-timing/first-contentful-canvas.html index 3610a57ec71..ab47aa0c21c 100644 --- a/tests/wpt/web-platform-tests/paint-timing/first-contentful-canvas.html +++ b/tests/wpt/web-platform-tests/paint-timing/first-contentful-canvas.html @@ -9,6 +9,7 @@ <script> async_test(function (t) { + assert_precondition(window.PerformancePaintTiming, "Paint Timing isn't supported."); const canvas = document.getElementById("canvas"); const context = canvas.getContext("2d"); context.beginPath(); diff --git a/tests/wpt/web-platform-tests/paint-timing/first-contentful-image.html b/tests/wpt/web-platform-tests/paint-timing/first-contentful-image.html index a4e89b37657..034391c796c 100644 --- a/tests/wpt/web-platform-tests/paint-timing/first-contentful-image.html +++ b/tests/wpt/web-platform-tests/paint-timing/first-contentful-image.html @@ -9,6 +9,7 @@ <script> async_test(function (t) { + assert_precondition(window.PerformancePaintTiming, "Paint Timing isn't supported."); const img = document.createElement("IMG"); img.src = "resources/circles.png"; img.onload = function() { diff --git a/tests/wpt/web-platform-tests/paint-timing/first-contentful-paint.html b/tests/wpt/web-platform-tests/paint-timing/first-contentful-paint.html index d8eabefe12f..67d7b95eaa5 100644 --- a/tests/wpt/web-platform-tests/paint-timing/first-contentful-paint.html +++ b/tests/wpt/web-platform-tests/paint-timing/first-contentful-paint.html @@ -10,6 +10,7 @@ <script> async_test(function (t) { + assert_precondition(window.PerformancePaintTiming, "Paint Timing isn't supported."); const bufferedEntries = performance.getEntriesByType('paint'); assert_equals(bufferedEntries.length, 0, "No paint entries yet"); const div = document.createElement("div"); diff --git a/tests/wpt/web-platform-tests/paint-timing/first-contentful-svg.html b/tests/wpt/web-platform-tests/paint-timing/first-contentful-svg.html index cf3e9542758..8cda11c9567 100644 --- a/tests/wpt/web-platform-tests/paint-timing/first-contentful-svg.html +++ b/tests/wpt/web-platform-tests/paint-timing/first-contentful-svg.html @@ -9,6 +9,7 @@ <script> async_test(function (t) { + assert_precondition(window.PerformancePaintTiming, "Paint Timing isn't supported."); const img = document.createElement("IMG"); img.src = "resources/circle.svg"; img.onload = function() { diff --git a/tests/wpt/web-platform-tests/paint-timing/first-image-child.html b/tests/wpt/web-platform-tests/paint-timing/first-image-child.html index 0622ddef96b..9851800a7bd 100644 --- a/tests/wpt/web-platform-tests/paint-timing/first-image-child.html +++ b/tests/wpt/web-platform-tests/paint-timing/first-image-child.html @@ -9,6 +9,7 @@ <script> async_test(function (t) { + assert_precondition(window.PerformancePaintTiming, "Paint Timing isn't supported."); const iframe = document.createElement('iframe'); iframe.id = 'child-iframe'; iframe.src = 'resources/subframe-sending-paint.html'; diff --git a/tests/wpt/web-platform-tests/paint-timing/first-paint-bg-color.html b/tests/wpt/web-platform-tests/paint-timing/first-paint-bg-color.html index 46efb9e2674..5e863794d41 100644 --- a/tests/wpt/web-platform-tests/paint-timing/first-paint-bg-color.html +++ b/tests/wpt/web-platform-tests/paint-timing/first-paint-bg-color.html @@ -11,6 +11,7 @@ <footer> <script> async_test(function (t) { + assert_precondition(window.PerformancePaintTiming, "Paint Timing isn't supported."); document.body.style.backgroundColor = "#AA0000"; function testPaintEntries() { diff --git a/tests/wpt/web-platform-tests/paint-timing/first-paint-only.html b/tests/wpt/web-platform-tests/paint-timing/first-paint-only.html index fb0e7528753..ea735a246b3 100644 --- a/tests/wpt/web-platform-tests/paint-timing/first-paint-only.html +++ b/tests/wpt/web-platform-tests/paint-timing/first-paint-only.html @@ -9,6 +9,7 @@ <script> async_test(function (t) { + assert_precondition(window.PerformancePaintTiming, "Paint Timing isn't supported."); const div = document.createElement("div"); div.style.width = "100px"; div.style.height = "100px"; diff --git a/tests/wpt/web-platform-tests/paint-timing/paint-visited.html b/tests/wpt/web-platform-tests/paint-timing/paint-visited.html index a0734f97acc..9a5561d5f7f 100644 --- a/tests/wpt/web-platform-tests/paint-timing/paint-visited.html +++ b/tests/wpt/web-platform-tests/paint-timing/paint-visited.html @@ -9,7 +9,10 @@ <script src="/resources/testharnessreport.js"></script> <a id="link" href="./">link</a> <script> -/* This test ensures that an empty page is painted when there is an invisible visited link (that would be visible if the link was not visited). It's necessary that whether the page is painted or not does not depend on visitedness of the link. Otherwise the paint-timing API could be used to sniff whether a link has been visited or not. */ +/* This test ensures that an empty page is painted when there is an invisible visited link (that +would be visible if the link was not visited). It's necessary that whether the page is painted or +not does not depend on visitedness of the link. Otherwise the paint-timing API could be used to +sniff whether a link has been visited or not. */ window.onload = function() { /* Convenience helper to get the link into the browsing history. Using a relative path because some browsers only allow replaceState within the same domain. */ @@ -18,6 +21,7 @@ window.onload = function() { history.replaceState({}, "", current_url); } async_test(function(t) { + assert_precondition(window.PerformancePaintTiming, "Paint Timing isn't supported."); function testPaintEntries() { const bufferedEntries = performance.getEntriesByType('paint'); if (bufferedEntries.length < 2) { diff --git a/tests/wpt/web-platform-tests/paint-timing/sibling-painting-first-image.html b/tests/wpt/web-platform-tests/paint-timing/sibling-painting-first-image.html index d4197e8a35c..16a6f145db0 100644 --- a/tests/wpt/web-platform-tests/paint-timing/sibling-painting-first-image.html +++ b/tests/wpt/web-platform-tests/paint-timing/sibling-painting-first-image.html @@ -6,6 +6,7 @@ <iframe id="listening-iframe" src="resources/subframe-sending-paint.html"></iframe> <script> async_test(function (t) { + assert_precondition(window.PerformancePaintTiming, "Paint Timing isn't supported."); let paintingIframeHasDispatchedEntries = false; window.addEventListener('message', t.step_func(e => { if (!paintingIframeHasDispatchedEntries) { diff --git a/tests/wpt/web-platform-tests/paint-timing/supported-paint-type.window.js b/tests/wpt/web-platform-tests/paint-timing/supported-paint-type.window.js index 36acf82ca3b..c2c3cf5d6dd 100644 --- a/tests/wpt/web-platform-tests/paint-timing/supported-paint-type.window.js +++ b/tests/wpt/web-platform-tests/paint-timing/supported-paint-type.window.js @@ -1,25 +1,22 @@ test(() => { - if (typeof PerformanceObserver.supportedEntryTypes === "undefined") - assert_unreached("supportedEntryTypes is not supported."); + assert_precondition(typeof PerformanceObserver.supportedEntryTypes !== "undefined", 'supportedEntryTypes is not supported'); assert_true(PerformanceObserver.supportedEntryTypes.includes("paint"), "There should be an entry 'paint' in PerformanceObserver.supportedEntryTypes"); }, "supportedEntryTypes contains 'paint'."); -if (typeof PerformanceObserver.supportedEntryTypes !== "undefined") { - const entryType = 'paint'; - if (PerformanceObserver.supportedEntryTypes.includes(entryType)) { - promise_test(async() => { - await new Promise((resolve) => { - new PerformanceObserver(function (list, observer) { - observer.disconnect(); - resolve(); - }).observe({entryTypes: [entryType]}); +const entryType = 'paint'; +promise_test(async() => { + assert_precondition(typeof PerformanceObserver.supportedEntryTypes !== "undefined", 'supportedEntryTypes is not supported'); + assert_precondition(typeof PerformanceObserver.supportedEntryTypes.includes(entryType), `supportedEntryTypes does not include '${entryType}'`); + await new Promise((resolve) => { + new PerformanceObserver(function (list, observer) { + observer.disconnect(); + resolve(); + }).observe({entryTypes: [entryType]}); - // Force the PerformanceEntry. - // Use `self` for Workers. - if (self.document) - document.head.parentNode.appendChild(document.createTextNode('foo')); - }) - }, `'${entryType}' entries should be observable.`) - } -} + // Force the PerformanceEntry. + // Use `self` for Workers. + if (self.document) + document.head.parentNode.appendChild(document.createTextNode('foo')); + }) +}, `'${entryType}' entries should be observable.`) diff --git a/tests/wpt/web-platform-tests/payment-method-id/payment-request-ctor-pmi-handling.https.html b/tests/wpt/web-platform-tests/payment-method-id/payment-request-ctor-pmi-handling.https.html index 5f888f0389f..4ef083ebb4f 100644 --- a/tests/wpt/web-platform-tests/payment-method-id/payment-request-ctor-pmi-handling.https.html +++ b/tests/wpt/web-platform-tests/payment-method-id/payment-request-ctor-pmi-handling.https.html @@ -111,8 +111,8 @@ test(() => { ["visa","mastercard"], // stringifies to "visa,mastercard" ]; for (const invalidMethod of invalidMethods) { - assert_throws( - new RangeError(), + assert_throws_js( + RangeError, () => { const methods = [{ supportedMethods: invalidMethod }]; new PaymentRequest(methods, defaultDetails); @@ -135,8 +135,8 @@ test(() => { "https://", ]; for (const invalidMethod of invalidMethods) { - assert_throws( - new RangeError(), + assert_throws_js( + RangeError, () => { const methods = [{ supportedMethods: invalidMethod }]; new PaymentRequest(methods, defaultDetails); diff --git a/tests/wpt/web-platform-tests/payment-request/MerchantValidationEvent/complete-method.https.html b/tests/wpt/web-platform-tests/payment-request/MerchantValidationEvent/complete-method.https.html index 4edfd54f40e..36bfdb2160a 100644 --- a/tests/wpt/web-platform-tests/payment-request/MerchantValidationEvent/complete-method.https.html +++ b/tests/wpt/web-platform-tests/payment-request/MerchantValidationEvent/complete-method.https.html @@ -8,7 +8,7 @@ <script> test(() => { const event = new MerchantValidationEvent("test"); - assert_throws("InvalidStateError", () => { + assert_throws_dom("InvalidStateError", () => { event.complete(""); }) }, "If event's isTrusted attribute is false, then then throw an InvalidStateError DOMException."); diff --git a/tests/wpt/web-platform-tests/payment-request/MerchantValidationEvent/constructor.https.html b/tests/wpt/web-platform-tests/payment-request/MerchantValidationEvent/constructor.https.html index da30fef0019..9fdf78ddb3d 100644 --- a/tests/wpt/web-platform-tests/payment-request/MerchantValidationEvent/constructor.https.html +++ b/tests/wpt/web-platform-tests/payment-request/MerchantValidationEvent/constructor.https.html @@ -64,7 +64,7 @@ test(() => { test(() => { const validationURL = "http://\u005B"; // invalid URL - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new MerchantValidationEvent("test", { validationURL }); }); }, "Must throw TypeError if initialized with an invalid URL."); @@ -135,8 +135,8 @@ test(() => { "unknown://example.com/pay", ]; for (const methodName of invalidPMIs) { - assert_throws( - new RangeError(), + assert_throws_js( + RangeError, () => { const event = new MerchantValidationEvent("test", { methodName }); }, diff --git a/tests/wpt/web-platform-tests/payment-request/PaymentAddress/attributes-and-toJSON-method-manual.https.html b/tests/wpt/web-platform-tests/payment-request/PaymentAddress/attributes-and-toJSON-method-manual.https.html index 226fd88ff84..898e1916ca5 100644 --- a/tests/wpt/web-platform-tests/payment-request/PaymentAddress/attributes-and-toJSON-method-manual.https.html +++ b/tests/wpt/web-platform-tests/payment-request/PaymentAddress/attributes-and-toJSON-method-manual.https.html @@ -28,8 +28,8 @@ function runManualTest(button, expected = {}) { addr.addressLine instanceof Array, "Expected addressLine to be an array" ); - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { addr.addressLine.push("this must throw"); }, diff --git a/tests/wpt/web-platform-tests/payment-request/PaymentRequestUpdateEvent/updateWith-call-immediate-manual.https.html b/tests/wpt/web-platform-tests/payment-request/PaymentRequestUpdateEvent/updateWith-call-immediate-manual.https.html index 243250080bd..0284de78580 100644 --- a/tests/wpt/web-platform-tests/payment-request/PaymentRequestUpdateEvent/updateWith-call-immediate-manual.https.html +++ b/tests/wpt/web-platform-tests/payment-request/PaymentRequestUpdateEvent/updateWith-call-immediate-manual.https.html @@ -148,7 +148,7 @@ function testRecycleEvents({ textContent: testName }) { // Here, we try to be sneaky, and reuse the addressChangeEvent to perform the update. // However, addressChangeEvent [[waitingForUpdate]] is true, so it throws. - assert_throws( + assert_throws_dom( "InvalidStateError", () => { addressChangeEvent.updateWith(validDetails); @@ -159,7 +159,7 @@ function testRecycleEvents({ textContent: testName }) { // But optionChangeEvent is still usable tho, so... optionChangeEvent.updateWith(validDetails); - assert_throws( + assert_throws_dom( "InvalidStateError", () => { optionChangeEvent.updateWith(validDetails); diff --git a/tests/wpt/web-platform-tests/payment-request/PaymentRequestUpdateEvent/updateWith-state-checks-manual.https.html b/tests/wpt/web-platform-tests/payment-request/PaymentRequestUpdateEvent/updateWith-state-checks-manual.https.html index c5737aa8c31..fb16de5699a 100644 --- a/tests/wpt/web-platform-tests/payment-request/PaymentRequestUpdateEvent/updateWith-state-checks-manual.https.html +++ b/tests/wpt/web-platform-tests/payment-request/PaymentRequestUpdateEvent/updateWith-state-checks-manual.https.html @@ -55,7 +55,7 @@ function testRequestIsClosed(button) { responsePromise.catch(err => err); // Set request.[[state]] to closed await event.target.abort(); - assert_throws( + assert_throws_dom( "InvalidStateError", () => { event.updateWith(validDetails); @@ -80,7 +80,7 @@ function testRequestIsUpdating(button) { }); // Set request.[[updating]] to true event.updateWith(pendingPromise); - assert_throws( + assert_throws_dom( "InvalidStateError", () => { event.updateWith(validDetails); diff --git a/tests/wpt/web-platform-tests/payment-request/PaymentRequestUpdateEvent/updatewith-method.https.html b/tests/wpt/web-platform-tests/payment-request/PaymentRequestUpdateEvent/updatewith-method.https.html index 17a4741cdf9..acc62f5e2ce 100644 --- a/tests/wpt/web-platform-tests/payment-request/PaymentRequestUpdateEvent/updatewith-method.https.html +++ b/tests/wpt/web-platform-tests/payment-request/PaymentRequestUpdateEvent/updatewith-method.https.html @@ -43,7 +43,7 @@ test(() => { new PaymentRequestUpdateEvent("shippingaddresschange"), new PaymentRequestUpdateEvent("shippingoptionchange"), ].forEach(ev => { - assert_throws( + assert_throws_dom( "InvalidStateError", () => { ev.updateWith(Promise.resolve()); @@ -63,7 +63,7 @@ test(() => { ].map(ev => { request.dispatchEvent(ev); // set .target and dispatch flag // unstrusted event. - assert_throws( + assert_throws_dom( "InvalidStateError", () => { ev.updateWith(Promise.resolve()) diff --git a/tests/wpt/web-platform-tests/payment-request/allowpaymentrequest/active-document-cross-origin.https.sub.html b/tests/wpt/web-platform-tests/payment-request/allowpaymentrequest/active-document-cross-origin.https.sub.html index 48f6d906632..29d7c6010ec 100644 --- a/tests/wpt/web-platform-tests/payment-request/allowpaymentrequest/active-document-cross-origin.https.sub.html +++ b/tests/wpt/web-platform-tests/payment-request/allowpaymentrequest/active-document-cross-origin.https.sub.html @@ -17,7 +17,7 @@ async_test((t) => { path: '/common/blank.html' }); iframe.onload = t.step_func_done(() => { - assert_throws({name: 'SecurityError'}, () => { + assert_throws_dom('SecurityError', () => { new grabbedPaymentRequest(...paymentArgs); }); }); diff --git a/tests/wpt/web-platform-tests/payment-request/allowpaymentrequest/active-document-same-origin.https.html b/tests/wpt/web-platform-tests/payment-request/allowpaymentrequest/active-document-same-origin.https.html index bbcc026d527..9d5d30cdcab 100644 --- a/tests/wpt/web-platform-tests/payment-request/allowpaymentrequest/active-document-same-origin.https.html +++ b/tests/wpt/web-platform-tests/payment-request/allowpaymentrequest/active-document-same-origin.https.html @@ -13,7 +13,7 @@ async_test((t) => { const grabbedPaymentRequest = win.PaymentRequest; win.location.href = '/common/blank.html'; iframe.onload = t.step_func_done(() => { - assert_throws({name: 'SecurityError'}, () => { + assert_throws_dom('SecurityError', () => { new grabbedPaymentRequest(...paymentArgs); }); }); diff --git a/tests/wpt/web-platform-tests/payment-request/constructor_convert_method_data.https.html b/tests/wpt/web-platform-tests/payment-request/constructor_convert_method_data.https.html index 56866b43a48..f4a9a721d07 100644 --- a/tests/wpt/web-platform-tests/payment-request/constructor_convert_method_data.https.html +++ b/tests/wpt/web-platform-tests/payment-request/constructor_convert_method_data.https.html @@ -32,8 +32,8 @@ for (const supportedMethods of [].concat(knownPMIs).concat(unknownPMIs)) { const method = { supportedMethods }; const request = new PaymentRequest([method], details); - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { const badMethod = Object.assign( {}, @@ -55,8 +55,8 @@ // Only check the PMIs that are actually supported if (!(await request.canMakePayment())) continue; - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { const badMethod = Object.assign( {}, diff --git a/tests/wpt/web-platform-tests/payment-request/historical.https.html b/tests/wpt/web-platform-tests/payment-request/historical.https.html index e681f6486b9..639bd400449 100644 --- a/tests/wpt/web-platform-tests/payment-request/historical.https.html +++ b/tests/wpt/web-platform-tests/payment-request/historical.https.html @@ -37,7 +37,7 @@ test(() => { const unexpectedError = {name: 'sequence<DOMString> conversion is not allowed'}; methods.toString = () => { throw expectedError; }; Object.defineProperty(methods, '0', { get: () => { throw unexpectedError; } }); - assert_throws(expectedError, () => { + assert_throws_exactly(expectedError, () => { new PaymentRequest([{supportedMethods: methods}], {total: {label: 'bar', amount: {currency: 'BAZ', value: '0'}}}); }); }, 'supportedMethods must not support sequence<DOMString>'); diff --git a/tests/wpt/web-platform-tests/payment-request/payment-request-constructor.https.html b/tests/wpt/web-platform-tests/payment-request/payment-request-constructor.https.html index 99c25d17234..43b9588397e 100644 --- a/tests/wpt/web-platform-tests/payment-request/payment-request-constructor.https.html +++ b/tests/wpt/web-platform-tests/payment-request/payment-request-constructor.https.html @@ -108,7 +108,7 @@ test(() => { test(() => { smokeTest(); - assert_throws(new TypeError(), () => new PaymentRequest([], defaultDetails)); + assert_throws_js(TypeError, () => new PaymentRequest([], defaultDetails)); }, "If the length of the methodData sequence is zero, then throw a TypeError"); test(() => { @@ -137,7 +137,7 @@ test(() => { smokeTest(); const recursiveDictionary = {}; recursiveDictionary.foo = recursiveDictionary; - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { const methods = [ { supportedMethods: "https://wpt.fyi/payment-request", @@ -146,7 +146,7 @@ test(() => { ]; new PaymentRequest(methods, defaultDetails); }); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { const methods = [ { supportedMethods: "https://wpt.fyi/payment-request", @@ -155,8 +155,8 @@ test(() => { ]; new PaymentRequest(methods, defaultDetails); }); - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { const methods = [ { @@ -215,8 +215,8 @@ test(() => { }, }, }; - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { new PaymentRequest(defaultMethods, invalidDetails); }, @@ -238,7 +238,7 @@ test(() => { test(() => { smokeTest(); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new PaymentRequest(defaultMethods, { total: { label: "", @@ -266,8 +266,8 @@ test(() => { }, ], }; - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { new PaymentRequest(defaultMethods, invalidDetails); }, @@ -372,8 +372,8 @@ test(() => { const details = Object.assign({}, defaultDetails, { shippingOptions: [invalidShippingOption], }); - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { new PaymentRequest(defaultMethods, details, { requestShipping: true }); }, @@ -490,8 +490,8 @@ test(() => { null, "shippingOption must be null, because requestShipping is false" ); - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { new PaymentRequest(defaultMethods, details, { requestShipping: true }); }, @@ -519,8 +519,8 @@ test(() => { null, "shippingOption must be null, because requestShipping is false" ); - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { new PaymentRequest(defaultMethods, details, { requestShipping: true }); }, @@ -542,8 +542,8 @@ test(() => { }, }, }; - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { new PaymentRequest(defaultMethods, { modifiers: [invalidModifier], @@ -571,8 +571,8 @@ test(() => { }, ], }; - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { new PaymentRequest(defaultMethods, { modifiers: [invalidModifier], @@ -636,7 +636,7 @@ test(() => { }, ], }); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new PaymentRequest(defaultMethods, modifiedDetails); }); }, "Rethrow any exceptions of JSON-serializing modifier.data"); @@ -644,7 +644,7 @@ test(() => { //Setting ShippingType attribute during construction test(() => { smokeTest(); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new PaymentRequest(defaultMethods, defaultDetails, { shippingType: "invalid", }); diff --git a/tests/wpt/web-platform-tests/payment-request/payment-request-ctor-currency-code-checks.https.html b/tests/wpt/web-platform-tests/payment-request/payment-request-ctor-currency-code-checks.https.html index 1641683beb5..8004ff43f83 100644 --- a/tests/wpt/web-platform-tests/payment-request/payment-request-ctor-currency-code-checks.https.html +++ b/tests/wpt/web-platform-tests/payment-request/payment-request-ctor-currency-code-checks.https.html @@ -48,7 +48,7 @@ const invalidCurrencyCodes = [ "ınr", ]; -const RANGE_ERROR = new RangeError(); +const RANGE_ERROR = RangeError; const invalidAmount = Object.freeze({ currency: "¡INVALID!", @@ -69,7 +69,7 @@ function smokeTest() { // Process the total: test(() => { - assert_throws(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); + assert_throws_js(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); for (const validCurrency of wellFormedCurrencyCodes) { const amount = { currency: validCurrency, @@ -93,7 +93,7 @@ test(() => { }, "Check and canonicalize valid details.total.amount"); test(() => { - assert_throws(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); + assert_throws_js(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); for (const invalidCurrency of invalidCurrencyCodes) { const amount = { currency: invalidCurrency, @@ -106,7 +106,7 @@ test(() => { const details = { total, }; - assert_throws( + assert_throws_js( RANGE_ERROR, () => { new PaymentRequest(defaultMethods, details); @@ -118,7 +118,7 @@ test(() => { // If the displayItems member of details is present, then for each item in details.displayItems: test(() => { - assert_throws(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); + assert_throws_js(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); const displayItems = []; for (const validCurrency of wellFormedCurrencyCodes) { const amount = { @@ -154,7 +154,7 @@ test(() => { }, "Check and canonicalize valid details.displayItems amount"); test(() => { - assert_throws(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); + assert_throws_js(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); for (const invalidCurrency of invalidCurrencyCodes) { const amount = { currency: invalidCurrency, @@ -168,7 +168,7 @@ test(() => { total: defaultTotal, displayItems: [displayItem], }; - assert_throws( + assert_throws_js( RANGE_ERROR, () => { new PaymentRequest(defaultMethods, details); @@ -180,7 +180,7 @@ test(() => { // Process shipping options: test(() => { - assert_throws(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); + assert_throws_js(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); const shippingOptions = []; for (const validCurrency of wellFormedCurrencyCodes) { const shippingOption = { @@ -213,7 +213,7 @@ test(() => { }, "Check and canonicalize valid details.shippingOptions amount."); test(() => { - assert_throws(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); + assert_throws_js(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); for (const invalidCurrency of invalidCurrencyCodes) { const shippingOption = { id: "test", @@ -225,7 +225,7 @@ test(() => { total: defaultTotal, shippingOptions: [shippingOption], }; - assert_throws( + assert_throws_js( RANGE_ERROR, () => { new PaymentRequest(defaultMethods, details, { requestShipping: true }); @@ -237,7 +237,7 @@ test(() => { // Process payment details modifiers: test(() => { - assert_throws(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); + assert_throws_js(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); for (const validCurrency of wellFormedCurrencyCodes) { const modifier = { supportedMethods: "https://wpt.fyi", @@ -261,7 +261,7 @@ test(() => { }, "Check and canonicalize valid modifiers[n].total amount."); test(() => { - assert_throws(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); + assert_throws_js(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); for (const invalidCurrency of invalidCurrencyCodes) { const modifier = { supportedMethods: "https://wpt.fyi", @@ -274,7 +274,7 @@ test(() => { total: defaultTotal, modifiers: [modifier], }; - assert_throws( + assert_throws_js( RANGE_ERROR, () => { new PaymentRequest(defaultMethods, details); @@ -286,7 +286,7 @@ test(() => { // Process payment details modifiers: test(() => { - assert_throws(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); + assert_throws_js(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); for (const validCurrency of wellFormedCurrencyCodes) { const additionalItem = { label: "additionalItem", @@ -312,7 +312,7 @@ test(() => { }, "Check and canonicalize valid modifiers[n].additionaDisplayItem amount."); test(() => { - assert_throws(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); + assert_throws_js(RANGE_ERROR, smokeTest, "Expected smoke test to throw."); for (const invalidCurrency of invalidCurrencyCodes) { const additionalItem = { label: "additionalItem", @@ -327,7 +327,7 @@ test(() => { total: defaultTotal, modifiers: [modifier], }; - assert_throws( + assert_throws_js( RANGE_ERROR, () => { new PaymentRequest(defaultMethods, details); diff --git a/tests/wpt/web-platform-tests/payment-request/payment-request-ctor-pmi-handling.https.html b/tests/wpt/web-platform-tests/payment-request/payment-request-ctor-pmi-handling.https.html index 5f888f0389f..4ef083ebb4f 100644 --- a/tests/wpt/web-platform-tests/payment-request/payment-request-ctor-pmi-handling.https.html +++ b/tests/wpt/web-platform-tests/payment-request/payment-request-ctor-pmi-handling.https.html @@ -111,8 +111,8 @@ test(() => { ["visa","mastercard"], // stringifies to "visa,mastercard" ]; for (const invalidMethod of invalidMethods) { - assert_throws( - new RangeError(), + assert_throws_js( + RangeError, () => { const methods = [{ supportedMethods: invalidMethod }]; new PaymentRequest(methods, defaultDetails); @@ -135,8 +135,8 @@ test(() => { "https://", ]; for (const invalidMethod of invalidMethods) { - assert_throws( - new RangeError(), + assert_throws_js( + RangeError, () => { const methods = [{ supportedMethods: invalidMethod }]; new PaymentRequest(methods, defaultDetails); diff --git a/tests/wpt/web-platform-tests/performance-timeline/po-observe-type.any.js b/tests/wpt/web-platform-tests/performance-timeline/po-observe-type.any.js index 5cdac973bec..2c0719a8d14 100644 --- a/tests/wpt/web-platform-tests/performance-timeline/po-observe-type.any.js +++ b/tests/wpt/web-platform-tests/performance-timeline/po-observe-type.any.js @@ -3,7 +3,7 @@ test(() => { const obs = new PerformanceObserver(() =>{}); obs.observe({entryTypes: ["mark"]}); - assert_throws('InvalidModificationError', function () { + assert_throws_dom('InvalidModificationError', function () { obs.observe({type: "measure"}); }); }, "Calling observe() with entryTypes and then type should throw an InvalidModificationError"); @@ -11,14 +11,14 @@ test(() => { test(() => { const obs = new PerformanceObserver(() =>{}); obs.observe({type: "mark"}); - assert_throws('InvalidModificationError', function () { + assert_throws_dom('InvalidModificationError', function () { obs.observe({entryTypes: ["measure"]}); }); }, "Calling observe() with type and then entryTypes should throw an InvalidModificationError"); test(() => { const obs = new PerformanceObserver(() =>{}); - assert_throws(new SyntaxError(), function () { + assert_throws_dom("SyntaxError", function () { obs.observe({type: "mark", entryTypes: ["measure"]}); }); }, "Calling observe() with type and entryTypes should throw a SyntaxError"); diff --git a/tests/wpt/web-platform-tests/performance-timeline/po-observe.any.js b/tests/wpt/web-platform-tests/performance-timeline/po-observe.any.js index 6a673dbe784..7d7de376b25 100644 --- a/tests/wpt/web-platform-tests/performance-timeline/po-observe.any.js +++ b/tests/wpt/web-platform-tests/performance-timeline/po-observe.any.js @@ -2,16 +2,16 @@ test(function () { var obs = new PerformanceObserver(function () { return true; }); - assert_throws(new SyntaxError(), function () { + assert_throws_dom("SyntaxError", function () { obs.observe({}); }); - assert_throws(new SyntaxError(), function () { + assert_throws_dom("SyntaxError", function () { obs.observe({entryType: []}); }); }, "no 'type' or 'entryTypes' throws a SyntaxError"); test(function () { var obs = new PerformanceObserver(function () { return true; }); - assert_throws(new TypeError(), function () { + assert_throws_js(TypeError, function () { obs.observe({entryTypes: "mark"}); }); }, "entryTypes must be a sequence or throw a TypeError"); diff --git a/tests/wpt/web-platform-tests/pointerevents/pointerevent_releasepointercapture_invalid_pointerid.html b/tests/wpt/web-platform-tests/pointerevents/pointerevent_releasepointercapture_invalid_pointerid.html index 82449455167..c54e3a7ada6 100644 --- a/tests/wpt/web-platform-tests/pointerevents/pointerevent_releasepointercapture_invalid_pointerid.html +++ b/tests/wpt/web-platform-tests/pointerevents/pointerevent_releasepointercapture_invalid_pointerid.html @@ -37,7 +37,7 @@ detected_pointertypes[event.pointerType] = true; test_pointerEvent.step(function() { - assert_throws("NotFoundError", function(){ listener.releasePointerCapture(INVALID_POINTERID); }, + assert_throws_dom("NotFoundError", function(){ listener.releasePointerCapture(INVALID_POINTERID); }, "It should not be possible to release capture an invalid pointer id"); }); diff --git a/tests/wpt/web-platform-tests/pointerevents/pointerevent_setpointercapture_invalid_pointerid.html b/tests/wpt/web-platform-tests/pointerevents/pointerevent_setpointercapture_invalid_pointerid.html index 3180ca53f55..ada67fa5b7b 100644 --- a/tests/wpt/web-platform-tests/pointerevents/pointerevent_setpointercapture_invalid_pointerid.html +++ b/tests/wpt/web-platform-tests/pointerevents/pointerevent_setpointercapture_invalid_pointerid.html @@ -33,7 +33,7 @@ on_event(target0, "pointerdown", function (event) { detected_pointertypes[event.pointerType] = true; test_pointerEvent.step(function() { - assert_throws("NotFoundError", function(){ listener.setPointerCapture(INVALID_POINTERID); }, + assert_throws_dom("NotFoundError", function(){ listener.setPointerCapture(INVALID_POINTERID); }, "It should not be possible to capture an invalid pointer id"); }); test_pointerEvent.done(); // complete test diff --git a/tests/wpt/web-platform-tests/portals/portal-activate-event-constructor.html b/tests/wpt/web-platform-tests/portals/portal-activate-event-constructor.html index 7263b121151..1931e8fc865 100644 --- a/tests/wpt/web-platform-tests/portals/portal-activate-event-constructor.html +++ b/tests/wpt/web-platform-tests/portals/portal-activate-event-constructor.html @@ -20,6 +20,6 @@ test(() => { test(() => { const e = new PortalActivateEvent("portalactivate"); - assert_throws("InvalidStateError", () => e.adoptPredecessor()); + assert_throws_dom("InvalidStateError", () => e.adoptPredecessor()); }, "Invoking adoptPredecessor on a synthetic PortalActivateEvent should throw"); </script> diff --git a/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationConnection_send-manual.https.html b/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationConnection_send-manual.https.html index 9bdd0859b1c..fcc91212e05 100644 --- a/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationConnection_send-manual.https.html +++ b/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationConnection_send-manual.https.html @@ -65,7 +65,7 @@ // send data in "connecting" state (throws an exception) assert_equals(connection.state, 'connecting', 'the initial state of the presentation connection is "connecting"'); - assert_throws('InvalidStateError', () => { + assert_throws_dom('InvalidStateError', () => { connection.send(''); }, 'an InvalidStateError is thrown if the state is "connecting"'); @@ -103,7 +103,7 @@ return watcher.wait_for('close'); }).then(() => { assert_equals(connection.state, 'closed', 'the state is set to "closed" when the presentation connection is closed'); - assert_throws('InvalidStateError', () => { + assert_throws_dom('InvalidStateError', () => { connection.send(''); }, 'an InvalidStateError is thrown if the state is "closed"'); @@ -117,7 +117,7 @@ return watcher.wait_for('terminate'); }).then(() => { assert_equals(connection.state, 'terminated', 'the state is set to "terminated" when the presentation connection is terminated'); - assert_throws('InvalidStateError', () => { + assert_throws_dom('InvalidStateError', () => { connection.send(''); }, 'an InvalidStateError is thrown if the state is "terminated"'); }); diff --git a/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationRequest_error.https.html b/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationRequest_error.https.html index cb22b4368ab..68e0fbcd222 100644 --- a/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationRequest_error.https.html +++ b/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationRequest_error.https.html @@ -9,27 +9,27 @@ <script> test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new PresentationRequest(); }, 'Call PresentationRequest() constructor without presentation URL. TypeError Exception expected.'); - assert_throws('NotSupportedError', () => { + assert_throws_dom('NotSupportedError', () => { new PresentationRequest([]); }, 'Call PresentationRequest constructor with an empty sequence. NotSupportedError Exception expected.'); - assert_throws('SyntaxError', () => { + assert_throws_dom('SyntaxError', () => { new PresentationRequest('https://@'); }, 'Call PresentationRequest constructor with an invalid URL. SyntaxError Exception expected.'); - assert_throws('NotSupportedError', () => { + assert_throws_dom('NotSupportedError', () => { new PresentationRequest('unsupported://example.com'); }, 'Call PresentationRequest constructor with an unsupported URL. NotSupportedError expected.'); - assert_throws('SyntaxError', function() { + assert_throws_dom('SyntaxError', function() { new PresentationRequest(['presentation.html', 'https://@']); }, 'Call PresentationRequest constructor with a sequence of URLs, one of them invalid. SyntaxError Exception expected.'); - assert_throws('NotSupportedError', function() { + assert_throws_dom('NotSupportedError', function() { new PresentationRequest(['unsupported://example.com', 'invalid://example.com']); }, 'Call PresentationRequest constructor only with a sequence of unsupported URLs. NotSupportedError Exception expected.'); }); diff --git a/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationRequest_mixedcontent.https.html b/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationRequest_mixedcontent.https.html index 52a520b748f..3b19b9c9bd2 100644 --- a/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationRequest_mixedcontent.https.html +++ b/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationRequest_mixedcontent.https.html @@ -12,7 +12,7 @@ }; test(function () { - assert_throws('SecurityError', createPresentation); + assert_throws_dom('SecurityError', createPresentation); }); </script> diff --git a/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationRequest_mixedcontent_multiple.https.html b/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationRequest_mixedcontent_multiple.https.html index 862cb45c06f..e9571224d62 100644 --- a/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationRequest_mixedcontent_multiple.https.html +++ b/tests/wpt/web-platform-tests/presentation-api/controlling-ua/PresentationRequest_mixedcontent_multiple.https.html @@ -15,7 +15,7 @@ }; test(function () { - assert_throws('SecurityError', createPresentation); + assert_throws_dom('SecurityError', createPresentation); }); </script> diff --git a/tests/wpt/web-platform-tests/presentation-api/controlling-ua/defaultRequest.https.html b/tests/wpt/web-platform-tests/presentation-api/controlling-ua/defaultRequest.https.html index bc07e02748c..713cea7f9ae 100644 --- a/tests/wpt/web-platform-tests/presentation-api/controlling-ua/defaultRequest.https.html +++ b/tests/wpt/web-platform-tests/presentation-api/controlling-ua/defaultRequest.https.html @@ -14,7 +14,7 @@ navigator.presentation.defaultRequest = request; assert_equals(navigator.presentation.defaultRequest, request, 'The default presentation request is set to an instance of PresentationRequest.'); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { navigator.presentation.defaultRequest = {}; }, 'The default presentation request cannot be set to any value but an instance of PresentationRequest or null.'); diff --git a/tests/wpt/web-platform-tests/presentation-api/receiving-ua/PresentationConnection_send-manual.https.html b/tests/wpt/web-platform-tests/presentation-api/receiving-ua/PresentationConnection_send-manual.https.html index f600a7fba23..188f7e3fc1b 100644 --- a/tests/wpt/web-platform-tests/presentation-api/receiving-ua/PresentationConnection_send-manual.https.html +++ b/tests/wpt/web-platform-tests/presentation-api/receiving-ua/PresentationConnection_send-manual.https.html @@ -88,7 +88,7 @@ if (!result.type || result.type !== 'error') assert_unreached('an InvalidStateError is thrown if the state is "closed"'); else - assert_throws('InvalidStateError', () => { + assert_throws_dom('InvalidStateError', () => { throw new DOMException(result.message, result.name); }, 'an InvalidStateError is thrown if the state is "closed"'); }); diff --git a/tests/wpt/web-platform-tests/priority-hints/fetch-api-request.tentative.any.js b/tests/wpt/web-platform-tests/priority-hints/fetch-api-request.tentative.any.js index e492d87d4f2..0c10a3e2f96 100644 --- a/tests/wpt/web-platform-tests/priority-hints/fetch-api-request.tentative.any.js +++ b/tests/wpt/web-platform-tests/priority-hints/fetch-api-request.tentative.any.js @@ -1,5 +1,5 @@ test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new Request("", {importance: 'invalid'}); }, "a new Request() must throw a TypeError if RequestInit's importance is an invalid value"); }, "new Request() throws a TypeError if any of RequestInit's members' values are invalid"); diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..4c3802dae79 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..d394bd1e4e2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..85ca63d1470 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..a05223441ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..080260e7d46 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..142fe0c1344 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..68b6b4796d3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..95991260cc3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..143b92c3e94 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..caccf277e48 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ff2b557f1a5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..361752465e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b313e1b8cf0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..2bfdf1f966f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..15949d8d11f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..05b2a3d68eb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..c3b6f6c7c7f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e83bf31950d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..35a96050dc6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..3d04cad1f38 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..30577195c98 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..cf51c1e72a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d817ec4dd12 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..72df66720b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..43761121a3c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..edf6ad13a05 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..0a3c40a408e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..9d4b569cdf4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..42d30788381 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..c172ab34c71 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..211188643b0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..774fc69efe7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a8590f135b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..acb73e754ce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..460e2460525 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2dbf501e788 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..1eb93554227 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..f28f6a8c9ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..d052d045239 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..a2130565292 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..9dd49623438 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..58fb3efe76a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..a351c338b6a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..0741ca04100 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..841e3175422 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..69fdbcb1058 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e47f4ff801b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1222252b6a4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..4ecc3367b63 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..4f6a3571834 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..395db421847 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..ec9da8a2a02 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..79e00866ba6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2637d13d36c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3e5b298f86f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c71ca117226 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..af90b554010 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9cf74fd7e0d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..3f8822828b5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..de626c259d0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..608802389c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..481f3a25060 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4914ed183ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..5248a244a40 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4371218111e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..68a6e853aba --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b0ef51f4d74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..5bdb3f44dad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..64f40b9ac99 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..49b21a9aaf9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0e68ad23e60 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d45ec515a50 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..efa73828287 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1e17c7be9c6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..44f55bc82b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..11d28f2b7b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8eb728b6883 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..fb4e67dbce8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a2f1b18267e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d0ebc66aa5f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a6a7f916ec3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..97172fc6af4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fb5e75f4746 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..fcc3079d1c0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d24f65ca2e9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b20fac55fad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..00624e1b0c3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..89c78640687 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e23fa374b46 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4325995f1cb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..218bc1ae9c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..f5b8b464b8a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..10227f71543 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..70b830df152 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..cc96f816cab --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c96b1a3bd2b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..32fa5eb0be0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8a3a657822b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..96195c261f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ea6022df1ab --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..af7c40febec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..781a8d446c6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f0dc7c38ce1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..683b8b5ca96 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..edffa0f3ace --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5083fe37990 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..064e09bd7ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d31d03a8071 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8f1c4717df9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2d8fe73002f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0693a8f3fcb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..311bd13bf45 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2249c1a161d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f0544a56011 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..eb5ed99ebef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2dc52498384 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d8f11e5abb4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..77e969c673f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7ce3088cbda --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d6702e6fe44 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ea3e7b68f44 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..3d23c296934 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..92dc5c75764 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..dcab0bfa862 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..064250efda3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..a804d60f937 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..99e306b5f5f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..db0e25e6c3b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..03f565a69be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..726c8d7f140 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..a88cb365519 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..43c875becbc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a5aacc5bde4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e8e550e70b5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..a975e0afe22 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7b4b354e222 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..019586e19b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..83a5347eec7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..83175ed9536 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ad0d2ea3aa8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..9682e79855d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4e6c295b183 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..e21471beb3b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..31a5606e98d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7d8bcd93218 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..62bdb36df8a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..33058b7004c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..60ade0b6a2a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..c3c99c95461 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..b94df6fa438 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..8986821f7f2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..464b20c87ab --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..64d312c68e5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a7a0d8b14ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..e34b0f44137 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e79090f32fd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6a44f60bd6c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..f5650aee090 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..f73d530e189 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..0bb37b4900d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e075d359cf3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..61350037cc2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..8f596f55e15 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..658891c390e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a2374195345 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..bf2c352f98e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..2d0b84962ba --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..30177b584db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..dacd57f68ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..5f8812e2f43 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..73dbd33dc70 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..8ec97700201 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..047485e38b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..64f10038370 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a23d7d20df6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..cef8fdb5e81 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a3aa1db13f5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..941850e8b6b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..120efba8c36 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d460510fdc5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..50cf5378fff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..956d32a212a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..036392abd66 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b33893e9336 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..bdd7631581f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b4ef622748b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b2c8a07785f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..8dd5eb8630d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..96705247c6e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..08b38475ab7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e9f0d495048 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..f88769fd9c0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a747db8bf19 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6fbdb686a1a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..a7e3dc51855 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..2a50287c1bb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..acb2d52a9e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..8c16c05f1a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..496d12d647b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..1b0378a3679 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..00bea0d3a51 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ac2686bf311 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0c72b8e9d36 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..d6c068b61b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..444b3ef22f9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..4e33ed9551b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..d458756330b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..26b3bfd4d0c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..a0ccb1b05a4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..c6445444c0d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..d1f5a4d16ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..631165464cd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..c38aec92be2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8dbe6086637 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..793297d1697 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e46888e7dd1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..62ce6a41480 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..6afa660bf9d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..c32fe9b95d5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e7cbc17b7c1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..7446d6cb7f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..1f14c13bc58 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..f27f5a9ea8c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..3fc281e8deb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..1343e9370ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..aa5a4dda5b0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..16d6b375c4f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..d9c21291c9e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..f383932ad52 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7f0a7900e03 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..afef1ce00fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e0fbedab983 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..f737d136298 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..9d94546fe02 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..f73a67d4030 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..e5329556d40 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..424154f44e6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1e0fe60c46c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b1c1b2c7892 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c6d6679ef33 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0ec1d058859 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..1b5110c28cf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..43e2070ea66 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c82ebd1769b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..79c204fee0a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d7f31ea497a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..522877903c5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5dc0587fc0a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..34fa9f77036 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0de1d990786 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..ed256fe53d2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..1a93d1fce38 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..25f197009e6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..54c3a070d61 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..346d4c1ea2a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..15e1b94c00d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4f7ed37e7b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..7fa22ec13e4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c16b91a511a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..66b00c80385 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..536a94590b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..7ef3918a8ef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..5b1bf55d659 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7c8843bea8e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..caa7bc3b5c1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..6e6134809d1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..71c7443ee51 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..b50c96be0e7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..986de2112fd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..c6fe553114a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..4cbd4308984 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4bbc0305cc9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d3c1792b804 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a91366efb77 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..00f9d4ff054 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..44c7e6efbc0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..ff30b9ecf79 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..775025d2bf3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..6eb042c6581 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..5fe6c8be51c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..00020010b83 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..47540313d0b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..56552a05ade --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..59fd3b6e252 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0ed6e096dc8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..6d9de995d8d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..b0e2201884d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..c782e4c7e0b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..fdd5ecf8f80 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..73566bf3649 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1417dc92468 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..76ba3f84056 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..7b9302e4f89 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..2de8c8cb1df --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..5ab7aacd9bf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..94899b0eef8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2ca30553142 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..79b0e7039db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..ad3eb19f8c1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..4e8730f4180 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..647a7726178 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..12625ee696f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b8c9c4a0683 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..99e234cb77a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..1de1d44ae49 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..19da7b57a4e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..d8ff85a0dc6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1ee7b80a5e6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3022b6479d1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b9cf476c07f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..36c43b36d7a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..a6bb6f1e477 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e9145326584 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c51267686eb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..793c4a90bcf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5e7abe84be1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5eea8def593 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6bd1a59d715 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..dee29c95da1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..b4129f05115 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..af904eec692 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..9d2464d73ea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..52c65b0df41 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..8f326c12977 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..eeacfc72403 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..629f0b1e432 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0f195ad8458 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..3aef44d2db0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..02b9018cf87 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..de558ff53a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..5b86e03f24a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a04ef6cafd7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..837cc3dbc06 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b39a5057e80 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ee7241a12c9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..77028a538b5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8ae44989ba5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7f2c372b0e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d430552bc44 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..20b7dd54bff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..475a0bc5a34 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..17ab76a033b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b8d754a7c52 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fd82790469e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f51a49eaea3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..903caf9ab99 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..408d57c2050 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fcc2d6ae894 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..437779cb3ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..08b5b0661ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ccf400275a2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c687779eceb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3bee5c4875f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..380a4a716a9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e0f8eff6a54 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1b7606dcb22 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fc229db6525 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..515f07ea0e9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..efa5245864c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..03a0fcb679e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9e19c534df9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..24ce029049a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..66ac7130d25 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3f68452cf73 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1ac53f3c3b9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9dfdd01c4f8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e86f4558a22 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..74fe3da8fdc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..814ee1f816b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..86288171f40 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0b3c0515009 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..060341416a2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ff5c12b1d88 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c3e0c85db0e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..475118b602c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8ffdffb5074 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e62460cf05c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0f602308263 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..28d85879598 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c865d14f103 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3e5a4471519 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..cd3fa41ec7c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e5151b0cef1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..26e1ad11e8c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3beb9397b53 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..704a84ccae2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..5ed3aee5ecc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1101eb09b35 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..6a5fb25d427 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..e7c2e37a22c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..09f961930aa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..57b2a1b801a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..620a3ee07af --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ef8f517d3f7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b56e6763a9e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..112dc5a5c8f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..1ec5d4200f0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..57fa649afa3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..734d2254f88 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..9082bf4ccf4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..9b76a680e89 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..75a991a04fa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..c25c3defc43 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..701f2d73bcd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d290db53f79 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3a7120351b6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..3e85f68d713 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..34484fdf417 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..f59b0b40090 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..01eec1bee2a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..c221f6f7ac4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..a9aa1d82399 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..581e7ce0b9c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..4d5613013c0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b45eb6e9cee --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..eee2437ca18 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f29bb36f18e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c8969f1d778 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..5d9bc6944d9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..dc3a34ce57c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7406e3f96c1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..d8256f74b3e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..be2c3ca9b28 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..0bc9282b76a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..490821d67af --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..bddaefc4a98 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b4d36fa5874 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..b4f501fbbeb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..cb623363537 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c382dadaa45 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..597dd7ef2e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c879e822992 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..56225dbc3af --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..c1fb0addb6e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a18c4e6371e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..207b7fd9638 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d3e4aeeaad2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b018ba12e8f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1b8bd3581ad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8d6a0159bfe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..93799cad263 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..4eeff108866 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..833ccfeda04 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..85d74f6f12a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..84662c7139e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..783a4281312 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..bcb3912c4ee --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..915430e2bf0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..06e2040989f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..4c448982ae0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..470a1fed5dd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..c69cc65b24f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..f88769fd9c0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a747db8bf19 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6fbdb686a1a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..a7e3dc51855 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..2a50287c1bb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..acb2d52a9e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..8c16c05f1a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..496d12d647b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..1b0378a3679 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..00bea0d3a51 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ac2686bf311 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0c72b8e9d36 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..d6c068b61b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..444b3ef22f9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..4e33ed9551b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..d458756330b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..26b3bfd4d0c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..a0ccb1b05a4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..c6445444c0d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..d1f5a4d16ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..631165464cd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..c38aec92be2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8dbe6086637 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..793297d1697 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e46888e7dd1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..62ce6a41480 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..6afa660bf9d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..c32fe9b95d5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e7cbc17b7c1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..7446d6cb7f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..1f14c13bc58 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..f27f5a9ea8c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..3fc281e8deb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..1343e9370ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..aa5a4dda5b0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..16d6b375c4f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..d9c21291c9e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..f383932ad52 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7f0a7900e03 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..afef1ce00fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e0fbedab983 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..f737d136298 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..9d94546fe02 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..f73a67d4030 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..e5329556d40 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..424154f44e6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1e0fe60c46c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b1c1b2c7892 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c6d6679ef33 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0ec1d058859 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..1b5110c28cf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..43e2070ea66 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c82ebd1769b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..79c204fee0a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d7f31ea497a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..522877903c5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5dc0587fc0a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..34fa9f77036 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0de1d990786 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..ed256fe53d2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..1a93d1fce38 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..25f197009e6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..54c3a070d61 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..346d4c1ea2a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..15e1b94c00d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4f7ed37e7b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..7fa22ec13e4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c16b91a511a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..66b00c80385 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..536a94590b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K+1/gen/top.meta/unset/xhr/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K+1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..54160250a64 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a14fab1396f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..853e3ecd98f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..f296d012d82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..2d3b451e43e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..30a0ee652cd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..8576b77ec6b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..7e4f30fc2e8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..dcce9ea64ad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..a2b413197ba --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..74ed4c622f3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8f19bf48229 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c6591c90407 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..b3ae0354843 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..ca967c585c9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..7a620541464 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..806fab6c61d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..f71d39ca069 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..978ac1d7fac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..c9db3acde9c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..3decd3a67f4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..9277073bbab --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..912e6135da6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9e09c25bde8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b2c36993e9f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..36c37a40fea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b994dde1720 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..5da33c6f1f3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..efa5d3118f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..3787093e5bd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..d6c6c6b6d54 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..5226e583a55 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..e7420da5a18 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..95816eb2034 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8fa1801dbc1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..f268a6ed6eb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..f5d1eed2106 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..a9df49d8756 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..87c7b14bad3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..21c9f250b51 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..1009f359e87 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..bdebaeee48f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..598bf0aaf23 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..f2e819ce368 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b8ddb48fd21 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..4c6aa0e5cab --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8c499d35c7b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..36692fccdb8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e8578c365ca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..5d489db7aa6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9ede931dae5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..9ca994d57ea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..37d2238c09d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3f69bbd2191 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..43bfecf19db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..67900f9062e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..dc43bf41461 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..32bedff1177 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..1fe69c1af24 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..90503c86c9a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..dd9e20f0953 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..92fd41603e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..f5d55ebf08c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..9ca3d898262 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8797d24f912 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a21632865ce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..f47d931ac09 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..1cc027e3fcb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9577dddc93b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..fc5b92fce9d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9a2b056c8c6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6f3bb72674a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..731c6fce572 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1b17f0f9271 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..f3d121e857b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5971b59fad2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..055ec8c2122 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..aad5ff4708f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ce0835daf59 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..63606746657 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9c3604a6b96 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b8933df29fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b341ff28b99 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d0172cec6bb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2dfd23da480 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5f01dd0a522 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a20fbdef3e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..19f762834d4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..45b3f76674c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..25794b0bdac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4808c92b9a6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0fccf00caad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..122f0971a36 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ce7aa504486 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4ffafe2c054 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..decf2c40322 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2b17369776b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c4d44c7d174 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..110edf5f8a7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..39adae23ee2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ba6dbd59d6d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c3680a1f71c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4073a9177e2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..963e613a8e5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c4bcd4811fe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..202fa0c9a7e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..520f0941e16 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..00a20bd1fb4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ca4dcf7381a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b189fa6326c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2a8bb230239 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..600ce02bc22 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..824fb33302f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4c83fde2e4d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0f3d7878a5d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c33c745d388 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..76eb7bd934a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..36088e087ac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..117a77b8e5a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0cdb3f1cff7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ef2c352ca53 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..fef103ab36f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b30e65cef88 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c85a4b5a464 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..99db3864a64 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..4211b11a519 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..15a90bd77c7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..5dc1482ec09 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..f209625f185 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..0ba5f0d4391 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..603523ab466 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..aa2f229a061 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8456a5f131b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..5c598da13ac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..2027d546040 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..764fbf15ecb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..410ae2bcd28 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0efdd54a34f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..cfb09c1ec03 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..3b182ea5985 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ebe29f74bf0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..2659b7b9664 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..5093dfcb745 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..9d220aecdcf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c80120da25e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..949beb9f2e5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..1562269434f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9a841555d95 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..7d4eba4c0cf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e822bc38e9b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..89a35697897 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..09043d6bde7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..4771692b756 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..f0334b267bc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..5312351dc23 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c3c6b244631 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a0d4eadc671 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..587548d0b69 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..38d7bf856bc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..62b6e24a057 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..47834e9d522 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..2afe993bbea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..11040bba542 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..c33eb02091a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..9bb1e5bfbdd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..eae638c6746 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..527328fc980 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6b706c4de12 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c96c701e38a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..eb57c2c11cf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..d5aefdb2ad1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..47775c11d5d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..39ae72fa535 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d2f928e3b9f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2dfdeb45d83 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..efa5185ed5f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7bbea8116b6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ed68f19bf05 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ab6d388f224 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..40bc6f19d1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..75ea4bb8202 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ddc655cd69f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..d140b8bf144 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..5f9dafe9f7b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..a2be99f9fed --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..030d5f10d32 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..18500c2f2fa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..bdbad5ca2b7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..b079438febf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b21409a073a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..f52736ec73b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..5643bee8c84 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..929f9a937ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..221ad2be6e5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..db0b3e6b74e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..44639bdd28a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..fd93d32cf35 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..89bc43cc723 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..4ec3d90cda9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..420d76e6554 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..8d243e77f6d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1dc719efe55 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2136d9fcabb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..0689e038550 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..4aeaf477234 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..5ee203b76fa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..8c1c8e6b2b4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0feeb305f72 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..51fb18edfe7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..364a03ae552 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..dcf6bfbf1c0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..61fe4deebf7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..6c70039b1f4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a54f711b8f5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..25e9320df5c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..19855221746 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c01c5e96eeb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..e8839b93a31 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..c3e3a5209dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..b8c03e924e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..7cffff93b68 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..581789cd22e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a7fa4e3d2a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..9822fe84342 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..6b465939df7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..46e82825fb3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0756276d9e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..9f814fa852b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..129e3c560a4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..af8a97d1184 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..40fa0886280 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..9dfd8683770 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..64df30a8858 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..34be694e3fa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a08f1b2191c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..6b57a550032 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..f900690ec7f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7fa850eea50 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..68f01c719ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..dc95dc909b7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..1cc91cb6ead --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..d6809deb530 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..b78fc7135e4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c8a46e5d191 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..82789e2cde2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8c84a954c66 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..97545736fd9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a6865e346d0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7ff5670a5c2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..2eb093834d6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..3462597c2f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..92503762400 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..1ae3ec326cf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..d763c5f6300 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3e4776ae7ff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..984888d1dcd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1012f88acc1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..293f3b81485 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..564e62a6e5d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7a83e94487d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..446cf9824f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..6635dfc5031 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..e83ae4c7693 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..15d4e795dd7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7658b82ec1a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..6248d0555e5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..48d5d351b69 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..b46c6e3be67 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..12cae73fbac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..ded040b8f10 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..587d33bba90 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d9f2b31903a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6deeb1030a2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..d398f8f0a49 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..ea6088e2334 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..dfcf3cf24f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..ab490575d22 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..364b47cd599 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..abeafee9eea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..06cd341aa20 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..b65273930ff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..29da61ad2cd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..b5883fc31dd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8bf24a8b543 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5bfca7b23cf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..5e976f19844 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..238d6a7a703 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..42ec3e3321b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..d5ad6f60819 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..a8cb418ff69 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..edc3c13d38b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..2f7f2e4a45a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..d5382241de7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..462853088ed --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..10ce4ce09d2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..eda423471fa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a9603707319 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..07795d238fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..85e10c6d5d4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b212c97aedf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..ed9b01814dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0fca364bf45 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..dcde2682326 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..65e4b530988 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..4ccd1f8719b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..5ea416427ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..2d750ef7f1f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f32e1403c92 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4245f1c5fbb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a8b1d9102d5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..6802465799d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b91241e3350 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..b3b48ac7167 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b962171e6df --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..88c548adf08 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..9a29ad47937 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4f7253c25a8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b3dee8cc5fe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..75a14d71a0b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..7c63fcb42ce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..c05a4c9c690 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..086d5904c0c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..972017b054c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..5ef3f2fc609 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..b64c282e435 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1f2512faf74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7244d148ee7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..2e692b8f515 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..747e4a39370 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..3d83d2305bb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..2afe68e9280 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a6f537f175e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..86b2620d905 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1b6f9764994 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..74320c80a83 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..27c78b1acd0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..9e475ea1d5b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ea75a2987ad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..331c30ea67f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..65920c7a391 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a4f45594322 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..50861fe7082 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..95a0c8c03c4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1adcb1004b7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ad9673edb75 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d49bf50b465 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..269ac8f825a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5f550fdb2fc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..973e6a05502 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..07240599c8b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..98dd2b22abf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..034c0d49919 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8506cff81ca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b2d0ccb2ef2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..f79fb606133 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b2c65b916e2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5db950ef617 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..cb0c92eb930 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7b4500d2efd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ad8ce8ada33 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..09e04628762 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..97aa7c0989d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..18e2cac2c5b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c1b01545027 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..caa7e1d9e52 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a3fd164bafe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d3b334d3b6b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e1d95b11f72 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..49a78b0ccf9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ebb61bf712a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d39439883e4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..bb2467f6754 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..02b88daec66 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..95424dd40fc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..01005e24f33 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..76dda5d8241 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5a794cfa43f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0d8ed7ddf9d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..93bcc8f6bb6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..27a35a92bb5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..169b6020755 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6fe020ccdf3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..5e25fbcce64 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..db57ebbae40 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..426f6d11a08 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..746c5e0a2f3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..22c37bfe5e9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1caf3ee26e8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..789b1db6194 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..68f05c5c0b4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b16af6a1161 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..1df1732f9f2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5e8f0321d46 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a2a5ee24668 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a36ce68ecd4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..50cef3fdf47 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..64013770f53 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..0a7522a6052 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..f4ecf9e72e3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d27594fb9b6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..f78e7b8a688 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..7566c575d6d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..7041e4cd613 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..67daf36b9e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ee0a21cdf65 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..98e6801514c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e254449c117 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..1d98050db43 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..cc68d00e624 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..93ef3c680fe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..44a151fa461 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..7000b2c39f9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..a2eead77367 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..3a891942bb2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..283bd24f9be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..1f03d22999c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3ea9eb9017d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c22b6f66ccd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..87c58951199 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..d557c463572 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..2d529653f38 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..f75e8e7f20e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..5105b355bfa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1e5417ddda0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..82e77718d77 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..f158ca6ab72 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..ffcca16ea74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..4ef7da52c29 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c90600de118 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2229564c4ff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..d631404582e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..9b9c193387d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..c3184980f13 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..22858a5e179 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..02d815b285d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..59d0107987e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7611f0c0ccb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..62360e290cd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1f5f6489d3a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4f3add3f008 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..4dc0e6d514e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..4dda84412e2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..8eac0309834 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..fd6a3dfc251 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..09c1dfcecdb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..5d479a21df6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..bfd916d74b0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b86ee7e3856 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..6ce7c97c7e2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..569ba812f84 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..d6c2712a1d2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e6415f4b5ea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..5643bee8c84 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..929f9a937ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..221ad2be6e5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..db0b3e6b74e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..44639bdd28a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..fd93d32cf35 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..89bc43cc723 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..4ec3d90cda9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..420d76e6554 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..8d243e77f6d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1dc719efe55 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2136d9fcabb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..0689e038550 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..4aeaf477234 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..5ee203b76fa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..8c1c8e6b2b4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/fetch/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0feeb305f72 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..51fb18edfe7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..364a03ae552 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..dcf6bfbf1c0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..61fe4deebf7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..6c70039b1f4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a54f711b8f5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..25e9320df5c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..19855221746 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c01c5e96eeb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..e8839b93a31 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..c3e3a5209dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..b8c03e924e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..7cffff93b68 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..581789cd22e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a7fa4e3d2a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..9822fe84342 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..6b465939df7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..46e82825fb3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0756276d9e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..9f814fa852b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..129e3c560a4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..af8a97d1184 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..40fa0886280 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..9dfd8683770 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..64df30a8858 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..34be694e3fa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a08f1b2191c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..6b57a550032 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..f900690ec7f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7fa850eea50 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..68f01c719ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..dc95dc909b7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..1cc91cb6ead --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..d6809deb530 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..b78fc7135e4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c8a46e5d191 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..82789e2cde2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8c84a954c66 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..97545736fd9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a6865e346d0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7ff5670a5c2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..2eb093834d6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..3462597c2f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..92503762400 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..1ae3ec326cf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..d763c5f6300 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3e4776ae7ff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..984888d1dcd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1012f88acc1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..293f3b81485 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..564e62a6e5d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7a83e94487d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..446cf9824f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K-1/gen/top.meta/unset/xhr/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K-1/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..a9fefc5335a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..fe269b591df --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..bdab90c3c93 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..2166f0dde13 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..f2729cbcb52 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..a73e9d11a2f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..50ece9cadcb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..c955a1fea18 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..f71c3b2c16c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..882d65711a8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d4f39f9242a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a7b0e7f266d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..32c268942da --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..8ea4786c419 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..73548913060 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..823c727cf7a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..79b9f206b13 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..28b0287a669 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..1d0b258f03a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..8eccc567550 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..dc5b1c64ca8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..98ff9597c55 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..de37be5b870 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4d034ab49d4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a65b56492b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..2503c58f6e8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..d8c793f10a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..7ee8f923b26 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e59b8f7e55f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e8c78a21f28 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..9324cf727db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..99ce0e996b6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..8b1306840e5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..18bb216bcc6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e3c20928d71 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a78f1b9c0f7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..7f9a2bf57b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0027a51ef74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..dfdf17ca220 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..d84ed7e107a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..b2f70707cb3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b8c847aec05 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ca13a3b60ff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..b48d1202cf7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..132ab1033ff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..dfa840a3516 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3fe9772e601 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a260b4b2ebe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e8c45deba7f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..1992b36e858 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..a0f774640e6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..2deb7c6b481 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2ff9d5f36b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4c6a9514b42 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2a0fc0f623a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5e88f7341ed --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7d8a4afc069 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c7f60904e18 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..fdfb72931fc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..47666106781 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..4f08a622acc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..436de59cab0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a8f54c1702b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..6757257a17b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2faa3f2f9be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..69d15044350 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..12959fbf9a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..b5183cb3881 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..ad4a1bcfea2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..1bab6fe7762 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7f35dbbacad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..98941a44ab3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ad62a678ebd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..866d3b13d38 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..bf9f28ec801 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..773e5c81b52 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..15fe7d07220 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..9f24d9bde8a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..bffff9be0fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b92a16dde62 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..cb11dfbefed --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..49182a2c2c2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1e1559eb973 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..05963c2d9f2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0e7d536ab26 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ab8585fc56c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c9511876c97 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4d10d3e4396 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c396d388206 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7f902f70e03 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..34582b4d6dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9fce73c9d58 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..43b06e91563 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0b4d5a1baaf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..9a30544bcdf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..da220eb5825 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3cef1b4b322 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..305c63c7a9a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..cfafc7166f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2eb778279dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..88d31a55ff4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8e987ecf3dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6b99399a7bc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e5de56b797b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3635ee6c7aa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0645477144f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4fdb3e02e2a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..35749e37f9a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a5e4575a294 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..179e958d3f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..f53ad35d86b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4ad7dcfca2f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a5571e07a5d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..22eacd003b5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a29ba3dbd8b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4ab18ec26d3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a5e08751cec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a8babc7eb40 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..346654a54ee --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7df84deb40e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d6490256a0c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b49b87c3fa4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..29a1698f1a8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..16252eb3e89 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..75e4b8de706 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..9922c8bf400 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..3e77a7bda28 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..9789b3a8dff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..7d00a136314 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..e5182860dba --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..2fda3a8680d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8de62ae9dfa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..bbd7003d9b0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..6b49c22ffcf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..8467efcb78b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b86b55cacde --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..09fc8694fd2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..6d2446f7cef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..fa7c97b5773 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..864ed4d6f0f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..31857f5b020 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..807c2ea5c8f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..fbd5a0e4e87 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b55aa725186 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7fb7b273d7a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..7ef73d70001 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..a3282d26e16 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..d2fd9f38849 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..05d5e333652 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..54aec1435f0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..734b5e24b4f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..e66736a1f2a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..03351c7007e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a870fa6a4c2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3d61543525a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6498c9b73b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..98126940adc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..04b442f199f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..04bb78f2385 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..05e88291cdd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..6cb89d4113e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..09ba06fe97a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..5ddbbbd0097 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..daa75cd9dd2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..d0159817d0c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..92fc05e5a58 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..cd607f7a74d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..508066029a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fa1d48ed60d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b0aef7fcc7c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..fb5aab72bda --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..5975e7432e3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..45506e97df7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..066f65c0715 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5fbdf424f7a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8dbf224a261 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..eabdcb1011c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ea0ff9655d5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5a99955c352 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..6b136600885 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..a802ecb55f0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..fb18a558fcb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..44b1ad4136e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..fb68b248043 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3f208548366 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..067b74f6883 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..63e27261cb4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..9f2b14305fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..b92e14939a6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..16eee27fee3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..9e18ad80906 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e1b9c071a8f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..9df9f18a540 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b2111079c20 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..c7aa9dc13c3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..929c4c594d6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b2fea46787d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..e08868bbb70 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..827a4543138 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..ced41a3b59b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..ab873760f22 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..47153305f55 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..76d4705ae5d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c026b45fd06 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..6870f2cfd07 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..1a3acf28dff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..87981d1c661 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/fetch/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..186d94ba8af --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..bfe3c149eae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..265b108c984 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..51fb8801cf2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..078b8036840 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..078aef4c736 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..65b6e912cf3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7ab79f00ab2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..951b9a76ddf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c2e72a3c545 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..da910c915a7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..be9b5c3979b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..69bae396965 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..2c800d68d3c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ff6aee7cf06 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ce1ddee18da --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..63b43d13997 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..ed497a1c802 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f8d97a0c86a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..611164c1f48 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c680915e28a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..915a88cca84 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..28122a250d8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..27553107eeb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..136ddb9cc68 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d011a885919 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..d87d5850f0d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..2c6bf466298 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..bf0589564b4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3f616dec68a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0b796055cbb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e903577c95a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c812e2aa122 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..88b68ef5e00 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..47a8bb18953 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..a5e98f5f38e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3b6c78dcea4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ca6f2485a99 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..520bea1e1fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..298248e21d6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3b6630ca6e7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d6f2ec45a7c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d78ce1f66f4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..314e15d4304 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..b098e917c93 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..43f924c77f8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..10dc03fb014 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..541415c9546 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f9d4101186f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fa92ffe6bd0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b1d2d924035 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..5fb91ef90d4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..135bf134a40 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..db8586474b0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.http-rp/unset/xhr/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..22c4900d10a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..65a3ddca6a7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d1b3ebcbca0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..38abcd502d5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..858abba8e1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e138dbac1fc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..7f0a6399f57 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..9f271c5c468 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..1be7385e46d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..442632c4b9b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6ef20558777 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3bed586e83c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..4a1f4291656 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c55848be7c1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..d9d9b5e7622 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..8e814e27b29 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..22ece65ccd1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..40e36088e39 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ecfcf418c63 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ecab7543b04 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..c76f5c3bde4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..9041c1e8f5d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..db6c8a6681e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7a242da44b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c5773070336 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..39a65cf8e8f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..03588d7d3c6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..2253f93b1b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d5ff6947fc5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..6e0e170dfc6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..08be9fc8fb9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..49205634e59 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..d0cdf5ecde7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..6b1f98786e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..49d5b4143bf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..64ea5452cc6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..f193ced7bc8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..31ad993e663 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..fed40493102 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..053cd8d7a35 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..35ed15e929b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..014693c3e88 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..886ea8c3a72 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..23685b8a0df --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..822d196eb51 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..5cda327fcc4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3c63a8b1c10 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5836897035e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..975110b1e77 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..4641de88c73 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..a2b9102e82f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..114a40cb800 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..97230961f67 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ec8ed051039 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..aa336f3914d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ff4f0b77666 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0b2b0ad8d52 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..af09ae128f9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..99d4f8be754 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..788cf677801 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ac3aadbdc8e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..8329e740950 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..e9647772192 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..b95f2fc84d7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..95b0ca6fbff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..bf1f4f4f8e4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..cbfa298cf59 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..3be3c7c04b7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..e5ae1b3a62c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..f3bb4286afc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a00780694c1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..604a1e529f5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..37b4b4c81d9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..76c03a3a23b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..f804ae15f6c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..218e7974a4a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..509b5c21258 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..06518b37c08 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6d3bbad2f98 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f3d89afa8e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8a0f895dd55 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8ef99fdc727 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c809622a3f8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b8d88a5fdce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5cd3774b8ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ef1c290075b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..426d5bf8556 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a5678f0d8af --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7fbef77906b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a04e160ed66 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1a5830e3398 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b7cbd0f451c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1a077590101 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2a6023dd483 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..db4f2c3c07c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7667e641a18 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0a0b8dd2897 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ad1ea96f46c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f9959d9c864 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a459c7251cf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..20483abbee1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b291030abcc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c99c5c6512a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ce4ad27fe84 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/same-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b18f0df99b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..84a9a807c0f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..04971fe57f0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..81e99b3ac0f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..be9fdbff517 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..fe67437e4dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5a1ec96f33a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b31138974ed --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d3fb9bbb74a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4631af5260b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..dd6362c04db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c823c6e7ba1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6801b70f93a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a55b41a020d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..35727cd0e22 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0e3338647fe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d0897860602 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..672bf6de221 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..2c5d115414a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..77679ab4e62 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..2ed530425d5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..f1724215d00 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b86e83109a8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..2849ca8cf72 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..572e04d674d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b589362fb2b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..695e0d32b99 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..41ba30a0c55 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1f4442d0fd6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..53e502ff566 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..786e43ee726 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..cf30ceb5943 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..ba7e39d8902 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/fetch/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..b25f36c61b5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..49352a7f587 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..1c84b97f73c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..1fd86c6ea26 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..625b3cba292 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..2ab41c9ebec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b463dfd023c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..00a10e19450 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c1a52fe0c5b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c4ff3800315 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..863369c876c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..9240998a3c4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0f4640654fa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..934d17cc329 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..270e81a5251 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..abddc971c7e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..38bde67c48c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..0c4a9a38db9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3c6efb46f16 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..77a4e88b778 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..119445172a4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..18ce22b7ea9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..95ad996eebc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..1d558cf5673 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0f269d6fac1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1966a479387 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..caa83b1b315 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..281119783e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..86785b7f5c0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..402f680880e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..db7a1530be5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..70fc272e714 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b6f2c8add9a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..925cb67ac51 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..5ac8f25ecbd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..20632217221 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f1f4f3bba43 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..030de324d9f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2914c71d272 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..586b673102d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..54bbe38a124 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9f71e045a19 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..356475b6a10 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..01ef4b080fc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..e8795602b93 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ba216274525 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..59c4d5238a4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..d067cc8ea2c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..889acaca97b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..25d1857ead5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..51b71a977ce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-http.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..f0a18a10a2e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.keep-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..c11a9c40c34 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.no-redirect.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..9cc85b97d69 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unsafe-url/xhr/same-https.swap-origin.http.html @@ -0,0 +1,36 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e1b9c071a8f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..9df9f18a540 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b2111079c20 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..c7aa9dc13c3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..929c4c594d6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b2fea46787d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..e08868bbb70 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..827a4543138 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..ced41a3b59b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..ab873760f22 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..47153305f55 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..76d4705ae5d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c026b45fd06 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..6870f2cfd07 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..1a3acf28dff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..87981d1c661 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/fetch/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..186d94ba8af --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..bfe3c149eae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..265b108c984 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..51fb8801cf2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..078b8036840 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..078aef4c736 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..65b6e912cf3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7ab79f00ab2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..951b9a76ddf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c2e72a3c545 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..da910c915a7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..be9b5c3979b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..69bae396965 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..2c800d68d3c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ff6aee7cf06 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ce1ddee18da --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..63b43d13997 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..ed497a1c802 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f8d97a0c86a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..611164c1f48 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c680915e28a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..915a88cca84 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..28122a250d8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..27553107eeb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..136ddb9cc68 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d011a885919 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..d87d5850f0d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..2c6bf466298 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..bf0589564b4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3f616dec68a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0b796055cbb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e903577c95a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c812e2aa122 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..88b68ef5e00 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..47a8bb18953 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..a5e98f5f38e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3b6c78dcea4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ca6f2485a99 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..520bea1e1fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..298248e21d6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3b6630ca6e7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d6f2ec45a7c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d78ce1f66f4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..314e15d4304 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..b098e917c93 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..43f924c77f8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..10dc03fb014 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..541415c9546 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f9d4101186f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fa92ffe6bd0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b1d2d924035 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-http.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..5fb91ef90d4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-https.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..135bf134a40 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-https.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..db8586474b0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/4K/gen/top.meta/unset/xhr/same-https.swap-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/4K/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../../generic/test-case.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/resize-observer/observe.html b/tests/wpt/web-platform-tests/resize-observer/observe.html index 7360264e6ba..d4179933272 100644 --- a/tests/wpt/web-platform-tests/resize-observer/observe.html +++ b/tests/wpt/web-platform-tests/resize-observer/observe.html @@ -56,7 +56,7 @@ function test1() { function test2() { test(() => { - assert_throws({name: "TypeError"}, _=> { + assert_throws_js(TypeError, _=> { let ro = new ResizeObserver(() => {}); ro.observe({}); }); diff --git a/tests/wpt/web-platform-tests/resources/idlharness.js b/tests/wpt/web-platform-tests/resources/idlharness.js index 7d1373ef341..01af85b295d 100644 --- a/tests/wpt/web-platform-tests/resources/idlharness.js +++ b/tests/wpt/web-platform-tests/resources/idlharness.js @@ -1190,6 +1190,10 @@ IdlArray.prototype.assert_type_is = function(value, type) assert_regexp_match(value, /^([\x00-\ud7ff\ue000-\uffff]|[\ud800-\udbff][\udc00-\udfff])*$/); return; + case "DataView": + assert_equals(typeof value, "DataView"); + return; + case "object": assert_in_array(typeof value, ["object", "function"], "wrong type: not object or function"); return; diff --git a/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlArray/is_json_type.html b/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlArray/is_json_type.html index 463d2b45309..ab068b29cac 100644 --- a/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlArray/is_json_type.html +++ b/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlArray/is_json_type.html @@ -171,13 +171,13 @@ test(function() { var idl = new IdlArray(); - assert_throws(new Error(), _ => idl.is_json_type(typeFrom("Foo"))); + assert_throws_js(Error, _ => idl.is_json_type(typeFrom("Foo"))); }, "should throw if it references a dictionary, enum or interface which wasn't added to the IdlArray"); test(function() { var idl = new IdlArray(); idl.add_untested_idls('interface Foo : Bar { };'); - assert_throws(new Error(), _ => idl.is_json_type(typeFrom("Foo"))); + assert_throws_js(Error, _ => idl.is_json_type(typeFrom("Foo"))); }, "should throw for interfaces which inherit from another interface which wasn't added to the IdlArray"); test(function() { diff --git a/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlDictionary/get_inheritance_stack.html b/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlDictionary/get_inheritance_stack.html index 1ac9e8da06f..052592dd460 100644 --- a/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlDictionary/get_inheritance_stack.html +++ b/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlDictionary/get_inheritance_stack.html @@ -19,7 +19,7 @@ test(function() { var d = dictionaryFrom('dictionary A : B { };'); - assert_throws(new Error(), _ => d.get_inheritance_stack()); + assert_throws_js(Error, _ => d.get_inheritance_stack()); }, "should throw for dictionaries which inherit from another dictionary which wasn't added to the IdlArray"); test(function() { diff --git a/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlInterface/get_inheritance_stack.html b/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlInterface/get_inheritance_stack.html index 66b79afc12f..7e9188c7318 100644 --- a/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlInterface/get_inheritance_stack.html +++ b/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlInterface/get_inheritance_stack.html @@ -19,7 +19,7 @@ test(function() { var i = interfaceFrom('interface A : B { };'); - assert_throws(new Error(), _ => i.get_inheritance_stack()); + assert_throws_js(Error, _ => i.get_inheritance_stack()); }, "should throw for interfaces which inherit from another interface which wasn't added to the IdlArray"); test(function() { diff --git a/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlInterface/traverse_inherited_and_consequential_interfaces.html b/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlInterface/traverse_inherited_and_consequential_interfaces.html index 400bc35d9fc..94b956db6ee 100644 --- a/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlInterface/traverse_inherited_and_consequential_interfaces.html +++ b/tests/wpt/web-platform-tests/resources/test/tests/unit/IdlInterface/traverse_inherited_and_consequential_interfaces.html @@ -35,13 +35,13 @@ test(function() { var context = new IdlArray(); context.add_idls("interface A { }; A includes B;"); - assert_throws(new Error(), _ => context.members["A"].traverse_inherited_and_consequential_interfaces(function() {})); + assert_throws_js(Error, _ => context.members["A"].traverse_inherited_and_consequential_interfaces(function() {})); }, "should throw for interfaces which are extended by another interface which wasn't added to the IdlArray."); test(function() { var context = new IdlArray(); context.add_idls("interface A { };"); - assert_throws(new TypeError(), _ => context.members["A"].traverse_inherited_and_consequential_interfaces()); + assert_throws_js(TypeError, _ => context.members["A"].traverse_inherited_and_consequential_interfaces()); }, "should throw if not passed a callback"); test(function() { diff --git a/tests/wpt/web-platform-tests/scroll-animations/constructor.html b/tests/wpt/web-platform-tests/scroll-animations/constructor.html index a449b32d2be..336afd504e5 100644 --- a/tests/wpt/web-platform-tests/scroll-animations/constructor.html +++ b/tests/wpt/web-platform-tests/scroll-animations/constructor.html @@ -82,14 +82,14 @@ test(t => { let constructorFunc = function() { new ScrollTimeline({orientation: 'nonsense', timeRange: 100}) }; - assert_throws(TypeError(), constructorFunc); + assert_throws_js(TypeError, constructorFunc); // 'auto' for orientation was previously in the spec, but was removed. Make // sure that implementations do not support it. constructorFunc = function() { new ScrollTimeline({orientation: 'auto', timeRange: 100}) }; - assert_throws(TypeError(), constructorFunc); + assert_throws_js(TypeError, constructorFunc); }, 'Creating a ScrollTimeline with an invalid orientation value should throw'); // startScrollOffset and endScrollOffset @@ -182,7 +182,7 @@ for (const offset of gInvalidScrollOffsetValues) { new ScrollTimeline( {timeRange: 100, startScrollOffset: offset, endScrollOffset: offset}) }; - assert_throws(new TypeError(), constructorFunc); + assert_throws_js(TypeError, constructorFunc); }, '\'' + offset + '\' is an invalid scroll offset value'); } @@ -193,7 +193,7 @@ for (const suffix of gInvalidScrollOffsetSuffixes) { new ScrollTimeline( {timeRange: 100, startScrollOffset: offset, endScrollOffset: offset}); }; - assert_throws(new TypeError(), constructorFunc); + assert_throws_js(TypeError, constructorFunc); }, '\'' + suffix + '\' is an invalid scroll offset unit'); } @@ -230,7 +230,7 @@ for (let timeRange of gInvalidTimeRangeValues) { const constructorFunc = function() { new ScrollTimeline({timeRange: timeRange}); }; - assert_throws(new TypeError(), constructorFunc); + assert_throws_js(TypeError, constructorFunc); }, '\'' + timeRange + '\' is an invalid timeRange value'); } @@ -259,6 +259,6 @@ test(t => { let constructorFunc = function() { new ScrollTimeline({fill: 'nonsense', timeRange: 100}) }; - assert_throws(TypeError(), constructorFunc); + assert_throws_js(TypeError, constructorFunc); }, 'Creating a ScrollTimeline with an invalid fill value should throw'); </script> diff --git a/tests/wpt/web-platform-tests/scroll-animations/setting-current-time.html b/tests/wpt/web-platform-tests/scroll-animations/setting-current-time.html index 7a77f17509c..dd2abb47d39 100644 --- a/tests/wpt/web-platform-tests/scroll-animations/setting-current-time.html +++ b/tests/wpt/web-platform-tests/scroll-animations/setting-current-time.html @@ -53,7 +53,7 @@ await animation.ready; - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { animation.currentTime = null; }); }, 'Setting animation current time to null throws TypeError.'); diff --git a/tests/wpt/web-platform-tests/selection/collapse.js b/tests/wpt/web-platform-tests/selection/collapse.js index 7d03f00c8c7..4a816f49564 100644 --- a/tests/wpt/web-platform-tests/selection/collapse.js +++ b/tests/wpt/web-platform-tests/selection/collapse.js @@ -9,14 +9,14 @@ function testCollapse(range, point, method) { } if (point[0].nodeType == Node.DOCUMENT_TYPE_NODE) { - assert_throws("INVALID_NODE_TYPE_ERR", function() { + assert_throws_dom("INVALID_NODE_TYPE_ERR", function() { selection[method](point[0], point[1]); }, "Must throw INVALID_NODE_TYPE_ERR when " + method + "()ing if the node is a DocumentType"); return; } if (point[1] < 0 || point[1] > getNodeLength(point[0])) { - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { selection[method](point[0], point[1]); }, "Must throw INDEX_SIZE_ERR when " + method + "()ing if the offset is negative or greater than the node's length"); return; diff --git a/tests/wpt/web-platform-tests/selection/collapseToStartEnd.html b/tests/wpt/web-platform-tests/selection/collapseToStartEnd.html index 07c2b843b40..c2bba3af189 100644 --- a/tests/wpt/web-platform-tests/selection/collapseToStartEnd.html +++ b/tests/wpt/web-platform-tests/selection/collapseToStartEnd.html @@ -9,7 +9,7 @@ test(function() { selection.removeAllRanges(); - assert_throws("INVALID_STATE_ERR", function() { + assert_throws_dom("INVALID_STATE_ERR", function() { selection.collapseToStart(); }); }, "Must throw InvalidStateErr if the selection's range is null"); diff --git a/tests/wpt/web-platform-tests/selection/extend.js b/tests/wpt/web-platform-tests/selection/extend.js index a3be628d6c8..d5d199068c5 100644 --- a/tests/wpt/web-platform-tests/selection/extend.js +++ b/tests/wpt/web-platform-tests/selection/extend.js @@ -71,7 +71,7 @@ function testExtend(endpoints, target) { // "If the context object's range is null, throw an InvalidStateError // exception and abort these steps." if (getSelection().rangeCount == 0) { - assert_throws("INVALID_STATE_ERR", function() { + assert_throws_dom("INVALID_STATE_ERR", function() { selection.extend(node, offset); }, "extend() when rangeCount is 0 must throw InvalidStateError"); return; @@ -101,7 +101,7 @@ function testExtend(endpoints, target) { // From DOM4's "set the start or end of a range": "If node is a doctype, // throw an "InvalidNodeTypeError" exception and terminate these steps." if (node.nodeType == Node.DOCUMENT_TYPE_NODE) { - assert_throws("INVALID_NODE_TYPE_ERR", function() { + assert_throws_dom("INVALID_NODE_TYPE_ERR", function() { selection.extend(node, offset); }, "extend() to a doctype must throw InvalidNodeTypeError"); return; @@ -114,7 +114,7 @@ function testExtend(endpoints, target) { // FIXME: We should be casting offset to an unsigned int per WebIDL. Until // we do, we need the offset < 0 check too. if (offset < 0 || offset > getNodeLength(node)) { - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { selection.extend(node, offset); }, "extend() to an offset that's greater than node length (" + getNodeLength(node) + ") must throw IndexSizeError"); return; diff --git a/tests/wpt/web-platform-tests/selection/getRangeAt.html b/tests/wpt/web-platform-tests/selection/getRangeAt.html index 3c6d7976fa0..466bfd52865 100644 --- a/tests/wpt/web-platform-tests/selection/getRangeAt.html +++ b/tests/wpt/web-platform-tests/selection/getRangeAt.html @@ -8,7 +8,7 @@ test(function() { var sel = getSelection(); var range = document.createRange(); sel.addRange(range); - assert_throws("INDEX_SIZE_ERR", function() { sel.getRangeAt(-1); }) - assert_throws("INDEX_SIZE_ERR", function() { sel.getRangeAt(1); }) + assert_throws_dom("INDEX_SIZE_ERR", function() { sel.getRangeAt(-1); }) + assert_throws_dom("INDEX_SIZE_ERR", function() { sel.getRangeAt(1); }) }); </script> diff --git a/tests/wpt/web-platform-tests/selection/removeRange.html b/tests/wpt/web-platform-tests/selection/removeRange.html index 6ddccc66f22..7618a4ac535 100644 --- a/tests/wpt/web-platform-tests/selection/removeRange.html +++ b/tests/wpt/web-platform-tests/selection/removeRange.html @@ -30,7 +30,7 @@ testRanges.forEach(function(rangeData, index) { var equivalentRange = ownerDocument(endpoints[0]).createRange(); equivalentRange.setStart(endpoints[0], endpoints[1]); equivalentRange.setEnd(endpoints[2], endpoints[3]); - assert_throws("NotFoundError", + assert_throws_dom("NotFoundError", function() { selection.removeRange(equivalentRange) }, "Removing a different range should throw"); assert_equals(selection.rangeCount, 1, 'Equivalent Range should not remove the registered Range.'); @@ -40,8 +40,8 @@ testRanges.forEach(function(rangeData, index) { test(function() { var selection = getSelection(); - assert_throws(new TypeError(), function() { selection.removeRange(null); }); - assert_throws(new TypeError(), function() { selection.removeRange(selection); }); + assert_throws_js(TypeError, function() { selection.removeRange(null); }); + assert_throws_js(TypeError, function() { selection.removeRange(selection); }); }, 'removeRange() argument is non-optional Range'); </script> </body> diff --git a/tests/wpt/web-platform-tests/selection/selectAllChildren.html b/tests/wpt/web-platform-tests/selection/selectAllChildren.html index 65a4ff3c6c5..9a472a4b2fe 100644 --- a/tests/wpt/web-platform-tests/selection/selectAllChildren.html +++ b/tests/wpt/web-platform-tests/selection/selectAllChildren.html @@ -23,7 +23,7 @@ for (var i = 0; i < testRanges.length; i++) { : null; if (node.nodeType == Node.DOCUMENT_TYPE_NODE) { - assert_throws("INVALID_NODE_TYPE_ERR", function() { + assert_throws_dom("INVALID_NODE_TYPE_ERR", function() { selection.selectAllChildren(node); }, "selectAllChildren() on a DocumentType must throw InvalidNodeTypeError"); return; diff --git a/tests/wpt/web-platform-tests/service-workers/cache-storage/script-tests/cache-put.js b/tests/wpt/web-platform-tests/service-workers/cache-storage/script-tests/cache-put.js index 38d25647b34..6979d96d161 100644 --- a/tests/wpt/web-platform-tests/service-workers/cache-storage/script-tests/cache-put.js +++ b/tests/wpt/web-platform-tests/service-workers/cache-storage/script-tests/cache-put.js @@ -293,7 +293,7 @@ cache_test(function(cache) { var response = new Response(test_body); return cache.put(new Request(test_url), response) .then(function() { - assert_throws(new TypeError(), () => response.body.getReader()); + assert_throws_js(TypeError, () => response.body.getReader()); }); }, 'getReader() after Cache.put'); diff --git a/tests/wpt/web-platform-tests/service-workers/service-worker/ServiceWorkerGlobalScope/resources/extendable-message-event-constructor-worker.js b/tests/wpt/web-platform-tests/service-workers/service-worker/ServiceWorkerGlobalScope/resources/extendable-message-event-constructor-worker.js index 55de70dcf81..42da5825c56 100644 --- a/tests/wpt/web-platform-tests/service-workers/service-worker/ServiceWorkerGlobalScope/resources/extendable-message-event-constructor-worker.js +++ b/tests/wpt/web-platform-tests/service-workers/service-worker/ServiceWorkerGlobalScope/resources/extendable-message-event-constructor-worker.js @@ -53,8 +53,9 @@ test(function() { valueOf: function() { return TEST_OBJECT; } } }).data == TEST_OBJECT); assert_equals(createEvent({ get data(){ return 123; } }).data, 123); - assert_throws({ name: 'Error' }, function() { - createEvent({ get data() { throw { name: 'Error' }; } }); }); + let thrown = { name: 'Error' }; + assert_throws_exactly(thrown, function() { + createEvent({ get data() { throw thrown; } }); }); }, '`data` is specified'); test(function() { @@ -81,8 +82,9 @@ test(function() { '[object Object]'); assert_equals( createEvent({ get origin() { return 123; } }).origin, '123'); - assert_throws({ name: 'Error' }, function() { - createEvent({ get origin() { throw { name: 'Error' }; } }); }); + let thrown = { name: 'Error' }; + assert_throws_exactly(thrown, function() { + createEvent({ get origin() { throw thrown; } }); }); }, '`origin` is specified'); test(function() { @@ -112,8 +114,9 @@ test(function() { assert_equals( createEvent({ get lastEventId() { return 123; } }).lastEventId, '123'); - assert_throws({ name: 'Error' }, function() { - createEvent({ get lastEventId() { throw { name: 'Error' }; } }); }); + let thrown = { name: 'Error' }; + assert_throws_exactly(thrown, function() { + createEvent({ get lastEventId() { throw thrown; } }); }); }, '`lastEventId` is specified'); test(function() { @@ -123,8 +126,8 @@ test(function() { self.registration.active); assert_equals( createEvent({ source: CHANNEL1.port1 }).source, CHANNEL1.port1); - assert_throws( - { name: 'TypeError' }, function() { createEvent({ source: this }); }, + assert_throws_js( + TypeError, function() { createEvent({ source: this }); }, 'source should be Client or ServiceWorker or MessagePort'); }, '`source` is specified'); @@ -138,36 +141,37 @@ test(function() { assert_array_equals(createEvent({ ports: undefined }).ports, []); // Invalid message ports. - assert_throws({ name: 'TypeError' }, + assert_throws_js(TypeError, function() { createEvent({ ports: [1, 2, 3] }); }); - assert_throws({ name: 'TypeError' }, + assert_throws_js(TypeError, function() { createEvent({ ports: TEST_OBJECT }); }); - assert_throws({ name: 'TypeError' }, + assert_throws_js(TypeError, function() { createEvent({ ports: null }); }); - assert_throws({ name: 'TypeError' }, + assert_throws_js(TypeError, function() { createEvent({ ports: this }); }); - assert_throws({ name: 'TypeError' }, + assert_throws_js(TypeError, function() { createEvent({ ports: false }); }); - assert_throws({ name: 'TypeError' }, + assert_throws_js(TypeError, function() { createEvent({ ports: true }); }); - assert_throws({ name: 'TypeError' }, + assert_throws_js(TypeError, function() { createEvent({ ports: '' }); }); - assert_throws({ name: 'TypeError' }, + assert_throws_js(TypeError, function() { createEvent({ ports: 'chocolate' }); }); - assert_throws({ name: 'TypeError' }, + assert_throws_js(TypeError, function() { createEvent({ ports: 12345 }); }); - assert_throws({ name: 'TypeError' }, + assert_throws_js(TypeError, function() { createEvent({ ports: 18446744073709551615 }); }); - assert_throws({ name: 'TypeError' }, + assert_throws_js(TypeError, function() { createEvent({ ports: NaN }); }); - assert_throws({ name: 'TypeError' }, + assert_throws_js(TypeError, function() { createEvent({ get ports() { return 123; } }); }); - assert_throws({ name: 'Error' }, function() { - createEvent({ get ports() { throw { name: 'Error' }; } }); }); + let thrown = { name: 'Error' }; + assert_throws_exactly(thrown, function() { + createEvent({ get ports() { throw thrown; } }); }); // Note that valueOf() is not called, when the left hand side is // evaluated. var valueOf = function() { return PORTS; }; - assert_throws({ name: 'TypeError' }, function() { + assert_throws_js(TypeError, function() { createEvent({ ports: { valueOf: valueOf } }); }); }, '`ports` is specified'); diff --git a/tests/wpt/web-platform-tests/service-workers/service-worker/client-navigate.https.html b/tests/wpt/web-platform-tests/service-workers/service-worker/client-navigate.https.html index 9492335bb29..4ba64e5fd90 100644 --- a/tests/wpt/web-platform-tests/service-workers/service-worker/client-navigate.https.html +++ b/tests/wpt/web-platform-tests/service-workers/service-worker/client-navigate.https.html @@ -82,7 +82,7 @@ .then(({result, url}) => { assert_equals(result, "test_client_navigate_redirect"); assert_equals(url, ""); - assert_throws("SecurityError", function() { return frame.contentWindow.location.href }); + assert_throws_dom("SecurityError", function() { return frame.contentWindow.location.href }); frame.remove(); }) .catch(unreached_rejection(t)) @@ -108,7 +108,7 @@ .then(({result, url}) => { assert_equals(result, "test_client_navigate_cross_origin"); assert_equals(url, ""); - assert_throws("SecurityError", function() { return frame.contentWindow.location.href }); + assert_throws_dom("SecurityError", function() { return frame.contentWindow.location.href }); frame.remove(); }) .catch(unreached_rejection(t)) diff --git a/tests/wpt/web-platform-tests/service-workers/service-worker/detached-context.https.html b/tests/wpt/web-platform-tests/service-workers/service-worker/detached-context.https.html index f96370d2010..c9015b80930 100644 --- a/tests/wpt/web-platform-tests/service-workers/service-worker/detached-context.https.html +++ b/tests/wpt/web-platform-tests/service-workers/service-worker/detached-context.https.html @@ -79,8 +79,8 @@ promise_test(t => { assert_equals(worker.scriptURL, normalizeURL(script)); assert_equals(worker.state, 'activated'); worker.onstatechange = () => { /* empty */ }; - assert_throws( - { name: 'InvalidStateError' }, + assert_throws_dom( + 'InvalidStateError', () => { worker.postMessage(''); }, 'postMessage on a detached client should throw an exception.'); }); @@ -117,7 +117,7 @@ test(t => { } assert_not_equals(get_navigator().serviceWorker, null); iframe.remove(); - assert_throws({name: 'TypeError'}, () => get_navigator()); + assert_throws_js(TypeError, () => get_navigator()); }, 'accessing navigator on a removed frame'); // It seems weird that about:blank and blank.html (the test above) have diff --git a/tests/wpt/web-platform-tests/service-workers/service-worker/fetch-canvas-tainting-double-write.https.html b/tests/wpt/web-platform-tests/service-workers/service-worker/fetch-canvas-tainting-double-write.https.html index 4e233053729..dab2153baa6 100644 --- a/tests/wpt/web-platform-tests/service-workers/service-worker/fetch-canvas-tainting-double-write.https.html +++ b/tests/wpt/web-platform-tests/service-workers/service-worker/fetch-canvas-tainting-double-write.https.html @@ -52,6 +52,6 @@ promise_test(async (t) => { // ... the opaque image taints the canvas. context.drawImage(opaqueImage, 0, 0); - assert_throws('SecurityError', () => { canvas.toDataURL(); }); + assert_throws_dom('SecurityError', () => { canvas.toDataURL(); }); }, 'canvas is tainted after writing both a non-opaque image and an opaque image from the same URL'); </script> diff --git a/tests/wpt/web-platform-tests/service-workers/service-worker/fetch-request-css-cross-origin.https.html b/tests/wpt/web-platform-tests/service-workers/service-worker/fetch-request-css-cross-origin.https.html index 2cdfdea996f..5d9db5cb466 100644 --- a/tests/wpt/web-platform-tests/service-workers/service-worker/fetch-request-css-cross-origin.https.html +++ b/tests/wpt/web-platform-tests/service-workers/service-worker/fetch-request-css-cross-origin.https.html @@ -61,7 +61,7 @@ promise_test(async t => { const f = await with_iframe(PAGE); t.add_cleanup(() => {f.remove(); }); - assert_throws('SecurityError', () => { + assert_throws_dom('SecurityError', () => { f.contentDocument.styleSheets[0].cssRules[0].cssText; }); assert_equals( diff --git a/tests/wpt/web-platform-tests/service-workers/service-worker/multipart-image.https.html b/tests/wpt/web-platform-tests/service-workers/service-worker/multipart-image.https.html index 9bdadff21fb..75865172c60 100644 --- a/tests/wpt/web-platform-tests/service-workers/service-worker/multipart-image.https.html +++ b/tests/wpt/web-platform-tests/service-workers/service-worker/multipart-image.https.html @@ -56,7 +56,7 @@ promise_test(t => { promise_test(t => { return frame.contentWindow.load_multipart_image('cross-origin-multipart-image-with-no-cors') .then(img => { - assert_throws('SecurityError', () => frame.contentWindow.get_image_data(img)); + assert_throws_dom('SecurityError', () => frame.contentWindow.get_image_data(img)); }); }, 'cross-origin multipart image with no-cors via SW should not be readable'); diff --git a/tests/wpt/web-platform-tests/service-workers/service-worker/resources/import-scripts-mime-types-worker.js b/tests/wpt/web-platform-tests/service-workers/service-worker/resources/import-scripts-mime-types-worker.js index 2c585ac1060..d4f1f3e26d8 100644 --- a/tests/wpt/web-platform-tests/service-workers/service-worker/resources/import-scripts-mime-types-worker.js +++ b/tests/wpt/web-platform-tests/service-workers/service-worker/resources/import-scripts-mime-types-worker.js @@ -30,7 +30,7 @@ importScripts('/resources/testharness.js'); for (const mimeType of badMimeTypes) { test(() => { - assert_throws( + assert_throws_dom( 'NetworkError', () => { importScriptsWithMimeType(mimeType); }, `importScripts with ${mimeType ? 'bad' : 'no'} MIME type ${mimeType || ''} throws NetworkError`, diff --git a/tests/wpt/web-platform-tests/service-workers/service-worker/resources/service-worker-csp-worker.py b/tests/wpt/web-platform-tests/service-workers/service-worker/resources/service-worker-csp-worker.py index 9d2b1f2d834..7b0c13feba9 100644 --- a/tests/wpt/web-platform-tests/service-workers/service-worker/resources/service-worker-csp-worker.py +++ b/tests/wpt/web-platform-tests/service-workers/service-worker/resources/service-worker-csp-worker.py @@ -18,10 +18,10 @@ test(function() { }, 'importScripts test for default-src'); test(function() { - assert_throws(EvalError(), + assert_throws_js(EvalError, function() { eval('1 + 1'); }, 'eval() should throw EvalError.') - assert_throws(EvalError(), + assert_throws_js(EvalError, function() { new Function('1 + 1'); }, 'new Function() should throw EvalError.') }, 'eval test for default-src'); @@ -73,10 +73,10 @@ test(function() { }, 'importScripts test for script-src'); test(function() { - assert_throws(EvalError(), + assert_throws_js(EvalError, function() { eval('1 + 1'); }, 'eval() should throw EvalError.') - assert_throws(EvalError(), + assert_throws_js(EvalError, function() { new Function('1 + 1'); }, 'new Function() should throw EvalError.') }, 'eval test for script-src'); diff --git a/tests/wpt/web-platform-tests/shadow-dom/Document-prototype-adoptNode.html b/tests/wpt/web-platform-tests/shadow-dom/Document-prototype-adoptNode.html index e9b07d0c809..6afd603618d 100644 --- a/tests/wpt/web-platform-tests/shadow-dom/Document-prototype-adoptNode.html +++ b/tests/wpt/web-platform-tests/shadow-dom/Document-prototype-adoptNode.html @@ -15,7 +15,7 @@ function testAdoptNode(mode) { test(function () { var newDocument = document.implementation.createHTMLDocument(); - assert_throws({'name': 'HierarchyRequestError'}, function () { + assert_throws_dom('HierarchyRequestError', function () { var element = document.createElement('div'); var shadowRoot = element.attachShadow({mode: mode}); newDocument.adoptNode(shadowRoot); diff --git a/tests/wpt/web-platform-tests/shadow-dom/Document-prototype-importNode.html b/tests/wpt/web-platform-tests/shadow-dom/Document-prototype-importNode.html index 4566e4e8358..f71f8dc6c5e 100644 --- a/tests/wpt/web-platform-tests/shadow-dom/Document-prototype-importNode.html +++ b/tests/wpt/web-platform-tests/shadow-dom/Document-prototype-importNode.html @@ -15,7 +15,7 @@ function testImportNode(mode) { test(function () { var newDocument = document.implementation.createHTMLDocument(); - assert_throws({'name': 'NotSupportedError'}, function () { + assert_throws_dom('NotSupportedError', function () { var element = document.createElement('div'); var shadowRoot = element.attachShadow({mode: mode}); newDocument.importNode(shadowRoot); diff --git a/tests/wpt/web-platform-tests/shadow-dom/Element-interface-attachShadow-custom-element.html b/tests/wpt/web-platform-tests/shadow-dom/Element-interface-attachShadow-custom-element.html index 8f2913450d4..11ae277c412 100644 --- a/tests/wpt/web-platform-tests/shadow-dom/Element-interface-attachShadow-custom-element.html +++ b/tests/wpt/web-platform-tests/shadow-dom/Element-interface-attachShadow-custom-element.html @@ -28,18 +28,18 @@ test(() => { element.attachShadow({mode: 'closed'}); // No definition and it's already a host. - assert_throws('NotSupportedError', () => { + assert_throws_dom('NotSupportedError', () => { element.attachShadow({mode: 'closed'}); }, 'No definition, host'); // The element has a definition, and it's already a host. customElements.define('shadow-disabled-element', ShadowDisabledElement); - assert_throws('NotSupportedError', () => { + assert_throws_dom('NotSupportedError', () => { element.attachShadow({mode: 'closed'}); }, 'Definition, host'); // The element has a definition, and it's not a host. - assert_throws('NotSupportedError', () => { + assert_throws_dom('NotSupportedError', () => { document.createElement('shadow-disabled-element').attachShadow({mode: 'closed'}); }, 'Definition, not a host'); }, 'Element.attachShadow for an autonomous custom element with ' + @@ -56,20 +56,20 @@ test(() => { element.attachShadow({mode: 'closed'}); // No definition and it's already a host. - assert_throws('NotSupportedError', () => { + assert_throws_dom('NotSupportedError', () => { element.attachShadow({mode: 'closed'}); }, 'No definition, host.'); // The element has a definition, and it's already a host. customElements.define('shadow-disabled-heading-element', ShadowDisabledHeadingElement, {extends: 'h2'}); - assert_throws('NotSupportedError', () => { + assert_throws_dom('NotSupportedError', () => { element.attachShadow({mode: 'closed'}); }, 'Definition, host'); // The element has a definition, and it's not a host. let h2 = document.createElement('h2', {is: 'shadow-disabled-heading-element'}); - assert_throws('NotSupportedError', () => { + assert_throws_dom('NotSupportedError', () => { h2.attachShadow({mode: 'closed'}); }, 'Definition, not a host'); }, 'Element.attachShadow for a customized built-in element with ' + @@ -92,7 +92,7 @@ class MyCustomizedBuiltinElement extends HTMLInputElement { customElements.define('my-input', MyCustomizedBuiltinElement, { extends: 'input' }); test(() => { - assert_throws({'name': 'NotSupportedError'}, () => { + assert_throws_dom('NotSupportedError', () => { document.createElement('input', {is: 'my-input'}).attachShadow({mode: "open"}); }); }, 'Element.attachShadow must throw a NotSupportedError for customized built-in elements'); diff --git a/tests/wpt/web-platform-tests/shadow-dom/Element-interface-attachShadow.html b/tests/wpt/web-platform-tests/shadow-dom/Element-interface-attachShadow.html index 304b64cd466..858dec4cb9f 100644 --- a/tests/wpt/web-platform-tests/shadow-dom/Element-interface-attachShadow.html +++ b/tests/wpt/web-platform-tests/shadow-dom/Element-interface-attachShadow.html @@ -32,15 +32,15 @@ test(function () { }, 'Nodes other than Element should not have attachShadow'); test(function () { - assert_throws({'name': 'TypeError'}, function () { + assert_throws_js(TypeError, function () { document.createElement('div').attachShadow({}) }, 'attachShadow must throw a TypeError when mode is omitted'); - assert_throws({'name': 'TypeError'}, function () { + assert_throws_js(TypeError, function () { document.createElement('div').attachShadow({mode: true}) }, 'attachShadow must throw a TypeError when mode is a boolean'); - assert_throws({'name': 'TypeError'}, function () { + assert_throws_js(TypeError, function () { document.createElement('div').attachShadow({mode: 1}) }, 'attachShadow must throw a TypeError when mode is 1'); }, 'Element.attachShadow must throw a TypeError if mode is not "open" or "closed"'); @@ -53,25 +53,25 @@ test(function () { }, 'Element.attachShadow must create an instance of ShadowRoot'); test(function () { - assert_throws({'name': 'NotSupportedError'}, function () { + assert_throws_dom('NotSupportedError', function () { var div = document.createElement('div'); div.attachShadow({mode: "open"}); div.attachShadow({mode: "open"}); }, 'Calling attachShadow({mode: "open"}) twice on the same element must throw'); - assert_throws({'name': 'NotSupportedError'}, function () { + assert_throws_dom('NotSupportedError', function () { var div = document.createElement('div'); div.attachShadow({mode: "closed"}); div.attachShadow({mode: "closed"}); }, 'Calling attachShadow({mode: "closed"}) twice on the same element must throw'); - assert_throws({'name': 'NotSupportedError'}, function () { + assert_throws_dom('NotSupportedError', function () { var div = document.createElement('div'); div.attachShadow({mode: "open"}); div.attachShadow({mode: "closed"}); }, 'Calling attachShadow({mode: "closed"}) after attachShadow({mode: "open"}) on the same element must throw'); - assert_throws({'name': 'NotSupportedError'}, function () { + assert_throws_dom('NotSupportedError', function () { var div = document.createElement('div'); div.attachShadow({mode: "closed"}); div.attachShadow({mode: "open"}); @@ -80,11 +80,11 @@ test(function () { test(function () { for (var elementName of ATTACHSHADOW_DISALLOWED_ELEMENTS) { - assert_throws({'name': 'NotSupportedError'}, function () { + assert_throws_dom('NotSupportedError', function () { document.createElement(elementName).attachShadow({mode: "open"}); }, 'Calling attachShadow({mode: "open"}) on ' + elementName + ' element must throw'); - assert_throws({'name': 'NotSupportedError'}, function () { + assert_throws_dom('NotSupportedError', function () { document.createElement(elementName).attachShadow({mode: "closed"}); }, 'Calling attachShadow({mode: "closed"}) on ' + elementName + ' element must throw'); } diff --git a/tests/wpt/web-platform-tests/shadow-dom/Node-prototype-cloneNode.html b/tests/wpt/web-platform-tests/shadow-dom/Node-prototype-cloneNode.html index 6c6b24bc0ee..0ee47d492e5 100644 --- a/tests/wpt/web-platform-tests/shadow-dom/Node-prototype-cloneNode.html +++ b/tests/wpt/web-platform-tests/shadow-dom/Node-prototype-cloneNode.html @@ -14,13 +14,13 @@ function testCloneNode(mode) { test(function () { - assert_throws({'name': 'NotSupportedError'}, function () { + assert_throws_dom('NotSupportedError', function () { var element = document.createElement('div'); var shadowRoot = element.attachShadow({mode: mode}); shadowRoot.cloneNode(false); }, 'cloneNode(false) on a shadow root in ' + mode + ' mode must throw a NotSupportedError'); - assert_throws({'name': 'NotSupportedError'}, function () { + assert_throws_dom('NotSupportedError', function () { var element = document.createElement('div'); var shadowRoot = element.attachShadow({mode: mode}); shadowRoot.cloneNode(false); diff --git a/tests/wpt/web-platform-tests/shadow-dom/ShadowRoot-interface.html b/tests/wpt/web-platform-tests/shadow-dom/ShadowRoot-interface.html index bda361e5987..8efa50e4ea1 100644 --- a/tests/wpt/web-platform-tests/shadow-dom/ShadowRoot-interface.html +++ b/tests/wpt/web-platform-tests/shadow-dom/ShadowRoot-interface.html @@ -21,7 +21,7 @@ test(function () { }, 'ShadowRoot must inherit from DocumentFragment'); test(function () { - assert_throws({'name': 'TypeError'}, function () { new ShadowRoot(); }, 'new ShadowRoot() must throw a TypeError'); + assert_throws_js(TypeError, function () { new ShadowRoot(); }, 'new ShadowRoot() must throw a TypeError'); }, 'ShadowRoot must not be a constructor'); function testActiveElement(mode) { diff --git a/tests/wpt/web-platform-tests/speech-api/SpeechSynthesisErrorEvent-constructor.html b/tests/wpt/web-platform-tests/speech-api/SpeechSynthesisErrorEvent-constructor.html index 61e179cca47..abefbf9a51c 100644 --- a/tests/wpt/web-platform-tests/speech-api/SpeechSynthesisErrorEvent-constructor.html +++ b/tests/wpt/web-platform-tests/speech-api/SpeechSynthesisErrorEvent-constructor.html @@ -11,33 +11,33 @@ interface SpeechSynthesisErrorEvent : SpeechSynthesisErrorEvent { }; */ test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new SpeechSynthesisErrorEvent(); }); }, "SpeechSynthesisErrorEvent with no arguments throws TypeError"); test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new SpeechSynthesisErrorEvent("type"); }); }, "SpeechSynthesisErrorEvent with no eventInitDict throws TypeError"); test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new SpeechSynthesisErrorEvent("type", {}); }); }, `SpeechSynthesisErrorEvent with empty eventInitDict throws TypeError (requires utterance and error)`); test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new SpeechSynthesisErrorEvent("type", {error:"not-allowed"}); }); }, `SpeechSynthesisErrorEvent with eventInitDict without utterance throws TypeError`); test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new SpeechSynthesisErrorEvent("type", {utterance: new SpeechSynthesisUtterance()}); }); }, `SpeechSynthesisErrorEvent with eventInitDict without error throws @@ -81,8 +81,8 @@ test(() => { }); }; }; - assert_throws(new TypeError(), createEventFunc("")); - assert_throws(new TypeError(), createEventFunc("foo")); - assert_throws(new TypeError(), createEventFunc("bar")); + assert_throws_js(TypeError, createEventFunc("")); + assert_throws_js(TypeError, createEventFunc("foo")); + assert_throws_js(TypeError, createEventFunc("bar")); }, "SpeechSynthesisErrorEvent with wrong error enum"); </script> diff --git a/tests/wpt/web-platform-tests/speech-api/SpeechSynthesisEvent-constructor.html b/tests/wpt/web-platform-tests/speech-api/SpeechSynthesisEvent-constructor.html index 3ad6886b0aa..e6b29683f79 100644 --- a/tests/wpt/web-platform-tests/speech-api/SpeechSynthesisEvent-constructor.html +++ b/tests/wpt/web-platform-tests/speech-api/SpeechSynthesisEvent-constructor.html @@ -14,26 +14,26 @@ interface SpeechSynthesisEvent : Event { }; */ test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new SpeechSynthesisEvent(); }); }, "SpeechSynthesisEvent with no arguments throws TypeError"); test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new SpeechSynthesisEvent("type"); }); }, "SpeechSynthesisEvent with no eventInitDict throws TypeError"); test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new SpeechSynthesisEvent("type", {}); }); }, `SpeechSynthesisEvent with empty eventInitDict throws TypeError (requires utterance)`); test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new SpeechSynthesisEvent("type", {charIndex: 10, elapsedTime: 50, name:"foo"}); }); }, `SpeechSynthesisEvent with eventInitDict not having utterance throws diff --git a/tests/wpt/web-platform-tests/std-toast/actions.html b/tests/wpt/web-platform-tests/std-toast/actions.html index d07e5fd3d62..6a80def0998 100644 --- a/tests/wpt/web-platform-tests/std-toast/actions.html +++ b/tests/wpt/web-platform-tests/std-toast/actions.html @@ -122,14 +122,14 @@ testActionToast((toast, action) => { testToastElement((toast) => { const text = document.createTextNode('some text'); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { toast.action = text; }); }, 'setting the action to an invalid type (Text node) throws an error'); testToastElement((toast) => { const text = 'some text'; - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { toast.action = text; }); }, 'setting the action to an invalid type (string) throws an error'); @@ -171,7 +171,7 @@ test(() => { const fakeElement = {}; const toast = showToast('Message'); - assert_throws(new TypeError(), () => toast.action = fakeElement); + assert_throws_js(TypeError, () => toast.action = fakeElement); } finally { delete Element[Symbol.hasInstance]; } diff --git a/tests/wpt/web-platform-tests/std-toast/options.html b/tests/wpt/web-platform-tests/std-toast/options.html index 9f53bf88601..0383d71f9ae 100644 --- a/tests/wpt/web-platform-tests/std-toast/options.html +++ b/tests/wpt/web-platform-tests/std-toast/options.html @@ -116,13 +116,13 @@ async_test(t => { }, 'passing Infinity as the duration leaves the toast open for at least 50ms'); test(() => { - assert_throws(new RangeError(), () => { + assert_throws_js(RangeError, () => { const toast = showToast('Message', {duration: 0}); }); }, 'setting the duration to 0 throws a RangeError'); test(() => { - assert_throws(new RangeError(), () => { + assert_throws_js(RangeError, () => { const toast = showToast('Message', {duration: -5}); }); }, 'setting the duration to a negative number throws a RangeError'); diff --git a/tests/wpt/web-platform-tests/streams/byte-length-queuing-strategy.any.js b/tests/wpt/web-platform-tests/streams/byte-length-queuing-strategy.any.js index 6a61adcdc96..5cb3f5e87c5 100644 --- a/tests/wpt/web-platform-tests/streams/byte-length-queuing-strategy.any.js +++ b/tests/wpt/web-platform-tests/streams/byte-length-queuing-strategy.any.js @@ -27,9 +27,9 @@ test(() => { get highWaterMark() { throw error; } }; - assert_throws({ name: 'TypeError' }, () => new ByteLengthQueuingStrategy(), 'construction fails with undefined'); - assert_throws({ name: 'TypeError' }, () => new ByteLengthQueuingStrategy(null), 'construction fails with null'); - assert_throws({ name: 'Error' }, () => new ByteLengthQueuingStrategy(highWaterMarkObjectGetterThrowing), + assert_throws_js(TypeError, () => new ByteLengthQueuingStrategy(), 'construction fails with undefined'); + assert_throws_js(TypeError, () => new ByteLengthQueuingStrategy(null), 'construction fails with null'); + assert_throws_js(Error, () => new ByteLengthQueuingStrategy(highWaterMarkObjectGetterThrowing), 'construction fails with an object with a throwing highWaterMark getter'); // Should not fail: @@ -50,8 +50,8 @@ test(() => { const chunkGetterThrowing = { get byteLength() { throw error; } }; - assert_throws({ name: 'TypeError' }, () => ByteLengthQueuingStrategy.prototype.size(), 'size fails with undefined'); - assert_throws({ name: 'TypeError' }, () => ByteLengthQueuingStrategy.prototype.size(null), 'size fails with null'); + assert_throws_js(TypeError, () => ByteLengthQueuingStrategy.prototype.size(), 'size fails with undefined'); + assert_throws_js(TypeError, () => ByteLengthQueuingStrategy.prototype.size(null), 'size fails with null'); assert_equals(ByteLengthQueuingStrategy.prototype.size('potato'), undefined, 'size succeeds with undefined with a random non-object type'); assert_equals(ByteLengthQueuingStrategy.prototype.size({}), undefined, @@ -60,7 +60,7 @@ test(() => { 'size succeeds with the right amount with an object with a hwm'); assert_equals(ByteLengthQueuingStrategy.prototype.size(chunkGetter), size, 'size succeeds with the right amount with an object with a hwm getter'); - assert_throws({ name: 'Error' }, () => ByteLengthQueuingStrategy.prototype.size(chunkGetterThrowing), + assert_throws_js(Error, () => ByteLengthQueuingStrategy.prototype.size(chunkGetterThrowing), 'size fails with the error thrown by the getter'); }, 'ByteLengthQueuingStrategy size behaves as expected with strange arguments'); diff --git a/tests/wpt/web-platform-tests/streams/count-queuing-strategy.any.js b/tests/wpt/web-platform-tests/streams/count-queuing-strategy.any.js index 5aae61eda33..f36bdc5790d 100644 --- a/tests/wpt/web-platform-tests/streams/count-queuing-strategy.any.js +++ b/tests/wpt/web-platform-tests/streams/count-queuing-strategy.any.js @@ -27,9 +27,9 @@ test(() => { get highWaterMark() { throw error; } }; - assert_throws({ name: 'TypeError' }, () => new CountQueuingStrategy(), 'construction fails with undefined'); - assert_throws({ name: 'TypeError' }, () => new CountQueuingStrategy(null), 'construction fails with null'); - assert_throws({ name: 'Error' }, () => new CountQueuingStrategy(highWaterMarkObjectGetterThrowing), + assert_throws_js(TypeError, () => new CountQueuingStrategy(), 'construction fails with undefined'); + assert_throws_js(TypeError, () => new CountQueuingStrategy(null), 'construction fails with null'); + assert_throws_js(Error, () => new CountQueuingStrategy(highWaterMarkObjectGetterThrowing), 'construction fails with an object with a throwing highWaterMark getter'); // Should not fail: diff --git a/tests/wpt/web-platform-tests/streams/piping/pipe-through.any.js b/tests/wpt/web-platform-tests/streams/piping/pipe-through.any.js index 92d1394ca2f..e6959b6c12a 100644 --- a/tests/wpt/web-platform-tests/streams/piping/pipe-through.any.js +++ b/tests/wpt/web-platform-tests/streams/piping/pipe-through.any.js @@ -99,7 +99,7 @@ test(t => { const badReadables = [null, undefined, 0, NaN, true, 'ReadableStream', Object.create(ReadableStream.prototype)]; for (const readable of badReadables) { test(() => { - assert_throws(new TypeError(), + assert_throws_js(TypeError, ReadableStream.prototype.pipeThrough.bind(readable, uninterestingReadableWritablePair()), 'pipeThrough should throw'); }, `pipeThrough should brand-check this and not allow '${readable}'`); @@ -108,7 +108,7 @@ for (const readable of badReadables) { const rs = new ReadableStream(); const writable = new WritableStream(); let writableGetterCalled = false; - assert_throws(new TypeError(), () => rs.pipeThrough({ + assert_throws_js(TypeError, () => rs.pipeThrough({ get writable() { writableGetterCalled = true; return new WritableStream(); @@ -129,7 +129,7 @@ for (const writable of badWritables) { } }); let readableGetterCalled = false; - assert_throws(new TypeError(), () => rs.pipeThrough({ + assert_throws_js(TypeError, () => rs.pipeThrough({ get readable() { readableGetterCalled = true; return new ReadableStream(); @@ -155,9 +155,9 @@ test(t => { throw error; } }; - assert_throws(error, - () => ReadableStream.prototype.pipeThrough.call(rs, throwingWritable, {}), - 'pipeThrough should rethrow the error thrown by the writable getter'); + assert_throws_exactly(error, + () => ReadableStream.prototype.pipeThrough.call(rs, throwingWritable, {}), + 'pipeThrough should rethrow the error thrown by the writable getter'); const throwingReadable = { get readable() { @@ -165,9 +165,9 @@ test(t => { }, writable: {} }; - assert_throws(error, - () => ReadableStream.prototype.pipeThrough.call(rs, throwingReadable, {}), - 'pipeThrough should rethrow the error thrown by the readable getter'); + assert_throws_exactly(error, + () => ReadableStream.prototype.pipeThrough.call(rs, throwingReadable, {}), + 'pipeThrough should rethrow the error thrown by the readable getter'); }, 'pipeThrough should rethrow errors from accessing readable or writable'); @@ -175,7 +175,7 @@ const badSignals = [null, 0, NaN, true, 'AbortSignal', Object.create(AbortSignal for (const signal of badSignals) { test(() => { const rs = new ReadableStream(); - assert_throws(new TypeError(), () => rs.pipeThrough(uninterestingReadableWritablePair(), { signal }), + assert_throws_js(TypeError, () => rs.pipeThrough(uninterestingReadableWritablePair(), { signal }), 'pipeThrough should throw'); }, `invalid values of signal should throw; specifically '${signal}'`); } @@ -190,7 +190,7 @@ test(() => { test(() => { const rs = new ReadableStream(); rs.getReader(); - assert_throws(new TypeError(), () => rs.pipeThrough(uninterestingReadableWritablePair()), + assert_throws_js(TypeError, () => rs.pipeThrough(uninterestingReadableWritablePair()), 'pipeThrough should throw'); }, 'pipeThrough should throw if this is locked'); @@ -199,7 +199,7 @@ test(() => { const writable = new WritableStream(); const readable = new ReadableStream(); writable.getWriter(); - assert_throws(new TypeError(), () => rs.pipeThrough({writable, readable}), + assert_throws_js(TypeError, () => rs.pipeThrough({writable, readable}), 'pipeThrough should throw'); }, 'pipeThrough should throw if writable is locked'); @@ -258,7 +258,7 @@ test(() => { const rs = new ReadableStream(); const readable = new ReadableStream(); const writable = new WritableStream(); - assert_throws(new TypeError(), () => rs.pipeThrough({readable, writable}, { + assert_throws_js(TypeError, () => rs.pipeThrough({readable, writable}, { get preventAbort() { writable.getWriter(); } diff --git a/tests/wpt/web-platform-tests/streams/piping/throwing-options.any.js b/tests/wpt/web-platform-tests/streams/piping/throwing-options.any.js index 6fab32cc6dc..68fac571114 100644 --- a/tests/wpt/web-platform-tests/streams/piping/throwing-options.any.js +++ b/tests/wpt/web-platform-tests/streams/piping/throwing-options.any.js @@ -53,8 +53,8 @@ for (let i = 0; i < checkOrder.length; ++i) { test(() => { const options = new ThrowingOptions(whatShouldThrow); - assert_throws( - new Error(), + assert_throws_js( + Error, () => new ReadableStream().pipeThrough(new TransformStream(), options), 'pipeThrough should throw'); assert_array_equals( diff --git a/tests/wpt/web-platform-tests/streams/readable-byte-streams/brand-checks.any.js b/tests/wpt/web-platform-tests/streams/readable-byte-streams/brand-checks.any.js index e4d5e26e843..9bbe7111ea8 100644 --- a/tests/wpt/web-platform-tests/streams/readable-byte-streams/brand-checks.any.js +++ b/tests/wpt/web-platform-tests/streams/readable-byte-streams/brand-checks.any.js @@ -72,7 +72,7 @@ function realRBSController() { test(() => { - assert_throws(new TypeError(), () => new ReadableStreamBYOBReader(fakeRS()), 'constructor should throw'); + assert_throws_js(TypeError, () => new ReadableStreamBYOBReader(fakeRS()), 'constructor should throw'); }, 'ReadableStreamBYOBReader enforces a brand check on its argument'); @@ -106,14 +106,14 @@ test(() => { test(() => { - assert_throws(new TypeError(), () => new ReadableByteStreamController(fakeRS()), + assert_throws_js(TypeError, () => new ReadableByteStreamController(fakeRS()), 'Constructing a ReadableByteStreamController should throw'); }, 'ReadableByteStreamController enforces a brand check on its arguments'); test(() => { - assert_throws(new TypeError(), () => new ReadableByteStreamController(realRS()), + assert_throws_js(TypeError, () => new ReadableByteStreamController(realRS()), 'Constructing a ReadableByteStreamController should throw'); }, 'ReadableByteStreamController can\'t be given a fully-constructed ReadableStream'); @@ -174,7 +174,7 @@ promise_test(t => { function brandChecks() { for (const badController of [fakeRBSController(), realRS(), realRSBYOBReader(), undefined, null]) { - assert_throws(new TypeError(), () => new ReadableStreamBYOBRequest(badController, new Uint8Array(1)), + assert_throws_js(TypeError, () => new ReadableStreamBYOBRequest(badController, new Uint8Array(1)), 'ReadableStreamBYOBRequest constructor must throw for an invalid controller argument'); } getterThrowsForAll(ReadableStreamBYOBRequest.prototype, 'view', diff --git a/tests/wpt/web-platform-tests/streams/readable-byte-streams/construct-byob-request.any.js b/tests/wpt/web-platform-tests/streams/readable-byte-streams/construct-byob-request.any.js index 428cdeb76ae..2e1c53fdea8 100644 --- a/tests/wpt/web-platform-tests/streams/readable-byte-streams/construct-byob-request.any.js +++ b/tests/wpt/web-platform-tests/streams/readable-byte-streams/construct-byob-request.any.js @@ -48,7 +48,7 @@ function runTests(ReadableStreamBYOBRequest) { for (const viewType of dummyTypes) { const view = createDummyObject(Uint8Array.prototype, viewType, () => new Uint8Array(16)); test(() => { - assert_throws(new TypeError(), () => new ReadableStreamBYOBRequest(controller, view), + assert_throws_js(TypeError, () => new ReadableStreamBYOBRequest(controller, view), 'constructor should throw'); }, `ReadableStreamBYOBRequest constructor should throw when passed a ${controllerType} ` + `ReadableByteStreamController and a ${viewType} view`); diff --git a/tests/wpt/web-platform-tests/streams/readable-byte-streams/detached-buffers.any.js b/tests/wpt/web-platform-tests/streams/readable-byte-streams/detached-buffers.any.js index 7d87173f0a0..e37db6a0d87 100644 --- a/tests/wpt/web-platform-tests/streams/readable-byte-streams/detached-buffers.any.js +++ b/tests/wpt/web-platform-tests/streams/readable-byte-streams/detached-buffers.any.js @@ -52,7 +52,7 @@ test(() => { start(c) { const view = new Uint8Array([1, 2, 3]); c.enqueue(view); - assert_throws(new TypeError(), () => c.enqueue(view), 'enqueuing an already-detached buffer must throw'); + assert_throws_js(TypeError, () => c.enqueue(view), 'enqueuing an already-detached buffer must throw'); }, type: 'bytes' }); @@ -81,7 +81,7 @@ async_test(t => { // Detach it by reading into it reader.read(c.byobRequest.view); - assert_throws(new TypeError(), () => c.byobRequest.respond(1), + assert_throws_js(TypeError, () => c.byobRequest.respond(1), 'respond() must throw if the corresponding view has become detached'); }), type: 'bytes' @@ -100,7 +100,7 @@ async_test(t => { c.close(); - assert_throws(new TypeError(), () => c.byobRequest.respond(0), + assert_throws_js(TypeError, () => c.byobRequest.respond(0), 'respond() must throw if the corresponding view has become detached'); }), type: 'bytes' @@ -118,7 +118,7 @@ async_test(t => { const view = new Uint8Array([1, 2, 3]); reader.read(view); - assert_throws(new TypeError(), () => c.byobRequest.respondWithNewView(view), + assert_throws_js(TypeError, () => c.byobRequest.respondWithNewView(view), 'respondWithNewView() must throw if passed a detached view'); }), type: 'bytes' @@ -139,7 +139,7 @@ async_test(t => { c.close(); const zeroLengthView = new Uint8Array(view.buffer, 0, 0); - assert_throws(new TypeError(), () => c.byobRequest.respondWithNewView(zeroLengthView), + assert_throws_js(TypeError, () => c.byobRequest.respondWithNewView(zeroLengthView), 'respondWithNewView() must throw if passed a (zero-length) view whose buffer has been detached'); }), type: 'bytes' diff --git a/tests/wpt/web-platform-tests/streams/readable-byte-streams/general.any.js b/tests/wpt/web-platform-tests/streams/readable-byte-streams/general.any.js index c8f1fb7864e..1947ededb66 100644 --- a/tests/wpt/web-platform-tests/streams/readable-byte-streams/general.any.js +++ b/tests/wpt/web-platform-tests/streams/readable-byte-streams/general.any.js @@ -7,7 +7,7 @@ const error1 = new Error('error1'); error1.name = 'error1'; test(() => { - assert_throws(new TypeError(), () => new ReadableStream().getReader({ mode: 'byob' })); + assert_throws_js(TypeError, () => new ReadableStream().getReader({ mode: 'byob' })); }, 'getReader({mode: "byob"}) throws on non-bytes streams'); @@ -179,7 +179,7 @@ promise_test(t => { const reader = stream.getReader(); return reader.closed.then(() => { - assert_throws(new TypeError(), () => stream.getReader(), 'getReader() must throw'); + assert_throws_js(TypeError, () => stream.getReader(), 'getReader() must throw'); }); }, 'ReadableStream with byte source: Test that closing a stream does not release a reader automatically'); @@ -195,7 +195,7 @@ promise_test(t => { const reader = stream.getReader({ mode: 'byob' }); return reader.closed.then(() => { - assert_throws(new TypeError(), () => stream.getReader({ mode: 'byob' }), 'getReader() must throw'); + assert_throws_js(TypeError, () => stream.getReader({ mode: 'byob' }), 'getReader() must throw'); }); }, 'ReadableStream with byte source: Test that closing a stream does not release a BYOB reader automatically'); @@ -211,7 +211,7 @@ promise_test(t => { const reader = stream.getReader(); return promise_rejects(t, error1, reader.closed, 'closed must reject').then(() => { - assert_throws(new TypeError(), () => stream.getReader(), 'getReader() must throw'); + assert_throws_js(TypeError, () => stream.getReader(), 'getReader() must throw'); }); }, 'ReadableStream with byte source: Test that erroring a stream does not release a reader automatically'); @@ -227,7 +227,7 @@ promise_test(t => { const reader = stream.getReader({ mode: 'byob' }); return promise_rejects(t, error1, reader.closed, 'closed must reject').then(() => { - assert_throws(new TypeError(), () => stream.getReader({ mode: 'byob' }), 'getReader() must throw'); + assert_throws_js(TypeError, () => stream.getReader({ mode: 'byob' }), 'getReader() must throw'); }); }, 'ReadableStream with byte source: Test that erroring a stream does not release a BYOB reader automatically'); @@ -238,7 +238,7 @@ test(() => { const reader = stream.getReader(); reader.read(); - assert_throws(new TypeError(), () => reader.releaseLock(), 'reader.releaseLock() must throw'); + assert_throws_js(TypeError, () => reader.releaseLock(), 'reader.releaseLock() must throw'); }, 'ReadableStream with byte source: releaseLock() on ReadableStreamReader with pending read() must throw'); promise_test(() => { @@ -551,7 +551,7 @@ promise_test(() => { }, 'ReadableStream with byte source: Push source that doesn\'t understand pull signal'); test(() => { - assert_throws(new TypeError(), () => new ReadableStream({ + assert_throws_js(TypeError, () => new ReadableStream({ pull: 'foo', type: 'bytes' }), 'constructor should throw'); @@ -1446,7 +1446,7 @@ promise_test(t => { const readPromise = reader.read(new Uint16Array(1)); - assert_throws(new TypeError(), () => controller.close(), 'controller.close() must throw'); + assert_throws_js(TypeError, () => controller.close(), 'controller.close() must throw'); return promise_rejects(t, new TypeError(), readPromise, 'read(view) must fail') .then(() => promise_rejects(t, new TypeError(), reader.closed, 'reader.closed must reject')); @@ -1469,7 +1469,7 @@ test(() => { controller.enqueue(view); controller.close(); - assert_throws(new TypeError(), () => controller.close(), 'controller.close() must throw'); + assert_throws_js(TypeError, () => controller.close(), 'controller.close() must throw'); }, 'ReadableStream with byte source: Throw if close()-ed more than once'); test(() => { @@ -1488,7 +1488,7 @@ test(() => { controller.enqueue(view); controller.close(); - assert_throws(new TypeError(), () => controller.enqueue(view), 'controller.close() must throw'); + assert_throws_js(TypeError, () => controller.enqueue(view), 'controller.close() must throw'); }, 'ReadableStream with byte source: Throw on enqueue() after close()'); promise_test(() => { @@ -1973,7 +1973,7 @@ promise_test(() => { const reader = rs.getReader({ mode: 'byob' }); const view = new Uint8Array(16); return reader.read(view).then(() => { - assert_throws(new TypeError(), () => byobRequest.respond(4), 'respond() should throw a TypeError'); + assert_throws_js(TypeError, () => byobRequest.respond(4), 'respond() should throw a TypeError'); }); }, 'calling respond() twice on the same byobRequest should throw'); @@ -1989,7 +1989,7 @@ promise_test(() => { }); const reader = rs.getReader({ mode: 'byob' }); return reader.read(newView()).then(() => { - assert_throws(new TypeError(), () => byobRequest.respondWithNewView(newView()), + assert_throws_js(TypeError, () => byobRequest.respondWithNewView(newView()), 'respondWithNewView() should throw a TypeError'); }); }, 'calling respondWithNewView() twice on the same byobRequest should throw'); @@ -2018,7 +2018,7 @@ promise_test(() => { resolvePull(); byobRequest.respond(0); return Promise.all([readPromise, cancelPromise]).then(() => { - assert_throws(new TypeError(), () => byobRequest.respond(0), 'respond() should throw'); + assert_throws_js(TypeError, () => byobRequest.respond(0), 'respond() should throw'); }); }); }, 'calling respond(0) twice on the same byobRequest should throw even when closed'); @@ -2043,7 +2043,7 @@ promise_test(() => { return pullCalledPromise.then(() => { resolvePull(); return delay(0).then(() => { - assert_throws(new TypeError(), () => reader.releaseLock(), 'releaseLock() should throw'); + assert_throws_js(TypeError, () => reader.releaseLock(), 'releaseLock() should throw'); }); }); }, 'pull() resolving should not make releaseLock() possible'); @@ -2078,37 +2078,37 @@ test(() => { test(() => { const ReadableStreamBYOBReader = new ReadableStream({ type: 'bytes' }).getReader({ mode: 'byob' }).constructor; - assert_throws(new TypeError(), () => new ReadableStreamBYOBReader({}), 'constructor must throw'); + assert_throws_js(TypeError, () => new ReadableStreamBYOBReader({}), 'constructor must throw'); }, 'ReadableStreamBYOBReader constructor requires a ReadableStream argument'); test(() => { const ReadableStreamBYOBReader = new ReadableStream({ type: 'bytes' }).getReader({ mode: 'byob' }).constructor; const stream = new ReadableStream({ type: 'bytes' }); stream.getReader(); - assert_throws(new TypeError(), () => new ReadableStreamBYOBReader(stream), 'constructor must throw'); + assert_throws_js(TypeError, () => new ReadableStreamBYOBReader(stream), 'constructor must throw'); }, 'ReadableStreamBYOBReader constructor requires an unlocked ReadableStream'); test(() => { const ReadableStreamBYOBReader = new ReadableStream({ type: 'bytes' }).getReader({ mode: 'byob' }).constructor; const stream = new ReadableStream(); - assert_throws(new TypeError(), () => new ReadableStreamBYOBReader(stream), 'constructor must throw'); + assert_throws_js(TypeError, () => new ReadableStreamBYOBReader(stream), 'constructor must throw'); }, 'ReadableStreamBYOBReader constructor requires a ReadableStream with type "bytes"'); test(() => { - assert_throws(new RangeError(), () => new ReadableStream({ type: 'bytes' }, { + assert_throws_js(RangeError, () => new ReadableStream({ type: 'bytes' }, { size() { return 1; } }), 'constructor should throw for size function'); - assert_throws(new RangeError(), () => new ReadableStream({ type: 'bytes' }, { size: null }), + assert_throws_js(RangeError, () => new ReadableStream({ type: 'bytes' }, { size: null }), 'constructor should throw for size defined'); - assert_throws(new RangeError(), + assert_throws_js(RangeError, () => new ReadableStream({ type: 'bytes' }, new CountQueuingStrategy({ highWaterMark: 1 })), 'constructor should throw when strategy is CountQueuingStrategy'); - assert_throws(new RangeError(), + assert_throws_js(RangeError, () => new ReadableStream({ type: 'bytes' }, new ByteLengthQueuingStrategy({ highWaterMark: 512 })), 'constructor should throw when strategy is ByteLengthQueuingStrategy'); @@ -2116,6 +2116,6 @@ test(() => { size() {} } - assert_throws(new RangeError(), () => new ReadableStream({ type: 'bytes' }, new HasSizeMethod()), + assert_throws_js(RangeError, () => new ReadableStream({ type: 'bytes' }, new HasSizeMethod()), 'constructor should throw when size on the prototype chain'); }, 'ReadableStream constructor should not accept a strategy with a size defined if type is "bytes"'); diff --git a/tests/wpt/web-platform-tests/streams/readable-byte-streams/properties.any.js b/tests/wpt/web-platform-tests/streams/readable-byte-streams/properties.any.js index 2d52fd678ab..b201caf78a7 100644 --- a/tests/wpt/web-platform-tests/streams/readable-byte-streams/properties.any.js +++ b/tests/wpt/web-platform-tests/streams/readable-byte-streams/properties.any.js @@ -14,9 +14,9 @@ test(() => { test(() => { - assert_throws(new TypeError(), () => new ReadableStreamBYOBReader('potato')); - assert_throws(new TypeError(), () => new ReadableStreamBYOBReader({})); - assert_throws(new TypeError(), () => new ReadableStreamBYOBReader()); + assert_throws_js(TypeError, () => new ReadableStreamBYOBReader('potato')); + assert_throws_js(TypeError, () => new ReadableStreamBYOBReader({})); + assert_throws_js(TypeError, () => new ReadableStreamBYOBReader()); }, 'ReadableStreamBYOBReader constructor should get a ReadableStream object as argument'); diff --git a/tests/wpt/web-platform-tests/streams/readable-streams/async-iterator.any.js b/tests/wpt/web-platform-tests/streams/readable-streams/async-iterator.any.js index 865b8475427..ffbcdbb28bc 100644 --- a/tests/wpt/web-platform-tests/streams/readable-streams/async-iterator.any.js +++ b/tests/wpt/web-platform-tests/streams/readable-streams/async-iterator.any.js @@ -262,7 +262,7 @@ test(() => { }, }); const it = s.getIterator(); - assert_throws(new TypeError(), () => s.getIterator(), 'getIterator() should throw'); + assert_throws_js(TypeError, () => s.getIterator(), 'getIterator() should throw'); }, 'getIterator() throws if there\'s already a lock'); promise_test(async () => { diff --git a/tests/wpt/web-platform-tests/streams/readable-streams/bad-strategies.any.js b/tests/wpt/web-platform-tests/streams/readable-streams/bad-strategies.any.js index 5dab51ef771..2378c2bef2f 100644 --- a/tests/wpt/web-platform-tests/streams/readable-streams/bad-strategies.any.js +++ b/tests/wpt/web-platform-tests/streams/readable-streams/bad-strategies.any.js @@ -5,7 +5,7 @@ test(() => { const theError = new Error('a unique string'); - assert_throws(theError, () => { + assert_throws_exactly(theError, () => { new ReadableStream({}, { get size() { throw theError; @@ -37,7 +37,7 @@ promise_test(t => { } ); - assert_throws(thrownError, () => controller.enqueue('a'), 'enqueue should re-throw the error'); + assert_throws_exactly(thrownError, () => controller.enqueue('a'), 'enqueue should re-throw the error'); return promise_rejects(t, controllerError, rs.getReader().closed); @@ -63,7 +63,7 @@ promise_test(t => { } ); - assert_throws(new RangeError(), () => controller.enqueue('a'), 'enqueue should throw a RangeError'); + assert_throws_js(RangeError, () => controller.enqueue('a'), 'enqueue should throw a RangeError'); return promise_rejects(t, theError, rs.getReader().closed, 'closed should reject with the error'); @@ -75,7 +75,7 @@ promise_test(() => { const rs = new ReadableStream( { start(c) { - assert_throws(theError, () => c.enqueue('a'), 'enqueue should throw the error'); + assert_throws_exactly(theError, () => c.enqueue('a'), 'enqueue should throw the error'); } }, { @@ -96,7 +96,7 @@ test(() => { const theError = new Error('a unique string'); - assert_throws(theError, () => { + assert_throws_exactly(theError, () => { new ReadableStream({}, { size() { return 1; @@ -112,7 +112,7 @@ test(() => { test(() => { for (const highWaterMark of [-1, -Infinity, NaN, 'foo', {}]) { - assert_throws(new RangeError(), () => { + assert_throws_js(RangeError, () => { new ReadableStream({}, { size() { return 1; diff --git a/tests/wpt/web-platform-tests/streams/readable-streams/bad-underlying-sources.any.js b/tests/wpt/web-platform-tests/streams/readable-streams/bad-underlying-sources.any.js index cde5603f240..0dc3e0a2535 100644 --- a/tests/wpt/web-platform-tests/streams/readable-streams/bad-underlying-sources.any.js +++ b/tests/wpt/web-platform-tests/streams/readable-streams/bad-underlying-sources.any.js @@ -6,7 +6,7 @@ test(() => { const theError = new Error('a unique string'); - assert_throws(theError, () => { + assert_throws_exactly(theError, () => { new ReadableStream({ get start() { throw theError; @@ -21,7 +21,7 @@ test(() => { const theError = new Error('a unique string'); - assert_throws(theError, () => { + assert_throws_exactly(theError, () => { new ReadableStream({ start() { throw theError; @@ -35,7 +35,7 @@ test(() => { test(() => { const theError = new Error('a unique string'); - assert_throws(theError, () => new ReadableStream({ + assert_throws_exactly(theError, () => new ReadableStream({ get pull() { throw theError; } @@ -117,7 +117,7 @@ promise_test(t => { test(() => { const theError = new Error('a unique string'); - assert_throws(theError, () => new ReadableStream({ + assert_throws_exactly(theError, () => new ReadableStream({ get cancel() { throw theError; } @@ -148,7 +148,7 @@ promise_test(() => { }); rs.cancel(); - assert_throws(new TypeError(), () => controller.enqueue('a'), 'Calling enqueue after canceling should throw'); + assert_throws_js(TypeError, () => controller.enqueue('a'), 'Calling enqueue after canceling should throw'); return rs.getReader().closed; @@ -166,7 +166,7 @@ promise_test(() => { }); rs.cancel(); - assert_throws(new TypeError(), () => controller.enqueue('c'), 'Calling enqueue after canceling should throw'); + assert_throws_js(TypeError, () => controller.enqueue('c'), 'Calling enqueue after canceling should throw'); return rs.getReader().closed; @@ -177,7 +177,7 @@ promise_test(() => { return new ReadableStream({ start(c) { c.close(); - assert_throws(new TypeError(), () => c.enqueue('a'), 'call to enqueue should throw a TypeError'); + assert_throws_js(TypeError, () => c.enqueue('a'), 'call to enqueue should throw a TypeError'); } }).getReader().closed; @@ -189,7 +189,7 @@ promise_test(t => { const closed = new ReadableStream({ start(c) { c.error(theError); - assert_throws(new TypeError(), () => c.enqueue('a'), 'call to enqueue should throw the error'); + assert_throws_js(TypeError, () => c.enqueue('a'), 'call to enqueue should throw the error'); } }).getReader().closed; @@ -202,7 +202,7 @@ promise_test(() => { return new ReadableStream({ start(c) { c.close(); - assert_throws(new TypeError(), () => c.close(), 'second call to close should throw a TypeError'); + assert_throws_js(TypeError, () => c.close(), 'second call to close should throw a TypeError'); } }).getReader().closed; @@ -216,7 +216,7 @@ promise_test(() => { start(c) { c.enqueue('a'); c.close(); - assert_throws(new TypeError(), () => c.close(), 'second call to close should throw a TypeError'); + assert_throws_js(TypeError, () => c.close(), 'second call to close should throw a TypeError'); startCalled = true; } }).getReader(); @@ -246,7 +246,7 @@ promise_test(() => { }); rs.cancel(); - assert_throws(new TypeError(), () => controller.close(), 'Calling close after canceling should throw'); + assert_throws_js(TypeError, () => controller.close(), 'Calling close after canceling should throw'); return rs.getReader().closed.then(() => { assert_true(startCalled); @@ -267,7 +267,7 @@ promise_test(() => { }); rs.cancel(); - assert_throws(new TypeError(), () => controller.close(), 'Calling close after canceling should throw'); + assert_throws_js(TypeError, () => controller.close(), 'Calling close after canceling should throw'); return rs.getReader().closed.then(() => { assert_true(startCalled); @@ -283,7 +283,7 @@ promise_test(() => { const closed = new ReadableStream({ start(c) { c.error(theError); - assert_throws(new TypeError(), () => c.close(), 'call to close should throw a TypeError'); + assert_throws_js(TypeError, () => c.close(), 'call to close should throw a TypeError'); startCalled = true; } }).getReader().closed; diff --git a/tests/wpt/web-platform-tests/streams/readable-streams/brand-checks.any.js b/tests/wpt/web-platform-tests/streams/readable-streams/brand-checks.any.js index 7bd41b4455e..c82f513df01 100644 --- a/tests/wpt/web-platform-tests/streams/readable-streams/brand-checks.any.js +++ b/tests/wpt/web-platform-tests/streams/readable-streams/brand-checks.any.js @@ -119,7 +119,7 @@ test(() => { test(() => { - assert_throws(new TypeError(), () => new ReadableStreamDefaultReader(fakeRS()), + assert_throws_js(TypeError, () => new ReadableStreamDefaultReader(fakeRS()), 'Constructing a ReadableStreamDefaultReader should throw'); }, 'ReadableStreamDefaultReader enforces a brand check on its argument'); @@ -154,14 +154,14 @@ test(() => { test(() => { - assert_throws(new TypeError(), () => new ReadableStreamDefaultController(fakeRS()), + assert_throws_js(TypeError, () => new ReadableStreamDefaultController(fakeRS()), 'Constructing a ReadableStreamDefaultController should throw'); }, 'ReadableStreamDefaultController enforces a brand check on its argument'); test(() => { - assert_throws(new TypeError(), () => new ReadableStreamDefaultController(realRS()), + assert_throws_js(TypeError, () => new ReadableStreamDefaultController(realRS()), 'Constructing a ReadableStreamDefaultController should throw'); }, 'ReadableStreamDefaultController can\'t be given a fully-constructed ReadableStream'); diff --git a/tests/wpt/web-platform-tests/streams/readable-streams/default-reader.any.js b/tests/wpt/web-platform-tests/streams/readable-streams/default-reader.any.js index 224cd834b31..1e67b272b54 100644 --- a/tests/wpt/web-platform-tests/streams/readable-streams/default-reader.any.js +++ b/tests/wpt/web-platform-tests/streams/readable-streams/default-reader.any.js @@ -13,9 +13,9 @@ test(() => { test(() => { - assert_throws(new TypeError(), () => new ReadableStreamDefaultReader('potato')); - assert_throws(new TypeError(), () => new ReadableStreamDefaultReader({})); - assert_throws(new TypeError(), () => new ReadableStreamDefaultReader()); + assert_throws_js(TypeError, () => new ReadableStreamDefaultReader('potato')); + assert_throws_js(TypeError, () => new ReadableStreamDefaultReader({})); + assert_throws_js(TypeError, () => new ReadableStreamDefaultReader()); }, 'ReadableStreamDefaultReader constructor should get a ReadableStream object as argument'); @@ -68,7 +68,7 @@ test(() => { const rs = new ReadableStream(); new ReadableStreamDefaultReader(rs); // Constructing directly the first time should be fine. - assert_throws(new TypeError(), () => new ReadableStreamDefaultReader(rs), + assert_throws_js(TypeError, () => new ReadableStreamDefaultReader(rs), 'constructing directly the second time should fail'); }, 'Constructing a ReadableStreamDefaultReader directly should fail if the stream is already locked (via direct ' + @@ -78,7 +78,7 @@ test(() => { const rs = new ReadableStream(); new ReadableStreamDefaultReader(rs); // Constructing directly should be fine. - assert_throws(new TypeError(), () => rs.getReader(), 'getReader() should fail'); + assert_throws_js(TypeError, () => rs.getReader(), 'getReader() should fail'); }, 'Getting a ReadableStreamDefaultReader via getReader should fail if the stream is already locked (via direct ' + 'construction)'); @@ -87,7 +87,7 @@ test(() => { const rs = new ReadableStream(); rs.getReader(); // getReader() should be fine. - assert_throws(new TypeError(), () => new ReadableStreamDefaultReader(rs), 'constructing directly should fail'); + assert_throws_js(TypeError, () => new ReadableStreamDefaultReader(rs), 'constructing directly should fail'); }, 'Constructing a ReadableStreamDefaultReader directly should fail if the stream is already locked (via getReader)'); @@ -95,7 +95,7 @@ test(() => { const rs = new ReadableStream(); rs.getReader(); // getReader() should be fine. - assert_throws(new TypeError(), () => rs.getReader(), 'getReader() should fail'); + assert_throws_js(TypeError, () => rs.getReader(), 'getReader() should fail'); }, 'Getting a ReadableStreamDefaultReader via getReader should fail if the stream is already locked (via getReader)'); @@ -150,7 +150,7 @@ promise_test(() => { const rs = new ReadableStream({ cancel(reason) { assert_true(rs.locked, 'the stream should still be locked'); - assert_throws(new TypeError(), () => rs.getReader(), 'should not be able to get another reader'); + assert_throws_js(TypeError, () => rs.getReader(), 'should not be able to get another reader'); assert_equals(reason, passedReason, 'the cancellation reason is passed through to the underlying source'); cancelCalled = true; } @@ -295,7 +295,7 @@ promise_test(t => { promise_rejects(t, theError, reader1.read()) ); - assert_throws(new TypeError(), () => rs.getReader(), 'trying to get another reader before erroring should throw'); + assert_throws_js(TypeError, () => rs.getReader(), 'trying to get another reader before erroring should throw'); controller.error(theError); @@ -491,7 +491,7 @@ test(() => { return ''; } }; - assert_throws(new RangeError(), () => rs.getReader({ mode }), 'getReader() should throw'); + assert_throws_js(RangeError, () => rs.getReader({ mode }), 'getReader() should throw'); assert_true(toStringCalled, 'toString() should be called'); }, 'getReader() should call ToString() on mode'); diff --git a/tests/wpt/web-platform-tests/streams/readable-streams/garbage-collection.any.js b/tests/wpt/web-platform-tests/streams/readable-streams/garbage-collection.any.js index b6f2a7f1d94..76a69572073 100644 --- a/tests/wpt/web-platform-tests/streams/readable-streams/garbage-collection.any.js +++ b/tests/wpt/web-platform-tests/streams/readable-streams/garbage-collection.any.js @@ -15,7 +15,7 @@ promise_test(() => { return delay(50).then(() => { controller.close(); - assert_throws(new TypeError(), () => controller.close(), 'close should throw a TypeError the second time'); + assert_throws_js(TypeError, () => controller.close(), 'close should throw a TypeError the second time'); controller.error(); }); @@ -64,7 +64,7 @@ promise_test(() => { garbageCollect(); - return delay(50).then(() => assert_throws(new TypeError(), () => rs.getReader(), + return delay(50).then(() => assert_throws_js(TypeError, () => rs.getReader(), 'old reader should still be locking the stream even after garbage collection')); }, 'Garbage-collecting a ReadableStreamDefaultReader should not unlock its stream'); diff --git a/tests/wpt/web-platform-tests/streams/readable-streams/general.any.js b/tests/wpt/web-platform-tests/streams/readable-streams/general.any.js index e9a107db1a3..4a72b3044ff 100644 --- a/tests/wpt/web-platform-tests/streams/readable-streams/general.any.js +++ b/tests/wpt/web-platform-tests/streams/readable-streams/general.any.js @@ -20,20 +20,20 @@ test(() => { test(() => { - assert_throws(new TypeError(), () => new ReadableStream(null), 'constructor should throw when the source is null'); + assert_throws_js(TypeError, () => new ReadableStream(null), 'constructor should throw when the source is null'); }, 'ReadableStream can\'t be constructed with garbage'); test(() => { - assert_throws(new RangeError(), () => new ReadableStream({ type: null }), + assert_throws_js(RangeError, () => new ReadableStream({ type: null }), 'constructor should throw when the type is null'); - assert_throws(new RangeError(), () => new ReadableStream({ type: '' }), + assert_throws_js(RangeError, () => new ReadableStream({ type: '' }), 'constructor should throw when the type is empty string'); - assert_throws(new RangeError(), () => new ReadableStream({ type: 'asdf' }), + assert_throws_js(RangeError, () => new ReadableStream({ type: 'asdf' }), 'constructor should throw when the type is asdf'); - assert_throws(error1, () => new ReadableStream({ type: { get toString() {throw error1;} } }), 'constructor should throw when ToString() throws'); - assert_throws(error1, () => new ReadableStream({ type: { toString() {throw error1;} } }), 'constructor should throw when ToString() throws'); + assert_throws_exactly(error1, () => new ReadableStream({ type: { get toString() {throw error1;} } }), 'constructor should throw when ToString() throws'); + assert_throws_exactly(error1, () => new ReadableStream({ type: { toString() {throw error1;} } }), 'constructor should throw when ToString() throws'); }, 'ReadableStream can\'t be constructed with an invalid type'); @@ -86,7 +86,7 @@ test(() => { test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new ReadableStream({ start: 'potato' }); }, 'constructor should throw when start is not a function'); @@ -94,13 +94,13 @@ test(() => { test(() => { - assert_throws(new TypeError(), () => new ReadableStream({ cancel: '2' }), 'constructor should throw'); + assert_throws_js(TypeError, () => new ReadableStream({ cancel: '2' }), 'constructor should throw'); }, 'ReadableStream constructor will not tolerate initial garbage as cancel argument'); test(() => { - assert_throws(new TypeError(), () => new ReadableStream({ pull: { } }), 'constructor should throw'); + assert_throws_js(TypeError, () => new ReadableStream({ pull: { } }), 'constructor should throw'); }, 'ReadableStream constructor will not tolerate initial garbage as pull argument'); @@ -178,7 +178,7 @@ test(() => { (new ReadableStream()).getReader(undefined); (new ReadableStream()).getReader({}); (new ReadableStream()).getReader({ mode: undefined, notmode: 'ignored' }); - assert_throws(new RangeError(), () => (new ReadableStream()).getReader({ mode: 'potato' })); + assert_throws_js(RangeError, () => (new ReadableStream()).getReader({ mode: 'potato' })); }, 'default ReadableStream getReader() should only accept mode:undefined'); promise_test(() => { @@ -689,7 +689,7 @@ test(() => { assert_equals(c.enqueue('a'), undefined, 'the first enqueue should return undefined'); c.close(); - assert_throws(new TypeError(), () => c.enqueue('b'), 'enqueue after close should throw a TypeError'); + assert_throws_js(TypeError, () => c.enqueue('b'), 'enqueue after close should throw a TypeError'); startCalled = true; } }); @@ -706,7 +706,7 @@ test(() => { start(c) { c.close(); - assert_throws(new TypeError(), () => c.enqueue('a'), 'enqueue after close should throw a TypeError'); + assert_throws_js(TypeError, () => c.enqueue('a'), 'enqueue after close should throw a TypeError'); startCalled = true; } }); diff --git a/tests/wpt/web-platform-tests/streams/readable-streams/reentrant-strategies.any.js b/tests/wpt/web-platform-tests/streams/readable-streams/reentrant-strategies.any.js index 7724ea63d37..ca77a1b357f 100644 --- a/tests/wpt/web-platform-tests/streams/readable-streams/reentrant-strategies.any.js +++ b/tests/wpt/web-platform-tests/streams/readable-streams/reentrant-strategies.any.js @@ -123,7 +123,7 @@ promise_test(t => { }, cancel: t.step_func(reason => { assert_equals(reason, error1, 'reason should be error1'); - assert_throws(new TypeError(), () => controller.enqueue(), 'enqueue() should throw'); + assert_throws_js(TypeError, () => controller.enqueue(), 'enqueue() should throw'); }) }, { size() { diff --git a/tests/wpt/web-platform-tests/streams/resources/rs-test-templates.js b/tests/wpt/web-platform-tests/streams/resources/rs-test-templates.js index ef68e0ade64..8e3814d322f 100644 --- a/tests/wpt/web-platform-tests/streams/resources/rs-test-templates.js +++ b/tests/wpt/web-platform-tests/streams/resources/rs-test-templates.js @@ -23,10 +23,10 @@ self.templatedRSEmpty = (label, factory) => { test(() => { const rs = factory(); - assert_throws(new RangeError(), () => rs.getReader({ mode: '' }), 'empty string mode should throw'); - assert_throws(new RangeError(), () => rs.getReader({ mode: null }), 'null mode should throw'); - assert_throws(new RangeError(), () => rs.getReader({ mode: 'asdf' }), 'asdf mode should throw'); - assert_throws(new TypeError(), () => rs.getReader(null), 'null should throw'); + assert_throws_js(RangeError, () => rs.getReader({ mode: '' }), 'empty string mode should throw'); + assert_throws_js(RangeError, () => rs.getReader({ mode: null }), 'null mode should throw'); + assert_throws_js(RangeError, () => rs.getReader({ mode: 'asdf' }), 'asdf mode should throw'); + assert_throws_js(TypeError, () => rs.getReader(null), 'null should throw'); }, label + ': calling getReader with invalid arguments should throw appropriate errors'); }; @@ -83,8 +83,8 @@ self.templatedRSClosed = (label, factory) => { rs.getReader(); - assert_throws(new TypeError(), () => rs.getReader(), 'getting a second reader should throw'); - assert_throws(new TypeError(), () => rs.getReader(), 'getting a third reader should throw'); + assert_throws_js(TypeError, () => rs.getReader(), 'getting a second reader should throw'); + assert_throws_js(TypeError, () => rs.getReader(), 'getting a third reader should throw'); }, label + ': should not be able to acquire a second reader if we don\'t release the first one'); }; @@ -142,8 +142,8 @@ self.templatedRSErroredSyncOnly = (label, factory, error) => { const rs = factory(); rs.getReader(); - assert_throws(new TypeError(), () => rs.getReader(), 'getting a second reader should throw a TypeError'); - assert_throws(new TypeError(), () => rs.getReader(), 'getting a third reader should throw a TypeError'); + assert_throws_js(TypeError, () => rs.getReader(), 'getting a second reader should throw a TypeError'); + assert_throws_js(TypeError, () => rs.getReader(), 'getting a third reader should throw a TypeError'); }, label + ': should not be able to obtain additional readers if we don\'t release the first lock'); @@ -244,7 +244,7 @@ self.templatedRSEmptyReader = (label, factory) => { test(() => { const stream = factory().stream; - assert_throws(new TypeError(), () => stream.getReader(), 'stream.getReader() should throw a TypeError'); + assert_throws_js(TypeError, () => stream.getReader(), 'stream.getReader() should throw a TypeError'); }, label + ': getReader() again on the stream should fail'); @@ -269,7 +269,7 @@ self.templatedRSEmptyReader = (label, factory) => { t.unreached_func('closed should not reject') ); - assert_throws(new TypeError(), () => reader.releaseLock(), 'releaseLock should throw a TypeError'); + assert_throws_js(TypeError, () => reader.releaseLock(), 'releaseLock should throw a TypeError'); assert_true(stream.locked, 'the stream should still be locked'); diff --git a/tests/wpt/web-platform-tests/streams/resources/test-utils.js b/tests/wpt/web-platform-tests/streams/resources/test-utils.js index 5a9e2479faa..614fcca18e9 100644 --- a/tests/wpt/web-platform-tests/streams/resources/test-utils.js +++ b/tests/wpt/web-platform-tests/streams/resources/test-utils.js @@ -24,7 +24,7 @@ self.methodRejectsForAll = (t, obj, methodName, targets, args) => { self.getterThrows = (obj, getterName, target) => { const getter = Object.getOwnPropertyDescriptor(obj, getterName).get; - assert_throws(new TypeError(), () => getter.call(target), getterName + ' should throw a TypeError'); + assert_throws_js(TypeError, () => getter.call(target), getterName + ' should throw a TypeError'); }; self.getterThrowsForAll = (obj, getterName, targets) => { @@ -35,7 +35,7 @@ self.methodThrows = (obj, methodName, target, args) => { const method = obj[methodName]; assert_equals(typeof method, 'function', methodName + ' should exist'); - assert_throws(new TypeError(), () => method.apply(target, args), methodName + ' should throw a TypeError'); + assert_throws_js(TypeError, () => method.apply(target, args), methodName + ' should throw a TypeError'); }; self.methodThrowsForAll = (obj, methodName, targets, args) => { @@ -43,7 +43,7 @@ self.methodThrowsForAll = (obj, methodName, targets, args) => { }; self.constructorThrowsForAll = (constructor, firstArgs) => { - firstArgs.forEach(firstArg => assert_throws(new TypeError(), () => new constructor(firstArg), + firstArgs.forEach(firstArg => assert_throws_js(TypeError, () => new constructor(firstArg), 'constructor should throw a TypeError')); }; diff --git a/tests/wpt/web-platform-tests/streams/transform-streams/errors.any.js b/tests/wpt/web-platform-tests/streams/transform-streams/errors.any.js index 53a4a49984b..a6a35839e23 100644 --- a/tests/wpt/web-platform-tests/streams/transform-streams/errors.any.js +++ b/tests/wpt/web-platform-tests/streams/transform-streams/errors.any.js @@ -59,7 +59,7 @@ test(() => { start(c) { c.enqueue('a'); c.error(new Error('generic error')); - assert_throws(new TypeError(), () => c.enqueue('b'), 'enqueue() should throw'); + assert_throws_js(TypeError, () => c.enqueue('b'), 'enqueue() should throw'); } }); }, 'errored TransformStream should not enqueue new chunks'); @@ -109,7 +109,7 @@ promise_test(t => { }, 'when controller.error is followed by a rejection, the error reason should come from controller.error'); test(() => { - assert_throws(new URIError(), () => new TransformStream({ + assert_throws_js(URIError, () => new TransformStream({ start() { throw new URIError('start thrown error'); }, transform() {} }), 'constructor should throw'); @@ -120,7 +120,7 @@ test(() => { size() { throw new URIError('size thrown error'); } }; - assert_throws(new URIError(), () => new TransformStream({ + assert_throws_js(URIError, () => new TransformStream({ start(c) { c.enqueue('a'); }, @@ -139,7 +139,7 @@ test(() => { } }; - assert_throws(new URIError(), () => new TransformStream({ + assert_throws_js(URIError, () => new TransformStream({ start(c) { controller = c; c.enqueue('a'); diff --git a/tests/wpt/web-platform-tests/streams/transform-streams/general.any.js b/tests/wpt/web-platform-tests/streams/transform-streams/general.any.js index 537001edae9..c9323155e6a 100644 --- a/tests/wpt/web-platform-tests/streams/transform-streams/general.any.js +++ b/tests/wpt/web-platform-tests/streams/transform-streams/general.any.js @@ -376,7 +376,7 @@ test(() => { new TransformStream({ start(controller) { controller.terminate(); - assert_throws(new TypeError(), () => controller.enqueue(), 'enqueue should throw'); + assert_throws_js(TypeError, () => controller.enqueue(), 'enqueue should throw'); } }); }, 'enqueue() should throw after controller.terminate()'); @@ -389,7 +389,7 @@ promise_test(() => { } }); const cancelPromise = ts.readable.cancel(); - assert_throws(new TypeError(), () => controller.enqueue(), 'enqueue should throw'); + assert_throws_js(TypeError, () => controller.enqueue(), 'enqueue should throw'); return cancelPromise; }, 'enqueue() should throw after readable.cancel()'); @@ -431,11 +431,11 @@ promise_test(() => { }, 'start() should not be called twice'); test(() => { - assert_throws(new RangeError(), () => new TransformStream({ readableType: 'bytes' }), 'constructor should throw'); + assert_throws_js(RangeError, () => new TransformStream({ readableType: 'bytes' }), 'constructor should throw'); }, 'specifying a defined readableType should throw'); test(() => { - assert_throws(new RangeError(), () => new TransformStream({ writableType: 'bytes' }), 'constructor should throw'); + assert_throws_js(RangeError, () => new TransformStream({ writableType: 'bytes' }), 'constructor should throw'); }, 'specifying a defined writableType should throw'); test(() => { diff --git a/tests/wpt/web-platform-tests/streams/transform-streams/strategies.any.js b/tests/wpt/web-platform-tests/streams/transform-streams/strategies.any.js index 9ebfec7358e..c7645e7e651 100644 --- a/tests/wpt/web-platform-tests/streams/transform-streams/strategies.any.js +++ b/tests/wpt/web-platform-tests/streams/transform-streams/strategies.any.js @@ -86,13 +86,13 @@ promise_test(t => { }, 'default readable strategy should be equivalent to { highWaterMark: 0 }'); test(() => { - assert_throws(new RangeError(), () => new TransformStream(undefined, { highWaterMark: -1 }), + assert_throws_js(RangeError, () => new TransformStream(undefined, { highWaterMark: -1 }), 'should throw RangeError for negative writableHighWaterMark'); - assert_throws(new RangeError(), () => new TransformStream(undefined, undefined, { highWaterMark: -1 }), + assert_throws_js(RangeError, () => new TransformStream(undefined, undefined, { highWaterMark: -1 }), 'should throw RangeError for negative readableHighWaterMark'); - assert_throws(new RangeError(), () => new TransformStream(undefined, { highWaterMark: NaN }), + assert_throws_js(RangeError, () => new TransformStream(undefined, { highWaterMark: NaN }), 'should throw RangeError for NaN writableHighWaterMark'); - assert_throws(new RangeError(), () => new TransformStream(undefined, undefined, { highWaterMark: NaN }), + assert_throws_js(RangeError, () => new TransformStream(undefined, undefined, { highWaterMark: NaN }), 'should throw RangeError for NaN readableHighWaterMark'); }, 'a RangeError should be thrown for an invalid highWaterMark'); @@ -129,7 +129,7 @@ promise_test(t => { const ts = new TransformStream({ transform(chunk, controller) { // This assert has the important side-effect of catching the error, so transform() does not throw. - assert_throws(new RangeError(), () => controller.enqueue(chunk), 'enqueue should throw'); + assert_throws_js(RangeError, () => controller.enqueue(chunk), 'enqueue should throw'); } }, undefined, { size() { diff --git a/tests/wpt/web-platform-tests/streams/transform-streams/terminate.any.js b/tests/wpt/web-platform-tests/streams/transform-streams/terminate.any.js index 2bf9eabed84..0018b4b47d2 100644 --- a/tests/wpt/web-platform-tests/streams/transform-streams/terminate.any.js +++ b/tests/wpt/web-platform-tests/streams/transform-streams/terminate.any.js @@ -48,7 +48,7 @@ test(() => { start(controller) { controller.enqueue(0); controller.terminate(); - assert_throws(new TypeError(), () => controller.enqueue(1), 'enqueue should throw'); + assert_throws_js(TypeError, () => controller.enqueue(1), 'enqueue should throw'); } }); }, 'controller.enqueue() should throw after controller.terminate()'); diff --git a/tests/wpt/web-platform-tests/streams/writable-streams/bad-strategies.any.js b/tests/wpt/web-platform-tests/streams/writable-streams/bad-strategies.any.js index d67ee6b5039..bc51c3e9fc4 100644 --- a/tests/wpt/web-platform-tests/streams/writable-streams/bad-strategies.any.js +++ b/tests/wpt/web-platform-tests/streams/writable-streams/bad-strategies.any.js @@ -5,7 +5,7 @@ const error1 = new Error('a unique string'); error1.name = 'error1'; test(() => { - assert_throws(error1, () => { + assert_throws_exactly(error1, () => { new WritableStream({}, { get size() { throw error1; @@ -16,13 +16,13 @@ test(() => { }, 'Writable stream: throwing strategy.size getter'); test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new WritableStream({}, { size: 'a string' }); }); }, 'reject any non-function value for strategy.size'); test(() => { - assert_throws(error1, () => { + assert_throws_exactly(error1, () => { new WritableStream({}, { size() { return 1; @@ -37,7 +37,7 @@ test(() => { test(() => { for (const highWaterMark of [-1, -Infinity, NaN, 'foo', {}]) { - assert_throws(new RangeError(), () => { + assert_throws_js(RangeError, () => { new WritableStream({}, { size() { return 1; @@ -88,7 +88,7 @@ promise_test(() => { }, 'Writable stream: invalid strategy.size return value'); test(() => { - assert_throws(new TypeError(), () => new WritableStream(undefined, { + assert_throws_js(TypeError, () => new WritableStream(undefined, { size: 'not a function', highWaterMark: NaN }), 'WritableStream constructor should throw a TypeError'); diff --git a/tests/wpt/web-platform-tests/streams/writable-streams/bad-underlying-sinks.any.js b/tests/wpt/web-platform-tests/streams/writable-streams/bad-underlying-sinks.any.js index ed04b3c0a17..b0da6503b0f 100644 --- a/tests/wpt/web-platform-tests/streams/writable-streams/bad-underlying-sinks.any.js +++ b/tests/wpt/web-platform-tests/streams/writable-streams/bad-underlying-sinks.any.js @@ -7,7 +7,7 @@ const error1 = new Error('error1'); error1.name = 'error1'; test(() => { - assert_throws(error1, () => { + assert_throws_exactly(error1, () => { new WritableStream({ get start() { throw error1; @@ -15,7 +15,7 @@ test(() => { }); }, 'constructor should throw same error as throwing start getter'); - assert_throws(error1, () => { + assert_throws_exactly(error1, () => { new WritableStream({ start() { throw error1; @@ -23,13 +23,13 @@ test(() => { }); }, 'constructor should throw same error as throwing start method'); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new WritableStream({ start: 'not a function or undefined' }); }, 'constructor should throw TypeError when passed a non-function start property'); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new WritableStream({ start: { apply() {} } }); @@ -72,7 +72,7 @@ promise_test(t => { }, 'close: returning a rejected promise should cause writer close() and ready to reject'); test(() => { - assert_throws(error1, () => new WritableStream({ + assert_throws_exactly(error1, () => new WritableStream({ get close() { throw error1; } @@ -80,7 +80,7 @@ test(() => { }, 'close: throwing getter should cause constructor to throw'); test(() => { - assert_throws(error1, () => new WritableStream({ + assert_throws_exactly(error1, () => new WritableStream({ get write() { throw error1; } @@ -162,13 +162,13 @@ promise_test(t => { }, 'write: returning a rejected promise (second write) should cause writer write() and ready to reject'); test(() => { - assert_throws(new TypeError(), () => new WritableStream({ + assert_throws_js(TypeError, () => new WritableStream({ abort: { apply() {} } }), 'constructor should throw'); }, 'abort: non-function abort method with .apply'); test(() => { - assert_throws(error1, () => new WritableStream({ + assert_throws_exactly(error1, () => new WritableStream({ get abort() { throw error1; } diff --git a/tests/wpt/web-platform-tests/streams/writable-streams/brand-checks.any.js b/tests/wpt/web-platform-tests/streams/writable-streams/brand-checks.any.js index 17179e7936e..a28fec3bd6b 100644 --- a/tests/wpt/web-platform-tests/streams/writable-streams/brand-checks.any.js +++ b/tests/wpt/web-platform-tests/streams/writable-streams/brand-checks.any.js @@ -76,7 +76,7 @@ test(() => { }, 'WritableStream.prototype.getWriter enforces a brand check'); test(() => { - assert_throws(new TypeError(), () => new WritableStreamDefaultWriter(fakeWS()), 'constructor should throw'); + assert_throws_js(TypeError, () => new WritableStreamDefaultWriter(fakeWS()), 'constructor should throw'); }, 'WritableStreamDefaultWriter constructor enforces a brand check'); test(() => { diff --git a/tests/wpt/web-platform-tests/streams/writable-streams/constructor.any.js b/tests/wpt/web-platform-tests/streams/writable-streams/constructor.any.js index 97cda9cedac..c792e1f1faf 100644 --- a/tests/wpt/web-platform-tests/streams/writable-streams/constructor.any.js +++ b/tests/wpt/web-platform-tests/streams/writable-streams/constructor.any.js @@ -115,7 +115,7 @@ test(() => { } }); - assert_throws(new TypeError(), () => new WritableStreamDefaultController({}), + assert_throws_js(TypeError, () => new WritableStreamDefaultController({}), 'constructor should throw a TypeError exception'); }, 'WritableStreamDefaultController constructor should throw'); @@ -127,7 +127,7 @@ test(() => { } }); - assert_throws(new TypeError(), () => new WritableStreamDefaultController(stream), + assert_throws_js(TypeError, () => new WritableStreamDefaultController(stream), 'constructor should throw a TypeError exception'); }, 'WritableStreamDefaultController constructor should throw when passed an initialised WritableStream'); @@ -136,7 +136,7 @@ test(() => { const writer = stream.getWriter(); const WritableStreamDefaultWriter = writer.constructor; writer.releaseLock(); - assert_throws(new TypeError(), () => new WritableStreamDefaultWriter({}), + assert_throws_js(TypeError, () => new WritableStreamDefaultWriter({}), 'constructor should throw a TypeError exception'); }, 'WritableStreamDefaultWriter should throw unless passed a WritableStream'); @@ -144,7 +144,7 @@ test(() => { const stream = new WritableStream(); const writer = stream.getWriter(); const WritableStreamDefaultWriter = writer.constructor; - assert_throws(new TypeError(), () => new WritableStreamDefaultWriter(stream), + assert_throws_js(TypeError, () => new WritableStreamDefaultWriter(stream), 'constructor should throw a TypeError exception'); }, 'WritableStreamDefaultWriter constructor should throw when stream argument is locked'); diff --git a/tests/wpt/web-platform-tests/streams/writable-streams/general.any.js b/tests/wpt/web-platform-tests/streams/writable-streams/general.any.js index 96670448a9d..b168ee0a5b9 100644 --- a/tests/wpt/web-platform-tests/streams/writable-streams/general.any.js +++ b/tests/wpt/web-platform-tests/streams/writable-streams/general.any.js @@ -6,7 +6,7 @@ test(() => { const writer = ws.getWriter(); writer.releaseLock(); - assert_throws(new TypeError(), () => writer.desiredSize, 'desiredSize should throw a TypeError'); + assert_throws_js(TypeError, () => writer.desiredSize, 'desiredSize should throw a TypeError'); }, 'desiredSize on a released writer'); test(() => { diff --git a/tests/wpt/web-platform-tests/streams/writable-streams/start.any.js b/tests/wpt/web-platform-tests/streams/writable-streams/start.any.js index 0a1095b2506..96be6a7b18a 100644 --- a/tests/wpt/web-platform-tests/streams/writable-streams/start.any.js +++ b/tests/wpt/web-platform-tests/streams/writable-streams/start.any.js @@ -60,7 +60,7 @@ test(() => { let writeCalled = false; let closeCalled = false; - assert_throws(passedError, () => { + assert_throws_exactly(passedError, () => { // recordingWritableStream cannot be used here because the exception in the // constructor prevents assigning the object to a variable. new WritableStream({ diff --git a/tests/wpt/web-platform-tests/streams/writable-streams/write.any.js b/tests/wpt/web-platform-tests/streams/writable-streams/write.any.js index c936ef55af9..68da7939855 100644 --- a/tests/wpt/web-platform-tests/streams/writable-streams/write.any.js +++ b/tests/wpt/web-platform-tests/streams/writable-streams/write.any.js @@ -256,7 +256,7 @@ promise_test(() => { const stream = new WritableStream(); const writer = stream.getWriter(); const WritableStreamDefaultWriter = writer.constructor; - assert_throws(new TypeError(), () => new WritableStreamDefaultWriter(stream), + assert_throws_js(TypeError, () => new WritableStreamDefaultWriter(stream), 'should not be able to construct on locked stream'); // If stream.[[writer]] no longer points to |writer| then the closed Promise // won't work properly. diff --git a/tests/wpt/web-platform-tests/svg/animations/scripted/SVGAnimationElement-exceptions.html b/tests/wpt/web-platform-tests/svg/animations/scripted/SVGAnimationElement-exceptions.html index 0ad8ad3df50..fe06ac1a376 100644 --- a/tests/wpt/web-platform-tests/svg/animations/scripted/SVGAnimationElement-exceptions.html +++ b/tests/wpt/web-platform-tests/svg/animations/scripted/SVGAnimationElement-exceptions.html @@ -9,10 +9,10 @@ setup(function() { }); test(function() { - assert_throws('InvalidStateError', function() { animationElement.getStartTime() }); + assert_throws_dom('InvalidStateError', function() { animationElement.getStartTime() }); }, document.title+', getStartTime throws with unresolved interval.'); test(function() { - assert_throws('NotSupportedError', function() { animationElement.getSimpleDuration() }); + assert_throws_dom('NotSupportedError', function() { animationElement.getSimpleDuration() }); }, document.title+', getSimpleDuration throws with undefined simple duration.'); </script> diff --git a/tests/wpt/web-platform-tests/svg/animations/scripted/SVGAnimationElement-getStartTime.html b/tests/wpt/web-platform-tests/svg/animations/scripted/SVGAnimationElement-getStartTime.html index 5ffe98c3b85..fec3ff4db20 100644 --- a/tests/wpt/web-platform-tests/svg/animations/scripted/SVGAnimationElement-getStartTime.html +++ b/tests/wpt/web-platform-tests/svg/animations/scripted/SVGAnimationElement-getStartTime.html @@ -20,10 +20,10 @@ function checkStartTime(values, t) { } function checkHasNoCurrentInterval(t) { - assert_throws('InvalidStateError', () => { + assert_throws_dom('InvalidStateError', () => { animationElements[0].getStartTime() }, 'no interval @ ' + t); - assert_throws('InvalidStateError', () => { + assert_throws_dom('InvalidStateError', () => { animationElements[1].getStartTime() }, 'no interval @ ' + t); } diff --git a/tests/wpt/web-platform-tests/svg/path/distance/pathLength-positive.svg b/tests/wpt/web-platform-tests/svg/path/distance/pathLength-positive.svg index b40d6b82b55..798b7ff3b8a 100644 --- a/tests/wpt/web-platform-tests/svg/path/distance/pathLength-positive.svg +++ b/tests/wpt/web-platform-tests/svg/path/distance/pathLength-positive.svg @@ -10,8 +10,7 @@ </metadata> <defs> - <path id="track" stroke="lightblue" fill="none" - d="M 50 50 h 200" pathLength="2"/> + <path id="track" stroke="lightblue" fill="none" d="M 50 50 h 200" pathLength="2"/> </defs> <g> diff --git a/tests/wpt/web-platform-tests/svg/path/distance/pathlength-path-mutating.svg b/tests/wpt/web-platform-tests/svg/path/distance/pathlength-path-mutating.svg new file mode 100644 index 00000000000..b3f71653f42 --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/path/distance/pathlength-path-mutating.svg @@ -0,0 +1,15 @@ +<svg xmlns="http://www.w3.org/2000/svg" xmlns:h="http://www.w3.org/1999/xhtml" class="reftest-wait"> + <title>Mutating the 'pathLength' attribute ('path' element)</title> + <h:link rel="help" href="https://svgwg.org/svg2-draft/paths.html#PathLengthAttribute"/> + <h:link rel="match" href="reference/pathlength-path-mutating-ref.svg"/> + <path pathLength="800" d="M100,100h100v100h-100z" fill="none" + stroke="blue" stroke-width="20" stroke-dasharray="25"/> + <script> + requestAnimationFrame(() => { + requestAnimationFrame(() => { + document.querySelector('path').setAttribute('pathLength', 200); + document.documentElement.classList.toggle("reftest-wait"); + }); + }); + </script> +</svg> diff --git a/tests/wpt/web-platform-tests/svg/path/distance/pathlength-path-negative.svg b/tests/wpt/web-platform-tests/svg/path/distance/pathlength-path-negative.svg new file mode 100644 index 00000000000..ce782dbef76 --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/path/distance/pathlength-path-negative.svg @@ -0,0 +1,7 @@ +<svg xmlns="http://www.w3.org/2000/svg" xmlns:h="http://www.w3.org/1999/xhtml"> + <title>The 'pathLength' attribute set to a negative value ('path' element)</title> + <h:link rel="help" href="https://svgwg.org/svg2-draft/paths.html#PathLengthAttribute"/> + <h:link rel="match" href="reference/pathlength-path-negative-ref.svg"/> + <path d="M10,10L110,10L110,110L10,110Z" pathLength="-4" stroke-dashoffset="1" stroke-dasharray="1 1" + fill="none" stroke="black" stroke-width="10"></path> +</svg> diff --git a/tests/wpt/web-platform-tests/svg/path/distance/pathlength-path-zero.svg b/tests/wpt/web-platform-tests/svg/path/distance/pathlength-path-zero.svg new file mode 100644 index 00000000000..f5c4168cd59 --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/path/distance/pathlength-path-zero.svg @@ -0,0 +1,7 @@ +<svg xmlns="http://www.w3.org/2000/svg" xmlns:h="http://www.w3.org/1999/xhtml"> + <title>The 'pathLength' attribute set to zero ('path' element)</title> + <h:link rel="help" href="https://svgwg.org/svg2-draft/paths.html#PathLengthAttribute"/> + <h:link rel="match" href="reference/pathlength-path-zero-ref.svg"/> + <path d="M10,10L110,10L110,110L10,110Z" pathLength="0" stroke-dashoffset="1" stroke-dasharray="1 1" + fill="none" stroke="black" stroke-width="10"/> +</svg> diff --git a/tests/wpt/web-platform-tests/svg/path/distance/pathlength-path.svg b/tests/wpt/web-platform-tests/svg/path/distance/pathlength-path.svg new file mode 100644 index 00000000000..79402505ca9 --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/path/distance/pathlength-path.svg @@ -0,0 +1,8 @@ +<svg xmlns="http://www.w3.org/2000/svg" xmlns:h="http://www.w3.org/1999/xhtml"> + <title>The 'pathLength' attribute ('path' element)</title> + <h:link rel="help" href="https://svgwg.org/svg2-draft/paths.html#PathLengthAttribute"/> + <h:link rel="match" href="reference/pathlength-path-ref.svg"/> + <path d="M10,10L110,10L110,110L10,110Z" pathLength="4" + stroke-dashoffset="1" stroke-dasharray="1 1" + fill="none" stroke="black" stroke-width="10"/> +</svg> diff --git a/tests/wpt/web-platform-tests/svg/path/distance/pathlength-rect-mutating.svg b/tests/wpt/web-platform-tests/svg/path/distance/pathlength-rect-mutating.svg new file mode 100644 index 00000000000..2dcbe440790 --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/path/distance/pathlength-rect-mutating.svg @@ -0,0 +1,17 @@ +<svg xmlns="http://www.w3.org/2000/svg" xmlns:h="http://www.w3.org/1999/xhtml" class="reftest-wait" + width="100" height="100"> + <title>Mutating the 'pathLength' attribute ('rect' element)</title> + <h:link rel="help" href="https://svgwg.org/svg2-draft/paths.html#PathLengthAttribute"/> + <h:link rel="match" href="reference/pathlength-rect-mutating-ref.svg"/> + <rect y="50" width="200" height="100" fill="red" + stroke="green" stroke-width="100" stroke-dasharray="100" + pathLength="4800"/> + <script> + requestAnimationFrame(() => { + requestAnimationFrame(() => { + document.querySelector('rect').setAttribute('pathLength', 600); + document.documentElement.classList.toggle("reftest-wait"); + }); + }); + </script> +</svg> diff --git a/tests/wpt/web-platform-tests/svg/path/distance/pathlength-rect.svg b/tests/wpt/web-platform-tests/svg/path/distance/pathlength-rect.svg new file mode 100644 index 00000000000..106fed5f2eb --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/path/distance/pathlength-rect.svg @@ -0,0 +1,7 @@ +<svg xmlns="http://www.w3.org/2000/svg" xmlns:h="http://www.w3.org/1999/xhtml"> + <title>The 'pathLength' attribute ('rect' element)</title> + <h:link rel="help" href="https://svgwg.org/svg2-draft/paths.html#PathLengthAttribute"/> + <h:link rel="match" href="reference/pathlength-rect-ref.svg"/> + <rect width="50" height="50" pathLength="4" fill="blue" + stroke-dashoffset="1" stroke-dasharray="1 1" stroke="black" stroke-width="10"/> +</svg> diff --git a/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-mutating-ref.svg b/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-mutating-ref.svg new file mode 100644 index 00000000000..fe45125f6bb --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-mutating-ref.svg @@ -0,0 +1,5 @@ +<svg xmlns="http://www.w3.org/2000/svg"> + <title>Mutating the 'pathLength' attribute ('path' element; reference)</title> + <path d="M100,100h100v100h-100z" fill="none" stroke="blue" + stroke-width="20" stroke-dasharray="50"/> +</svg> diff --git a/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-negative-ref.svg b/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-negative-ref.svg new file mode 100644 index 00000000000..c4dfb1b2b59 --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-negative-ref.svg @@ -0,0 +1,5 @@ +<svg xmlns="http://www.w3.org/2000/svg"> + <title>The 'pathLength' attribute set to a negative value ('path' element; reference)</title> + <path d="M10,10L110,10L110,110L10,110Z" stroke-dashoffset="1" stroke-dasharray="1 1" + fill="none" stroke="black" stroke-width="10"></path> +</svg> diff --git a/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-ref.svg b/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-ref.svg new file mode 100644 index 00000000000..79aca872043 --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-ref.svg @@ -0,0 +1,5 @@ +<svg xmlns="http://www.w3.org/2000/svg"> + <title>The 'pathLength' attribute ('path' element; reference)</title> + <path d="M10,10L110,10L110,110L10,110Z" stroke-dashoffset="100" stroke-dasharray="100 100" + fill="none" stroke="black" stroke-width="10"></path> +</svg> diff --git a/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-zero-ref.svg b/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-zero-ref.svg new file mode 100644 index 00000000000..232bf66cbcd --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-path-zero-ref.svg @@ -0,0 +1,4 @@ +<svg xmlns="http://www.w3.org/2000/svg"> + <title>The 'pathLength' attribute set to zero ('path' element; reference)</title> + <path d="M10,10L110,10L110,110L10,110Z" fill="none" stroke="black" stroke-width="10"/> +</svg> diff --git a/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-rect-mutating-ref.svg b/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-rect-mutating-ref.svg new file mode 100644 index 00000000000..120941444a4 --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-rect-mutating-ref.svg @@ -0,0 +1,3 @@ +<svg xmlns="http://www.w3.org/2000/svg"> + <rect width="100" height="100" fill="green"/> +</svg> diff --git a/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-rect-ref.svg b/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-rect-ref.svg new file mode 100644 index 00000000000..232178d732c --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/path/distance/reference/pathlength-rect-ref.svg @@ -0,0 +1,5 @@ +<svg xmlns="http://www.w3.org/2000/svg"> + <title>The 'pathLength' attribute ('rect' element; reference)</title> + <rect width="50" height="50" fill="blue" + stroke-dashoffset="50" stroke-dasharray="50 50" stroke="black" stroke-width="10"/> +</svg> diff --git a/tests/wpt/web-platform-tests/svg/types/scripted/SVGAnimatedNumber.html b/tests/wpt/web-platform-tests/svg/types/scripted/SVGAnimatedNumber.html index a1697cbf926..c72cabca1a8 100644 --- a/tests/wpt/web-platform-tests/svg/types/scripted/SVGAnimatedNumber.html +++ b/tests/wpt/web-platform-tests/svg/types/scripted/SVGAnimatedNumber.html @@ -26,15 +26,15 @@ test(function() { assert_equals(feSpecularLightingElement.surfaceScale.baseVal, 300); // ECMA-262, 9.3, "ToNumber" - assert_throws(new TypeError(), function() { feSpecularLightingElement.surfaceScale.baseVal = 'aString'; }); + assert_throws_js(TypeError, function() { feSpecularLightingElement.surfaceScale.baseVal = 'aString'; }); assert_equals(feSpecularLightingElement.surfaceScale.baseVal, 300); feSpecularLightingElement.surfaceScale.baseVal = 0; assert_equals(feSpecularLightingElement.surfaceScale.baseVal, 0); - assert_throws(new TypeError(), function() { feSpecularLightingElement.surfaceScale.baseVal = NaN; }); + assert_throws_js(TypeError, function() { feSpecularLightingElement.surfaceScale.baseVal = NaN; }); assert_equals(feSpecularLightingElement.surfaceScale.baseVal, 0); - assert_throws(new TypeError(), function() { feSpecularLightingElement.surfaceScale.baseVal = Infinity; }); + assert_throws_js(TypeError, function() { feSpecularLightingElement.surfaceScale.baseVal = Infinity; }); assert_equals(feSpecularLightingElement.surfaceScale.baseVal, 0); - assert_throws(new TypeError(), function() { feSpecularLightingElement.surfaceScale.baseVal = feSpecularLightingElement; }); + assert_throws_js(TypeError, function() { feSpecularLightingElement.surfaceScale.baseVal = feSpecularLightingElement; }); assert_equals(feSpecularLightingElement.surfaceScale.baseVal, 0); feSpecularLightingElement.surfaceScale.baseVal = 300; assert_equals(feSpecularLightingElement.surfaceScale.baseVal, 300); diff --git a/tests/wpt/web-platform-tests/svg/types/scripted/SVGGeometryElement.getPointAtLength-02.svg b/tests/wpt/web-platform-tests/svg/types/scripted/SVGGeometryElement.getPointAtLength-02.svg new file mode 100644 index 00000000000..4cf93da6a18 --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/types/scripted/SVGGeometryElement.getPointAtLength-02.svg @@ -0,0 +1,20 @@ +<svg xmlns="http://www.w3.org/2000/svg" xmlns:h="http://www.w3.org/1999/xhtml"> + <title>SVGGeometryElement.prototype.getPointAtLength() query with 'pathLength'</title> + <h:link rel="help" href="https://svgwg.org/svg2-draft/types.html#__svg__SVGGeometryElement__getPointAtLength"/> + <h:script src="/resources/testharness.js"/> + <h:script src="/resources/testharnessreport.js"/> + <script> +test(function() { + let path = document.createElementNS('http://www.w3.org/2000/svg', 'path'); + path.setAttribute('d', 'M0,0L100,0L100,100'); + path.setAttribute('pathLength', '1000'); + + var point = path.getPointAtLength(50); + assert_approx_equals(point.x, 50, 1e-5); + assert_approx_equals(point.y, 0, 1e-5); + var point = path.getPointAtLength(150); + assert_approx_equals(point.x, 100, 1e-5); + assert_approx_equals(point.y, 50, 1e-5); +}); + </script> +</svg> diff --git a/tests/wpt/web-platform-tests/svg/types/scripted/SVGGeometryElement.getTotalLength-01.svg b/tests/wpt/web-platform-tests/svg/types/scripted/SVGGeometryElement.getTotalLength-01.svg new file mode 100644 index 00000000000..49c8c165d70 --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/types/scripted/SVGGeometryElement.getTotalLength-01.svg @@ -0,0 +1,14 @@ +<svg xmlns="http://www.w3.org/2000/svg" xmlns:h="http://www.w3.org/1999/xhtml"> + <title>SVGGeometryElement.prototype.getTotalLength() query with 'pathLength'</title> + <h:link rel="help" href="https://svgwg.org/svg2-draft/types.html#__svg__SVGGeometryElement__getTotalLength"/> + <h:script src="/resources/testharness.js"/> + <h:script src="/resources/testharnessreport.js"/> + <script> +test(function() { + let path = document.createElementNS('http://www.w3.org/2000/svg', 'path'); + path.setAttribute('d', 'M0,0L100,0L100,100'); + path.setAttribute('pathLength', '1000'); + assert_approx_equals(path.getTotalLength(), 200, 1e-5); +}, document.title+', getTotalLength'); + </script> +</svg> diff --git a/tests/wpt/web-platform-tests/svg/types/scripted/SVGLength.html b/tests/wpt/web-platform-tests/svg/types/scripted/SVGLength.html index 2b043b99a62..7436f5940c5 100644 --- a/tests/wpt/web-platform-tests/svg/types/scripted/SVGLength.html +++ b/tests/wpt/web-platform-tests/svg/types/scripted/SVGLength.html @@ -21,50 +21,50 @@ test(function() { assert_equals(length.valueAsString, "2px"); // Check invalid arguments for 'convertToSpecifiedUnits'. - assert_throws("NotSupportedError", function() { length.convertToSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_UNKNOWN); }); - assert_throws("NotSupportedError", function() { length.convertToSpecifiedUnits(-1); }); - assert_throws("NotSupportedError", function() { length.convertToSpecifiedUnits(11); }); - assert_throws("NotSupportedError", function() { length.convertToSpecifiedUnits('aString'); }); - assert_throws("NotSupportedError", function() { length.convertToSpecifiedUnits(length); }); - assert_throws("NotSupportedError", function() { length.convertToSpecifiedUnits(svgElement); }); - assert_throws(new TypeError(), function() { length.convertToSpecifiedUnits(); }); + assert_throws_dom("NotSupportedError", function() { length.convertToSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_UNKNOWN); }); + assert_throws_dom("NotSupportedError", function() { length.convertToSpecifiedUnits(-1); }); + assert_throws_dom("NotSupportedError", function() { length.convertToSpecifiedUnits(11); }); + assert_throws_dom("NotSupportedError", function() { length.convertToSpecifiedUnits('aString'); }); + assert_throws_dom("NotSupportedError", function() { length.convertToSpecifiedUnits(length); }); + assert_throws_dom("NotSupportedError", function() { length.convertToSpecifiedUnits(svgElement); }); + assert_throws_js(TypeError, function() { length.convertToSpecifiedUnits(); }); assert_equals(length.unitType, SVGLength.SVG_LENGTHTYPE_PX); assert_equals(length.value, 2); assert_equals(length.valueInSpecifiedUnits, 2); assert_equals(length.valueAsString, "2px"); // Check invalid arguments for 'newValueSpecifiedUnits'. - assert_throws("NotSupportedError", function() { length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_UNKNOWN, 4); }); - assert_throws("NotSupportedError", function() { length.newValueSpecifiedUnits(-1, 4); }); - assert_throws("NotSupportedError", function() { length.newValueSpecifiedUnits(11, 4); }); + assert_throws_dom("NotSupportedError", function() { length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_UNKNOWN, 4); }); + assert_throws_dom("NotSupportedError", function() { length.newValueSpecifiedUnits(-1, 4); }); + assert_throws_dom("NotSupportedError", function() { length.newValueSpecifiedUnits(11, 4); }); // ECMA-262, 9.3, "ToNumber". length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_PX, 0); - assert_throws(new TypeError(), function() { length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_PX, 'aString'); }); + assert_throws_js(TypeError, function() { length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_PX, 'aString'); }); assert_equals(length.value, 0); - assert_throws(new TypeError(), function() { length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_PX, length); }); + assert_throws_js(TypeError, function() { length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_PX, length); }); assert_equals(length.value, 0); - assert_throws(new TypeError(), function() { length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_PX, svgElement); }); + assert_throws_js(TypeError, function() { length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_PX, svgElement); }); assert_equals(length.value, 0); - assert_throws(new TypeError(), function() { length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_PX, NaN); }); + assert_throws_js(TypeError, function() { length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_PX, NaN); }); assert_equals(length.value, 0); - assert_throws(new TypeError(), function() { length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_PX, Infinity); }); + assert_throws_js(TypeError, function() { length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_PX, Infinity); }); assert_equals(length.value, 0); - assert_throws(new TypeError(), function() { length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_PX); }); + assert_throws_js(TypeError, function() { length.newValueSpecifiedUnits(SVGLength.SVG_LENGTHTYPE_PX); }); // Reset to original value above. length.valueAsString = "2px"; - assert_throws("NotSupportedError", function() { length.newValueSpecifiedUnits('aString', 4); }); - assert_throws("NotSupportedError", function() { length.newValueSpecifiedUnits(length, 4); }); - assert_throws("NotSupportedError", function() { length.newValueSpecifiedUnits(svgElement, 4); }); - assert_throws(new TypeError(), function() { length.newValueSpecifiedUnits('aString', 'aString'); }); - assert_throws(new TypeError(), function() { length.newValueSpecifiedUnits(length, length); }); - assert_throws(new TypeError(), function() { length.newValueSpecifiedUnits(svgElement, svgElement); }); + assert_throws_dom("NotSupportedError", function() { length.newValueSpecifiedUnits('aString', 4); }); + assert_throws_dom("NotSupportedError", function() { length.newValueSpecifiedUnits(length, 4); }); + assert_throws_dom("NotSupportedError", function() { length.newValueSpecifiedUnits(svgElement, 4); }); + assert_throws_js(TypeError, function() { length.newValueSpecifiedUnits('aString', 'aString'); }); + assert_throws_js(TypeError, function() { length.newValueSpecifiedUnits(length, length); }); + assert_throws_js(TypeError, function() { length.newValueSpecifiedUnits(svgElement, svgElement); }); assert_equals(length.unitType, SVGLength.SVG_LENGTHTYPE_PX); assert_equals(length.value, 2); assert_equals(length.valueInSpecifiedUnits, 2); assert_equals(length.valueAsString, "2px"); // Check setting invalid 'valueAsString' arguments. - assert_throws("SyntaxError", function() { length.valueAsString = '10deg'; }); + assert_throws_dom("SyntaxError", function() { length.valueAsString = '10deg'; }); assert_equals(length.valueAsString, "2px"); assert_equals(length.value, 2); assert_equals(length.valueInSpecifiedUnits, 2); @@ -78,34 +78,34 @@ test(function() { length.valueAsString = "2px"; // reset to 2px. - assert_throws("SyntaxError", function() { length.valueAsString = ',5 em'; }); + assert_throws_dom("SyntaxError", function() { length.valueAsString = ',5 em'; }); assert_equals(length.valueAsString, "2px"); assert_equals(length.value, 2); assert_equals(length.valueInSpecifiedUnits, 2); assert_equals(length.unitType, SVGLength.SVG_LENGTHTYPE_PX); - assert_throws("SyntaxError", function() { length.valueAsString = null; }); + assert_throws_dom("SyntaxError", function() { length.valueAsString = null; }); assert_equals(length.valueAsString, "2px"); assert_equals(length.value, 2); assert_equals(length.valueInSpecifiedUnits, 2); assert_equals(length.unitType, SVGLength.SVG_LENGTHTYPE_PX); - assert_throws("SyntaxError", function() { length.valueAsString = ''; }); + assert_throws_dom("SyntaxError", function() { length.valueAsString = ''; }); assert_equals(length.valueAsString, "2px"); assert_equals(length.value, 2); assert_equals(length.valueInSpecifiedUnits, 2); assert_equals(length.unitType, SVGLength.SVG_LENGTHTYPE_PX); // Check setting invalid 'value' arguments. - assert_throws(new TypeError(), function() { length.value = NaN; }); - assert_throws(new TypeError(), function() { length.value = Infinity; }); + assert_throws_js(TypeError, function() { length.value = NaN; }); + assert_throws_js(TypeError, function() { length.value = Infinity; }); assert_equals(length.value, 2); assert_equals(length.valueInSpecifiedUnits, 2); assert_equals(length.unitType, SVGLength.SVG_LENGTHTYPE_PX); // Check setting invalid 'valueInSpecifiedUnits' arguments. - assert_throws(new TypeError(), function() { length.valueInSpecifiedUnits = NaN; }); - assert_throws(new TypeError(), function() { length.valueInSpecifiedUnits = Infinity; }); + assert_throws_js(TypeError, function() { length.valueInSpecifiedUnits = NaN; }); + assert_throws_js(TypeError, function() { length.valueInSpecifiedUnits = Infinity; }); assert_equals(length.value, 2); assert_equals(length.valueInSpecifiedUnits, 2); assert_equals(length.unitType, SVGLength.SVG_LENGTHTYPE_PX); diff --git a/tests/wpt/web-platform-tests/svg/types/scripted/SVGLengthList-basics.html b/tests/wpt/web-platform-tests/svg/types/scripted/SVGLengthList-basics.html index 58d0e937bed..685074d519f 100644 --- a/tests/wpt/web-platform-tests/svg/types/scripted/SVGLengthList-basics.html +++ b/tests/wpt/web-platform-tests/svg/types/scripted/SVGLengthList-basics.html @@ -21,22 +21,22 @@ test(function() { assert_equals(xBaseValList.getItem(2).value, 1500); // Test uncommon arguments for initialize(). - assert_throws(new TypeError(), function() { xBaseValList.initialize(30); }); - assert_throws(new TypeError(), function() { xBaseValList.initialize('aString'); }); - assert_throws(new TypeError(), function() { xBaseValList.initialize(text1); }); - assert_throws(new TypeError(), function() { xBaseValList.initialize(null); }); + assert_throws_js(TypeError, function() { xBaseValList.initialize(30); }); + assert_throws_js(TypeError, function() { xBaseValList.initialize('aString'); }); + assert_throws_js(TypeError, function() { xBaseValList.initialize(text1); }); + assert_throws_js(TypeError, function() { xBaseValList.initialize(null); }); // Test uncommon arguments for getItem(). - assert_throws("IndexSizeError", function() { xBaseValList.getItem(30); }); + assert_throws_dom("IndexSizeError", function() { xBaseValList.getItem(30); }); assert_equals(xBaseValList.getItem('aString').value, xBaseValList.getItem(0).value); assert_equals(xBaseValList.getItem(text1).value, xBaseValList.getItem(0).value); assert_equals(xBaseValList.getItem(null).value, xBaseValList.getItem(0).value); // Test uncommon arguments for insertItemBefore(). - assert_throws(new TypeError(), function() { xBaseValList.insertItemBefore(30); }); - assert_throws(new TypeError(), function() { xBaseValList.insertItemBefore('aString'); }); - assert_throws(new TypeError(), function() { xBaseValList.insertItemBefore(text1); }); - assert_throws(new TypeError(), function() { xBaseValList.insertItemBefore(null); }); + assert_throws_js(TypeError, function() { xBaseValList.insertItemBefore(30); }); + assert_throws_js(TypeError, function() { xBaseValList.insertItemBefore('aString'); }); + assert_throws_js(TypeError, function() { xBaseValList.insertItemBefore(text1); }); + assert_throws_js(TypeError, function() { xBaseValList.insertItemBefore(null); }); assert_equals(xBaseValList.insertItemBefore(xBaseValList.getItem(1), 'aString').value, xBaseValList.getItem(0).value); assert_equals(xBaseValList.numberOfItems, 4); @@ -77,10 +77,10 @@ test(function() { assert_equals(xBaseValList.getItem(6).value, 1500); assert_equals(text1.getAttribute('x'), "500 1000 500 1000 500 1000 1500"); - assert_throws(new TypeError(), function() { xBaseValList.insertItemBefore(30, 0); }); - assert_throws(new TypeError(), function() { xBaseValList.insertItemBefore('aString', 0); }); - assert_throws(new TypeError(), function() { xBaseValList.insertItemBefore(text1, 0); }); - assert_throws(new TypeError(), function() { xBaseValList.insertItemBefore(null, 0); }); + assert_throws_js(TypeError, function() { xBaseValList.insertItemBefore(30, 0); }); + assert_throws_js(TypeError, function() { xBaseValList.insertItemBefore('aString', 0); }); + assert_throws_js(TypeError, function() { xBaseValList.insertItemBefore(text1, 0); }); + assert_throws_js(TypeError, function() { xBaseValList.insertItemBefore(null, 0); }); // Set x='1 2 3 4' for text1. text1.setAttribute('x', '1 2 3 4'); @@ -103,20 +103,20 @@ test(function() { assert_equals(text1.getAttribute('x'), "1 2 3 4"); // Test uncommon arguments for replaceItem(). - assert_throws(new TypeError(), function() { xBaseValList.replaceItem(30); }); - assert_throws(new TypeError(), function() { xBaseValList.replaceItem('aString'); }); - assert_throws(new TypeError(), function() { xBaseValList.replaceItem(text1); }); - assert_throws(new TypeError(), function() { xBaseValList.replaceItem(null); }); - assert_throws(new TypeError(), function() { xBaseValList.replaceItem(30, 0); }); - assert_throws(new TypeError(), function() { xBaseValList.replaceItem('aString', 0); }); - assert_throws(new TypeError(), function() { xBaseValList.replaceItem(text1, 0); }); - assert_throws(new TypeError(), function() { xBaseValList.replaceItem(null, 0); }); + assert_throws_js(TypeError, function() { xBaseValList.replaceItem(30); }); + assert_throws_js(TypeError, function() { xBaseValList.replaceItem('aString'); }); + assert_throws_js(TypeError, function() { xBaseValList.replaceItem(text1); }); + assert_throws_js(TypeError, function() { xBaseValList.replaceItem(null); }); + assert_throws_js(TypeError, function() { xBaseValList.replaceItem(30, 0); }); + assert_throws_js(TypeError, function() { xBaseValList.replaceItem('aString', 0); }); + assert_throws_js(TypeError, function() { xBaseValList.replaceItem(text1, 0); }); + assert_throws_js(TypeError, function() { xBaseValList.replaceItem(null, 0); }); // Test uncommon values for indexed setter. - assert_throws(new TypeError(), function() { xBaseValList[0] = 30; }); - assert_throws(new TypeError(), function() { xBaseValList[0] = 'aString'; }); - assert_throws(new TypeError(), function() { xBaseValList[0] = text1; }); - assert_throws(new TypeError(), function() { xBaseValList[0] = null; }); + assert_throws_js(TypeError, function() { xBaseValList[0] = 30; }); + assert_throws_js(TypeError, function() { xBaseValList[0] = 'aString'; }); + assert_throws_js(TypeError, function() { xBaseValList[0] = text1; }); + assert_throws_js(TypeError, function() { xBaseValList[0] = null; }); assert_equals(xBaseValList.replaceItem(xBaseValList.getItem(0), 0).value, xBaseValList.getItem(0).value); assert_equals(xBaseValList.numberOfItems, 4); @@ -148,13 +148,13 @@ test(function() { assert_equals(xBaseValList.replaceItem(xBaseValList.getItem(1), 3).value, xBaseValList.getItem(3).value); assert_equals(xBaseValList.numberOfItems, 4); assert_equals(text1.getAttribute('x'), "1 2 3 2"); - assert_throws("IndexSizeError", function() { xBaseValList.replaceItem(xBaseValList.getItem(3), 4); }); + assert_throws_dom("IndexSizeError", function() { xBaseValList.replaceItem(xBaseValList.getItem(3), 4); }); // Set x='1 2 3 4' for text1. text1.setAttribute('x', '1 2 3 4'); // Test uncommon arguments for removeItem(). - assert_throws("IndexSizeError", function() { xBaseValList.removeItem(30); }); + assert_throws_dom("IndexSizeError", function() { xBaseValList.removeItem(30); }); assert_equals(xBaseValList.removeItem(0).value, 1); assert_equals(xBaseValList.numberOfItems, 3); @@ -170,13 +170,13 @@ test(function() { assert_equals(text1.getAttribute('x'), "3 4"); // Test uncommon arguments for appendItem(). - assert_throws(new TypeError(), function() { xBaseValList.appendItem(30); }); - assert_throws(new TypeError(), function() { xBaseValList.appendItem('aString'); }); - assert_throws(new TypeError(), function() { xBaseValList.appendItem(text1); }); - assert_throws(new TypeError(), function() { xBaseValList.appendItem(null); }); + assert_throws_js(TypeError, function() { xBaseValList.appendItem(30); }); + assert_throws_js(TypeError, function() { xBaseValList.appendItem('aString'); }); + assert_throws_js(TypeError, function() { xBaseValList.appendItem(text1); }); + assert_throws_js(TypeError, function() { xBaseValList.appendItem(null); }); // Testing animVal clear throws. - assert_throws("NoModificationAllowedError", function() { xAnimValList.clear(); }); + assert_throws_dom("NoModificationAllowedError", function() { xAnimValList.clear(); }); xBaseValList.clear(); }); </script> diff --git a/tests/wpt/web-platform-tests/svg/types/scripted/SVGLengthList-getItem.html b/tests/wpt/web-platform-tests/svg/types/scripted/SVGLengthList-getItem.html index c81a2339446..ca27810e72d 100644 --- a/tests/wpt/web-platform-tests/svg/types/scripted/SVGLengthList-getItem.html +++ b/tests/wpt/web-platform-tests/svg/types/scripted/SVGLengthList-getItem.html @@ -14,12 +14,12 @@ test(function() { assert_equals(xList.numberOfItems, 3); // Test with various index parameters. - assert_throws("IndexSizeError", function() { xList.getItem(-100); }); - assert_throws("IndexSizeError", function() { xList.getItem(-1); }); + assert_throws_dom("IndexSizeError", function() { xList.getItem(-100); }); + assert_throws_dom("IndexSizeError", function() { xList.getItem(-1); }); assert_equals(xList.getItem(0).value, 50); assert_equals(xList.getItem(1).value, 100); assert_equals(xList.getItem(2).value, 150); - assert_throws("IndexSizeError", function() { xList.getItem(3); }); - assert_throws("IndexSizeError", function() { xList.getItem(100); }); + assert_throws_dom("IndexSizeError", function() { xList.getItem(3); }); + assert_throws_dom("IndexSizeError", function() { xList.getItem(100); }); }); </script> \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/svg/types/scripted/resources/SVGLengthList-helper.js b/tests/wpt/web-platform-tests/svg/types/scripted/resources/SVGLengthList-helper.js index 3cf888b7dba..07697d6491b 100644 --- a/tests/wpt/web-platform-tests/svg/types/scripted/resources/SVGLengthList-helper.js +++ b/tests/wpt/web-platform-tests/svg/types/scripted/resources/SVGLengthList-helper.js @@ -3,5 +3,5 @@ function assert_list(list, expectedValues) { for (var index = 0; index < expectedValues.length; ++index) assert_equals(list.getItem(index).value, expectedValues[index]); - assert_throws("IndexSizeError", function() { list.getItem(expectedValues.length); }); + assert_throws_dom("IndexSizeError", function() { list.getItem(expectedValues.length); }); } \ No newline at end of file diff --git a/tests/wpt/web-platform-tests/tools/META.yml b/tests/wpt/web-platform-tests/tools/META.yml index 7cc22a28c20..6f4bb000cfa 100644 --- a/tests/wpt/web-platform-tests/tools/META.yml +++ b/tests/wpt/web-platform-tests/tools/META.yml @@ -2,3 +2,7 @@ suggested_reviewers: - jgraham - gsnedders - jugglinmike + - Hexcles + - stephenmcgruer + - LukeZielinski + - KyleJu diff --git a/tests/wpt/web-platform-tests/tools/ci/azure/pip_install.yml b/tests/wpt/web-platform-tests/tools/ci/azure/pip_install.yml index c8795345f6b..eb7e790ba22 100644 --- a/tests/wpt/web-platform-tests/tools/ci/azure/pip_install.yml +++ b/tests/wpt/web-platform-tests/tools/ci/azure/pip_install.yml @@ -3,11 +3,15 @@ parameters: steps: - script: | - # `sudo pip install` is not used because some packages (e.g. tox) depend on - # system packages (e.g. setuptools) which cannot be upgraded due to System - # Integrity Protection, see https://stackoverflow.com/a/33004920. - pip install --user ${{ parameters.packages }} - echo "##vso[task.prependpath]$HOME/Library/Python/2.7/bin" + if [ `which pip` = '/usr/bin/pip' ]; then + # `sudo pip install` is not used because some packages (e.g. tox) depend on + # system packages (e.g. setuptools) which cannot be upgraded due to System + # Integrity Protection, see https://stackoverflow.com/a/33004920. + pip install --user ${{ parameters.packages }} + echo "##vso[task.prependpath]$HOME/Library/Python/2.7/bin" + else + pip --disable-pip-version-check install --upgrade ${{ parameters.packages }} + fi displayName: 'Install Python packages (macOS)' condition: and(succeeded(), eq(variables['Agent.OS'], 'Darwin')) - script: pip --disable-pip-version-check install --upgrade ${{ parameters.packages }} diff --git a/tests/wpt/web-platform-tests/tools/ci/tc/decision.py b/tests/wpt/web-platform-tests/tools/ci/tc/decision.py index 0c935b93f8e..4b23630012b 100644 --- a/tests/wpt/web-platform-tests/tools/ci/tc/decision.py +++ b/tests/wpt/web-platform-tests/tools/ci/tc/decision.py @@ -199,6 +199,7 @@ def build_full_command(event, task): ~/start.sh \ %(repo_url)s \ %(fetch_ref)s; +sudo add-apt-repository ppa:deadsnakes/ppa %(install_str)s cd web-platform-tests; ./tools/ci/run_tc.py %(options_str)s -- %(task_cmd)s; diff --git a/tests/wpt/web-platform-tests/tools/ci/tc/tasks/test.yml b/tests/wpt/web-platform-tests/tools/ci/tc/tasks/test.yml index e80e794203e..7476337e09b 100644 --- a/tests/wpt/web-platform-tests/tools/ci/tc/tasks/test.yml +++ b/tests/wpt/web-platform-tests/tools/ci/tc/tasks/test.yml @@ -101,6 +101,15 @@ components: install: - python3-pip + tox-python38: + env: + TOXENV: py38 + PY_COLORS: 0 + install: + - python3.8 + - python3.8-distutils + - python3.8-dev + tests-affected: options: browser: @@ -306,9 +315,9 @@ tasks: run-job: - tools_unittest - - tools/ unittests (Python 3): + - tools/ unittests (Python 3.6): description: >- - Unit tests for tools running under Python 3, excluding wptrunner + Unit tests for tools running under Python 3.6, excluding wptrunner use: - wpt-base - trigger-pr @@ -320,7 +329,21 @@ tasks: run-job: - tools_unittest - - tools/wpt/ tests: + - tools/ unittests (Python 3.8): + description: >- + Unit tests for tools running under Python 3.8, excluding wptrunner + use: + - wpt-base + - trigger-pr + - tox-python38 + command: ./tools/ci/ci_tools_unittest.sh + env: + HYPOTHESIS_PROFILE: ci + schedule-if: + run-job: + - tools_unittest + + - tools/wpt/ tests (Python 2): description: >- Integration tests for wpt commands use: @@ -342,6 +365,50 @@ tasks: run-job: - wpt_integration + - tools/wpt/ tests (Python 3.6): + description: >- + Integration tests for wpt commands + use: + - wpt-base + - trigger-pr + - tox-python3 + command: ./tools/ci/ci_wpt.sh + install: + - libnss3-tools + options: + oom-killer: true + browser: + - firefox + - chrome + channel: experimental + xvfb: true + hosts: true + schedule-if: + run-job: + - wpt_integration + + - tools/wpt/ tests (Python 3.8): + description: >- + Integration tests for wpt commands + use: + - wpt-base + - trigger-pr + - tox-python38 + command: ./tools/ci/ci_wpt.sh + install: + - libnss3-tools + options: + oom-killer: true + browser: + - firefox + - chrome + channel: experimental + xvfb: true + hosts: true + schedule-if: + run-job: + - wpt_integration + - resources/ tests: description: >- Tests for testharness.js and other files in resources/ diff --git a/tests/wpt/web-platform-tests/tools/ci/tc/tests/test_valid.py b/tests/wpt/web-platform-tests/tools/ci/tc/tests/test_valid.py index b170928b290..a194d370181 100644 --- a/tests/wpt/web-platform-tests/tools/ci/tc/tests/test_valid.py +++ b/tests/wpt/web-platform-tests/tools/ci/tc/tests/test_valid.py @@ -129,8 +129,11 @@ def test_verify_payload(): ("pr_event.json", True, {".taskcluster.yml",".travis.yml","tools/ci/start.sh"}, {'lint', 'tools/ unittests (Python 2)', - 'tools/ unittests (Python 3)', - 'tools/wpt/ tests', + 'tools/ unittests (Python 3.6)', + 'tools/ unittests (Python 3.8)', + 'tools/wpt/ tests (Python 2)', + 'tools/wpt/ tests (Python 3.6)', + 'tools/wpt/ tests (Python 3.8)', 'resources/ tests', 'infrastructure/ tests'}), # More tests are affected in the actual PR but it shouldn't affect the scheduled tasks diff --git a/tests/wpt/web-platform-tests/tools/requirements_mypy.txt b/tests/wpt/web-platform-tests/tools/requirements_mypy.txt index f3a56a6dd71..a478015893d 100644 --- a/tests/wpt/web-platform-tests/tools/requirements_mypy.txt +++ b/tests/wpt/web-platform-tests/tools/requirements_mypy.txt @@ -1,3 +1,3 @@ mypy==0.761 mypy-extensions==0.4.3 -typed-ast==1.4.0 +typed-ast==1.4.1 diff --git a/tests/wpt/web-platform-tests/tools/tox.ini b/tests/wpt/web-platform-tests/tools/tox.ini index e8673db0a69..6706c4787fc 100644 --- a/tests/wpt/web-platform-tests/tools/tox.ini +++ b/tests/wpt/web-platform-tests/tools/tox.ini @@ -1,6 +1,7 @@ [tox] -envlist = py27,py35,py36,py37,pypy,{py27,py35,py36,py37}-flake8,{py35,py36,py37}-mypy +envlist = py27,py35,py36,py37,py38,pypy,{py27,py35,py36,py37,py38}-flake8,{py35,py36,py37,py38}-mypy skipsdist=True +skip_missing_interpreters = False [testenv] deps = @@ -37,6 +38,10 @@ commands = flake8 --append-config={toxinidir}/py36-flake8.ini {posargs} deps = -rrequirements_flake8.txt commands = flake8 --append-config={toxinidir}/py36-flake8.ini {posargs} +[testenv:py38-flake8] +deps = -rrequirements_flake8.txt +commands = flake8 --append-config={toxinidir}/py36-flake8.ini {posargs} + [testenv:py35-mypy] deps = -rrequirements_mypy.txt changedir = {toxinidir}/.. @@ -54,3 +59,9 @@ deps = -rrequirements_mypy.txt changedir = {toxinidir}/.. commands = mypy --config-file={toxinidir}/mypy.ini --no-incremental --py2 -p tools.manifest -p tools.lint -p tools.gitignore + +[testenv:py38-mypy] +deps = -rrequirements_mypy.txt +changedir = {toxinidir}/.. +commands = + mypy --config-file={toxinidir}/mypy.ini --no-incremental --py2 -p tools.manifest -p tools.lint -p tools.gitignore diff --git a/tests/wpt/web-platform-tests/tools/wpt/browser.py b/tests/wpt/web-platform-tests/tools/wpt/browser.py index 13ce823d0ce..bf1958fab99 100644 --- a/tests/wpt/web-platform-tests/tools/wpt/browser.py +++ b/tests/wpt/web-platform-tests/tools/wpt/browser.py @@ -1068,11 +1068,11 @@ class Safari(Browser): except subprocess.CalledProcessError: self.logger.warning("Failed to call %s --version" % webdriver_binary) return None - m = re.match(r"Included with Safari (.*)", version_string) + m = re.match(br"Included with Safari (.*)", version_string) if not m: self.logger.warning("Failed to extract version from: %s" % version_string) return None - return m.group(1) + return m.group(1).decode() class Servo(Browser): diff --git a/tests/wpt/web-platform-tests/tools/wpt/install.py b/tests/wpt/web-platform-tests/tools/wpt/install.py index 3da697e5333..4a368f9a4d6 100644 --- a/tests/wpt/web-platform-tests/tools/wpt/install.py +++ b/tests/wpt/web-platform-tests/tools/wpt/install.py @@ -2,7 +2,6 @@ import argparse import sys from . import browser - latest_channels = { 'firefox': 'nightly', 'chrome': 'dev', diff --git a/tests/wpt/web-platform-tests/tools/wpt/tests/test_browser.py b/tests/wpt/web-platform-tests/tools/wpt/tests/test_browser.py index 25b66e7d922..e7c32a36211 100644 --- a/tests/wpt/web-platform-tests/tools/wpt/tests/test_browser.py +++ b/tests/wpt/web-platform-tests/tools/wpt/tests/test_browser.py @@ -15,11 +15,11 @@ def test_safari_version(mocked_check_output): safari = browser.Safari(logger) # Safari - mocked_check_output.return_value = 'Included with Safari 12.1 (14607.1.11)' + mocked_check_output.return_value = b'Included with Safari 12.1 (14607.1.11)' assert safari.version(webdriver_binary="safaridriver") == '12.1 (14607.1.11)' # Safari Technology Preview - mocked_check_output.return_value = 'Included with Safari Technology Preview (Release 67, 13607.1.9.0.1)' + mocked_check_output.return_value = b'Included with Safari Technology Preview (Release 67, 13607.1.9.0.1)' assert safari.version(webdriver_binary="safaridriver") == 'Technology Preview (Release 67, 13607.1.9.0.1)' @mock.patch('subprocess.check_output') @@ -30,11 +30,11 @@ def test_safari_version_errors(mocked_check_output): assert safari.version() is None # `safaridriver --version` return gibberish - mocked_check_output.return_value = 'gibberish' + mocked_check_output.return_value = b'gibberish' assert safari.version(webdriver_binary="safaridriver") is None # `safaridriver --version` fails (as it does for Safari <=12.0) - mocked_check_output.return_value = 'dummy' + mocked_check_output.return_value = b'dummy' mocked_check_output.side_effect = subprocess.CalledProcessError(1, 'cmd') assert safari.version(webdriver_binary="safaridriver") is None @@ -44,11 +44,11 @@ def test_webkitgtk_minibrowser_version(mocked_check_output): webkitgtk_minibrowser = browser.WebKitGTKMiniBrowser(logger) # stable version - mocked_check_output.return_value = 'WebKitGTK 2.26.1\n' + mocked_check_output.return_value = b'WebKitGTK 2.26.1\n' assert webkitgtk_minibrowser.version(binary='MiniBrowser') == '2.26.1' # nightly version - mocked_check_output.return_value = 'WebKitGTK 2.27.1 (r250823)\n' + mocked_check_output.return_value = b'WebKitGTK 2.27.1 (r250823)\n' assert webkitgtk_minibrowser.version(binary='MiniBrowser') == '2.27.1 (r250823)' @mock.patch('subprocess.check_output') @@ -59,11 +59,11 @@ def test_webkitgtk_minibrowser_version_errors(mocked_check_output): assert webkitgtk_minibrowser.version() is None # `MiniBrowser --version` return gibberish - mocked_check_output.return_value = 'gibberish' + mocked_check_output.return_value = b'gibberish' assert webkitgtk_minibrowser.version(binary='MiniBrowser') is None # `MiniBrowser --version` fails (as it does for MiniBrowser <= 2.26.0) - mocked_check_output.return_value = 'dummy' + mocked_check_output.return_value = b'dummy' mocked_check_output.side_effect = subprocess.CalledProcessError(1, 'cmd') assert webkitgtk_minibrowser.version(binary='MiniBrowser') is None @@ -93,11 +93,11 @@ def test_webkitgtk_minibrowser_find_binary(mocked_os_path_isfile): # Found on the default Debian path for AMD64 (gcc available but gives an error) debian_minibrowser_path_amd64 = '/usr/lib/x86_64-linux-gnu/webkit2gtk-4.0/MiniBrowser' mocked_os_path_isfile.side_effect = lambda path: path in [debian_minibrowser_path_amd64, '/usr/bin/gcc'] - with mock.patch('subprocess.check_output', return_value = 'error', side_effect = subprocess.CalledProcessError(1, 'cmd')): + with mock.patch('subprocess.check_output', return_value = b'error', side_effect = subprocess.CalledProcessError(1, 'cmd')): assert webkitgtk_minibrowser.find_binary() == debian_minibrowser_path_amd64 # Found on the default Debian path for ARM64 (gcc available) debian_minibrowser_path_arm64 = '/usr/lib/aarch64-linux-gnu/webkit2gtk-4.0/MiniBrowser' mocked_os_path_isfile.side_effect = lambda path: path in [debian_minibrowser_path_arm64, '/usr/bin/gcc'] - with mock.patch('subprocess.check_output', return_value = 'aarch64-linux-gnu'): + with mock.patch('subprocess.check_output', return_value = b'aarch64-linux-gnu'): assert webkitgtk_minibrowser.find_binary() == debian_minibrowser_path_arm64 diff --git a/tests/wpt/web-platform-tests/tools/wpt/tests/test_revlist.py b/tests/wpt/web-platform-tests/tools/wpt/tests/test_revlist.py index ec2a6b899d5..6b499dc5db4 100644 --- a/tests/wpt/web-platform-tests/tools/wpt/tests/test_revlist.py +++ b/tests/wpt/web-platform-tests/tools/wpt/tests/test_revlist.py @@ -1,4 +1,7 @@ +import sys + import mock +import pytest from tools.wpt import revlist @@ -10,12 +13,14 @@ def test_calculate_cutoff_date(): assert revlist.calculate_cutoff_date(3600, 3600, -1) == 3599 +@pytest.mark.xfail(sys.version_info >= (3,), reason="broken on Py3") def test_parse_epoch(): assert revlist.parse_epoch(b"10h") == 36000 assert revlist.parse_epoch(b"10d") == 864000 assert revlist.parse_epoch(b"10w") == 6048000 +@pytest.mark.xfail(sys.version_info >= (3,), reason="broken on Py3") @mock.patch('subprocess.check_output') def test_get_epoch_revisions(mocked_check_output): # check: diff --git a/tests/wpt/web-platform-tests/tools/wpt/tests/test_run.py b/tests/wpt/web-platform-tests/tools/wpt/tests/test_run.py index ef58ec41b2b..48713017009 100644 --- a/tests/wpt/web-platform-tests/tools/wpt/tests/test_run.py +++ b/tests/wpt/web-platform-tests/tools/wpt/tests/test_run.py @@ -42,6 +42,8 @@ def venv(): @pytest.fixture(scope="module") def logger(): + if sys.version_info >= (3,): + pytest.xfail(reason="broken on Py3") run.setup_logging({}) diff --git a/tests/wpt/web-platform-tests/tools/wpt/tests/test_wpt.py b/tests/wpt/web-platform-tests/tools/wpt/tests/test_wpt.py index 6569580e9ff..c8adef557d0 100644 --- a/tests/wpt/web-platform-tests/tools/wpt/tests/test_wpt.py +++ b/tests/wpt/web-platform-tests/tools/wpt/tests/test_wpt.py @@ -6,7 +6,12 @@ import subprocess import sys import tempfile import time -import urllib2 + +try: + from urllib.request import urlopen + from urllib.error import URLError +except ImportError: + from urllib2 import urlopen, URLError import pytest @@ -38,6 +43,8 @@ def get_persistent_manifest_path(): @pytest.fixture(scope="module", autouse=True) def init_manifest(): + if sys.version_info >= (3,): + pytest.xfail(reason="broken on Py3") with pytest.raises(SystemExit) as excinfo: wpt.main(argv=["manifest", "--no-download", "--path", get_persistent_manifest_path()]) @@ -388,9 +395,9 @@ def test_serve(): if time.time() - start > 60: assert False, "server did not start responding within 60s" try: - resp = urllib2.urlopen("http://web-platform.test:8000") + resp = urlopen("http://web-platform.test:8000") print(resp) - except urllib2.URLError: + except URLError: print("URLError") time.sleep(1) else: diff --git a/tests/wpt/web-platform-tests/tools/wpt/tox.ini b/tests/wpt/web-platform-tests/tools/wpt/tox.ini index 6a044473a6b..8e3e26e135b 100644 --- a/tests/wpt/web-platform-tests/tools/wpt/tox.ini +++ b/tests/wpt/web-platform-tests/tools/wpt/tox.ini @@ -1,6 +1,7 @@ [tox] -envlist = py27 +envlist = py27,py35,py36,py37,py38 skipsdist=True +skip_missing_interpreters = False [testenv] deps = diff --git a/tests/wpt/web-platform-tests/tools/wpt/wpt.py b/tests/wpt/web-platform-tests/tools/wpt/wpt.py index 93301dd86b4..49ee6345381 100644 --- a/tests/wpt/web-platform-tests/tools/wpt/wpt.py +++ b/tests/wpt/web-platform-tests/tools/wpt/wpt.py @@ -40,13 +40,14 @@ def load_commands(): return rv -def parse_args(argv, commands): +def parse_args(argv, commands = load_commands()): parser = argparse.ArgumentParser() parser.add_argument("--venv", action="store", help="Path to an existing virtualenv to use") parser.add_argument("--skip-venv-setup", action="store_true", dest="skip_venv_setup", help="Whether to use the virtualenv as-is. Must set --venv as well") parser.add_argument("--debug", action="store_true", help="Run the debugger in case of an exception") + parser.add_argument("--py3", action="store_true", help="Run with python3") subparsers = parser.add_subparsers(dest="command") for command, props in iteritems(commands): subparsers.add_parser(command, help=props["help"], add_help=False) diff --git a/tests/wpt/web-platform-tests/tools/wptrunner/requirements.txt b/tests/wpt/web-platform-tests/tools/wptrunner/requirements.txt index ccf55d2ca7f..4ebdb3ea5f2 100644 --- a/tests/wpt/web-platform-tests/tools/wptrunner/requirements.txt +++ b/tests/wpt/web-platform-tests/tools/wptrunner/requirements.txt @@ -3,7 +3,7 @@ mozinfo==1.1.0 mozlog==5.0 mozdebug==0.1.1 # Pillow 7 requires Python 3 -pillow==6.2.1 # pyup: <7.0 +pillow==6.2.2 # pyup: <7.0 urllib3[secure]==1.25.8 requests==2.22.0 six==1.14.0 diff --git a/tests/wpt/web-platform-tests/tools/wptrunner/test/test.py b/tests/wpt/web-platform-tests/tools/wptrunner/test/test.py index 8f323a3386c..0e3b30c745a 100644 --- a/tests/wpt/web-platform-tests/tools/wptrunner/test/test.py +++ b/tests/wpt/web-platform-tests/tools/wptrunner/test/test.py @@ -1,5 +1,4 @@ from __future__ import print_function -import ConfigParser import argparse import os import sys @@ -7,6 +6,7 @@ import sys from mozlog import structuredlog from mozlog.handlers import BaseHandler, StreamHandler from mozlog.formatters import MachFormatter +from six.moves.configparser import ConfigParser from wptrunner import wptcommandline, wptrunner here = os.path.abspath(os.path.dirname(__file__)) @@ -58,7 +58,7 @@ def test_settings(): } def read_config(): - parser = ConfigParser.ConfigParser() + parser = ConfigParser() parser.read("test.cfg") rv = {"general":{}, diff --git a/tests/wpt/web-platform-tests/tools/wptrunner/tox.ini b/tests/wpt/web-platform-tests/tools/wptrunner/tox.ini index ad3502e02a9..c544da7a95d 100644 --- a/tests/wpt/web-platform-tests/tools/wptrunner/tox.ini +++ b/tests/wpt/web-platform-tests/tools/wptrunner/tox.ini @@ -2,8 +2,8 @@ xfail_strict=true [tox] -envlist = py27-{base,chrome,edge,firefox,ie,opera,safari,sauce,servo,webkit,webkitgtk_minibrowser,epiphany},py36-base -skip_missing_interpreters = true +envlist = py27-{base,chrome,edge,firefox,ie,opera,safari,sauce,servo,webkit,webkitgtk_minibrowser,epiphany},{py35,py36,py37,py38}-base +skip_missing_interpreters = False [testenv] deps = diff --git a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/browsers/firefox_android.py b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/browsers/firefox_android.py index d6c8c479661..0b4832f858c 100644 --- a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/browsers/firefox_android.py +++ b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/browsers/firefox_android.py @@ -54,6 +54,7 @@ def browser_kwargs(test_type, run_info_data, config, **kwargs): "timeout_multiplier": get_timeout_multiplier(test_type, run_info_data, **kwargs), + "e10s": run_info_data["e10s"], # desktop only "leak_check": False, "stylo_threads": kwargs["stylo_threads"], @@ -124,6 +125,9 @@ class FirefoxAndroidBrowser(FirefoxBrowser): "network.preload": True, }) + if self.e10s: + self.profile.set_preferences({"browser.tabs.remote.autostart": True}) + if self.test_type == "reftest": self.logger.info("Setting android reftest preferences") self.profile.set_preferences({ diff --git a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/metadata.py b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/metadata.py index aafc7d52250..03d13f87015 100644 --- a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/metadata.py +++ b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/metadata.py @@ -5,7 +5,7 @@ from collections import defaultdict, namedtuple from mozlog import structuredlog from six import ensure_str, ensure_text, iteritems, iterkeys, itervalues, text_type -from six.moves import intern +from six.moves import intern, range from . import manifestupdate from . import testloader @@ -199,7 +199,7 @@ class InternedData(object): return obj def __iter__(self): - for i in xrange(1, len(self._data[0])): + for i in range(1, len(self._data[0])): yield self.get(i) diff --git a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/testloader.py b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/testloader.py index 8fcf66d64ed..6c5b5a8ea00 100644 --- a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/testloader.py +++ b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/testloader.py @@ -6,7 +6,7 @@ from six.moves.queue import Empty from collections import defaultdict, deque from multiprocessing import Queue from six import ensure_binary, iteritems -from six.moves import xrange +from six.moves import range from . import manifestinclude from . import manifestexpected @@ -208,7 +208,7 @@ class TestLoader(object): def load_dir_metadata(self, test_manifest, metadata_path, test_path): rv = [] path_parts = os.path.dirname(test_path).split(os.path.sep) - for i in xrange(len(path_parts) + 1): + for i in range(len(path_parts) + 1): path = os.path.join(metadata_path, os.path.sep.join(path_parts[:i]), "__dir__.ini") if path not in self.directory_manifests: self.directory_manifests[path] = manifestexpected.get_dir_manifest(path, @@ -330,8 +330,8 @@ class SingleTestSource(TestSource): def make_queue(cls, tests, **kwargs): test_queue = Queue() processes = kwargs["processes"] - queues = [deque([]) for _ in xrange(processes)] - metadatas = [cls.group_metadata(None) for _ in xrange(processes)] + queues = [deque([]) for _ in range(processes)] + metadatas = [cls.group_metadata(None) for _ in range(processes)] for test in tests: idx = hash(test.id) % processes group = queues[idx] diff --git a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/tests/test_products.py b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/tests/test_products.py index 5d2bcf075d0..e64f5ad8945 100644 --- a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/tests/test_products.py +++ b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/tests/test_products.py @@ -1,3 +1,5 @@ +import sys + from os.path import join, dirname import mock @@ -18,7 +20,11 @@ def test_load_active_product(product): # test passes if it doesn't throw -@all_products("product") +@all_products("product", marks={ + "firefox": pytest.mark.xfail(sys.platform.startswith('linux') and + sys.version_info >= (3, 8), + reason="mozinfo doesn't support Linux 3.8+") +}) def test_load_all_products(product): """test every product either loads or throws ImportError""" try: diff --git a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/update/tree.py b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/update/tree.py index 9006df67193..f362770ff16 100644 --- a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/update/tree.py +++ b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/update/tree.py @@ -3,6 +3,8 @@ import re import subprocess import tempfile +from six.moves import range + from .. import vcs from ..vcs import git, hg @@ -16,7 +18,7 @@ def get_unique_name(existing, initial): :param initial: Name, or name prefix, to use""" if initial not in existing: return initial - for i in xrange(len(existing) + 1): + for i in range(len(existing) + 1): test = "%s_%s" % (initial, i + 1) if test not in existing: return test diff --git a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/wptmanifest/node.py b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/wptmanifest/node.py index 77b17a50325..0f82d7006b6 100644 --- a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/wptmanifest/node.py +++ b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/wptmanifest/node.py @@ -1,4 +1,4 @@ -from six.moves import xrange +from six.moves import range class NodeVisitor(object): def visit(self, node): @@ -59,7 +59,7 @@ class DataNode(Node): index = len(self.children) while index > 0 and isinstance(self.children[index - 1], DataNode): index -= 1 - for i in xrange(index): + for i in range(index): if other.data == self.children[i].data: raise ValueError("Duplicate key %s" % self.children[i].data) self.children.insert(index, other) diff --git a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/wptmanifest/parser.py b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/wptmanifest/parser.py index b8b840fcaee..abb6d4da7c8 100644 --- a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/wptmanifest/parser.py +++ b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/wptmanifest/parser.py @@ -15,7 +15,7 @@ from __future__ import unicode_literals from six import binary_type, text_type, BytesIO, unichr -from six.moves import xrange +from six.moves import range from .node import (Node, AtomNode, BinaryExpressionNode, BinaryOperatorNode, ConditionalNode, DataNode, IndexNode, KeyValueNode, ListNode, @@ -494,7 +494,7 @@ class Tokenizer(object): def decode_escape(self, length): value = 0 - for i in xrange(length): + for i in range(length): c = self.char() value *= 16 value += self.escape_value(c) diff --git a/tests/wpt/web-platform-tests/tools/wptserve/tests/test_stash.py b/tests/wpt/web-platform-tests/tools/wptserve/tests/test_stash.py index 1ea99c0609f..31af1558b0c 100644 --- a/tests/wpt/web-platform-tests/tools/wptserve/tests/test_stash.py +++ b/tests/wpt/web-platform-tests/tools/wptserve/tests/test_stash.py @@ -4,6 +4,7 @@ import threading from multiprocessing.managers import BaseManager import pytest +from six import PY3 Stash = pytest.importorskip("wptserve.stash").Stash @@ -57,7 +58,8 @@ def run(process_queue, request_lock, response_lock): process_queue.put(thread_queue.get()) -@pytest.mark.xfail(sys.platform == "win32", +@pytest.mark.xfail(sys.platform == "win32" or + PY3 and multiprocessing.get_start_method() == "spawn", reason="https://github.com/web-platform-tests/wpt/issues/16938") def test_delayed_lock(add_cleanup): """Ensure that delays in proxied Lock retrieval do not interfere with @@ -96,7 +98,8 @@ def test_delayed_lock(add_cleanup): "both instances had valid locks") -@pytest.mark.xfail(sys.platform == "win32", +@pytest.mark.xfail(sys.platform == "win32" or + PY3 and multiprocessing.get_start_method() == "spawn", reason="https://github.com/web-platform-tests/wpt/issues/16938") def test_delayed_dict(add_cleanup): """Ensure that delays in proxied `dict` retrieval do not interfere with diff --git a/tests/wpt/web-platform-tests/tools/wptserve/wptserve/handlers.py b/tests/wpt/web-platform-tests/tools/wptserve/wptserve/handlers.py index c18fa2d3792..fea1277b0d1 100644 --- a/tests/wpt/web-platform-tests/tools/wptserve/wptserve/handlers.py +++ b/tests/wpt/web-platform-tests/tools/wptserve/wptserve/handlers.py @@ -1,7 +1,3 @@ -try: - import html -except ImportError: - import cgi as html import json import os import sys @@ -17,6 +13,11 @@ from .request import Authentication from .response import MultipartContent from .utils import HTTPException +try: + from html import escape +except ImportError: + from cgi import escape + __all__ = ["file_handler", "python_script_handler", "FunctionHandler", "handler", "json_handler", "as_is_handler", "ErrorHandler", "BasicAuthHandler"] @@ -79,7 +80,7 @@ class DirectoryHandler(object): <ul> %(items)s </ul> -""" % {"path": html.escape(url_path), +""" % {"path": escape(url_path), "items": "\n".join(self.list_items(url_path, path))} # noqa: E122 def list_items(self, base_path, path): @@ -105,18 +106,18 @@ class DirectoryHandler(object): items.append([item, None]) prev_item = item for item, dot_headers in items: - link = html.escape(quote(item)) + link = escape(quote(item)) dot_headers_markup = "" if dot_headers is not None: dot_headers_markup = (""" (<a href="%(link)s">.headers</a>)""" % - {"link": html.escape(quote(dot_headers))}) + {"link": escape(quote(dot_headers))}) if os.path.isdir(os.path.join(path, item)): link += "/" class_ = "dir" else: class_ = "file" yield ("""<li class="%(class)s"><a href="%(link)s">%(name)s</a>%(headers)s</li>""" % - {"link": link, "name": html.escape(item), "class": class_, + {"link": link, "name": escape(item), "class": class_, "headers": dot_headers_markup}) diff --git a/tests/wpt/web-platform-tests/tools/wptserve/wptserve/pipes.py b/tests/wpt/web-platform-tests/tools/wptserve/wptserve/pipes.py index 3500948fc8c..569875bf972 100644 --- a/tests/wpt/web-platform-tests/tools/wptserve/wptserve/pipes.py +++ b/tests/wpt/web-platform-tests/tools/wptserve/wptserve/pipes.py @@ -1,7 +1,3 @@ -try: - from html import escape -except ImportError: - from cgi import escape from collections import deque import base64 import gzip as gzip_module @@ -10,10 +6,15 @@ import os import re import time import uuid -from six.moves import StringIO +from six.moves import StringIO from six import text_type, binary_type +try: + from html import escape +except ImportError: + from cgi import escape + def resolve_content(response): return b"".join(item for item in response.iter_content(read_file=True)) diff --git a/tests/wpt/web-platform-tests/touch-events/touch-touchevent-constructor.html b/tests/wpt/web-platform-tests/touch-events/touch-touchevent-constructor.html index 1b723b7bb3c..e2d0950d5e2 100644 --- a/tests/wpt/web-platform-tests/touch-events/touch-touchevent-constructor.html +++ b/tests/wpt/web-platform-tests/touch-events/touch-touchevent-constructor.html @@ -13,14 +13,14 @@ test(function() { var testIdentifier = 0; var testTarget = document.getElementById('target0'); - assert_throws(new TypeError(), function() {new Touch();}, "Touch constructor with no argument"); - assert_throws(new TypeError(), function() {new Touch(null);}, "Touch constructor with null argument"); - assert_throws(new TypeError(), function() {new Touch(undefined);}, "Touch constructor with undefined argument"); - assert_throws(new TypeError(), function() {new Touch({});}, "Touch constructor with empty object"); - assert_throws(new TypeError(), function() {new Touch({ + assert_throws_js(TypeError, function() {new Touch();}, "Touch constructor with no argument"); + assert_throws_js(TypeError, function() {new Touch(null);}, "Touch constructor with null argument"); + assert_throws_js(TypeError, function() {new Touch(undefined);}, "Touch constructor with undefined argument"); + assert_throws_js(TypeError, function() {new Touch({});}, "Touch constructor with empty object"); + assert_throws_js(TypeError, function() {new Touch({ identifier: testIdentifier });}, "Touch constructor with only identifier"); - assert_throws(new TypeError(), function() {new Touch({ + assert_throws_js(TypeError, function() {new Touch({ target: testTarget });}, "Touch constructor with only target"); }, "Touch constructor with insufficient properties"); @@ -29,15 +29,15 @@ test(function() { var testIdentifier = 0; var testTarget = document.getElementById('target0'); - assert_throws(new TypeError(), function() {new Touch({ + assert_throws_js(TypeError, function() {new Touch({ identifier: testIdentifier, target: null });}, "Touch constructor with null target"); - assert_throws(new TypeError(), function() {new Touch({ + assert_throws_js(TypeError, function() {new Touch({ identifier: testIdentifier, target: undefined });}, "Touch constructor with undefined target"); - assert_throws(new TypeError(), function() {new Touch({ + assert_throws_js(TypeError, function() {new Touch({ identifier: testIdentifier, target: location });}, "Touch constructor with Location target"); diff --git a/tests/wpt/web-platform-tests/trusted-types/DOMParser-parseFromString-regression.tentative.https.html b/tests/wpt/web-platform-tests/trusted-types/DOMParser-parseFromString-regression.tentative.https.html index 30986e45d26..cc57ee7f8ea 100644 --- a/tests/wpt/web-platform-tests/trusted-types/DOMParser-parseFromString-regression.tentative.https.html +++ b/tests/wpt/web-platform-tests/trusted-types/DOMParser-parseFromString-regression.tentative.https.html @@ -27,7 +27,7 @@ test(t => { target.appendChild(frame); const frame_probe = document.getElementById("frame").contentDocument.getElementById("probe"); probe.innerHTML = "probe"; - assert_throws(new TypeError(), _ => { frame_probe.innnerHTML = "probe" }); + assert_throws_js(TypeError, _ => { frame_probe.innnerHTML = "probe" }); }, "Regression test for TT changes to parseFromString."); </script> </body> diff --git a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-CSP-no-name.tentative.html b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-CSP-no-name.tentative.html index 18819b20894..b1c7f51ddb3 100644 --- a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-CSP-no-name.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-CSP-no-name.tentative.html @@ -8,7 +8,7 @@ <script> // No name given test test(t => { - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => window.trustedTypes.createPolicy('SomeName', { createHTML: s => s } ), "createPolicy with an empty trusted-types CSP directive"); }, "No name list given - policy creation fails."); diff --git a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-CSP.tentative.html b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-CSP.tentative.html index 8ae162558f4..3a56546151e 100644 --- a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-CSP.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-CSP.tentative.html @@ -20,7 +20,7 @@ // Non-allowed names test test(t => { - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { window.trustedTypes.createPolicy('SomeOtherName', { createURL: s => s } ); }); }, "Non-allowed name policy creation throws."); diff --git a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-createXXX.tentative.html b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-createXXX.tentative.html index 34fbf5587da..7e39042e1cb 100644 --- a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-createXXX.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-createXXX.tentative.html @@ -11,13 +11,13 @@ createHTML: s => s, createScript: s => s }); - assert_throws(new TypeError(), _ => { p1.createScriptURL("foo"); }); + assert_throws_js(TypeError, _ => { p1.createScriptURL("foo"); }); const p2 = trustedTypes.createPolicy("policyURLAndScriptURL", { createScriptURL: s => s }); - assert_throws(new TypeError(), _ => { p2.createHTML("foo"); }); - assert_throws(new TypeError(), _ => { p2.createScript("foo"); }); + assert_throws_js(TypeError, _ => { p2.createHTML("foo"); }); + assert_throws_js(TypeError, _ => { p2.createScript("foo"); }); }, "calling undefined callbacks throws"); test(t => { @@ -35,9 +35,9 @@ test(t => { const policy = trustedTypes.createPolicy("nullpolicy", null); - assert_throws(new TypeError(), _ => { policy.createScriptURL("foo"); }); - assert_throws(new TypeError(), _ => { policy.createHTML("foo"); }); - assert_throws(new TypeError(), _ => { policy.createScript("foo"); }); + assert_throws_js(TypeError, _ => { policy.createScriptURL("foo"); }); + assert_throws_js(TypeError, _ => { policy.createHTML("foo"); }); + assert_throws_js(TypeError, _ => { policy.createScript("foo"); }); }, "trustedTypes.createPolicy(.., null) creates empty policy."); @@ -55,7 +55,7 @@ [ s => s, "whatever" ], [ s => null, "" ], [ s => "well, " + s, "well, whatever" ], - [ s => { throw new Error() }, new Error() ], + [ s => { throw new Error() }, Error ], [ s => { aGlobalVarForSideEffectTesting = s; return s }, "whatever" ], [ s => aGlobalVarForSideEffectTesting + s, "whateverwhatever" ], [ aGlobalFunction.bind(aGlobalObject), "well, whatever" ], @@ -66,7 +66,7 @@ [ s => s, INPUTS.SCRIPTURL ], [ s => null, "" ], [ s => s + "#duck", INPUTS.SCRIPTURL + "#duck" ], - [ s => { throw new Error() }, new Error() ], + [ s => { throw new Error() }, Error ], [ s => s + "#" + aGlobalVarForSideEffectTesting, INPUTS.SCRIPTURL + "#global" ], [ anotherGlobalFunction.bind(aGlobalObject), INPUTS.SCRIPTURL + "#well," ], @@ -99,8 +99,8 @@ for (let [index, [policy_fn, value]] of test_cases.entries()) { let subtest_name = "TestPolicy" + trusted_class.name + index; test(t => { - if (value instanceof Error) { - assert_throws(value, () => builder(subtest_name, policy_fn)); + if (typeof value == "object") { + assert_throws_js(value, () => builder(subtest_name, policy_fn)); } else { assert_equals("" + builder(subtest_name, policy_fn), value); } diff --git a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-createXYZTests.tentative.html b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-createXYZTests.tentative.html index a78b3dbf0fd..746d89fa3f8 100644 --- a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-createXYZTests.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-createXYZTests.tentative.html @@ -34,7 +34,7 @@ test(t => { let p = window.trustedTypes.createPolicy('TestPolicyHTML5', { createHTML: s => { throw new Error(); }}); - assert_throws(new Error(), _ => { + assert_throws_js(Error, _ => { p.createHTML('whatever'); }); }, "html = callback that throws"); @@ -58,20 +58,20 @@ test(t => { let p = window.trustedTypes.createPolicy('TestPolicyHTML8', null); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { p.createHTML('whatever'); }); }, "html - calling undefined callback throws"); test(t => { let p = window.trustedTypes.createPolicy('TestPolicyHTML9', { createHTML: createHTMLJS }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { p.createScript(INPUTS.SCRIPT); }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { p.createScriptURL(INPUTS.SCRIPTURL); }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { p.createURL(INPUTS.URL); }); }, "createHTML defined - calling undefined callbacks throws"); @@ -108,7 +108,7 @@ let p = window.trustedTypes.createPolicy('TestPolicyScript5', { createScript: s => { throw new Error(); } }); - assert_throws(new Error(), _ => { + assert_throws_js(Error, _ => { p.createScript('whatever'); }); }, "script = callback that throws"); @@ -132,20 +132,20 @@ test(t => { let p = window.trustedTypes.createPolicy('TestPolicyScript8', null); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { p.createScript('whatever'); }); }, "script - calling undefined callback throws"); test(t => { let p = window.trustedTypes.createPolicy('TestPolicyScript9', { createScript: createScriptJS }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { p.createHTML(INPUTS.HTML); }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { p.createScriptURL(INPUTS.SCRIPTURL); }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { p.createURL(INPUTS.URL); }); }, "createScript defined - calling undefined callbacks throws"); @@ -183,7 +183,7 @@ let p = window.trustedTypes.createPolicy('TestPolicyScriptURL5', { createScriptURL: s => { throw new Error(); } }); - assert_throws(new Error(), _ => { + assert_throws_js(Error, _ => { p.createScriptURL(INPUTS.SCRIPTURL); }); }, "script_url = callback that throws"); @@ -207,20 +207,20 @@ test(t => { let p = window.trustedTypes.createPolicy('TestPolicyScriptURL8', null); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { p.createScriptURL(INPUTS.SCRIPTURL); }); }, "script_url - calling undefined callback throws"); test(t => { let p = window.trustedTypes.createPolicy('TestPolicyScriptURL9', { createScriptURL: createScriptURLJS }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { p.createHTML(INPUTS.HTML); }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { p.createScript(INPUTS.SCRIPT); }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { p.createURL(INPUTS.URL); }); }, "createScriptURL defined - calling undefined callbacks throws"); diff --git a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-cspTests-noNamesGiven.tentative.html b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-cspTests-noNamesGiven.tentative.html index cec1bfb6041..15728b9888f 100644 --- a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-cspTests-noNamesGiven.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-cspTests-noNamesGiven.tentative.html @@ -7,7 +7,7 @@ <script> //No name given test test(t => { - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { window.trustedTypes.createPolicy('SomeName', { createHTML: s => s } ); }); }, "No name list given - policy creation throws"); diff --git a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-cspTests.tentative.html b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-cspTests.tentative.html index 8ae162558f4..3a56546151e 100644 --- a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-cspTests.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-cspTests.tentative.html @@ -20,7 +20,7 @@ // Non-allowed names test test(t => { - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { window.trustedTypes.createPolicy('SomeOtherName', { createURL: s => s } ); }); }, "Non-allowed name policy creation throws."); diff --git a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-nameTests.tentative.html b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-nameTests.tentative.html index 0b1872abe50..f049484f119 100644 --- a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-nameTests.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-createPolicy-nameTests.tentative.html @@ -15,7 +15,7 @@ // Duplicate names test test(t => { - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { trustedTypes.createPolicy('SomeName', {} ); }); }, "duplicate policy name attempt throws"); diff --git a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-metadata.tentative.html b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-metadata.tentative.html index 67c734b5a42..50f877cda07 100644 --- a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-metadata.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicyFactory-metadata.tentative.html @@ -66,7 +66,7 @@ // test_fn(); // assert_equals(element[property], value); // } else { - // assert_throws(..., test_fn, ...); + // assert_throws_js(..., test_fn, ...); // } // // Below is the same logic, but extended to handle the various edge @@ -122,7 +122,7 @@ } assert_equals("" + result_value, "" + value); } else { - assert_throws(new TypeError(), test_fn, "throws"); + assert_throws_js(TypeError, test_fn, "throws"); } }, `Test assignment of ${type ? type : "string"} on ${elem}.${property}`); @@ -137,7 +137,7 @@ test_fn(); assert_equals("" + element.getAttribute(property), "" + value); } else { - assert_throws(new TypeError(), test_fn, "throws"); + assert_throws_js(TypeError, test_fn, "throws"); } }, `Test assignment of ${type ? type : "string"} on ${elem}.setAttribute(${property},..)`); } diff --git a/tests/wpt/web-platform-tests/trusted-types/Window-TrustedTypes.tentative.html b/tests/wpt/web-platform-tests/trusted-types/Window-TrustedTypes.tentative.html index c61d9207b65..718c763afaf 100644 --- a/tests/wpt/web-platform-tests/trusted-types/Window-TrustedTypes.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/Window-TrustedTypes.tentative.html @@ -10,7 +10,7 @@ }, "factory = window.trustedTypes"); test(t => { - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { let factory = new TrustedTypePolicyFactory(); }); }, "factory construction fails"); diff --git a/tests/wpt/web-platform-tests/trusted-types/block-Node-multiple-arguments.tentative.html b/tests/wpt/web-platform-tests/trusted-types/block-Node-multiple-arguments.tentative.html index 879d34f9612..d66b8c8f25b 100644 --- a/tests/wpt/web-platform-tests/trusted-types/block-Node-multiple-arguments.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/block-Node-multiple-arguments.tentative.html @@ -57,7 +57,7 @@ var test_fn = _ => { setter.apply(inner, args); }; var expected; if (should_fail) { - assert_throws(new TypeError(), test_fn, "This should throw."); + assert_throws_js(TypeError, test_fn, "This should throw."); expected = ""; } else { test_fn(); @@ -74,7 +74,7 @@ var test_fn = _ => { setter.apply(outer, args); }; var expected; if (should_fail) { - assert_throws(new TypeError(), test_fn, "This should throw."); + assert_throws_js(TypeError, test_fn, "This should throw."); expected = ""; } else { test_fn(); diff --git a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-DOMParser-parseFromString.tentative.html b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-DOMParser-parseFromString.tentative.html index 12cef6af661..bd038635df7 100644 --- a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-DOMParser-parseFromString.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-DOMParser-parseFromString.tentative.html @@ -18,7 +18,7 @@ // String assignments throw. test(t => { var parser = new DOMParser(); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { var doc = parser.parseFromString("Fail", "text/html"); }); }, "`document.innerText = string` throws."); @@ -26,7 +26,7 @@ // Null assignment throws. test(t => { var parser = new DOMParser(); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { var doc = parser.parseFromString(null, "text/html"); }); }, "'document.innerText = null' throws"); diff --git a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-DOMWindowTimers-setTimeout-setInterval.tentative.html b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-DOMWindowTimers-setTimeout-setInterval.tentative.html index 6d723ba23b6..d2764936675 100644 --- a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-DOMWindowTimers-setTimeout-setInterval.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-DOMWindowTimers-setTimeout-setInterval.tentative.html @@ -18,14 +18,14 @@ // String assignments throw. test(t => { window.timeoutTestString = t.unreached_func(); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { setTimeout("window.timeoutTestString();"); }); }, "`window.setTimeout(string)` throws."); // Null assignment throws. test(t => { - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { setTimeout(null); }); }, "`window.setTimeout(null)` throws."); @@ -42,14 +42,14 @@ // String assignments throw. test(t => { window.intervalTestString = t.unreached_func(); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { setInterval("window.intervalTestString()"); }); }, "`window.setInterval(string)` throws."); // Null assignment throws. test(t => { - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { setInterval(null); }); }, "`window.setInterval(null)` throws."); diff --git a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Document-write.tentative.html b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Document-write.tentative.html index 1049b46563d..fa87d119f79 100644 --- a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Document-write.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Document-write.tentative.html @@ -29,7 +29,7 @@ // String assignments throw. test(t => { const old = document.body.innerText; - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { document.write('A string'); }); assert_equals(document.body.innerText, old); @@ -38,7 +38,7 @@ // String assignments throw. (Now for writeln.) test(t => { const old = document.body.innerText; - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { document.writeln('A string'); }); assert_equals(document.body.innerText, old); @@ -47,7 +47,7 @@ // Null assignment throws. test(t => { const old = document.body.innerText; - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { document.write(null); }); assert_equals(document.body.innerText, old); @@ -56,7 +56,7 @@ // Null assignment throws. (Now for writeln.) test(t => { const old = document.body.innerText; - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { document.writeln(null); }); assert_equals(document.body.innerText, old); diff --git a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-insertAdjacentHTML.tentative.html b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-insertAdjacentHTML.tentative.html index 1e8c091d87e..c91e4e56acd 100644 --- a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-insertAdjacentHTML.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-insertAdjacentHTML.tentative.html @@ -45,16 +45,16 @@ var d = document.createElement('div'); container.appendChild(d); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { d.insertAdjacentHTML('beforebegin', "<p>Fail</p>"); }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { d.insertAdjacentHTML('afterbegin', "<p>Fail</p>"); }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { d.insertAdjacentHTML('beforeend', "<p>Fail</p>"); }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { d.insertAdjacentHTML('afterend', "<p>Fail</p>"); }); @@ -72,16 +72,16 @@ var d = document.createElement('div'); container.appendChild(d); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { d.insertAdjacentHTML('beforebegin', null); }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { d.insertAdjacentHTML('afterbegin', null); }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { d.insertAdjacentHTML('beforeend', null); }); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { d.insertAdjacentHTML('afterend', null); }); diff --git a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-outerHTML.tentative.html b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-outerHTML.tentative.html index 17815e6a9e9..397606bc056 100644 --- a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-outerHTML.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-outerHTML.tentative.html @@ -30,7 +30,7 @@ test(t => { var d = document.createElement('div'); container.appendChild(d); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { d.outerHTML = "Fail."; }); assert_equals(container.innerText, ""); @@ -42,7 +42,7 @@ test(t => { var d = document.createElement('div'); container.appendChild(d); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { d.outerHTML = null; }); assert_equals(container.innerText, ""); diff --git a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-setAttribute.tentative.html b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-setAttribute.tentative.html index 47c4c3557f8..e6abf602fb0 100644 --- a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-setAttribute.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-setAttribute.tentative.html @@ -59,7 +59,7 @@ test(t => { let el = document.createElement('script'); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { el.setAttribute('SrC', INPUTS.URL); }); diff --git a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-setAttributeNS.tentative.html b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-setAttributeNS.tentative.html index cc8b05e8c83..aa13d72ceb2 100644 --- a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-setAttributeNS.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Element-setAttributeNS.tentative.html @@ -52,7 +52,7 @@ let elem = document.createElementNS(svg, "script"); const values = [ "abc", null, html, script ]; for (const v of values) { - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { elem.setAttributeNS(xlink, "href", v); }); } diff --git a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Range-createContextualFragment.tentative.html b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Range-createContextualFragment.tentative.html index a57376206de..b38e4f3da5f 100644 --- a/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Range-createContextualFragment.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/block-string-assignment-to-Range-createContextualFragment.tentative.html @@ -20,7 +20,7 @@ test(t => { var range = document.createRange(); range.selectNodeContents(document.documentElement); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { var result = range.createContextualFragment("A string"); }); }, "`range.createContextualFragment(string)` throws."); @@ -29,7 +29,7 @@ test(t => { var range = document.createRange(); range.selectNodeContents(document.documentElement); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { var result = range.createContextualFragment(null); }); }, "`range.createContextualFragment(null)` throws."); diff --git a/tests/wpt/web-platform-tests/trusted-types/block-text-node-insertion-into-script-element.tentative.html b/tests/wpt/web-platform-tests/trusted-types/block-text-node-insertion-into-script-element.tentative.html index 1f5e8fda7ae..607a622f2b3 100644 --- a/tests/wpt/web-platform-tests/trusted-types/block-text-node-insertion-into-script-element.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/block-text-node-insertion-into-script-element.tentative.html @@ -156,12 +156,12 @@ promise_test(t => { const inserted_script = document.getElementById("script1"); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { inserted_script.innerHTML = "2+2"; }); let new_script = document.createElement("script"); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { new_script.innerHTML = "2+2"; container.appendChild(new_script); }); diff --git a/tests/wpt/web-platform-tests/trusted-types/csp-block-eval.tentative.html b/tests/wpt/web-platform-tests/trusted-types/csp-block-eval.tentative.html index 93a97f15f8a..7902ca4040f 100644 --- a/tests/wpt/web-platform-tests/trusted-types/csp-block-eval.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/csp-block-eval.tentative.html @@ -14,7 +14,7 @@ test(t => { let a = 0; - assert_throws(new EvalError(), _ => { + assert_throws_js(EvalError, _ => { eval('a="hello there"'); }); assert_equals(a, 0); @@ -22,7 +22,7 @@ test(t => { let a = 0; - assert_throws(new EvalError(), _ => { + assert_throws_js(EvalError, _ => { eval(p.createScript('a="Hello transformed string"')); }); assert_equals(a, 0); diff --git a/tests/wpt/web-platform-tests/trusted-types/default-policy-report-only.tentative.html b/tests/wpt/web-platform-tests/trusted-types/default-policy-report-only.tentative.html index ba23d7a3678..1cff751a801 100644 --- a/tests/wpt/web-platform-tests/trusted-types/default-policy-report-only.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/default-policy-report-only.tentative.html @@ -89,7 +89,7 @@ testCases.forEach(c => { }, name + "null"); test(t => { const element = document.createElement(c[0]); - assert_throws(RangeError(), _ => element[c[1]] = "throw"); + assert_throws_js(RangeError, _ => element[c[1]] = "throw"); }, name + "throw"); test(t => { const element = document.createElement(c[0]); @@ -98,7 +98,7 @@ testCases.forEach(c => { }, name + "undefined"); test(t => { const element = document.createElement(c[0]); - assert_throws(TypeError(), _ => element[c[1]] = "typeerror"); + assert_throws_js(TypeError, _ => element[c[1]] = "typeerror"); }, name + "typeerror"); }); diff --git a/tests/wpt/web-platform-tests/trusted-types/default-policy.tentative.html b/tests/wpt/web-platform-tests/trusted-types/default-policy.tentative.html index 955cdfaa404..debde85cdac 100644 --- a/tests/wpt/web-platform-tests/trusted-types/default-policy.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/default-policy.tentative.html @@ -48,7 +48,7 @@ const testCases = [ testCases.forEach(c => { test(t => { const element = document.createElement(c[0]); - assert_throws(TypeError(), _ => element[c[1]] = "nodefault"); + assert_throws_js(TypeError, _ => element[c[1]] = "nodefault"); assert_equals(element[c[1]], ""); }, `${c[0]}.${c[1]} no default policy`); }); @@ -84,21 +84,21 @@ testCases.forEach(c => { }, name + "default"); test(t => { const element = document.createElement(c[0]); - assert_throws(TypeError(), _ => element[c[1]] = "null"); + assert_throws_js(TypeError, _ => element[c[1]] = "null"); assert_equals(element[c[1]], ""); }, name + "null"); test(t => { const element = document.createElement(c[0]); - assert_throws(RangeError(), _ => element[c[1]] = "throw"); + assert_throws_js(RangeError, _ => element[c[1]] = "throw"); }, name + "throw"); test(t => { const element = document.createElement(c[0]); - assert_throws(TypeError(), _ => element[c[1]] = "undefined"); + assert_throws_js(TypeError, _ => element[c[1]] = "undefined"); assert_equals(element[c[1]], ""); }, name + "undefined"); test(t => { const element = document.createElement(c[0]); - assert_throws(TypeError(), _ => element[c[1]] = "typeerror"); + assert_throws_js(TypeError, _ => element[c[1]] = "typeerror"); }, name + "typeerror"); }); diff --git a/tests/wpt/web-platform-tests/trusted-types/empty-default-policy.tentative.html b/tests/wpt/web-platform-tests/trusted-types/empty-default-policy.tentative.html index 2d3a10addbc..d31b48ecd5a 100644 --- a/tests/wpt/web-platform-tests/trusted-types/empty-default-policy.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/empty-default-policy.tentative.html @@ -41,7 +41,7 @@ testCases.forEach(c => { const name = `${c[0]}.${c[1]} `; test(t => { const element = document.createElement(c[0]); - assert_throws(TypeError(), _ => element[c[1]] = "abc"); + assert_throws_js(TypeError, _ => element[c[1]] = "abc"); assert_equals(element[c[1]], ""); }, name + "default"); }); diff --git a/tests/wpt/web-platform-tests/trusted-types/eval-csp-tt-no-default-policy.tentative.html b/tests/wpt/web-platform-tests/trusted-types/eval-csp-tt-no-default-policy.tentative.html index 0da09a8a5cd..6d48ae48a01 100644 --- a/tests/wpt/web-platform-tests/trusted-types/eval-csp-tt-no-default-policy.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/eval-csp-tt-no-default-policy.tentative.html @@ -15,7 +15,7 @@ }, "eval of TrustedScript works."); test(t => { - assert_throws(new EvalError(), _ => eval('1+1')); + assert_throws_js(EvalError, _ => eval('1+1')); }, "eval of string fails."); test(t => { diff --git a/tests/wpt/web-platform-tests/trusted-types/eval-with-permissive-csp.tentative.html b/tests/wpt/web-platform-tests/trusted-types/eval-with-permissive-csp.tentative.html index 32f12d8e129..5a35561438a 100644 --- a/tests/wpt/web-platform-tests/trusted-types/eval-with-permissive-csp.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/eval-with-permissive-csp.tentative.html @@ -14,7 +14,7 @@ let p = createScript_policy(window, 1); test(t => { let a = 0; - assert_throws(new EvalError(), _ => { + assert_throws_js(EvalError, _ => { eval('a="hello there"'); }); assert_equals(a, 0); diff --git a/tests/wpt/web-platform-tests/trusted-types/require-trusted-types-for.tentative.html b/tests/wpt/web-platform-tests/trusted-types/require-trusted-types-for.tentative.html index 95cfc4d106e..2a3820a89b8 100644 --- a/tests/wpt/web-platform-tests/trusted-types/require-trusted-types-for.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/require-trusted-types-for.tentative.html @@ -28,7 +28,7 @@ let p = Promise.resolve() .then(promise_violation("require-trusted-types-for 'script'")); d = document.createElement("div"); - assert_throws(new TypeError(), + assert_throws_js(TypeError, _ => { d.innerHTML = "a"; }); @@ -40,7 +40,7 @@ let p = Promise.resolve() .then(promise_violation("require-trusted-types-for 'script'")); d = document.createElement("script"); - assert_throws(new TypeError(), + assert_throws_js(TypeError, _ => { d.innerText = "a"; }); @@ -52,7 +52,7 @@ let p = Promise.resolve() .then(promise_violation("require-trusted-types-for 'script'")); s = document.createElement("script"); - assert_throws(new TypeError(), + assert_throws_js(TypeError, _ => { s.src = "a"; }); @@ -75,4 +75,4 @@ resolve(); }); }, "Set require trusted types for 'script' without CSP for trusted types don't block policy creation and using."); -</script> \ No newline at end of file +</script> diff --git a/tests/wpt/web-platform-tests/trusted-types/support/WorkerGlobalScope-importScripts.https.js b/tests/wpt/web-platform-tests/trusted-types/support/WorkerGlobalScope-importScripts.https.js index fa63c8bad0f..c40e8550dd6 100644 --- a/tests/wpt/web-platform-tests/trusted-types/support/WorkerGlobalScope-importScripts.https.js +++ b/tests/wpt/web-platform-tests/trusted-types/support/WorkerGlobalScope-importScripts.https.js @@ -27,13 +27,13 @@ test(t => { test(t => { let untrusted_url = "player.js"; - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { importScripts(untrusted_url) }, "importScripts(untrusted_url)"); }, "importScripts with untrusted URLs throws in " + worker_type); test(t => { - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { importScripts(null) }, "importScripts(null)"); }, "null is not a trusted script URL throws in " + worker_type); @@ -49,7 +49,7 @@ test(t => { test(t => { let untrusted_url = "player.js?variant1"; let untrusted_url2 = "player.js?variant2"; - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { importScripts(untrusted_url, untrusted_url2) }, "importScripts(untrusted_url, untrusted_url2)"); }, "importScripts with two URLs, both strings, in " + worker_type); @@ -57,7 +57,7 @@ test(t => { test(t => { let untrusted_url = "player.js"; let trusted_url = test_policy.createScriptURL(untrusted_url); - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { importScripts(untrusted_url, trusted_url) }, "importScripts(untrusted_url, trusted_url)"); }, "importScripts with two URLs, one trusted, in " + worker_type); diff --git a/tests/wpt/web-platform-tests/trusted-types/support/helper.sub.js b/tests/wpt/web-platform-tests/trusted-types/support/helper.sub.js index 20f56c3cbc7..2d1bd436bdf 100644 --- a/tests/wpt/web-platform-tests/trusted-types/support/helper.sub.js +++ b/tests/wpt/web-platform-tests/trusted-types/support/helper.sub.js @@ -75,7 +75,7 @@ function assert_element_accepts_trusted_type(tag, attribute, value, expected) { function assert_throws_no_trusted_type(tag, attribute, value) { let elem = document.createElement(tag); let prev = elem[attribute]; - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { elem[attribute] = value; }); assert_equals(elem[attribute], prev); @@ -111,7 +111,7 @@ function assert_element_accepts_trusted_type_explicit_set(tag, attribute, value, function assert_throws_no_trusted_type_explicit_set(tag, attribute, value) { let elem = document.createElement(tag); let prev = elem[attribute]; - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { elem.setAttribute(attribute, value); }); assert_equals(elem[attribute], prev); @@ -153,7 +153,7 @@ function assert_element_accepts_trusted_type_set_ns(tag, attribute, value, expec function assert_throws_no_trusted_type_set_ns(tag, attribute, value) { let elem = document.createElement(tag); - assert_throws(new TypeError(), _ => { + assert_throws_js(TypeError, _ => { elem.setAttributeNS(namespace, attribute, value); }); } diff --git a/tests/wpt/web-platform-tests/trusted-types/trusted-types-createHTMLDocument.tentative.html b/tests/wpt/web-platform-tests/trusted-types/trusted-types-createHTMLDocument.tentative.html index 711e494a160..ac95d9e64de 100644 --- a/tests/wpt/web-platform-tests/trusted-types/trusted-types-createHTMLDocument.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/trusted-types-createHTMLDocument.tentative.html @@ -35,7 +35,7 @@ function doc_test(doc_type, test_fn, description) { for (let doc_type in doc_types) { doc_test(doc_type, doc => { - assert_throws(new TypeError(), + assert_throws_js(TypeError, _ => { doc.createElement("script").textContent = "2+2"; }); }, "Trusted Type assignment is blocked." ); @@ -44,7 +44,7 @@ for (let doc_type in doc_types) { const value = policy.createHTML("hello"); doc.body.innerHTML = value; assert_equals(doc.body.textContent, "hello"); - assert_throws(new TypeError(), + assert_throws_js(TypeError, _ => { doc.body.innerHTML = "world"; }); }, "Trusted Type instances created in the main doc can be used."); } diff --git a/tests/wpt/web-platform-tests/trusted-types/trusted-types-duplicate-names-list.tentative.html b/tests/wpt/web-platform-tests/trusted-types/trusted-types-duplicate-names-list.tentative.html index 839f2ef7a3a..9a895ffa2ad 100644 --- a/tests/wpt/web-platform-tests/trusted-types/trusted-types-duplicate-names-list.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/trusted-types-duplicate-names-list.tentative.html @@ -8,13 +8,13 @@ <script> test(t => { trustedTypes.createPolicy("a", {}), - assert_throws(new TypeError(), + assert_throws_js(TypeError, _ => trustedTypes.createPolicy("a", {}), "Duplicate name"); trustedTypes.createPolicy("b", {}), - assert_throws(new TypeError(), + assert_throws_js(TypeError, _ => trustedTypes.createPolicy("d", {}), "Invalid name."); }, "TrustedTypePolicyFactory and policy list in CSP."); diff --git a/tests/wpt/web-platform-tests/trusted-types/trusted-types-duplicate-names.tentative.html b/tests/wpt/web-platform-tests/trusted-types/trusted-types-duplicate-names.tentative.html index fb808246ac8..e817cf145a2 100644 --- a/tests/wpt/web-platform-tests/trusted-types/trusted-types-duplicate-names.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/trusted-types-duplicate-names.tentative.html @@ -18,7 +18,7 @@ test(t => { assert_equals("" + b.createHTML(""), "b"); let def = trustedTypes.createPolicy("default", {}); - assert_throws(new TypeError(), + assert_throws_js(TypeError, _ => trustedTypes.createPolicy("default", {})); }, "policy - duplicate names"); </script> diff --git a/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting.tentative.https.html b/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting.tentative.https.html index a521f94389a..90007168a13 100644 --- a/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting.tentative.https.html +++ b/tests/wpt/web-platform-tests/trusted-types/trusted-types-eval-reporting.tentative.https.html @@ -70,7 +70,7 @@ let p = Promise.resolve() .then(promise_violation("require-trusted-types-for 'script'")) .then(promise_flush()); - assert_throws(new EvalError(), + assert_throws_js(EvalError, _ => eval('beacon="should not run"')); assert_equals(beacon, 'never_overwritten'); flush(); diff --git a/tests/wpt/web-platform-tests/trusted-types/tt-block-eval.tentative.html b/tests/wpt/web-platform-tests/trusted-types/tt-block-eval.tentative.html index 8fe8aa50d6c..f9c1a5d0b12 100644 --- a/tests/wpt/web-platform-tests/trusted-types/tt-block-eval.tentative.html +++ b/tests/wpt/web-platform-tests/trusted-types/tt-block-eval.tentative.html @@ -11,7 +11,7 @@ test(t => { let a = 0; - assert_throws(new EvalError(), _ => { + assert_throws_js(EvalError, _ => { eval('a="hello there"'); }); assert_equals(a, 0); diff --git a/tests/wpt/web-platform-tests/uievents/legacy/Event-subclasses-init.html b/tests/wpt/web-platform-tests/uievents/legacy/Event-subclasses-init.html index 676eec92809..a79a9f18adb 100644 --- a/tests/wpt/web-platform-tests/uievents/legacy/Event-subclasses-init.html +++ b/tests/wpt/web-platform-tests/uievents/legacy/Event-subclasses-init.html @@ -11,7 +11,7 @@ for (let eventTypeName of ['UIEvent', 'MouseEvent', 'KeyboardEvent', 'Compositio let event = new eventType('test'); let initFunction = "init" + eventTypeName; - assert_throws(new TypeError(), function() { eventType.prototype[initFunction].call(event) }); + assert_throws_js(TypeError, function() { eventType.prototype[initFunction].call(event) }); }, `Call init${eventTypeName} without parameters`); } </script> diff --git a/tests/wpt/web-platform-tests/url/failure.html b/tests/wpt/web-platform-tests/url/failure.html index ac16edf8c74..8f3d0299a40 100644 --- a/tests/wpt/web-platform-tests/url/failure.html +++ b/tests/wpt/web-platform-tests/url/failure.html @@ -20,7 +20,7 @@ function runTests(testData) { self.test(() => { // URL's constructor's first argument is tested by url-constructor.html // If a URL fails to parse with any valid base, it must also fail to parse with no base, i.e. // when used as a base URL itself. - assert_throws(new TypeError(), () => new URL("about:blank", test.input)); + assert_throws_js(TypeError, () => new URL("about:blank", test.input)); }, "URL's constructor's base argument: " + name) self.test(() => { @@ -30,7 +30,7 @@ function runTests(testData) { self.test(() => { const client = new XMLHttpRequest() - assert_throws("SyntaxError", () => client.open("GET", test.input)) + assert_throws_dom("SyntaxError", () => client.open("GET", test.input)) }, "XHR: " + name) self.test(() => { @@ -42,7 +42,7 @@ function runTests(testData) { }, "Location's href: " + name) self.test(() => { - assert_throws("SyntaxError", () => self.open(test.input).close()) + assert_throws_dom("SyntaxError", () => self.open(test.input).close()) }, "window.open(): " + name) } } diff --git a/tests/wpt/web-platform-tests/url/historical.any.js b/tests/wpt/web-platform-tests/url/historical.any.js index 407e118f3a0..c3067dfd730 100644 --- a/tests/wpt/web-platform-tests/url/historical.any.js +++ b/tests/wpt/web-platform-tests/url/historical.any.js @@ -15,7 +15,7 @@ if(self.GLOBAL.isWindow()) { test(function() { var url = new URL("./foo", "http://www.example.org"); assert_equals(url.href, "http://www.example.org/foo"); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { url.href = "./bar"; }); }, "Setting URL's href attribute and base URLs"); diff --git a/tests/wpt/web-platform-tests/url/url-constructor.html b/tests/wpt/web-platform-tests/url/url-constructor.html index cb4c0db3571..7ddcdc88170 100644 --- a/tests/wpt/web-platform-tests/url/url-constructor.html +++ b/tests/wpt/web-platform-tests/url/url-constructor.html @@ -15,7 +15,7 @@ function runURLTests(urltests) { test(function() { if (expected.failure) { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { bURL(expected.input, expected.base) }) return diff --git a/tests/wpt/web-platform-tests/url/url-searchparams.any.js b/tests/wpt/web-platform-tests/url/url-searchparams.any.js index c55ae58d3b1..34d4a4b0689 100644 --- a/tests/wpt/web-platform-tests/url/url-searchparams.any.js +++ b/tests/wpt/web-platform-tests/url/url-searchparams.any.js @@ -29,7 +29,7 @@ function runURLSearchParamTests() { 'use strict' var urlString = 'http://example.org' var url = bURL(urlString) - assert_throws(TypeError(), function() { url.searchParams = new URLSearchParams(urlString) }) + assert_throws_js(TypeError, function() { url.searchParams = new URLSearchParams(urlString) }) }, 'URL.searchParams setter, invalid values') test(function() { diff --git a/tests/wpt/web-platform-tests/user-timing/invoke_with_timing_attributes.html b/tests/wpt/web-platform-tests/user-timing/invoke_with_timing_attributes.html index 6c06f5e9d52..1df94a3006d 100644 --- a/tests/wpt/web-platform-tests/user-timing/invoke_with_timing_attributes.html +++ b/tests/wpt/web-platform-tests/user-timing/invoke_with_timing_attributes.html @@ -15,7 +15,7 @@ <script> function emit_test(attrName) { test(function() { - assert_throws("SyntaxError", function() { window.performance.mark(attrName); }); + assert_throws_dom("SyntaxError", function() { window.performance.mark(attrName); }); }, "performance.mark should throw if used with timing attribute " + attrName); } for (var i in timingAttributes) { diff --git a/tests/wpt/web-platform-tests/user-timing/invoke_without_parameter.html b/tests/wpt/web-platform-tests/user-timing/invoke_without_parameter.html index e47a3ba7a98..114435e59be 100644 --- a/tests/wpt/web-platform-tests/user-timing/invoke_without_parameter.html +++ b/tests/wpt/web-platform-tests/user-timing/invoke_without_parameter.html @@ -15,11 +15,11 @@ <div id="log"></div> <script> test(function () { - assert_throws(new TypeError(), function () { window.performance.mark() }); + assert_throws_js(TypeError, function () { window.performance.mark() }); }, "window.performance.mark() throws a TypeError exception when invoke without a parameter."); test(function () { - assert_throws(new TypeError(), function () { window.performance.measure(); }); + assert_throws_js(TypeError, function () { window.performance.measure(); }); }, "window.performance.measure() throws a TypeError exception when invoke without a parameter."); </script> </body> diff --git a/tests/wpt/web-platform-tests/user-timing/mark-errors.any.js b/tests/wpt/web-platform-tests/user-timing/mark-errors.any.js index 3207d18b048..dcd36695e22 100644 --- a/tests/wpt/web-platform-tests/user-timing/mark-errors.any.js +++ b/tests/wpt/web-platform-tests/user-timing/mark-errors.any.js @@ -1,15 +1,15 @@ test(function() { - assert_throws(new TypeError(), function() { self.performance.mark("mark1", 123); }, "Number passed as a dict argument should cause type-error.") + assert_throws_js(TypeError, function() { self.performance.mark("mark1", 123); }, "Number passed as a dict argument should cause type-error.") }, "Number should be rejected as the mark-options.") test(function() { - assert_throws(new TypeError(), function() { self.performance.mark("mark1", NaN); }, "NaN passed as a dict argument should cause type-error.") + assert_throws_js(TypeError, function() { self.performance.mark("mark1", NaN); }, "NaN passed as a dict argument should cause type-error.") }, "NaN should be rejected as the mark-options.") test(function() { - assert_throws(new TypeError(), function() { self.performance.mark("mark1", Infinity); }, "Infinity passed as a dict argument should cause type-error.") + assert_throws_js(TypeError, function() { self.performance.mark("mark1", Infinity); }, "Infinity passed as a dict argument should cause type-error.") }, "Infinity should be rejected as the mark-options.") test(function() { - assert_throws(new TypeError(), function() { self.performance.mark("mark1", "string"); }, "String passed as a dict argument should cause type-error.") + assert_throws_js(TypeError, function() { self.performance.mark("mark1", "string"); }, "String passed as a dict argument should cause type-error.") }, "String should be rejected as the mark-options.") diff --git a/tests/wpt/web-platform-tests/user-timing/mark_exceptions.html b/tests/wpt/web-platform-tests/user-timing/mark_exceptions.html index e1f4c4e0f49..b445c6b8778 100644 --- a/tests/wpt/web-platform-tests/user-timing/mark_exceptions.html +++ b/tests/wpt/web-platform-tests/user-timing/mark_exceptions.html @@ -12,14 +12,14 @@ <script> function test_exception(attrName) { test(function () { - assert_throws(new SyntaxError(), function () { + assert_throws_dom("SyntaxError", function () { window.performance.mark(attrName); }) }, "window.performance.mark(\"" + attrName + "\") throws a SyntaxError exception."); } test(() => { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { window.performance.mark(); }); }, 'window.performance.mark() throws a TypeError exception.') diff --git a/tests/wpt/web-platform-tests/user-timing/measure-exceptions.html b/tests/wpt/web-platform-tests/user-timing/measure-exceptions.html index 0c532e79390..2836eaee2a8 100644 --- a/tests/wpt/web-platform-tests/user-timing/measure-exceptions.html +++ b/tests/wpt/web-platform-tests/user-timing/measure-exceptions.html @@ -27,7 +27,7 @@ ]; eventMarks.forEach(function(name) { test(()=>{ - assert_throws("InvalidAccessError", ()=>{ + assert_throws_dom("InvalidAccessError", ()=>{ window.performance.measure("measuring", name, "mark"); }, "Should throw"); }, `Passing '${name}' as a mark to measure API should cause error when the mark is empty.`); @@ -39,7 +39,7 @@ ]; args.forEach(each => { test(()=>{ - assert_throws("SyntaxError", ()=>{ + assert_throws_dom("SyntaxError", ()=>{ window.performance.measure("measuring", each, "mark"); }, "Should throw"); }, `Passing ${each} as a mark to measure API should cause error.`); diff --git a/tests/wpt/web-platform-tests/user-timing/measure-with-dict.any.js b/tests/wpt/web-platform-tests/user-timing/measure-with-dict.any.js index 95160fea894..b452feb0de6 100644 --- a/tests/wpt/web-platform-tests/user-timing/measure-with-dict.any.js +++ b/tests/wpt/web-platform-tests/user-timing/measure-with-dict.any.js @@ -96,16 +96,16 @@ async_test(function (t) { test(function() { this.add_cleanup(cleanupPerformanceTimeline); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { self.performance.measure("optionsAndNumberEnd", {'start': 2}, 12); }, "measure should throw a TypeError when passed an options object and an end time"); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { self.performance.measure("optionsAndMarkEnd", {'start': 2}, 'mark1'); }, "measure should throw a TypeError when passed an options object and an end mark"); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { self.performance.measure("negativeStartInOptions", {'start': -1}); }, "measure cannot have a negative time stamp."); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { self.performance.measure("negativeEndInOptions", {'end': -1}); }, "measure cannot have a negative time stamp for end."); }, "measure should throw a TypeError when passed an invalid argument combination"); diff --git a/tests/wpt/web-platform-tests/user-timing/measure_exceptions_navigation_timing.html b/tests/wpt/web-platform-tests/user-timing/measure_exceptions_navigation_timing.html index 1633221198c..b1868b2cb6b 100644 --- a/tests/wpt/web-platform-tests/user-timing/measure_exceptions_navigation_timing.html +++ b/tests/wpt/web-platform-tests/user-timing/measure_exceptions_navigation_timing.html @@ -27,7 +27,7 @@ setup(function () { }); test(function () { - assert_throws("InvalidAccessError", function () { + assert_throws_dom("InvalidAccessError", function () { window.performance.measure("measure", zeroedNavTimingAtt); }); }, "window.performance.measure(\"measure\", \"" + zeroedNavTimingAtt + "\"), where \"" + @@ -35,7 +35,7 @@ test(function () { "InvalidAccessError exception."); test(function () { - assert_throws("InvalidAccessError", function () { + assert_throws_dom("InvalidAccessError", function () { window.performance.measure("measure", zeroedNavTimingAtt, "responseEnd"); }); }, "window.performance.measure(\"measure\", \"" + zeroedNavTimingAtt + "\", " + @@ -43,7 +43,7 @@ test(function () { "attribute with a value of 0, throws a InvalidAccessError exception."); test(function () { - assert_throws("InvalidAccessError", function () { + assert_throws_dom("InvalidAccessError", function () { window.performance.measure("measure", "navigationStart", zeroedNavTimingAtt); }); }, "window.performance.measure(\"measure\", \"navigationStart\", \"" + zeroedNavTimingAtt + @@ -51,7 +51,7 @@ test(function () { "value of 0, throws a InvalidAccessError exception."); test(function () { - assert_throws("InvalidAccessError", function () { + assert_throws_dom("InvalidAccessError", function () { window.performance.measure("measure", zeroedNavTimingAtt, zeroedNavTimingAtt); }); }, "window.performance.measure(\"measure\", \"" + zeroedNavTimingAtt + "\", \"" + diff --git a/tests/wpt/web-platform-tests/user-timing/measure_syntax_err.any.js b/tests/wpt/web-platform-tests/user-timing/measure_syntax_err.any.js index 84829f11eb1..9b762a40906 100644 --- a/tests/wpt/web-platform-tests/user-timing/measure_syntax_err.any.js +++ b/tests/wpt/web-platform-tests/user-timing/measure_syntax_err.any.js @@ -5,28 +5,28 @@ test(function () { self.performance.measure("measure", "existing_mark"); }, "Create a mark \"existing_mark\""); test(function () { - assert_throws(new SyntaxError(), function () { + assert_throws_dom("SyntaxError", function () { self.performance.measure("measure", "mark"); }); }, "self.performance.measure(\"measure\", \"mark\"), where \"mark\" is a non-existent mark, " + "throws a SyntaxError exception."); test(function () { - assert_throws(new SyntaxError(), function () { + assert_throws_dom("SyntaxError", function () { self.performance.measure("measure", "mark", "existing_mark"); }); }, "self.performance.measure(\"measure\", \"mark\", \"existing_mark\"), where \"mark\" is a " + "non-existent mark, throws a SyntaxError exception."); test(function () { - assert_throws(new SyntaxError(), function () { + assert_throws_dom("SyntaxError", function () { self.performance.measure("measure", "existing_mark", "mark"); }); }, "self.performance.measure(\"measure\", \"existing_mark\", \"mark\"), where \"mark\" " + "is a non-existent mark, throws a SyntaxError exception."); test(function () { - assert_throws(new SyntaxError(), function () { + assert_throws_dom("SyntaxError", function () { self.performance.measure("measure", "mark", "mark"); }); }, "self.performance.measure(\"measure\", \"mark\", \"mark\"), where \"mark\" is a " + diff --git a/tests/wpt/web-platform-tests/user-timing/performance-measure-invalid.worker.js b/tests/wpt/web-platform-tests/user-timing/performance-measure-invalid.worker.js index dedd6da8884..29efb729992 100644 --- a/tests/wpt/web-platform-tests/user-timing/performance-measure-invalid.worker.js +++ b/tests/wpt/web-platform-tests/user-timing/performance-measure-invalid.worker.js @@ -1,7 +1,7 @@ importScripts("/resources/testharness.js"); test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { performance.measure('name', 'navigationStart', 'navigationStart'); }); }, "When converting 'navigationStart' to a timestamp, the global object has to be a Window object."); diff --git a/tests/wpt/web-platform-tests/user-timing/structured-serialize-detail.any.js b/tests/wpt/web-platform-tests/user-timing/structured-serialize-detail.any.js index 0c4be9a3bcb..78771b2f766 100644 --- a/tests/wpt/web-platform-tests/user-timing/structured-serialize-detail.any.js +++ b/tests/wpt/web-platform-tests/user-timing/structured-serialize-detail.any.js @@ -22,7 +22,7 @@ test(function() { test(function() { performance.clearMarks(); const detail = { unserializable: Symbol() }; - assert_throws("DataCloneError", ()=>{ + assert_throws_dom("DataCloneError", ()=>{ new PerformanceMark("A", { detail }); }, "Trying to structured-serialize a Symbol."); }, "Mark: Throw an exception when the detail property cannot be structured-serialized."); @@ -50,7 +50,7 @@ test(function() { test(function() { performance.clearMeasures(); const detail = { unserializable: Symbol() }; - assert_throws("DataCloneError", ()=>{ + assert_throws_dom("DataCloneError", ()=>{ performance.measure("A", { start: 0, detail }); }, "Trying to structured-serialize a Symbol."); }, "Measure: Throw an exception when the detail property cannot be structured-serialized."); diff --git a/tests/wpt/web-platform-tests/vibration/invalid-values.html b/tests/wpt/web-platform-tests/vibration/invalid-values.html index 9381dadcc06..a8b2534feac 100644 --- a/tests/wpt/web-platform-tests/vibration/invalid-values.html +++ b/tests/wpt/web-platform-tests/vibration/invalid-values.html @@ -9,7 +9,7 @@ <script> test(function() { assert_precondition(navigator.vibrate, 'navigator.vibrate exists'); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { navigator.vibrate(); }, 'Argument is required, so was expecting a TypeError.'); }, 'Missing pattern argument'); diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/constructor/validate.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/constructor/validate.any.js index 57fa3359770..a0eaa3fb87d 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/constructor/validate.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/constructor/validate.any.js @@ -7,7 +7,7 @@ setup(() => { }); test(() => { - assert_throws(new TypeError(), () => WebAssembly.validate()); + assert_throws_js(TypeError, () => WebAssembly.validate()); }, "Missing argument"); test(() => { @@ -24,7 +24,7 @@ test(() => { Array.from(emptyModuleBinary), ]; for (const argument of invalidArguments) { - assert_throws(new TypeError(), () => WebAssembly.validate(argument), + assert_throws_js(TypeError, () => WebAssembly.validate(argument), `validate(${format_value(argument)})`); } }, "Invalid arguments"); diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/global/constructor.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/global/constructor.any.js index 237f99c8b29..cb287da4e9a 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/global/constructor.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/global/constructor.any.js @@ -19,12 +19,12 @@ test(() => { }, "length"); test(() => { - assert_throws(new TypeError(), () => new WebAssembly.Global()); + assert_throws_js(TypeError, () => new WebAssembly.Global()); }, "No arguments"); test(() => { const argument = { "value": "i32" }; - assert_throws(new TypeError(), () => WebAssembly.Global(argument)); + assert_throws_js(TypeError, () => WebAssembly.Global(argument)); }, "Calling"); test(() => { @@ -73,7 +73,7 @@ test(() => { {}, ]; for (const invalidArgument of invalidArguments) { - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => new WebAssembly.Global(invalidArgument), `new Global(${format_value(invalidArgument)})`); } @@ -83,15 +83,15 @@ test(() => { const invalidTypes = ["i16", "i128", "f16", "f128", "u32", "u64", "i32\0"]; for (const value of invalidTypes) { const argument = { value }; - assert_throws(new TypeError(), () => new WebAssembly.Global(argument)); + assert_throws_js(TypeError, () => new WebAssembly.Global(argument)); } }, "Invalid type argument"); test(() => { const argument = { "value": "i64" }; const global = new WebAssembly.Global(argument); - assert_throws(new TypeError(), () => global.value); - assert_throws(new TypeError(), () => global.valueOf()); + assert_throws_js(TypeError, () => global.value); + assert_throws_js(TypeError, () => global.valueOf()); }, "i64 with default"); for (const type of ["i32", "f32", "f64"]) { diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/global/value-get-set.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/global/value-get-set.any.js index 7b45ddc20b2..69f0e46379f 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/global/value-get-set.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/global/value-get-set.any.js @@ -23,8 +23,8 @@ test(() => { assert_equals(typeof setter, "function"); for (const thisValue of thisValues) { - assert_throws(new TypeError(), () => getter.call(thisValue), `getter with this=${format_value(thisValue)}`); - assert_throws(new TypeError(), () => setter.call(thisValue, 1), `setter with this=${format_value(thisValue)}`); + assert_throws_js(TypeError, () => getter.call(thisValue), `getter with this=${format_value(thisValue)}`); + assert_throws_js(TypeError, () => setter.call(thisValue, 1), `setter with this=${format_value(thisValue)}`); } }, "Branding"); @@ -44,7 +44,7 @@ for (const type of ["i32", "f32", "f64"]) { assert_equals(global.value, 0, "initial value"); assert_equals(global.valueOf(), 0, "initial valueOf"); - assert_throws(new TypeError(), () => global.value = 1); + assert_throws_js(TypeError, () => global.value = 1); assert_equals(global.value, 0, "post-set value"); assert_equals(global.valueOf(), 0, "post-set valueOf"); @@ -60,7 +60,7 @@ for (const type of ["i32", "f32", "f64"]) { valueOf: t.unreached_func("should not call valueOf"), toString: t.unreached_func("should not call toString"), }; - assert_throws(new TypeError(), () => global.value = value); + assert_throws_js(TypeError, () => global.value = value); assert_equals(global.value, 0, "post-set value"); assert_equals(global.valueOf(), 0, "post-set valueOf"); @@ -91,9 +91,9 @@ for (const type of ["i32", "f32", "f64"]) { test(() => { const argument = { "value": "i64", "mutable": true }; const global = new WebAssembly.Global(argument); - assert_throws(new TypeError(), () => global.value); - assert_throws(new TypeError(), () => global.value = 0); - assert_throws(new TypeError(), () => global.valueOf()); + assert_throws_js(TypeError, () => global.value); + assert_throws_js(TypeError, () => global.value = 0); + assert_throws_js(TypeError, () => global.valueOf()); }, "i64 with default"); test(t => { @@ -103,7 +103,7 @@ test(t => { valueOf: t.unreached_func("should not call valueOf"), toString: t.unreached_func("should not call toString"), }; - assert_throws(new TypeError(), () => global.value = value); + assert_throws_js(TypeError, () => global.value = value); }, "i64 with ToNumber side-effects"); test(() => { @@ -115,7 +115,7 @@ test(() => { const setter = desc.set; assert_equals(typeof setter, "function"); - assert_throws(new TypeError(), () => setter.call(global)); + assert_throws_js(TypeError, () => setter.call(global)); }, "Calling setter without argument"); test(() => { diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/global/valueOf.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/global/valueOf.any.js index d4a84b254f7..0d4de93a6bd 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/global/valueOf.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/global/valueOf.any.js @@ -17,7 +17,7 @@ test(() => { const fn = WebAssembly.Global.prototype.valueOf; for (const thisValue of thisValues) { - assert_throws(new TypeError(), () => fn.call(thisValue), `this=${format_value(thisValue)}`); + assert_throws_js(TypeError, () => fn.call(thisValue), `this=${format_value(thisValue)}`); } }, "Branding"); diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/instance/constructor.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/instance/constructor.any.js index 1ce4de904e1..745c3f84951 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/instance/constructor.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/instance/constructor.any.js @@ -17,7 +17,7 @@ test(() => { }, "length"); test(() => { - assert_throws(new TypeError(), () => new WebAssembly.Instance()); + assert_throws_js(TypeError, () => new WebAssembly.Instance()); }, "No arguments"); test(() => { @@ -33,14 +33,14 @@ test(() => { WebAssembly.Module.prototype, ]; for (const argument of invalidArguments) { - assert_throws(new TypeError(), () => new WebAssembly.Instance(argument), + assert_throws_js(TypeError, () => new WebAssembly.Instance(argument), `new Instance(${format_value(argument)})`); } }, "Non-Module arguments"); test(() => { const module = new WebAssembly.Module(emptyModuleBinary); - assert_throws(new TypeError(), () => WebAssembly.Instance(module)); + assert_throws_js(TypeError, () => WebAssembly.Instance(module)); }, "Calling"); for (const [name, fn] of instanceTestFactory) { diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/instance/exports.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/instance/exports.any.js index 2ba57c5e2fd..7c81a41295b 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/instance/exports.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/instance/exports.any.js @@ -28,7 +28,7 @@ test(() => { assert_equals(typeof desc.set, "undefined"); for (const thisValue of thisValues) { - assert_throws(new TypeError(), () => getter.call(thisValue), `this=${format_value(thisValue)}`); + assert_throws_js(TypeError, () => getter.call(thisValue), `this=${format_value(thisValue)}`); } }, "Branding"); @@ -58,7 +58,7 @@ test(() => { const module = new WebAssembly.Module(emptyModuleBinary); const instance = new WebAssembly.Instance(module); const exports = instance.exports; - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { "use strict"; instance.exports = {}; }); diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/interface.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/interface.any.js index 98c4a1d781b..88940be51a7 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/interface.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/interface.any.js @@ -63,11 +63,11 @@ test(() => { }, "WebAssembly: property descriptor"); test(() => { - assert_throws(new TypeError(), () => WebAssembly()); + assert_throws_js(TypeError, () => WebAssembly()); }, "WebAssembly: calling"); test(() => { - assert_throws(new TypeError(), () => new WebAssembly()); + assert_throws_js(TypeError, () => new WebAssembly()); }, "WebAssembly: constructing"); const interfaces = [ diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/memory/buffer.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/memory/buffer.any.js index 4788ffcf84f..a835e6511a0 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/memory/buffer.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/memory/buffer.any.js @@ -22,7 +22,7 @@ test(() => { assert_equals(typeof desc.set, "undefined"); for (const thisValue of thisValues) { - assert_throws(new TypeError(), () => getter.call(thisValue), `this=${format_value(thisValue)}`); + assert_throws_js(TypeError, () => getter.call(thisValue), `this=${format_value(thisValue)}`); } }, "Branding"); @@ -56,7 +56,7 @@ test(() => { const memory2 = new WebAssembly.Memory(argument); const buffer = memory.buffer; assert_not_equals(buffer, memory2.buffer, "Need two distinct buffers"); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { "use strict"; memory.buffer = memory2.buffer; }); diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/memory/constructor.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/memory/constructor.any.js index cef713fe0fe..8bd606e3212 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/memory/constructor.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/memory/constructor.any.js @@ -31,12 +31,12 @@ test(() => { }, "length"); test(() => { - assert_throws(new TypeError(), () => new WebAssembly.Memory()); + assert_throws_js(TypeError, () => new WebAssembly.Memory()); }, "No arguments"); test(() => { const argument = { "initial": 0 }; - assert_throws(new TypeError(), () => WebAssembly.Memory(argument)); + assert_throws_js(TypeError, () => WebAssembly.Memory(argument)); }, "Calling"); test(() => { @@ -53,14 +53,14 @@ test(() => { {}, ]; for (const invalidArgument of invalidArguments) { - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => new WebAssembly.Memory(invalidArgument), `new Memory(${format_value(invalidArgument)})`); } }, "Invalid descriptor argument"); test(() => { - assert_throws(new TypeError(), () => new WebAssembly.Memory({ "initial": undefined })); + assert_throws_js(TypeError, () => new WebAssembly.Memory({ "initial": undefined })); }, "Undefined initial value in descriptor"); const outOfRangeValues = [ @@ -74,20 +74,20 @@ const outOfRangeValues = [ for (const value of outOfRangeValues) { test(() => { - assert_throws(new TypeError(), () => new WebAssembly.Memory({ "initial": value })); + assert_throws_js(TypeError, () => new WebAssembly.Memory({ "initial": value })); }, `Out-of-range initial value in descriptor: ${format_value(value)}`); test(() => { - assert_throws(new TypeError(), () => new WebAssembly.Memory({ "initial": 0, "maximum": value })); + assert_throws_js(TypeError, () => new WebAssembly.Memory({ "initial": 0, "maximum": value })); }, `Out-of-range maximum value in descriptor: ${format_value(value)}`); } test(() => { - assert_throws(new RangeError(), () => new WebAssembly.Memory({ "initial": 10, "maximum": 9 })); + assert_throws_js(RangeError, () => new WebAssembly.Memory({ "initial": 10, "maximum": 9 })); }, "Initial value exceeds maximum"); test(() => { - assert_throws(new TypeError(), () => new WebAssembly.Memory({ "initial": 10, "shared": true })); + assert_throws_js(TypeError, () => new WebAssembly.Memory({ "initial": 10, "shared": true })); }, "Shared memory without maximum"); test(() => { diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/memory/grow.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/memory/grow.any.js index 11c41942510..f07a97c9275 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/memory/grow.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/memory/grow.any.js @@ -27,7 +27,7 @@ function assert_ArrayBuffer(actual, expected, message) { test(() => { const argument = { "initial": 0 }; const memory = new WebAssembly.Memory(argument); - assert_throws(new TypeError(), () => memory.grow()); + assert_throws_js(TypeError, () => memory.grow()); }, "Missing arguments"); test(t => { @@ -51,7 +51,7 @@ test(t => { const fn = WebAssembly.Memory.prototype.grow; for (const thisValue of thisValues) { - assert_throws(new TypeError(), () => fn.call(thisValue, argument), `this=${format_value(thisValue)}`); + assert_throws_js(TypeError, () => fn.call(thisValue, argument), `this=${format_value(thisValue)}`); } }, "Branding"); @@ -145,7 +145,7 @@ test(() => { const oldMemory = memory.buffer; assert_ArrayBuffer(oldMemory, { "size": 1 }, "Buffer before growing"); - assert_throws(new RangeError(), () => memory.grow(2)); + assert_throws_js(RangeError, () => memory.grow(2)); assert_equals(memory.buffer, oldMemory); assert_ArrayBuffer(memory.buffer, { "size": 1 }, "Buffer before trying to grow"); }, "Zero initial growing too much"); @@ -166,7 +166,7 @@ for (const value of outOfRangeValues) { test(() => { const argument = { "initial": 0 }; const memory = new WebAssembly.Memory(argument); - assert_throws(new TypeError(), () => memory.grow(value)); + assert_throws_js(TypeError, () => memory.grow(value)); }, `Out-of-range argument: ${format_value(value)}`); } diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/module/constructor.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/module/constructor.any.js index 03e508aa1e0..1fffb6cd4f3 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/module/constructor.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/module/constructor.any.js @@ -16,11 +16,11 @@ test(() => { }, "length"); test(() => { - assert_throws(new TypeError(), () => new WebAssembly.Module()); + assert_throws_js(TypeError, () => new WebAssembly.Module()); }, "No arguments"); test(() => { - assert_throws(new TypeError(), () => WebAssembly.Module(emptyModuleBinary)); + assert_throws_js(TypeError, () => WebAssembly.Module(emptyModuleBinary)); }, "Calling"); test(() => { @@ -38,7 +38,7 @@ test(() => { Array.from(emptyModuleBinary), ]; for (const argument of invalidArguments) { - assert_throws(new TypeError(), () => new WebAssembly.Module(argument), + assert_throws_js(TypeError, () => new WebAssembly.Module(argument), `new Module(${format_value(argument)})`); } }, "Invalid arguments"); diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/module/customSections.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/module/customSections.any.js index 09355979d84..298d89604cf 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/module/customSections.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/module/customSections.any.js @@ -24,9 +24,9 @@ setup(() => { }); test(() => { - assert_throws(new TypeError(), () => WebAssembly.Module.customSections()); + assert_throws_js(TypeError, () => WebAssembly.Module.customSections()); const module = new WebAssembly.Module(emptyModuleBinary); - assert_throws(new TypeError(), () => WebAssembly.Module.customSections(module)); + assert_throws_js(TypeError, () => WebAssembly.Module.customSections(module)); }, "Missing arguments"); test(() => { @@ -42,7 +42,7 @@ test(() => { WebAssembly.Module.prototype, ]; for (const argument of invalidArguments) { - assert_throws(new TypeError(), () => WebAssembly.Module.customSections(argument, ""), + assert_throws_js(TypeError, () => WebAssembly.Module.customSections(argument, ""), `customSections(${format_value(argument)})`); } }, "Non-Module arguments"); diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/module/exports.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/module/exports.any.js index eadfc84f1e4..83f97dd67a1 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/module/exports.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/module/exports.any.js @@ -35,7 +35,7 @@ function assert_exports(exports, expected) { } test(() => { - assert_throws(new TypeError(), () => WebAssembly.Module.exports()); + assert_throws_js(TypeError, () => WebAssembly.Module.exports()); }, "Missing arguments"); test(() => { @@ -51,7 +51,7 @@ test(() => { WebAssembly.Module.prototype, ]; for (const argument of invalidArguments) { - assert_throws(new TypeError(), () => WebAssembly.Module.exports(argument), + assert_throws_js(TypeError, () => WebAssembly.Module.exports(argument), `exports(${format_value(argument)})`); } }, "Non-Module arguments"); diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/module/imports.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/module/imports.any.js index 9d7ef2f0a9b..91e4be33aca 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/module/imports.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/module/imports.any.js @@ -41,7 +41,7 @@ setup(() => { }); test(() => { - assert_throws(new TypeError(), () => WebAssembly.Module.imports()); + assert_throws_js(TypeError, () => WebAssembly.Module.imports()); }, "Missing arguments"); test(() => { @@ -57,7 +57,7 @@ test(() => { WebAssembly.Module.prototype, ]; for (const argument of invalidArguments) { - assert_throws(new TypeError(), () => WebAssembly.Module.imports(argument), + assert_throws_js(TypeError, () => WebAssembly.Module.imports(argument), `imports(${format_value(argument)})`); } }, "Non-Module arguments"); diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/table/assertions.js b/tests/wpt/web-platform-tests/wasm/jsapi/table/assertions.js index c88972b4ebd..c42a446a75d 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/table/assertions.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/table/assertions.js @@ -2,12 +2,12 @@ function assert_equal_to_array(table, expected, message) { assert_equals(table.length, expected.length, `${message}: length`); // The argument check in get() happens before the range check, and negative numbers // are illegal, hence will throw TypeError per spec. - assert_throws(new TypeError(), () => table.get(-1), `${message}: table.get(-1)`); + assert_throws_js(TypeError, () => table.get(-1), `${message}: table.get(-1)`); for (let i = 0; i < expected.length; ++i) { assert_equals(table.get(i), expected[i], `${message}: table.get(${i} of ${expected.length})`); } - assert_throws(new RangeError(), () => table.get(expected.length), + assert_throws_js(RangeError, () => table.get(expected.length), `${message}: table.get(${expected.length} of ${expected.length})`); - assert_throws(new RangeError(), () => table.get(expected.length + 1), + assert_throws_js(RangeError, () => table.get(expected.length + 1), `${message}: table.get(${expected.length + 1} of ${expected.length})`); } diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/table/constructor.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/table/constructor.any.js index 99eee19fecd..a494a9e559b 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/table/constructor.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/table/constructor.any.js @@ -21,16 +21,16 @@ test(() => { }, "length"); test(() => { - assert_throws(new TypeError(), () => new WebAssembly.Table()); + assert_throws_js(TypeError, () => new WebAssembly.Table()); }, "No arguments"); test(() => { const argument = { "element": "anyfunc", "initial": 0 }; - assert_throws(new TypeError(), () => WebAssembly.Table(argument)); + assert_throws_js(TypeError, () => WebAssembly.Table(argument)); }, "Calling"); test(() => { - assert_throws(new TypeError(), () => new WebAssembly.Table({})); + assert_throws_js(TypeError, () => new WebAssembly.Table({})); }, "Empty descriptor"); test(() => { @@ -47,18 +47,18 @@ test(() => { {}, ]; for (const invalidArgument of invalidArguments) { - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => new WebAssembly.Table(invalidArgument), `new Table(${format_value(invalidArgument)})`); } }, "Invalid descriptor argument"); test(() => { - assert_throws(new TypeError(), () => new WebAssembly.Table({ "element": "anyfunc", "initial": undefined })); + assert_throws_js(TypeError, () => new WebAssembly.Table({ "element": "anyfunc", "initial": undefined })); }, "Undefined initial value in descriptor"); test(() => { - assert_throws(new TypeError(), () => new WebAssembly.Table({ "element": undefined, "initial": 0 })); + assert_throws_js(TypeError, () => new WebAssembly.Table({ "element": undefined, "initial": 0 })); }, "Undefined element value in descriptor"); const outOfRangeValues = [ @@ -72,16 +72,16 @@ const outOfRangeValues = [ for (const value of outOfRangeValues) { test(() => { - assert_throws(new TypeError(), () => new WebAssembly.Table({ "element": "anyfunc", "initial": value })); + assert_throws_js(TypeError, () => new WebAssembly.Table({ "element": "anyfunc", "initial": value })); }, `Out-of-range initial value in descriptor: ${format_value(value)}`); test(() => { - assert_throws(new TypeError(), () => new WebAssembly.Table({ "element": "anyfunc", "initial": 0, "maximum": value })); + assert_throws_js(TypeError, () => new WebAssembly.Table({ "element": "anyfunc", "initial": 0, "maximum": value })); }, `Out-of-range maximum value in descriptor: ${format_value(value)}`); } test(() => { - assert_throws(new RangeError(), () => new WebAssembly.Table({ "element": "anyfunc", "initial": 10, "maximum": 9 })); + assert_throws_js(RangeError, () => new WebAssembly.Table({ "element": "anyfunc", "initial": 10, "maximum": 9 })); }, "Initial value exceeds maximum"); test(() => { diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/table/get-set.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/table/get-set.any.js index bd053b389c9..175f30fbcad 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/table/get-set.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/table/get-set.any.js @@ -24,7 +24,7 @@ setup(() => { test(() => { const argument = { "element": "anyfunc", "initial": 5 }; const table = new WebAssembly.Table(argument); - assert_throws(new TypeError(), () => table.get()); + assert_throws_js(TypeError, () => table.get()); }, "Missing arguments: get"); test(t => { @@ -48,15 +48,15 @@ test(t => { const fn = WebAssembly.Table.prototype.get; for (const thisValue of thisValues) { - assert_throws(new TypeError(), () => fn.call(thisValue, argument), `this=${format_value(thisValue)}`); + assert_throws_js(TypeError, () => fn.call(thisValue, argument), `this=${format_value(thisValue)}`); } }, "Branding: get"); test(() => { const argument = { "element": "anyfunc", "initial": 5 }; const table = new WebAssembly.Table(argument); - assert_throws(new TypeError(), () => table.set()); - assert_throws(new TypeError(), () => table.set(0)); + assert_throws_js(TypeError, () => table.set()); + assert_throws_js(TypeError, () => table.set(0)); }, "Missing arguments: set"); test(t => { @@ -80,7 +80,7 @@ test(t => { const fn = WebAssembly.Table.prototype.set; for (const thisValue of thisValues) { - assert_throws(new TypeError(), () => fn.call(thisValue, argument, null), `this=${format_value(thisValue)}`); + assert_throws_js(TypeError, () => fn.call(thisValue, argument, null), `this=${format_value(thisValue)}`); } }, "Branding: set"); @@ -128,8 +128,8 @@ test(() => { // -1 is the wrong type hence the type check on entry gets this // before the range check does. - assert_throws(new TypeError(), () => table.set(-1, fn)); - assert_throws(new RangeError(), () => table.set(5, fn)); + assert_throws_js(TypeError, () => table.set(-1, fn)); + assert_throws_js(RangeError, () => table.set(5, fn)); assert_equal_to_array(table, [null, null, null, null, null]); }, "Setting out-of-bounds"); @@ -149,7 +149,7 @@ test(() => { {}, ]; for (const argument of invalidArguments) { - assert_throws(new TypeError(), () => table.set(0, argument), + assert_throws_js(TypeError, () => table.set(0, argument), `set(${format_value(argument)})`); } assert_equal_to_array(table, [null]); @@ -161,7 +161,7 @@ test(() => { assert_equal_to_array(table, [null]); const fn = function() {}; - assert_throws(new TypeError(), () => table.set(0, fn)); + assert_throws_js(TypeError, () => table.set(0, fn)); assert_equal_to_array(table, [null]); }, "Setting non-wasm function"); @@ -171,7 +171,7 @@ test(() => { assert_equal_to_array(table, [null]); const fn = () => {}; - assert_throws(new TypeError(), () => table.set(0, fn)); + assert_throws_js(TypeError, () => table.set(0, fn)); assert_equal_to_array(table, [null]); }, "Setting non-wasm arrow function"); @@ -191,13 +191,13 @@ for (const value of outOfRangeValues) { test(() => { const argument = { "element": "anyfunc", "initial": 1 }; const table = new WebAssembly.Table(argument); - assert_throws(new TypeError(), () => table.get(value)); + assert_throws_js(TypeError, () => table.get(value)); }, `Getting out-of-range argument: ${format_value(value)}`); test(() => { const argument = { "element": "anyfunc", "initial": 1 }; const table = new WebAssembly.Table(argument); - assert_throws(new TypeError(), () => table.set(value, null)); + assert_throws_js(TypeError, () => table.set(value, null)); }, `Setting out-of-range argument: ${format_value(value)}`); } @@ -211,7 +211,7 @@ test(() => { return 0; }, }; - assert_throws(new TypeError(), () => table.set(value, {})); + assert_throws_js(TypeError, () => table.set(value, {})); assert_equals(called, 1); }, "Order of argument conversion"); diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/table/grow-reftypes.tentative.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/table/grow-reftypes.tentative.any.js index 807aea991bb..54141c059ed 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/table/grow-reftypes.tentative.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/table/grow-reftypes.tentative.any.js @@ -32,11 +32,11 @@ test(() => { test(() => { const argument = { "element": "anyfunc", "initial": 1 }; const table = new WebAssembly.Table(argument); - assert_throws(new TypeError(), () => table.grow(2, {})); + assert_throws_js(TypeError, () => table.grow(2, {})); }, "Grow with non-function argument"); test(() => { const argument = { "element": "anyfunc", "initial": 1 }; const table = new WebAssembly.Table(argument); - assert_throws(new TypeError(), () => table.grow(2, () => true)); + assert_throws_js(TypeError, () => table.grow(2, () => true)); }, "Grow with JS-function argument"); diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/table/grow.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/table/grow.any.js index 558b49d1c7d..f543cc620bc 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/table/grow.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/table/grow.any.js @@ -8,7 +8,7 @@ function nulls(n) { test(() => { const argument = { "element": "anyfunc", "initial": 5 }; const table = new WebAssembly.Table(argument); - assert_throws(new TypeError(), () => table.grow()); + assert_throws_js(TypeError, () => table.grow()); }, "Missing arguments"); test(t => { @@ -32,7 +32,7 @@ test(t => { const fn = WebAssembly.Table.prototype.grow; for (const thisValue of thisValues) { - assert_throws(new TypeError(), () => fn.call(thisValue, argument), `this=${format_value(thisValue)}`); + assert_throws_js(TypeError, () => fn.call(thisValue, argument), `this=${format_value(thisValue)}`); } }, "Branding"); @@ -61,7 +61,7 @@ test(() => { const table = new WebAssembly.Table(argument); assert_equal_to_array(table, nulls(2), "before"); - assert_throws(new RangeError(), () => table.grow(4)); + assert_throws_js(RangeError, () => table.grow(4)); assert_equal_to_array(table, nulls(2), "after"); }, "Exceeded maximum"); @@ -81,7 +81,7 @@ for (const value of outOfRangeValues) { test(() => { const argument = { "element": "anyfunc", "initial": 1 }; const table = new WebAssembly.Table(argument); - assert_throws(new TypeError(), () => table.grow(value)); + assert_throws_js(TypeError, () => table.grow(value)); }, `Out-of-range argument: ${format_value(value)}`); } diff --git a/tests/wpt/web-platform-tests/wasm/jsapi/table/length.any.js b/tests/wpt/web-platform-tests/wasm/jsapi/table/length.any.js index b1bfa6cfd1f..f4e11484797 100644 --- a/tests/wpt/web-platform-tests/wasm/jsapi/table/length.any.js +++ b/tests/wpt/web-platform-tests/wasm/jsapi/table/length.any.js @@ -22,7 +22,7 @@ test(() => { assert_equals(typeof desc.set, "undefined"); for (const thisValue of thisValues) { - assert_throws(new TypeError(), () => getter.call(thisValue), `this=${format_value(thisValue)}`); + assert_throws_js(TypeError, () => getter.call(thisValue), `this=${format_value(thisValue)}`); } }, "Branding"); @@ -52,7 +52,7 @@ test(() => { const argument = { "element": "anyfunc", "initial": 2 }; const table = new WebAssembly.Table(argument); assert_equals(table.length, 2, "Initial length"); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { "use strict"; table.length = 4; }); diff --git a/tests/wpt/web-platform-tests/wasm/serialization/arraybuffer/transfer.window.js b/tests/wpt/web-platform-tests/wasm/serialization/arraybuffer/transfer.window.js index 3edfdaad958..b2b5697fca3 100644 --- a/tests/wpt/web-platform-tests/wasm/serialization/arraybuffer/transfer.window.js +++ b/tests/wpt/web-platform-tests/wasm/serialization/arraybuffer/transfer.window.js @@ -1,6 +1,6 @@ test(() => { const buffer = new WebAssembly.Memory({initial: 4}).buffer; - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { postMessage('foo', '*', [buffer]); }); }); diff --git a/tests/wpt/web-platform-tests/wasm/serialization/module/broadcastchannel-success.html b/tests/wpt/web-platform-tests/wasm/serialization/module/broadcastchannel-success.html index cd5f8d0b56a..ddc242b82ef 100644 --- a/tests/wpt/web-platform-tests/wasm/serialization/module/broadcastchannel-success.html +++ b/tests/wpt/web-platform-tests/wasm/serialization/module/broadcastchannel-success.html @@ -30,7 +30,7 @@ promise_test(t => { return; } - let {i, result} = msg; + let {i, result} = msg.data; assert_in_array(i, [0, 1, 2], "Any message events must come from expected sources"); assert_equals(result, i + 1, `iframe ${i} must return ${i+1}`); diff --git a/tests/wpt/web-platform-tests/wasm/serialization/module/no-transferring.html b/tests/wpt/web-platform-tests/wasm/serialization/module/no-transferring.html index a0bf11f01dd..2f0f674b1fc 100644 --- a/tests/wpt/web-platform-tests/wasm/serialization/module/no-transferring.html +++ b/tests/wpt/web-platform-tests/wasm/serialization/module/no-transferring.html @@ -11,21 +11,21 @@ test(() => { const module = createEmptyWasmModule(); - assert_throws("DataCloneError", () => window.postMessage(module, "*", [module])); - assert_throws("DataCloneError", () => window.postMessage("test", "*", [module])); + assert_throws_dom("DataCloneError", () => window.postMessage(module, "*", [module])); + assert_throws_dom("DataCloneError", () => window.postMessage("test", "*", [module])); }, "Trying to transfer a WebAssembly.Module to this window throws"); test(() => { const module = createEmptyWasmModule(); const worker = new Worker("resources/echo-worker.js"); - assert_throws("DataCloneError", () => worker.postMessage(module, [module])); - assert_throws("DataCloneError", () => worker.postMessage("test", [module])); + assert_throws_dom("DataCloneError", () => worker.postMessage(module, [module])); + assert_throws_dom("DataCloneError", () => worker.postMessage("test", [module])); }, "Trying to transfer a WebAssembly.Module to a worker throws"); test(() => { const module = createEmptyWasmModule(); const channel = new MessageChannel(); - assert_throws("DataCloneError", () => channel.port1.postMessage(module, [module])); - assert_throws("DataCloneError", () => channel.port1.postMessage("test", [module])); + assert_throws_dom("DataCloneError", () => channel.port1.postMessage(module, [module])); + assert_throws_dom("DataCloneError", () => channel.port1.postMessage("test", [module])); }, "Trying to transfer a WebAssembly.Module through a MessagePort throws"); </script> diff --git a/tests/wpt/web-platform-tests/wasm/serialization/module/serialization-via-history.html b/tests/wpt/web-platform-tests/wasm/serialization/module/serialization-via-history.html index 35dc17b6701..38d4301d70b 100644 --- a/tests/wpt/web-platform-tests/wasm/serialization/module/serialization-via-history.html +++ b/tests/wpt/web-platform-tests/wasm/serialization/module/serialization-via-history.html @@ -11,7 +11,7 @@ for (const method of ["pushState", "replaceState"]) { test(() => { - assert_throws("DataCloneError", () => { + assert_throws_dom("DataCloneError", () => { history[method](createEmptyWasmModule(), "dummy title"); }); }, `history.${method}(): simple case`); @@ -19,7 +19,7 @@ for (const method of ["pushState", "replaceState"]) { test(() => { let getter1Called = false; let getter2Called = false; - assert_throws("DataCloneError", () => { + assert_throws_dom("DataCloneError", () => { history[method]([ { get x() { getter1Called = true; return 5; } }, createEmptyWasmModule(), diff --git a/tests/wpt/web-platform-tests/wasm/serialization/module/serialization-via-idb.any.js b/tests/wpt/web-platform-tests/wasm/serialization/module/serialization-via-idb.any.js index 1d861c3d3aa..10c99c4d31c 100644 --- a/tests/wpt/web-platform-tests/wasm/serialization/module/serialization-via-idb.any.js +++ b/tests/wpt/web-platform-tests/wasm/serialization/module/serialization-via-idb.any.js @@ -13,7 +13,7 @@ async_test(t => { const db = e.target.result; const store = db.createObjectStore("store", { keyPath: "key" }); - assert_throws("DataCloneError", () => { + assert_throws_dom("DataCloneError", () => { store.put({ key: 1, property: createEmptyWasmModule() }); }); t.done(); @@ -30,7 +30,7 @@ async_test(t => { let getter1Called = false; let getter2Called = false; - assert_throws("DataCloneError", () => { + assert_throws_dom("DataCloneError", () => { store.put({ key: 1, property: [ { get x() { getter1Called = true; return 5; } }, createEmptyWasmModule(), diff --git a/tests/wpt/web-platform-tests/wasm/serialization/module/serialization-via-notifications-api.any.js b/tests/wpt/web-platform-tests/wasm/serialization/module/serialization-via-notifications-api.any.js index 84105651d3b..3672192df79 100644 --- a/tests/wpt/web-platform-tests/wasm/serialization/module/serialization-via-notifications-api.any.js +++ b/tests/wpt/web-platform-tests/wasm/serialization/module/serialization-via-notifications-api.any.js @@ -6,7 +6,7 @@ function createEmptyWasmModule() { } test(() => { - assert_throws("DataCloneError", () => { + assert_throws_dom("DataCloneError", () => { new Notification("Bob: Hi", { data: createEmptyWasmModule() }); }) }, "WebAssembly.Module cloning via the Notifications API's data member: basic case"); @@ -15,7 +15,7 @@ test(() => { let getter1Called = false; let getter2Called = false; - assert_throws("DataCloneError", () => { + assert_throws_dom("DataCloneError", () => { new Notification("Bob: Hi", { data: [ { get x() { getter1Called = true; return 5; } }, createEmptyWasmModule(), diff --git a/tests/wpt/web-platform-tests/wasm/webapi/historical.any.js b/tests/wpt/web-platform-tests/wasm/webapi/historical.any.js index 0fe1e1c891f..257112c4160 100644 --- a/tests/wpt/web-platform-tests/wasm/webapi/historical.any.js +++ b/tests/wpt/web-platform-tests/wasm/webapi/historical.any.js @@ -25,5 +25,5 @@ promise_test(async t => { const mod = await WebAssembly.compileStreaming(fetch('../incrementer.wasm')); const tx = db.transaction(obj_store, 'readwrite'); const store = tx.objectStore(obj_store); - assert_throws("DataCloneError", () => store.put(mod, module_key)); + assert_throws_dom("DataCloneError", () => store.put(mod, module_key)); }); diff --git a/tests/wpt/web-platform-tests/web-animations/README.md b/tests/wpt/web-platform-tests/web-animations/README.md index 75493ce57b4..c41e0e048ef 100644 --- a/tests/wpt/web-platform-tests/web-animations/README.md +++ b/tests/wpt/web-platform-tests/web-animations/README.md @@ -59,7 +59,7 @@ Guidelines for writing tests ```javascript test(t => { - assert_throws({ name: 'TypeError' }, () => { + assert_throws_js(TypeError, () => { createDiv(t).animate(null, -1); }); }, 'Setting a negative duration throws a TypeError'); diff --git a/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/commitStyles.html b/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/commitStyles.html index d3a95e053e3..40cb2634e41 100644 --- a/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/commitStyles.html +++ b/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/commitStyles.html @@ -276,7 +276,7 @@ test(t => { { duration: 1, fill: 'forwards', pseudoElement: '::before' } ); - assert_throws('NoModificationAllowedError', () => { + assert_throws_dom('NoModificationAllowedError', () => { animation.commitStyles(); }); }, 'Throws if the target element is a pseudo element'); @@ -292,7 +292,7 @@ test(t => { document.body.appendChild(nonStyleElement); animation.effect.target = nonStyleElement; - assert_throws('NoModificationAllowedError', () => { + assert_throws_dom('NoModificationAllowedError', () => { animation.commitStyles(); }); @@ -308,7 +308,7 @@ test(t => { div.style.display = 'none'; - assert_throws('InvalidStateError', () => { + assert_throws_dom('InvalidStateError', () => { animation.commitStyles(); }); }, 'Throws if the target effect is display:none'); @@ -325,7 +325,7 @@ test(t => { container.style.display = 'none'; - assert_throws('InvalidStateError', () => { + assert_throws_dom('InvalidStateError', () => { animation.commitStyles(); }); }, "Throws if the target effect's ancestor is display:none"); @@ -359,7 +359,7 @@ test(t => { div.style.display = 'contents'; container.style.display = 'none'; - assert_throws('InvalidStateError', () => { + assert_throws_dom('InvalidStateError', () => { animation.commitStyles(); }); }, 'Treats display:contents in a display:none subtree as not rendered'); @@ -373,7 +373,7 @@ test(t => { div.remove(); - assert_throws('InvalidStateError', () => { + assert_throws_dom('InvalidStateError', () => { animation.commitStyles(); }); }, 'Throws if the target effect is disconnected'); @@ -388,7 +388,7 @@ test(t => { div.remove(); - assert_throws('NoModificationAllowedError', () => { + assert_throws_dom('NoModificationAllowedError', () => { animation.commitStyles(); }); }, 'Checks the pseudo element condition before the not rendered condition'); diff --git a/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/pause.html b/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/pause.html index 0649c2f617d..74d0724ef42 100644 --- a/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/pause.html +++ b/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/pause.html @@ -73,7 +73,7 @@ test(t => { animation.cancel(); animation.playbackRate = -1; - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => { animation.pause(); }, 'Expect InvalidStateError exception on calling pause() ' + 'from idle with a negative playbackRate and ' + diff --git a/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/play.html b/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/play.html index 3e8f923d544..d29b67b7992 100644 --- a/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/play.html +++ b/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/play.html @@ -21,7 +21,7 @@ promise_test(t => { animation.currentTime = -5 * MS_PER_SEC; animation.playbackRate = -1; - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => { animation.play(); }, 'Expected InvalidStateError exception on calling play() ' + 'with a negative playbackRate and infinite-duration ' + diff --git a/tests/wpt/web-platform-tests/web-animations/interfaces/AnimationEffect/updateTiming.html b/tests/wpt/web-platform-tests/web-animations/interfaces/AnimationEffect/updateTiming.html index f4f672ab1aa..6a340c0bf47 100644 --- a/tests/wpt/web-platform-tests/web-animations/interfaces/AnimationEffect/updateTiming.html +++ b/tests/wpt/web-platform-tests/web-animations/interfaces/AnimationEffect/updateTiming.html @@ -58,7 +58,7 @@ test(t => { for (const invalid of gBadDelayValues) { test(t => { const anim = createDiv(t).animate(null); - assert_throws({ name: 'TypeError' }, () => { + assert_throws_js(TypeError, () => { anim.effect.updateTiming({ delay: invalid }); }); }, `Throws when setting invalid delay value: ${invalid}`); @@ -88,14 +88,14 @@ test(t => { test(t => { const anim = createDiv(t).animate(null, 2000); - assert_throws({ name: 'TypeError' }, () => { + assert_throws_js(TypeError, () => { anim.effect.updateTiming({ endDelay: Infinity }); }); }, 'Throws when setting the endDelay to infinity'); test(t => { const anim = createDiv(t).animate(null, 2000); - assert_throws({ name: 'TypeError' }, () => { + assert_throws_js(TypeError, () => { anim.effect.updateTiming({ endDelay: -Infinity }); }); }, 'Throws when setting the endDelay to negative infinity'); @@ -163,7 +163,7 @@ test(t => { for (const invalid of gBadIterationStartValues) { test(t => { const anim = createDiv(t).animate(null); - assert_throws({ name: 'TypeError' }, () => { + assert_throws_js(TypeError, () => { anim.effect.updateTiming({ iterationStart: invalid }); }, `setting ${invalid}`); }, `Throws when setting invalid iterationStart value: ${invalid}`); @@ -193,7 +193,7 @@ test(t => { for (const invalid of gBadIterationsValues) { test(t => { const anim = createDiv(t).animate(null); - assert_throws({ name: 'TypeError' }, () => { + assert_throws_js(TypeError, () => { anim.effect.updateTiming({ iterations: invalid }); }); }, `Throws when setting invalid iterations value: ${invalid}`); diff --git a/tests/wpt/web-platform-tests/web-animations/interfaces/KeyframeEffect/constructor.html b/tests/wpt/web-platform-tests/web-animations/interfaces/KeyframeEffect/constructor.html index 46a23b0c2e8..f9d552e63ec 100644 --- a/tests/wpt/web-platform-tests/web-animations/interfaces/KeyframeEffect/constructor.html +++ b/tests/wpt/web-platform-tests/web-animations/interfaces/KeyframeEffect/constructor.html @@ -186,7 +186,7 @@ test(t => { test(t => { const test_error = { name: 'test' }; - assert_throws(test_error, () => { + assert_throws_exactly(test_error, () => { new KeyframeEffect(target, { get left() { throw test_error }}) }); }, 'KeyframeEffect constructor propagates exceptions generated by accessing' diff --git a/tests/wpt/web-platform-tests/web-animations/interfaces/KeyframeEffect/processing-a-keyframes-argument-001.html b/tests/wpt/web-platform-tests/web-animations/interfaces/KeyframeEffect/processing-a-keyframes-argument-001.html index 5bd0ae2b1ed..87e60a2b108 100644 --- a/tests/wpt/web-platform-tests/web-animations/interfaces/KeyframeEffect/processing-a-keyframes-argument-001.html +++ b/tests/wpt/web-platform-tests/web-animations/interfaces/KeyframeEffect/processing-a-keyframes-argument-001.html @@ -320,7 +320,7 @@ test(() => { test(() => { const test_error = { name: 'test' }; const bad_keyframe = { get left() { throw test_error; } }; - assert_throws(test_error, () => { + assert_throws_exactly(test_error, () => { new KeyframeEffect(null, createIterable([ { done: false, value: { left: '100px' } }, { done: false, value: bad_keyframe }, @@ -332,7 +332,7 @@ test(() => { + ' propagated'); test(() => { - assert_throws({ name: 'TypeError' }, () => { + assert_throws_js(TypeError, () => { new KeyframeEffect(null, createIterable([ { done: false, value: { left: '100px' } }, { done: false, value: 1234 }, @@ -390,7 +390,7 @@ test(() => { return { next() { throw test_error; } }; }, }; - assert_throws(test_error, () => { + assert_throws_exactly(test_error, () => { new KeyframeEffect(null, keyframe_obj); }); }, 'If a custom iterator throws from next(), the exception should be rethrown'); @@ -404,7 +404,7 @@ test(() => { throw test_error; }, }; - assert_throws(test_error, () => { + assert_throws_exactly(test_error, () => { new KeyframeEffect(null, keyframe_obj); }); }, 'Accessing a Symbol.iterator property that throws should rethrow'); @@ -415,7 +415,7 @@ test(() => { return 42; // Not an object. }, }; - assert_throws({ name: 'TypeError' }, () => { + assert_throws_js(TypeError, () => { new KeyframeEffect(null, keyframe_obj); }); }, 'A non-object returned from the Symbol.iterator property should cause a' diff --git a/tests/wpt/web-platform-tests/web-animations/interfaces/KeyframeEffect/processing-a-keyframes-argument-002.html b/tests/wpt/web-platform-tests/web-animations/interfaces/KeyframeEffect/processing-a-keyframes-argument-002.html index e78e13d69aa..4b0e15c9a2f 100644 --- a/tests/wpt/web-platform-tests/web-animations/interfaces/KeyframeEffect/processing-a-keyframes-argument-002.html +++ b/tests/wpt/web-platform-tests/web-animations/interfaces/KeyframeEffect/processing-a-keyframes-argument-002.html @@ -66,7 +66,7 @@ test(() => { addProp('width'); keyframe.easing = 'easy-peasy'; - assert_throws({ name: 'TypeError' }, () => { + assert_throws_js(TypeError, () => { new KeyframeEffect(target, keyframe); }); assert_equals(propAccessCount, 2, @@ -92,7 +92,7 @@ test(() => { addProp(kf2, 'height'); addProp(kf2, 'width'); - assert_throws({ name: 'TypeError' }, () => { + assert_throws_js(TypeError, () => { new KeyframeEffect(target, [ kf1, kf2 ]); }); assert_equals(propAccessCount, 4, diff --git a/tests/wpt/web-platform-tests/web-animations/timing-model/animations/finishing-an-animation.html b/tests/wpt/web-platform-tests/web-animations/timing-model/animations/finishing-an-animation.html index 779bee184b8..b91eacfb689 100644 --- a/tests/wpt/web-platform-tests/web-animations/timing-model/animations/finishing-an-animation.html +++ b/tests/wpt/web-platform-tests/web-animations/timing-model/animations/finishing-an-animation.html @@ -17,7 +17,7 @@ test(t => { const animation = div.animate(null, 100 * MS_PER_SEC); animation.playbackRate = 0; - assert_throws({name: 'InvalidStateError'}, () => { + assert_throws_dom('InvalidStateError', () => { animation.finish(); }); }, 'Finishing an animation with a zero playback rate throws'); @@ -28,7 +28,7 @@ test(t => { { duration : 100 * MS_PER_SEC, iterations : Infinity }); - assert_throws({name: 'InvalidStateError'}, () => { + assert_throws_dom('InvalidStateError', () => { animation.finish(); }); }, 'Finishing an infinite animation throws'); @@ -249,7 +249,7 @@ promise_test(async t => { animation.updatePlaybackRate(0); - assert_throws('InvalidStateError', () => { + assert_throws_dom('InvalidStateError', () => { animation.finish(); }); }, 'An exception should be thrown if the effective playback rate is zero'); @@ -265,7 +265,7 @@ promise_test(async t => { animation.updatePlaybackRate(1); - assert_throws('InvalidStateError', () => { + assert_throws_dom('InvalidStateError', () => { animation.finish(); }); }, 'An exception should be thrown when finishing if the effective playback rate' diff --git a/tests/wpt/web-platform-tests/web-animations/timing-model/animations/reversing-an-animation.html b/tests/wpt/web-platform-tests/web-animations/timing-model/animations/reversing-an-animation.html index 75fd9876c04..8d869d72aaf 100644 --- a/tests/wpt/web-platform-tests/web-animations/timing-model/animations/reversing-an-animation.html +++ b/tests/wpt/web-platform-tests/web-animations/timing-model/animations/reversing-an-animation.html @@ -145,7 +145,7 @@ test(t => { iterations: Infinity }); animation.currentTime = -200 * MS_PER_SEC; - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => { animation.reverse(); }, 'reverse() should throw InvalidStateError ' + 'if the playbackRate > 0 and the currentTime < 0 ' + @@ -230,7 +230,7 @@ test(t => { const animation = new Animation(new KeyframeEffect(div, null, 100 * MS_PER_SEC), null); - assert_throws('InvalidStateError', () => { animation.reverse(); }); + assert_throws_dom('InvalidStateError', () => { animation.reverse(); }); }, 'Reversing an animation without an active timeline throws an ' + 'InvalidStateError'); @@ -254,7 +254,7 @@ promise_test(async t => { await animation.ready; animation.updatePlaybackRate(2); - assert_throws('InvalidStateError', () => { animation.reverse(); }); + assert_throws_dom('InvalidStateError', () => { animation.reverse(); }); assert_equals(animation.playbackRate, 1); await animation.ready; diff --git a/tests/wpt/web-platform-tests/web-animations/timing-model/animations/setting-the-current-time-of-an-animation.html b/tests/wpt/web-platform-tests/web-animations/timing-model/animations/setting-the-current-time-of-an-animation.html index 6687ad7612e..22f88adb8b4 100644 --- a/tests/wpt/web-platform-tests/web-animations/timing-model/animations/setting-the-current-time-of-an-animation.html +++ b/tests/wpt/web-platform-tests/web-animations/timing-model/animations/setting-the-current-time-of-an-animation.html @@ -26,7 +26,7 @@ promise_test(async t => { await anim.ready; assert_greater_than_equal(anim.currentTime, 0); - assert_throws({ name: 'TypeError' }, () => { + assert_throws_js(TypeError, () => { anim.currentTime = null; }); }, 'Setting the current time of a playing animation to unresolved throws a' @@ -38,7 +38,7 @@ promise_test(async t => { anim.pause(); assert_greater_than_equal(anim.currentTime, 0); - assert_throws({ name: 'TypeError' }, () => { + assert_throws_js(TypeError, () => { anim.currentTime = null; }); }, 'Setting the current time of a paused animation to unresolved throws a' diff --git a/tests/wpt/web-platform-tests/web-nfc/NDEFRecord_constructor.https.html b/tests/wpt/web-platform-tests/web-nfc/NDEFRecord_constructor.https.html index bf4697f8b17..66befaa30a7 100644 --- a/tests/wpt/web-platform-tests/web-nfc/NDEFRecord_constructor.https.html +++ b/tests/wpt/web-platform-tests/web-nfc/NDEFRecord_constructor.https.html @@ -82,7 +82,7 @@ assert_equals(record.encoding, null, 'encoding'); assert_equals(record.lang, null, 'lang'); assert_equals(record.data, null, 'data'); - assert_throws('NotSupportedError', () => record.toRecords(), + assert_throws_dom('NotSupportedError', () => record.toRecords(), 'Only smart-poster records and external type records could have embedded records.'); }, 'NDEFRecord constructor with empty record type'); @@ -96,7 +96,7 @@ const decoder = new TextDecoder(); assert_equals(decoder.decode(record.data), test_text_data, 'data has the same content with the original dictionary'); - assert_throws('NotSupportedError', () => record.toRecords(), + assert_throws_dom('NotSupportedError', () => record.toRecords(), 'Only smart-poster records and external type records could have embedded records.'); }, 'NDEFRecord constructor with text record type and string data'); @@ -113,7 +113,7 @@ const decoder = new TextDecoder(); assert_equals(decoder.decode(record.data), test_text_data, 'data has the same content with the original dictionary'); - assert_throws('NotSupportedError', () => record.toRecords(), + assert_throws_dom('NotSupportedError', () => record.toRecords(), 'Only smart-poster records and external type records could have embedded records.'); }, 'NDEFRecord constructor with text record type and arrayBuffer data'); @@ -130,14 +130,14 @@ const decoder = new TextDecoder(); assert_equals(decoder.decode(record.data), test_text_data, 'data has the same content with the original dictionary'); - assert_throws('NotSupportedError', () => record.toRecords(), + assert_throws_dom('NotSupportedError', () => record.toRecords(), 'Only smart-poster records and external type records could have embedded records.'); }, 'NDEFRecord constructor with text record type and arrayBufferView data'); test(() => { - assert_throws(new TypeError, () => new NDEFRecord(createTextRecord( + assert_throws_js(TypeError, () => new NDEFRecord(createTextRecord( test_text_data, 'random-encoding'))); - assert_throws(new TypeError, () => new NDEFRecord(createTextRecord( + assert_throws_js(TypeError, () => new NDEFRecord(createTextRecord( test_text_data, 'utf-16'))); // Only 'utf-8' is OK for a DOMString data source. const record = new NDEFRecord(createTextRecord(test_text_data, 'utf-8', 'fr')); @@ -148,7 +148,7 @@ assert_equals(decoder.decode(record.data), test_text_data, 'data has the same content with the original text'); - assert_throws(new TypeError, () => new NDEFRecord(createTextRecord( + assert_throws_js(TypeError, () => new NDEFRecord(createTextRecord( encodeTextToArrayBuffer(test_text_data, 'utf-8'), 'random-encoding'))); // The encoding list valid for a BufferSource data source. const encodings = ['utf-8', 'utf-16', 'utf-16be', 'utf-16le']; @@ -190,7 +190,7 @@ const decoder = new TextDecoder(); assert_equals(decoder.decode(record.data), test_url_data, 'data has the same content with the original dictionary'); - assert_throws('NotSupportedError', () => record.toRecords(), + assert_throws_dom('NotSupportedError', () => record.toRecords(), 'Only smart-poster records and external type records could have embedded records.'); }, 'NDEFRecord constructor with url record type'); @@ -202,7 +202,7 @@ const decoder = new TextDecoder(); assert_equals(decoder.decode(record.data), test_url_data, 'data has the same content with the original dictionary'); - assert_throws('NotSupportedError', () => record.toRecords(), + assert_throws_dom('NotSupportedError', () => record.toRecords(), 'Only smart-poster records and external type records could have embedded records.'); }, 'NDEFRecord constructor with absolute-url record type'); @@ -221,7 +221,7 @@ assert_equals(record.id, test_record_id, 'id'); assert_array_equals(new Uint8Array(record.data.buffer), [1, 2, 3, 4], 'data has the same content with the original buffer'); - assert_throws('NotSupportedError', () => record.toRecords(), + assert_throws_dom('NotSupportedError', () => record.toRecords(), 'Only smart-poster records and external type records could have embedded records.'); } // Feed ArrayBufferView. @@ -232,7 +232,7 @@ assert_equals(record.id, test_record_id, 'id'); assert_array_equals(new Uint8Array(record.data.buffer), [2, 3, 4], 'data has the same content with the original buffer view'); - assert_throws('NotSupportedError', () => record.toRecords(), + assert_throws_dom('NotSupportedError', () => record.toRecords(), 'Only smart-poster records and external type records could have embedded records.'); } }, 'NDEFRecord constructor with mime record type and stream data'); @@ -245,7 +245,7 @@ assert_object_equals(JSON.parse(new TextDecoder().decode(record.data)), test_json_data, 'data has the same content with the original json'); - assert_throws('NotSupportedError', () => record.toRecords(), + assert_throws_dom('NotSupportedError', () => record.toRecords(), 'Only smart-poster records and external type records could have embedded records.'); }, 'NDEFRecord constructor with mime record type and json data'); @@ -263,7 +263,7 @@ assert_equals(record.id, test_record_id, 'id'); assert_array_equals(new Uint8Array(record.data.buffer), [1, 2, 3, 4], 'data has the same content with the original buffer'); - assert_throws('NotSupportedError', () => record.toRecords(), + assert_throws_dom('NotSupportedError', () => record.toRecords(), 'Only smart-poster records and external type records could have embedded records.'); } // Feed ArrayBufferView. @@ -274,7 +274,7 @@ assert_equals(record.id, test_record_id, 'id'); assert_array_equals(new Uint8Array(record.data.buffer), [2, 3, 4], 'data has the same content with the original buffer view'); - assert_throws('NotSupportedError', () => record.toRecords(), + assert_throws_dom('NotSupportedError', () => record.toRecords(), 'Only smart-poster records and external type records could have embedded records.'); } }, 'NDEFRecord constructor with unknown record type'); @@ -344,7 +344,7 @@ }, 'NDEFRecord constructor with record type string being treated as case sensitive'); test(() => { - assert_throws(new TypeError, () => new NDEFRecord(createRecord( + assert_throws_js(TypeError, () => new NDEFRecord(createRecord( 'example.com:hellö', test_buffer_data)), 'The external type must be an ASCII string.'); diff --git a/tests/wpt/web-platform-tests/web-share/canShare-files.tentative.https.html b/tests/wpt/web-platform-tests/web-share/canShare-files.tentative.https.html index 98863a4e211..2c2f2ff9699 100644 --- a/tests/wpt/web-platform-tests/web-share/canShare-files.tentative.https.html +++ b/tests/wpt/web-platform-tests/web-share/canShare-files.tentative.https.html @@ -13,7 +13,7 @@ const emptyFile = new File([''], 'empty'); test(() => { - assert_throws(new TypeError(), () => { navigator.canShare({files: textFile}) }); + assert_throws_js(TypeError, () => { navigator.canShare({files: textFile}) }); }, 'canShare with single file'); test(() => { diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-analysernode-interface/test-analysernode.html b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-analysernode-interface/test-analysernode.html index a8b5a7154e9..e8325388d1b 100644 --- a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-analysernode-interface/test-analysernode.html +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-analysernode-interface/test-analysernode.html @@ -51,34 +51,34 @@ 1024, "Correct default value for frequencyBinCount" ); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.fftSize = 0; }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.fftSize = 1; }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.fftSize = 8; }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.fftSize = 100; }); // non-power of two - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.fftSize = 2049; }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.fftSize = 4097; }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.fftSize = 8193; }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.fftSize = 16385; }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.fftSize = 32769; }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.fftSize = 65536; }); analyser.fftSize = 1024; @@ -98,16 +98,16 @@ -30, "Correct default value for maxDecibels" ); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.minDecibels = -30; }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.minDecibels = -29; }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.maxDecibels = -100; }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.maxDecibels = -101; }); @@ -115,10 +115,10 @@ Math.abs(analyser.smoothingTimeConstant - 0.8) < 0.001, "Correct default value for smoothingTimeConstant" ); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.smoothingTimeConstant = -0.1; }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser.smoothingTimeConstant = 1.1; }); analyser.smoothingTimeConstant = 0; @@ -170,34 +170,34 @@ "Correct default value for smoothingTimeConstant" ); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { fftSize: 0 }); }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { fftSize: 1 }); }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { fftSize: 8 }); }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { fftSize: 100 }); }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { fftSize: 2049 }); }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { fftSize: 4097 }); }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { fftSize: 8193 }); }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { fftSize: 16385 }); }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { fftSize: 32769 }); }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { fftSize: 65536 }); }); analyser = new AnalyserNode(context, { fftSize: 1024 }); @@ -207,23 +207,23 @@ "Correct new value for frequencyBinCount" ); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { minDecibels: -30 }); }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { minDecibels: -29 }); }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { maxDecibels: -100 }); }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { maxDecibels: -101 }); }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { smoothingTimeConstant: -0.1 }); }); - assert_throws("INDEX_SIZE_ERR", function() { + assert_throws_dom("INDEX_SIZE_ERR", function() { analyser = new AnalyserNode(context, { smoothingTimeConstant: -1.1 }); }); analyser = new AnalyserNode(context, { smoothingTimeConstant: 0 }); diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-constantsourcenode-interface/test-constantsourcenode.html b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-constantsourcenode-interface/test-constantsourcenode.html index 1e0d7255c55..7cefde8f285 100644 --- a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-constantsourcenode-interface/test-constantsourcenode.html +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-constantsourcenode-interface/test-constantsourcenode.html @@ -22,16 +22,16 @@ test(function(t) { var csn = ac.createConstantSource(); - assert_throws("InvalidStateError", function() { + assert_throws_dom("InvalidStateError", function() { csn.stop(1); }, "Start must be called before stop"); - assert_throws(new RangeError(), function() { + assert_throws_js(RangeError, function() { csn.start(-1); }, "When can not be negative"); csn.start(0); - assert_throws(new RangeError(), function() { + assert_throws_js(RangeError, function() { csn.stop(-1); }, "When can not be negative"); }, "ConstantSourceNode stop and start"); diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-destinationnode-interface/destination.html b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-destinationnode-interface/destination.html index cda5668a09b..1af0e0f010b 100644 --- a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-destinationnode-interface/destination.html +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-destinationnode-interface/destination.html @@ -28,12 +28,12 @@ assert_greater_than_equal(ac.destination.maxChannelCount, 2, "maxChannelCount should be >= 2"); - assert_throws("IndexSizeError", function() { + assert_throws_dom("IndexSizeError", function() { ac.destination.channelCount = ac.destination.maxChannelCount + 1 }, `Setting the channelCount to something greater than the maxChannelCount should throw IndexSizeError`); - assert_throws("NotSupportedError", function() { + assert_throws_dom("NotSupportedError", function() { ac.destination.channelCount = 0; }, "Setting the channelCount to 0 should throw NotSupportedError"); diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-iirfilternode-interface/test-iirfilternode.html b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-iirfilternode-interface/test-iirfilternode.html index 61c11ffc508..001a2a61724 100644 --- a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-iirfilternode-interface/test-iirfilternode.html +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-iirfilternode-interface/test-iirfilternode.html @@ -9,7 +9,7 @@ test(function(t) { function check_args(arg1, arg2, err, desc) { test(function() { - assert_throws(err, function() { + assert_throws_dom(err, function() { ac.createIIRFilter(arg1, arg2) }) }, desc) diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-mediastreamaudiosourcenode-interface/mediastreamaudiosourcenode-ctor.html b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-mediastreamaudiosourcenode-interface/mediastreamaudiosourcenode-ctor.html index fea042ca530..a7114196569 100644 --- a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-mediastreamaudiosourcenode-interface/mediastreamaudiosourcenode-ctor.html +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-mediastreamaudiosourcenode-interface/mediastreamaudiosourcenode-ctor.html @@ -17,7 +17,7 @@ const emptyStream = new MediaStream(); test(function() { - assert_throws( + assert_throws_dom( "InvalidStateError", function() { ac.createMediaStreamSource(emptyStream); @@ -28,7 +28,7 @@ }, "MediaStreamAudioSourceNode created with factory method and MediaStream with no tracks"); test(function() { - assert_throws( + assert_throws_dom( "InvalidStateError", function() { new MediaStreamAudioSourceNode(ac, { mediaStream: emptyStream }); @@ -43,7 +43,7 @@ const videoOnlyStream = canvas.captureStream(); test(function() { - assert_throws( + assert_throws_dom( "InvalidStateError", function() { ac.createMediaStreamSource(videoOnlyStream); @@ -54,7 +54,7 @@ }, `MediaStreamAudioSourceNode created with the factory method and MediaStream with only a video track`); test(function() { - assert_throws( + assert_throws_dom( "InvalidStateError", function() { new MediaStreamAudioSourceNode(ac, { diff --git a/tests/wpt/web-platform-tests/webauthn/META.yml b/tests/wpt/web-platform-tests/webauthn/META.yml index e8ea8e05985..a52d978f0ea 100644 --- a/tests/wpt/web-platform-tests/webauthn/META.yml +++ b/tests/wpt/web-platform-tests/webauthn/META.yml @@ -2,3 +2,4 @@ spec: https://w3c.github.io/webauthn/ suggested_reviewers: - apowers313 - jcjones + - nsatragno diff --git a/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-attestation.https.html b/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-attestation.https.html index a56f4f03143..6bce3233a1c 100644 --- a/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-attestation.https.html +++ b/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-attestation.https.html @@ -12,11 +12,11 @@ standardSetup(function() { "use strict"; // attestation bad values - new CreateCredentialsTest("options.publicKey.attestation", {}).runTest("Bad attestation parameter: attestation is empty object", new TypeError()); - new CreateCredentialsTest("options.publicKey.attestation", []).runTest("Bad attestation parameter: attestation is empty array", new TypeError()); - new CreateCredentialsTest("options.publicKey.attestation", null).runTest("Bad attestation parameter: attestation is null", new TypeError()); - new CreateCredentialsTest("options.publicKey.attestation", "noneofyourbusiness").runTest("Bad attestation parameter: attestation is \"noneofyourbusiness\"", new TypeError()); - new CreateCredentialsTest("options.publicKey.attestation", "").runTest("Bad attestation parameter: attestation is empty string", new TypeError()); + new CreateCredentialsTest("options.publicKey.attestation", {}).runTest("Bad attestation parameter: attestation is empty object", TypeError); + new CreateCredentialsTest("options.publicKey.attestation", []).runTest("Bad attestation parameter: attestation is empty array", TypeError); + new CreateCredentialsTest("options.publicKey.attestation", null).runTest("Bad attestation parameter: attestation is null", TypeError); + new CreateCredentialsTest("options.publicKey.attestation", "noneofyourbusiness").runTest("Bad attestation parameter: attestation is \"noneofyourbusiness\"", TypeError); + new CreateCredentialsTest("options.publicKey.attestation", "").runTest("Bad attestation parameter: attestation is empty string", TypeError); }); /* JSHINT */ diff --git a/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-authnrselection.https.html b/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-authnrselection.https.html index a9ea8753c6a..87bdb040055 100644 --- a/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-authnrselection.https.html +++ b/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-authnrselection.https.html @@ -44,29 +44,29 @@ standardSetup(function() { authnrSelBadUvNull.userVerification = null; // authenticatorSelection bad values - new CreateCredentialsTest("options.publicKey.authenticatorSelection", []).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection is empty array", new TypeError()); - new CreateCredentialsTest("options.publicKey.authenticatorSelection", null).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection is null", new TypeError()); - new CreateCredentialsTest("options.publicKey.authenticatorSelection", "").runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection is empty string", new TypeError()); - new CreateCredentialsTest("options.publicKey.authenticatorSelection", "none").runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection is string", new TypeError()); + new CreateCredentialsTest("options.publicKey.authenticatorSelection", []).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection is empty array", TypeError); + new CreateCredentialsTest("options.publicKey.authenticatorSelection", null).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection is null", TypeError); + new CreateCredentialsTest("options.publicKey.authenticatorSelection", "").runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection is empty string", TypeError); + new CreateCredentialsTest("options.publicKey.authenticatorSelection", "none").runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection is string", TypeError); // authenticatorSelection bad attachment values - new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelBadAttachEmptyStr).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection attachment is empty string", new TypeError()); - new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelBadAttachEmptyObj).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection attachment is empty object", new TypeError()); - new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelBadAttachNull).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection attachment is null", new TypeError()); + new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelBadAttachEmptyStr).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection attachment is empty string", TypeError); + new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelBadAttachEmptyObj).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection attachment is empty object", TypeError); + new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelBadAttachNull).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection attachment is null", TypeError); // XXX: assumes authnr is behaving like most U2F authnrs; really depends on the authnr or mock configuration new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelAttachPlatform).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection attachment platform", "NotAllowedError"); // authenticatorSelection bad requireResidentKey values // XXX: assumes authnr is behaving like most U2F authnrs; really depends on the authnr or mock configuration new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelRkTrue).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection residentKey true", "NotAllowedError"); - new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelRkBadString).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection residentKey is string", new TypeError()); + new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelRkBadString).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection residentKey is string", TypeError); // TODO: not sure if rk is "boolean" or "truthy"; add test cases if it should only accept boolean values // authenticatorSelection bad userVerification values - new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelBadUvEmptyStr).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection userVerification empty string", new TypeError()); - new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelBadUvEmptyObj).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection userVerification empty object", new TypeError()); - new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelBadUvStr).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection userVerification bad value", new TypeError()); - new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelBadUvNull).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection userVerification null", new TypeError()); + new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelBadUvEmptyStr).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection userVerification empty string", TypeError); + new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelBadUvEmptyObj).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection userVerification empty object", TypeError); + new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelBadUvStr).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection userVerification bad value", TypeError); + new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelBadUvNull).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection userVerification null", TypeError); // XXX: assumes this is a mock authenticator the properly reports that it is not doing userVerfication new CreateCredentialsTest("options.publicKey.authenticatorSelection", authnrSelUvRequired).runTest("Bad AuthenticatorSelectionCriteria: authenticatorSelection userVerification required", "NotAllowedError"); }); diff --git a/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-challenge.https.html b/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-challenge.https.html index 6c03295bc9c..554fc0ec43b 100644 --- a/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-challenge.https.html +++ b/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-challenge.https.html @@ -13,11 +13,11 @@ standardSetup(function() { "use strict"; // bad challenge values - new CreateCredentialsTest({path: "options.publicKey.challenge", value: undefined}).runTest("Bad challenge: challenge missing", new TypeError()); - new CreateCredentialsTest("options.publicKey.challenge", "hi mom").runTest("Bad challenge: challenge is string", new TypeError()); - new CreateCredentialsTest("options.publicKey.challenge", null).runTest("Bad challenge: challenge is null", new TypeError()); - new CreateCredentialsTest("options.publicKey.challenge", {}).runTest("Bad challenge: challenge is empty object", new TypeError()); - new CreateCredentialsTest("options.publicKey.challenge", new Array()).runTest("Bad challenge: challenge is empty Array", new TypeError()); + new CreateCredentialsTest({path: "options.publicKey.challenge", value: undefined}).runTest("Bad challenge: challenge missing", TypeError); + new CreateCredentialsTest("options.publicKey.challenge", "hi mom").runTest("Bad challenge: challenge is string", TypeError); + new CreateCredentialsTest("options.publicKey.challenge", null).runTest("Bad challenge: challenge is null", TypeError); + new CreateCredentialsTest("options.publicKey.challenge", {}).runTest("Bad challenge: challenge is empty object", TypeError); + new CreateCredentialsTest("options.publicKey.challenge", new Array()).runTest("Bad challenge: challenge is empty Array", TypeError); }); /* JSHINT */ diff --git a/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-rp.https.html b/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-rp.https.html index 67598687cd2..890ba21a81b 100644 --- a/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-rp.https.html +++ b/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-rp.https.html @@ -13,13 +13,13 @@ standardSetup(function() { "use strict"; // rp bad values - new CreateCredentialsTest({path: "options.publicKey.rp", value: undefined}).runTest("Bad rp: rp missing", new TypeError()); + new CreateCredentialsTest({path: "options.publicKey.rp", value: undefined}).runTest("Bad rp: rp missing", TypeError); new CreateCredentialsTest({ path: "options.publicKey.rp", value: null }).runTest("Bad rp: rp null", "NotSupportedError"); - new CreateCredentialsTest("options.publicKey.rp", "hi mom").runTest("Bad rp: rp is string", new TypeError()); - new CreateCredentialsTest("options.publicKey.rp", {}).runTest("Bad rp: rp is empty object", new TypeError()); + new CreateCredentialsTest("options.publicKey.rp", "hi mom").runTest("Bad rp: rp is string", TypeError); + new CreateCredentialsTest("options.publicKey.rp", {}).runTest("Bad rp: rp is empty object", TypeError); // // rp.id - new CreateCredentialsTest("options.publicKey.rp.id", {}).runTest("Bad rp: id is object", new TypeError()); + new CreateCredentialsTest("options.publicKey.rp.id", {}).runTest("Bad rp: id is object", TypeError); new CreateCredentialsTest("options.publicKey.rp.id", null).runTest("Bad rp: id is null", "SecurityError"); new CreateCredentialsTest("options.publicKey.rp.id", "").runTest("Bad rp: id is empty String", "SecurityError"); new CreateCredentialsTest("options.publicKey.rp.id", "invalid domain.com").runTest("Bad rp: id is invalid domain (has space)", "SecurityError"); @@ -27,15 +27,15 @@ standardSetup(function() { new CreateCredentialsTest("options.publicKey.rp.id", "0invaliddomain.com").runTest("Bad rp: id is invalid domain (starts with number)", "SecurityError"); // // rp.name - new CreateCredentialsTest({path: "options.publicKey.rp.name", value: undefined}).runTest("rp missing name", new TypeError()); - new CreateCredentialsTest("options.publicKey.rp.name", {}).runTest("Bad rp: name is object", new TypeError()); - new CreateCredentialsTest("options.publicKey.rp.name", null).runTest("Bad rp: name is null", new TypeError()); - new CreateCredentialsTest("options.publicKey.rp.name", "").runTest("Bad rp: name is empty String", new TypeError()); + new CreateCredentialsTest({path: "options.publicKey.rp.name", value: undefined}).runTest("rp missing name", TypeError); + new CreateCredentialsTest("options.publicKey.rp.name", {}).runTest("Bad rp: name is object", TypeError); + new CreateCredentialsTest("options.publicKey.rp.name", null).runTest("Bad rp: name is null", TypeError); + new CreateCredentialsTest("options.publicKey.rp.name", "").runTest("Bad rp: name is empty String", TypeError); // // rp.icon - new CreateCredentialsTest("options.publicKey.rp.icon", {}).runTest("Bad rp: icon is object", new TypeError()); - new CreateCredentialsTest("options.publicKey.rp.icon", null).runTest("Bad rp: icon is null", new TypeError()); - new CreateCredentialsTest("options.publicKey.rp.icon", "").runTest("Bad rp: icon is empty String", new TypeError()); + new CreateCredentialsTest("options.publicKey.rp.icon", {}).runTest("Bad rp: icon is object", TypeError); + new CreateCredentialsTest("options.publicKey.rp.icon", null).runTest("Bad rp: icon is null", TypeError); + new CreateCredentialsTest("options.publicKey.rp.icon", "").runTest("Bad rp: icon is empty String", TypeError); new CreateCredentialsTest("options.publicKey.rp.icon", "http://fidoalliance.co.nz/testimages/catimage.png") .runTest("Bad rp: icon is insecure", "SecurityError"); // // TODO: unicode tests for icon URL (see also: USVString) diff --git a/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-user.https.html b/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-user.https.html index f03f233215a..070a5c77dea 100644 --- a/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-user.https.html +++ b/tests/wpt/web-platform-tests/webauthn/createcredential-badargs-user.https.html @@ -13,46 +13,31 @@ standardSetup(function() { "use strict"; // user bad values - new CreateCredentialsTest({path: "options.publicKey.user", value: undefined}).runTest("Bad user: user missing", new TypeError()); - new CreateCredentialsTest("options.publicKey.user", "hi mom").runTest("Bad user: user is string", new TypeError()); - new CreateCredentialsTest("options.publicKey.user", {}).runTest("Bad user: user is empty object", new TypeError()); + new CreateCredentialsTest({path: "options.publicKey.user", value: undefined}).runTest("Bad user: user missing", TypeError); + new CreateCredentialsTest("options.publicKey.user", "hi mom").runTest("Bad user: user is string", TypeError); + new CreateCredentialsTest("options.publicKey.user", {}).runTest("Bad user: user is empty object", TypeError); // // user.id - new CreateCredentialsTest({path: "options.publicKey.user.id", value: undefined}).runTest("Bad user: id is undefined", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.id", {}).runTest("Bad user: id is object", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.id", null).runTest("Bad user: id is null", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.id", "").runTest("Bad user: id is empty String", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.id", new Array()).runTest("Bad user: id is empty Array", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.id", new ArrayBuffer(0)).runTest("Bad user: id is empty ArrayBuffer", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.id", new ArrayBuffer(65)).runTest("Bad user: ArrayBuffer id is too long (65 bytes)", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.id", new Int16Array(33)).runTest("Bad user: Int16Array id is too long (66 bytes)", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.id", new Int32Array(17)).runTest("Bad user: Int32Array id is too long (68 bytes)", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.id", new Float32Array(17)).runTest("Bad user: Float32Array id is too long (68 bytes)", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.id", new Float64Array(9)).runTest("Bad user: Float64Array id is too long (72 bytes)", new TypeError()); + new CreateCredentialsTest({path: "options.publicKey.user.id", value: undefined}).runTest("Bad user: id is undefined", TypeError); + new CreateCredentialsTest("options.publicKey.user.id", {}).runTest("Bad user: id is object", TypeError); + new CreateCredentialsTest("options.publicKey.user.id", null).runTest("Bad user: id is null", TypeError); + new CreateCredentialsTest("options.publicKey.user.id", "").runTest("Bad user: id is empty String", TypeError); + new CreateCredentialsTest("options.publicKey.user.id", new Array()).runTest("Bad user: id is empty Array", TypeError); + new CreateCredentialsTest("options.publicKey.user.id", new ArrayBuffer(65)).runTest("Bad user: ArrayBuffer id is too long (65 bytes)", TypeError); + new CreateCredentialsTest("options.publicKey.user.id", new Int16Array(33)).runTest("Bad user: Int16Array id is too long (66 bytes)", TypeError); + new CreateCredentialsTest("options.publicKey.user.id", new Int32Array(17)).runTest("Bad user: Int32Array id is too long (68 bytes)", TypeError); + new CreateCredentialsTest("options.publicKey.user.id", new Float32Array(17)).runTest("Bad user: Float32Array id is too long (68 bytes)", TypeError); + new CreateCredentialsTest("options.publicKey.user.id", new Float64Array(9)).runTest("Bad user: Float64Array id is too long (72 bytes)", TypeError); var buf = new ArrayBuffer(65); - new CreateCredentialsTest("options.publicKey.user.id", new DataView(buf)).runTest("Bad user: id is too long (65 bytes)", new TypeError()); + new CreateCredentialsTest("options.publicKey.user.id", new DataView(buf)).runTest("Bad user: id is too long (65 bytes)", TypeError); // // user.name - new CreateCredentialsTest({path: "options.publicKey.user.name", value: undefined}).runTest("user missing name", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.name", {}).runTest("Bad user: name is object", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.name", null).runTest("Bad user: name is null", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.name", "").runTest("Bad user: name is empty String", new TypeError()); - - // // user.icon - new CreateCredentialsTest("options.publicKey.user.icon", {}).runTest("Bad user: icon is object", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.icon", null).runTest("Bad user: icon is null", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.icon", "").runTest("Bad user: icon is empty String", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.icon", "http://fidoalliance.co.nz/testimages/catimage.png") - .runTest("Bad user: icon is insecure", "SecurityError"); - // // TODO: unicode tests for icon URL (see also: USVString) + new CreateCredentialsTest({path: "options.publicKey.user.name", value: undefined}).runTest("user missing name", TypeError); // // user.displayName - new CreateCredentialsTest({path: "options.publicKey.user.displayName", value: undefined}).runTest("Bad user: displayName is undefined", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.displayName", {}).runTest("Bad user: displayName is object", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.displayName", null).runTest("Bad user: displayName is null", new TypeError()); - new CreateCredentialsTest("options.publicKey.user.displayName", "").runTest("Bad user: displayName is empty String", new TypeError()); + new CreateCredentialsTest({path: "options.publicKey.user.displayName", value: undefined}).runTest("Bad user: displayName is undefined", TypeError); }); /* JSHINT */ /* globals standardSetup, CreateCredentialsTest */ -</script> \ No newline at end of file +</script> diff --git a/tests/wpt/web-platform-tests/webauthn/createcredential-excludecredentials.https.html b/tests/wpt/web-platform-tests/webauthn/createcredential-excludecredentials.https.html index a5294c743ad..de72afc1f58 100644 --- a/tests/wpt/web-platform-tests/webauthn/createcredential-excludecredentials.https.html +++ b/tests/wpt/web-platform-tests/webauthn/createcredential-excludecredentials.https.html @@ -13,8 +13,8 @@ standardSetup(function() { "use strict"; // bad excludeCredentials values - new CreateCredentialsTest("options.publicKey.excludeCredentials", "hi mom").runTest("Bad excludeCredentials: string", new TypeError()); - new CreateCredentialsTest("options.publicKey.excludeCredentials", {}).runTest("Bad excludeCredentials: empty object", new TypeError()); + new CreateCredentialsTest("options.publicKey.excludeCredentials", "hi mom").runTest("Bad excludeCredentials: string", TypeError); + new CreateCredentialsTest("options.publicKey.excludeCredentials", {}).runTest("Bad excludeCredentials: empty object", TypeError); // TODO: bad excludeCredentials with [{.type}] or [{.id}] or [{.transports}] wrong // good excludeCredentials values diff --git a/tests/wpt/web-platform-tests/webauthn/createcredential-extensions.https.html b/tests/wpt/web-platform-tests/webauthn/createcredential-extensions.https.html index 01afb3344a5..f4a05c3042f 100644 --- a/tests/wpt/web-platform-tests/webauthn/createcredential-extensions.https.html +++ b/tests/wpt/web-platform-tests/webauthn/createcredential-extensions.https.html @@ -18,16 +18,16 @@ standardSetup(function() { }; // bad extension values - new CreateCredentialsTest("options.publicKey.extensions", "hi mom").runTest("Bad extensions: extensions is string", new TypeError()); - new CreateCredentialsTest("options.publicKey.extensions", null).runTest("Bad extensions: extensions is null", new TypeError()); - new CreateCredentialsTest("options.publicKey.extensions", []).runTest("Bad extensions: extensions is empty Array", new TypeError()); - new CreateCredentialsTest("options.publicKey.extensions", new ArrayBuffer(0)).runTest("Bad extensions: extensions is empty ArrayBuffer", new TypeError()); + new CreateCredentialsTest("options.publicKey.extensions", "hi mom").runTest("Bad extensions: extensions is string", TypeError); + new CreateCredentialsTest("options.publicKey.extensions", null).runTest("Bad extensions: extensions is null", TypeError); + new CreateCredentialsTest("options.publicKey.extensions", []).runTest("Bad extensions: extensions is empty Array", TypeError); + new CreateCredentialsTest("options.publicKey.extensions", new ArrayBuffer(0)).runTest("Bad extensions: extensions is empty ArrayBuffer", TypeError); var badJson = '{"foo": true, "bar: "yup"}'; // missing quote after "bar" - new CreateCredentialsTest("options.publicKey.extensions", {foo: badJson}).runTest("Bad extensions: malformatted JSON", new TypeError()); - new CreateCredentialsTest("options.publicKey.extensions", {foo: dummyExtension}).runTest("Bad extensions: JavaScript object", new TypeError()); + new CreateCredentialsTest("options.publicKey.extensions", {foo: badJson}).runTest("Bad extensions: malformatted JSON", TypeError); + new CreateCredentialsTest("options.publicKey.extensions", {foo: dummyExtension}).runTest("Bad extensions: JavaScript object", TypeError); var badExtId = {}; badExtId[createRandomString(65)] = dummyExtension; - new CreateCredentialsTest("options.publicKey.extensions", {badExtId: dummyExtension}).runTest("Bad extensions: extension ID too long", new TypeError()); + new CreateCredentialsTest("options.publicKey.extensions", {badExtId: dummyExtension}).runTest("Bad extensions: extension ID too long", TypeError); // phony extensions // TODO: not sure if this should pass or fail diff --git a/tests/wpt/web-platform-tests/webauthn/createcredential-pubkeycredparams.https.html b/tests/wpt/web-platform-tests/webauthn/createcredential-pubkeycredparams.https.html index 50166bbf141..34622fdf74e 100644 --- a/tests/wpt/web-platform-tests/webauthn/createcredential-pubkeycredparams.https.html +++ b/tests/wpt/web-platform-tests/webauthn/createcredential-pubkeycredparams.https.html @@ -31,13 +31,13 @@ standardSetup(function() { badAlgZero.alg = 0; // bad pubKeyCredParams values - new CreateCredentialsTest({path: "options.publicKey.pubKeyCredParams", value: undefined}).runTest("Bad pubKeyCredParams: pubKeyCredParams is undefined", new TypeError()); - new CreateCredentialsTest("options.publicKey.pubKeyCredParams", "hi mom").runTest("Bad pubKeyCredParams: pubKeyCredParams is string", new TypeError()); - new CreateCredentialsTest("options.publicKey.pubKeyCredParams", null).runTest("Bad pubKeyCredParams: pubKeyCredParams is null", new TypeError()); - new CreateCredentialsTest("options.publicKey.pubKeyCredParams", [badType]).runTest("Bad pubKeyCredParams: first param has bad type (\"something-else\")", new TypeError()); - new CreateCredentialsTest("options.publicKey.pubKeyCredParams", [badTypeEmptyString]).runTest("Bad pubKeyCredParams: first param has bad type (\"\")", new TypeError()); - new CreateCredentialsTest("options.publicKey.pubKeyCredParams", [badTypeNull]).runTest("Bad pubKeyCredParams: first param has bad type (null)", new TypeError()); - new CreateCredentialsTest("options.publicKey.pubKeyCredParams", [badTypeEmptyObj]).runTest("Bad pubKeyCredParams: first param has bad type (empty object)", new TypeError()); + new CreateCredentialsTest({path: "options.publicKey.pubKeyCredParams", value: undefined}).runTest("Bad pubKeyCredParams: pubKeyCredParams is undefined", TypeError); + new CreateCredentialsTest("options.publicKey.pubKeyCredParams", "hi mom").runTest("Bad pubKeyCredParams: pubKeyCredParams is string", TypeError); + new CreateCredentialsTest("options.publicKey.pubKeyCredParams", null).runTest("Bad pubKeyCredParams: pubKeyCredParams is null", TypeError); + new CreateCredentialsTest("options.publicKey.pubKeyCredParams", [badType]).runTest("Bad pubKeyCredParams: first param has bad type (\"something-else\")", TypeError); + new CreateCredentialsTest("options.publicKey.pubKeyCredParams", [badTypeEmptyString]).runTest("Bad pubKeyCredParams: first param has bad type (\"\")", TypeError); + new CreateCredentialsTest("options.publicKey.pubKeyCredParams", [badTypeNull]).runTest("Bad pubKeyCredParams: first param has bad type (null)", TypeError); + new CreateCredentialsTest("options.publicKey.pubKeyCredParams", [badTypeEmptyObj]).runTest("Bad pubKeyCredParams: first param has bad type (empty object)", TypeError); new CreateCredentialsTest("options.publicKey.pubKeyCredParams", [badAlg]).runTest("Bad pubKeyCredParams: first param has bad alg (42)", "NotSupportedError"); new CreateCredentialsTest("options.publicKey.pubKeyCredParams", [badAlgZero]).runTest("Bad pubKeyCredParams: first param has bad alg (0)", "NotSupportedError"); diff --git a/tests/wpt/web-platform-tests/webauthn/createcredential-timeout.https.html b/tests/wpt/web-platform-tests/webauthn/createcredential-timeout.https.html index b94ae582d3e..d4aa459240b 100644 --- a/tests/wpt/web-platform-tests/webauthn/createcredential-timeout.https.html +++ b/tests/wpt/web-platform-tests/webauthn/createcredential-timeout.https.html @@ -13,8 +13,8 @@ standardSetup(function() { // bad timeout values // TODO: there is some debate as to whether MAX_UNSIGNED_LONG + 1 and / or -1 should be disallowed since they get converted to valid values internally - // new CreateCredentialsTest({path: "options.publicKey.timeout", value: -1}).runTest("Bad timeout: negative", new TypeError()); - // new CreateCredentialsTest({path: "options.publicKey.timeout", value: 4294967295 + 1}).runTest("Bad timeout: too big", new TypeError()); + // new CreateCredentialsTest({path: "options.publicKey.timeout", value: -1}).runTest("Bad timeout: negative", TypeError); + // new CreateCredentialsTest({path: "options.publicKey.timeout", value: 4294967295 + 1}).runTest("Bad timeout: too big", TypeError); // timeout test // XXX: this probably always passes with most mock authenticators unless diff --git a/tests/wpt/web-platform-tests/webauthn/getcredential-badargs-userverification.https.html b/tests/wpt/web-platform-tests/webauthn/getcredential-badargs-userverification.https.html index 60f2e28b6ff..5bc579bc333 100644 --- a/tests/wpt/web-platform-tests/webauthn/getcredential-badargs-userverification.https.html +++ b/tests/wpt/web-platform-tests/webauthn/getcredential-badargs-userverification.https.html @@ -17,16 +17,16 @@ standardSetup(function() { // authenticatorSelection bad userVerification values new GetCredentialsTest("options.publicKey.userVerification", "") .addCredential(credPromise) - .runTest("Bad userVerification: empty string", new TypeError()); + .runTest("Bad userVerification: empty string", TypeError); new GetCredentialsTest("options.publicKey.userVerification", {}) .addCredential(credPromise) - .runTest("Bad userVerification: empty object", new TypeError()); + .runTest("Bad userVerification: empty object", TypeError); new GetCredentialsTest("options.publicKey.userVerification", "requiredshirtshoestshirt") .addCredential(credPromise) - .runTest("Bad userVerification: bad value", new TypeError()); + .runTest("Bad userVerification: bad value", TypeError); new GetCredentialsTest("options.publicKey.userVerification", null) .addCredential(credPromise) - .runTest("Bad userVerification: null", new TypeError()); + .runTest("Bad userVerification: null", TypeError); // XXX: assumes this is a mock authenticator the properly reports that it is not doing userVerfication new GetCredentialsTest("options.publicKey.userVerification", "required") .addCredential(credPromise) diff --git a/tests/wpt/web-platform-tests/webauthn/getcredential-extensions.https.html b/tests/wpt/web-platform-tests/webauthn/getcredential-extensions.https.html index bc7a80d40ee..763f48b70f3 100644 --- a/tests/wpt/web-platform-tests/webauthn/getcredential-extensions.https.html +++ b/tests/wpt/web-platform-tests/webauthn/getcredential-extensions.https.html @@ -21,28 +21,28 @@ standardSetup(function() { // bad extension values new GetCredentialsTest("options.publicKey.extensions", "hi mom") .addCredential(credPromise) - .runTest("Bad extensions: extensions is string", new TypeError()); + .runTest("Bad extensions: extensions is string", TypeError); new GetCredentialsTest("options.publicKey.extensions", null) .addCredential(credPromise) - .runTest("Bad extensions: extensions is null", new TypeError()); + .runTest("Bad extensions: extensions is null", TypeError); new GetCredentialsTest("options.publicKey.extensions", []) .addCredential(credPromise) - .runTest("Bad extensions: extensions is empty Array", new TypeError()); + .runTest("Bad extensions: extensions is empty Array", TypeError); new GetCredentialsTest("options.publicKey.extensions", new ArrayBuffer(0)) .addCredential(credPromise) - .runTest("Bad extensions: extensions is empty ArrayBuffer", new TypeError()); + .runTest("Bad extensions: extensions is empty ArrayBuffer", TypeError); var badJson = '{"foo": true, "bar: "yup"}'; // missing quote after "bar" new GetCredentialsTest("options.publicKey.extensions", {foo: badJson}) .addCredential(credPromise) - .runTest("Bad extensions: malformatted JSON", new TypeError()); + .runTest("Bad extensions: malformatted JSON", TypeError); new GetCredentialsTest("options.publicKey.extensions", {foo: dummyExtension}) .addCredential(credPromise) - .runTest("Bad extensions: JavaScript object", new TypeError()); + .runTest("Bad extensions: JavaScript object", TypeError); var badExtId = {}; badExtId[createRandomString(65)] = dummyExtension; new GetCredentialsTest("options.publicKey.extensions", {badExtId: dummyExtension}) .addCredential(credPromise) - .runTest("Bad extensions: extension ID too long", new TypeError()); + .runTest("Bad extensions: extension ID too long", TypeError); // phony extensions // TODO: not sure if this should pass or fail diff --git a/tests/wpt/web-platform-tests/webauthn/getcredential-timeout.https.html b/tests/wpt/web-platform-tests/webauthn/getcredential-timeout.https.html index 84dbad8c0bb..e6cd884ae06 100644 --- a/tests/wpt/web-platform-tests/webauthn/getcredential-timeout.https.html +++ b/tests/wpt/web-platform-tests/webauthn/getcredential-timeout.https.html @@ -18,10 +18,10 @@ standardSetup(function() { // TODO: there is some debate as to whether MAX_UNSIGNED_LONG + 1 and / or -1 should be disallowed since they get converted to valid values internally // new GetCredentialsTest({path: "options.publicKey.timeout", value: -1}) // .addCredential(credPromise) - // .runTest("Bad timeout: negative", new TypeError()); + // .runTest("Bad timeout: negative", TypeError); // new GetCredentialsTest({path: "options.publicKey.timeout", value: 4294967295 + 1}) // .addCredential(credPromise) - // .runTest("Bad timeout: too big", new TypeError()); + // .runTest("Bad timeout: too big", TypeError); // timeout test // XXX: this probably always passes with most mock authenticators unless diff --git a/tests/wpt/web-platform-tests/webauthn/helpers.js b/tests/wpt/web-platform-tests/webauthn/helpers.js index 73474b5ecbf..bbbba464948 100644 --- a/tests/wpt/web-platform-tests/webauthn/helpers.js +++ b/tests/wpt/web-platform-tests/webauthn/helpers.js @@ -244,7 +244,11 @@ class TestCase { * expects the test to fail */ testFails(t, testDesc, expectedErr) { - return promise_rejects(t, expectedErr, this.doIt(), "Expected bad parameters to fail"); + if (typeof expectedErr == "string") { + return promise_rejects_dom(t, expectedErr, this.doIt(), "Expected bad parameters to fail"); + } + + return promise_rejects_js(t, expectedErr, this.doIt(), "Expected bad parameters to fail"); } /** @@ -589,5 +593,5 @@ function standardSetup(cb) { //************* END DELETE AFTER 1/1/2018 *************** // /* JSHINT */ -/* globals promise_rejects, assert_class_string, assert_equals, assert_idl_attribute, assert_readonly, promise_test */ +/* globals promise_rejects_dom, promise_rejects_js, assert_class_string, assert_equals, assert_idl_attribute, assert_readonly, promise_test */ /* exported standardSetup, CreateCredentialsTest, GetCredentialsTest */ diff --git a/tests/wpt/web-platform-tests/webgl/compressedTexImage2D.html b/tests/wpt/web-platform-tests/webgl/compressedTexImage2D.html index b0a031add0b..a974c650024 100644 --- a/tests/wpt/web-platform-tests/webgl/compressedTexImage2D.html +++ b/tests/wpt/web-platform-tests/webgl/compressedTexImage2D.html @@ -22,7 +22,7 @@ test(function() { gl.compressedTexImage2D(gl.TEXTURE_2D, 0, COMPRESSED_RGB_S3TC_DXT1_EXT, 4, 4, 0, new Uint8Array(8), null); }); test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { gl.compressedTexImage2D(gl.TEXTURE_2D, 0, COMPRESSED_RGB_S3TC_DXT1_EXT, 4, 4, 0); }); }, "Should throw a TypeError when passing too few arguments."); diff --git a/tests/wpt/web-platform-tests/webgl/compressedTexSubImage2D.html b/tests/wpt/web-platform-tests/webgl/compressedTexSubImage2D.html index 539f9e17f8a..20c5ff9bd38 100644 --- a/tests/wpt/web-platform-tests/webgl/compressedTexSubImage2D.html +++ b/tests/wpt/web-platform-tests/webgl/compressedTexSubImage2D.html @@ -22,7 +22,7 @@ test(function() { gl.compressedTexSubImage2D(gl.TEXTURE_2D, 0, 0, 0, 10, 10, COMPRESSED_RGB_S3TC_DXT1_EXT, new Uint8Array(8), null); }); test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { gl.compressedTexSubImage2D(gl.TEXTURE_2D, 0, 0, 0, 10, 10, COMPRESSED_RGB_S3TC_DXT1_EXT); }); }, "Should throw a TypeError when passing too few arguments."); diff --git a/tests/wpt/web-platform-tests/webgl/texImage2D.html b/tests/wpt/web-platform-tests/webgl/texImage2D.html index 2f769160dfd..86b84d1a999 100644 --- a/tests/wpt/web-platform-tests/webgl/texImage2D.html +++ b/tests/wpt/web-platform-tests/webgl/texImage2D.html @@ -10,10 +10,10 @@ <script> test(function() { var gl = getGl(); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { gl.texImage2D(0, 0, 0, 0, 0, window); }); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { gl.texImage2D(0, 0, 0, 0, 0, { get width() { throw 7 }, get height() { throw 7 }, data: new Uint8ClampedArray(10) }); }); }); diff --git a/tests/wpt/web-platform-tests/webgl/texSubImage2D.html b/tests/wpt/web-platform-tests/webgl/texSubImage2D.html index 294b30c7607..7a6c2091822 100644 --- a/tests/wpt/web-platform-tests/webgl/texSubImage2D.html +++ b/tests/wpt/web-platform-tests/webgl/texSubImage2D.html @@ -10,10 +10,10 @@ <script> test(function() { var gl = getGl(); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { gl.texSubImage2D(0, 0, 0, 0, 0, 0, window); }); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { gl.texSubImage2D(0, 0, 0, 0, 0, 0, { get width() { throw 7 }, get height() { throw 7 }, data: new Uint8ClampedArray(10) }); }); }); diff --git a/tests/wpt/web-platform-tests/webmessaging/Channel_postMessage_DataCloneErr.htm b/tests/wpt/web-platform-tests/webmessaging/Channel_postMessage_DataCloneErr.htm index 9f4cd6b9be7..d2885d2947f 100644 --- a/tests/wpt/web-platform-tests/webmessaging/Channel_postMessage_DataCloneErr.htm +++ b/tests/wpt/web-platform-tests/webmessaging/Channel_postMessage_DataCloneErr.htm @@ -16,7 +16,7 @@ var channel = new MessageChannel(); channel.port1.start(); - assert_throws("DATA_CLONE_ERR", function() + assert_throws_dom("DATA_CLONE_ERR", function() { channel.port1.postMessage(navigator); }); diff --git a/tests/wpt/web-platform-tests/webmessaging/Channel_postMessage_clone_port_error.htm b/tests/wpt/web-platform-tests/webmessaging/Channel_postMessage_clone_port_error.htm index c33feaa5f09..bdc77e3b99d 100644 --- a/tests/wpt/web-platform-tests/webmessaging/Channel_postMessage_clone_port_error.htm +++ b/tests/wpt/web-platform-tests/webmessaging/Channel_postMessage_clone_port_error.htm @@ -16,7 +16,7 @@ var channel = new MessageChannel(); channel.port1.start(); - assert_throws("DATA_CLONE_ERR", function() + assert_throws_dom("DATA_CLONE_ERR", function() { channel.port1.postMessage("ports", [channel.port1]); }); diff --git a/tests/wpt/web-platform-tests/webmessaging/Channel_postMessage_ports_readonly_array.htm b/tests/wpt/web-platform-tests/webmessaging/Channel_postMessage_ports_readonly_array.htm index 4ccf3ac4f35..74027130377 100644 --- a/tests/wpt/web-platform-tests/webmessaging/Channel_postMessage_ports_readonly_array.htm +++ b/tests/wpt/web-platform-tests/webmessaging/Channel_postMessage_ports_readonly_array.htm @@ -28,7 +28,7 @@ function TestMessageEvent(evt) { var channel3 = new MessageChannel(); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { evt.ports.push(channel3.port1); }, "ports is a frozen object"); assert_equals(evt.ports.length, 1, "ports is a read only array with length == 1."); diff --git a/tests/wpt/web-platform-tests/webmessaging/MessageEvent.html b/tests/wpt/web-platform-tests/webmessaging/MessageEvent.html index 4fb68b5999b..401d941e1d6 100644 --- a/tests/wpt/web-platform-tests/webmessaging/MessageEvent.html +++ b/tests/wpt/web-platform-tests/webmessaging/MessageEvent.html @@ -21,7 +21,7 @@ prefixes.forEach(function(prefix) { test(function() { var event = new MessageEvent("message"); - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { event.initMessageEvent(); }, "Not enough arguments to initMessageEvent"); }, "initMessageEvent with no arguments"); diff --git a/tests/wpt/web-platform-tests/webmessaging/broadcastchannel/interface.html b/tests/wpt/web-platform-tests/webmessaging/broadcastchannel/interface.html index a552563ed66..1733d2d17fa 100644 --- a/tests/wpt/web-platform-tests/webmessaging/broadcastchannel/interface.html +++ b/tests/wpt/web-platform-tests/webmessaging/broadcastchannel/interface.html @@ -4,7 +4,7 @@ <script src="/resources/testharnessreport.js"></script> <script> -test(() => assert_throws(new TypeError(), () => new BroadcastChannel()), +test(() => assert_throws_js(TypeError, () => new BroadcastChannel()), 'Should throw if no name is provided'); test(() => { @@ -29,7 +29,7 @@ test(() => { test(() => { let c = new BroadcastChannel(''); - assert_throws(new TypeError(), () => c.postMessage()); + assert_throws_js(TypeError, () => c.postMessage()); }, 'postMessage without parameters should throw'); test(() => { @@ -51,7 +51,7 @@ test(() => { test(() => { let c = new BroadcastChannel(''); c.close(); - assert_throws('InvalidStateError', () => c.postMessage('')); + assert_throws_dom('InvalidStateError', () => c.postMessage('')); }, 'postMessage after close should throw'); test(() => { @@ -61,13 +61,13 @@ test(() => { test(() => { let c = new BroadcastChannel(''); - assert_throws('DataCloneError', () => c.postMessage(Symbol())); + assert_throws_dom('DataCloneError', () => c.postMessage(Symbol())); }, 'postMessage should throw with uncloneable data'); test(() => { let c = new BroadcastChannel(''); c.close(); - assert_throws('InvalidStateError', () => c.postMessage(Symbol())); + assert_throws_dom('InvalidStateError', () => c.postMessage(Symbol())); }, 'postMessage should throw InvalidStateError after close, even with uncloneable data'); </script> diff --git a/tests/wpt/web-platform-tests/webmessaging/message-channels/close.html b/tests/wpt/web-platform-tests/webmessaging/message-channels/close.html index d975ea72832..75b5f229d6d 100644 --- a/tests/wpt/web-platform-tests/webmessaging/message-channels/close.html +++ b/tests/wpt/web-platform-tests/webmessaging/message-channels/close.html @@ -62,7 +62,7 @@ async_test(t => { test(() => { const c = new MessageChannel(); c.port1.close(); - assert_throws("DataCloneError", () => self.postMessage(null, "*", [c.port1])); + assert_throws_dom("DataCloneError", () => self.postMessage(null, "*", [c.port1])); self.postMessage(null, "*", [c.port2]); }, "close() detaches a MessagePort (but not the one its entangled with)"); </script> diff --git a/tests/wpt/web-platform-tests/webmessaging/postMessage_Document.htm b/tests/wpt/web-platform-tests/webmessaging/postMessage_Document.htm index 97765fae818..a5580ef4b2b 100644 --- a/tests/wpt/web-platform-tests/webmessaging/postMessage_Document.htm +++ b/tests/wpt/web-platform-tests/webmessaging/postMessage_Document.htm @@ -25,7 +25,7 @@ { test(function() { - assert_throws("DATA_CLONE_ERR", function() + assert_throws_dom("DATA_CLONE_ERR", function() { TARGET.contentWindow.postMessage(DATA, "*"); }); diff --git a/tests/wpt/web-platform-tests/webmessaging/postMessage_Function.htm b/tests/wpt/web-platform-tests/webmessaging/postMessage_Function.htm index c53e8fcc3cd..fd31f83df4b 100644 --- a/tests/wpt/web-platform-tests/webmessaging/postMessage_Function.htm +++ b/tests/wpt/web-platform-tests/webmessaging/postMessage_Function.htm @@ -25,7 +25,7 @@ { test(function() { - assert_throws("DATA_CLONE_ERR", function() + assert_throws_dom("DATA_CLONE_ERR", function() { TARGET.contentWindow.postMessage(DATA, "*"); }); diff --git a/tests/wpt/web-platform-tests/webmessaging/postMessage_dup_transfer_objects.htm b/tests/wpt/web-platform-tests/webmessaging/postMessage_dup_transfer_objects.htm index a28c9640067..511b51271f3 100644 --- a/tests/wpt/web-platform-tests/webmessaging/postMessage_dup_transfer_objects.htm +++ b/tests/wpt/web-platform-tests/webmessaging/postMessage_dup_transfer_objects.htm @@ -25,7 +25,7 @@ { test(function() { - assert_throws("DATA_CLONE_ERR", function() + assert_throws_dom("DATA_CLONE_ERR", function() { assert_own_property(window, "MessageChannel", "window"); var channel = new MessageChannel(); diff --git a/tests/wpt/web-platform-tests/webmessaging/postMessage_invalid_targetOrigin.htm b/tests/wpt/web-platform-tests/webmessaging/postMessage_invalid_targetOrigin.htm index d6e16460f19..b9cc6377ef8 100644 --- a/tests/wpt/web-platform-tests/webmessaging/postMessage_invalid_targetOrigin.htm +++ b/tests/wpt/web-platform-tests/webmessaging/postMessage_invalid_targetOrigin.htm @@ -27,7 +27,7 @@ { test(function() { - assert_throws("SYNTAX_ERR", function() + assert_throws_dom("SYNTAX_ERR", function() { TARGET.contentWindow.postMessage(DATA, DATA); }); diff --git a/tests/wpt/web-platform-tests/webmessaging/with-options/broken-origin.html b/tests/wpt/web-platform-tests/webmessaging/with-options/broken-origin.html index d6901a15a34..795404b0ecf 100644 --- a/tests/wpt/web-platform-tests/webmessaging/with-options/broken-origin.html +++ b/tests/wpt/web-platform-tests/webmessaging/with-options/broken-origin.html @@ -5,7 +5,7 @@ <div id="log"></div> <script> test(function() { - assert_throws('SYNTAX_ERR', function() { + assert_throws_dom('SYNTAX_ERR', function() { postMessage('', {targetOrigin: 'http://foo bar'}); }, 'should have failed to resolve'); }); diff --git a/tests/wpt/web-platform-tests/webmessaging/with-ports/001.html b/tests/wpt/web-platform-tests/webmessaging/with-ports/001.html index e3687f16226..62dcf5e9bfb 100644 --- a/tests/wpt/web-platform-tests/webmessaging/with-ports/001.html +++ b/tests/wpt/web-platform-tests/webmessaging/with-ports/001.html @@ -5,7 +5,7 @@ <div id="log"></div> <script> test(function() { - assert_throws('SYNTAX_ERR', function() { + assert_throws_dom('SYNTAX_ERR', function() { postMessage('', 'http://foo bar', []); }, 'should have failed to resolve'); }); diff --git a/tests/wpt/web-platform-tests/webmessaging/with-ports/003.html b/tests/wpt/web-platform-tests/webmessaging/with-ports/003.html index 3c0d4296b07..47ddfbe81a5 100644 --- a/tests/wpt/web-platform-tests/webmessaging/with-ports/003.html +++ b/tests/wpt/web-platform-tests/webmessaging/with-ports/003.html @@ -5,7 +5,7 @@ <div id="log"></div> <script> test(function() { - assert_throws('SYNTAX_ERR', function() { + assert_throws_dom('SYNTAX_ERR', function() { postMessage('', 'example.org', []); }, 'targetOrigin is not an absolute url'); }); diff --git a/tests/wpt/web-platform-tests/webmessaging/with-ports/025.html b/tests/wpt/web-platform-tests/webmessaging/with-ports/025.html index 9a0e5cf6ffb..7af2a852ed6 100644 --- a/tests/wpt/web-platform-tests/webmessaging/with-ports/025.html +++ b/tests/wpt/web-platform-tests/webmessaging/with-ports/025.html @@ -5,7 +5,7 @@ <div id=log></div> <script> test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { postMessage('', '*', 1); }); }); diff --git a/tests/wpt/web-platform-tests/webmessaging/with-ports/026.html b/tests/wpt/web-platform-tests/webmessaging/with-ports/026.html index cf5c5e18ae5..2af90e6be3a 100644 --- a/tests/wpt/web-platform-tests/webmessaging/with-ports/026.html +++ b/tests/wpt/web-platform-tests/webmessaging/with-ports/026.html @@ -5,7 +5,7 @@ <div id=log></div> <script> test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { postMessage('', '*', {length:1}); }); }); diff --git a/tests/wpt/web-platform-tests/webmessaging/with-ports/027.html b/tests/wpt/web-platform-tests/webmessaging/with-ports/027.html index e5f8c9c14ab..78ea225eb75 100644 --- a/tests/wpt/web-platform-tests/webmessaging/with-ports/027.html +++ b/tests/wpt/web-platform-tests/webmessaging/with-ports/027.html @@ -18,7 +18,7 @@ test(() => { channel[0] = channel.port1; channel[1] = channel.port2; channel.length = 2; - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => { postMessage('', '*', channel) }, 'Old-style WebIDL arrays must throw a type error'); }, "Old-style array objects"); diff --git a/tests/wpt/web-platform-tests/webmessaging/without-ports/001.html b/tests/wpt/web-platform-tests/webmessaging/without-ports/001.html index 8f77c31fc61..09c28c5a5ce 100644 --- a/tests/wpt/web-platform-tests/webmessaging/without-ports/001.html +++ b/tests/wpt/web-platform-tests/webmessaging/without-ports/001.html @@ -5,7 +5,7 @@ <div id="log"></div> <script> test(function() { - assert_throws('SYNTAX_ERR', function() { + assert_throws_dom('SYNTAX_ERR', function() { postMessage('', 'http://foo bar'); }, 'should have failed to resolve'); }); diff --git a/tests/wpt/web-platform-tests/webmessaging/without-ports/003.html b/tests/wpt/web-platform-tests/webmessaging/without-ports/003.html index 5021e09f46b..6dc1e55777b 100644 --- a/tests/wpt/web-platform-tests/webmessaging/without-ports/003.html +++ b/tests/wpt/web-platform-tests/webmessaging/without-ports/003.html @@ -5,7 +5,7 @@ <div id="log"></div> <script> test(function() { - assert_throws('SYNTAX_ERR', function() { + assert_throws_dom('SYNTAX_ERR', function() { postMessage('', 'example.org'); }, 'targetOrigin is not an absolute url'); }); diff --git a/tests/wpt/web-platform-tests/webmessaging/without-ports/009.html b/tests/wpt/web-platform-tests/webmessaging/without-ports/009.html index 779383da203..d613b4a0734 100644 --- a/tests/wpt/web-platform-tests/webmessaging/without-ports/009.html +++ b/tests/wpt/web-platform-tests/webmessaging/without-ports/009.html @@ -5,7 +5,7 @@ <div id="log"></div> <script> test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { postMessage(); }); }); diff --git a/tests/wpt/web-platform-tests/webmessaging/without-ports/024.html b/tests/wpt/web-platform-tests/webmessaging/without-ports/024.html index 8d99994599c..0e4651593a7 100644 --- a/tests/wpt/web-platform-tests/webmessaging/without-ports/024.html +++ b/tests/wpt/web-platform-tests/webmessaging/without-ports/024.html @@ -9,6 +9,6 @@ test(function() { var ch = new MessageChannel(); ch.port1.onmessage = function(){}; ch.port2.start(); - assert_throws('DATA_CLONE_ERR', function() { ch.port2.postMessage({obj: obj}); }); + assert_throws_dom('DATA_CLONE_ERR', function() { ch.port2.postMessage({obj: obj}); }); }); </script> diff --git a/tests/wpt/web-platform-tests/webmessaging/without-ports/025-1.js b/tests/wpt/web-platform-tests/webmessaging/without-ports/025-1.js index c088fc98194..bd1d778d9b3 100644 --- a/tests/wpt/web-platform-tests/webmessaging/without-ports/025-1.js +++ b/tests/wpt/web-platform-tests/webmessaging/without-ports/025-1.js @@ -7,7 +7,7 @@ test(function() { }, "Worker MessageChannel's port should be an instance of MessagePort"); test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { new MessagePort() }, "MessagePort is [[Callable]]"); }, "Worker MessagePort should not be [[Callable]]"); diff --git a/tests/wpt/web-platform-tests/webmessaging/without-ports/025.html b/tests/wpt/web-platform-tests/webmessaging/without-ports/025.html index 47bec6bd842..4686febe94e 100644 --- a/tests/wpt/web-platform-tests/webmessaging/without-ports/025.html +++ b/tests/wpt/web-platform-tests/webmessaging/without-ports/025.html @@ -7,7 +7,7 @@ test(function() { var ch = new MessageChannel(); assert_true(ch.port1 instanceof MessagePort, "MessageChannel's port not an instance of MessagePort"); - assert_throws(new TypeError(), function () { var p = new MessagePort();}, "MessagePort is [[Callable]]"); + assert_throws_js(TypeError, function () { var p = new MessagePort();}, "MessagePort is [[Callable]]"); }); fetch_tests_from_worker(new Worker("025-1.js")); </script> diff --git a/tests/wpt/web-platform-tests/webmessaging/without-ports/026.html b/tests/wpt/web-platform-tests/webmessaging/without-ports/026.html index e8d799c5d25..546da8a91b5 100644 --- a/tests/wpt/web-platform-tests/webmessaging/without-ports/026.html +++ b/tests/wpt/web-platform-tests/webmessaging/without-ports/026.html @@ -6,9 +6,10 @@ <script> async_test(function() { var obj = {}; - obj.__defineGetter__( "field", function(){ throw new Error("getter_should_propagate_exceptions"); }); + var err = new Error("getter_should_propagate_exceptions"); + obj.__defineGetter__( "field", function(){ throw err }); - assert_throws(new Error("getter_should_propagate_exceptions"), function() { + assert_throws_exactly(err, function() { postMessage(obj, '*'); }); this.done(); diff --git a/tests/wpt/web-platform-tests/webrtc-extensions/RTCRtpReceiver-playoutDelayHint.html b/tests/wpt/web-platform-tests/webrtc-extensions/RTCRtpReceiver-playoutDelayHint.html index d8e47bda221..29dfc19a6b6 100644 --- a/tests/wpt/web-platform-tests/webrtc-extensions/RTCRtpReceiver-playoutDelayHint.html +++ b/tests/wpt/web-platform-tests/webrtc-extensions/RTCRtpReceiver-playoutDelayHint.html @@ -36,7 +36,7 @@ test(t => { t.add_cleanup(() => pc.close()); const {receiver} = pc.addTransceiver('audio', {direction:'recvonly'}); receiver.playoutDelayHint = 0.7 - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { receiver.playoutDelayHint = -0.5; }, 'audio playoutDelayHint doesn\'t accept negative values'); assert_equals(receiver.playoutDelayHint, 0.7); @@ -87,7 +87,7 @@ test(t => { t.add_cleanup(() => pc.close()); const {receiver} = pc.addTransceiver('video', {direction:'recvonly'}); receiver.playoutDelayHint = 0.7 - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { receiver.playoutDelayHint = -0.5; }, 'video playoutDelayHint doesn\'t accept negative values'); assert_equals(receiver.playoutDelayHint, 0.7); diff --git a/tests/wpt/web-platform-tests/webrtc-quic/RTCQuicStream.https.html b/tests/wpt/web-platform-tests/webrtc-quic/RTCQuicStream.https.html index 563d74a2080..9f5fd7ffd53 100644 --- a/tests/wpt/web-platform-tests/webrtc-quic/RTCQuicStream.https.html +++ b/tests/wpt/web-platform-tests/webrtc-quic/RTCQuicStream.https.html @@ -34,13 +34,13 @@ promise_test(async t => { promise_test(async t => { const quicTransport = await makeStandaloneQuicTransport(t); - assert_throws('InvalidStateError', () => quicTransport.createStream()); + assert_throws_dom('InvalidStateError', () => quicTransport.createStream()); }, 'createStream() throws if the transport is not connected.'); promise_test(async t => { const quicTransport = await makeStandaloneQuicTransport(t); quicTransport.stop(); - assert_throws('InvalidStateError', () => quicTransport.createStream()); + assert_throws_dom('InvalidStateError', () => quicTransport.createStream()); }, 'createStream() throws if the transport is closed.'); promise_test(async t => { @@ -91,7 +91,7 @@ promise_test(async t => { await makeTwoConnectedQuicTransports(t); const localStream = localQuicTransport.createStream(); localStream.write({ finish: true }); - assert_throws('InvalidStateError', () => { + assert_throws_dom('InvalidStateError', () => { localStream.write({ finish: true }); }); }, `write() with finish twice throws InvalidStateError.`); @@ -200,7 +200,7 @@ promise_test(async t => { const [ localQuicTransport, remoteQuicTransport ] = await makeTwoConnectedQuicTransports(t); const localStream = localQuicTransport.createStream(); - assert_throws('NotSupportedError', () => + assert_throws_dom('NotSupportedError', () => localStream.write({ data: new Uint8Array() })); }, 'write() without finish and an empty array throws NotSupportedError.'); @@ -208,7 +208,7 @@ promise_test(async t => { const [ localQuicTransport, remoteQuicTransport ] = await makeTwoConnectedQuicTransports(t); const localStream = localQuicTransport.createStream(); - assert_throws('NotSupportedError', () => + assert_throws_dom('NotSupportedError', () => localStream.write({})); }, 'write() without finish and no data throws NotSupportedError.'); @@ -248,7 +248,7 @@ promise_test(async t => { const [ localQuicTransport, remoteQuicTransport ] = await makeTwoConnectedQuicTransports(t); const localStream = localQuicTransport.createStream(); - assert_throws('OperationError', () => localStream.write({ + assert_throws_dom('OperationError', () => localStream.write({ data: new Uint8Array(localStream.maxWriteBufferedAmount + 1) })); assert_equals(localStream.writeBufferedAmount, 0); @@ -260,7 +260,7 @@ promise_test(async t => { const localStream = localQuicTransport.createStream(); localStream.write( { data: new Uint8Array(10)}); - assert_throws('OperationError', () => localStream.write({ + assert_throws_dom('OperationError', () => localStream.write({ data: new Uint8Array(localStream.maxWriteBufferedAmount) })); assert_equals(localStream.writeBufferedAmount, 10); @@ -291,12 +291,12 @@ promise_test(async t => { await makeTwoConnectedQuicTransports(t); const localStream = localQuicTransport.createStream(); localStream.write({ finish: true }); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => localStream.write({ data: new Uint8Array([65]) })); }, 'write() throws InvalidStateError if write() with finish has been called.'); closed_stream_test(async (t, stream) => { - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => stream.write({ data: new Uint8Array([65]) })); }, 'write() throws InvalidStateError.'); @@ -471,7 +471,7 @@ promise_test(async t => { }, 'readInto() on new local stream returns amount 0.'); closed_stream_test(async (t, stream) => { - assert_throws('InvalidStateError', () => stream.readInto(new Uint8Array(1))); + assert_throws_dom('InvalidStateError', () => stream.readInto(new Uint8Array(1))); }, 'readInto() throws InvalidStateError.'); promise_test(async t => { diff --git a/tests/wpt/web-platform-tests/webrtc-quic/RTCQuicTransport.https.html b/tests/wpt/web-platform-tests/webrtc-quic/RTCQuicTransport.https.html index b84d90f2388..aa80c911a67 100644 --- a/tests/wpt/web-platform-tests/webrtc-quic/RTCQuicTransport.https.html +++ b/tests/wpt/web-platform-tests/webrtc-quic/RTCQuicTransport.https.html @@ -36,7 +36,7 @@ test(t => { test(t => { const iceTransport = makeIceTransport(t); iceTransport.stop(); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => makeQuicTransport(t, iceTransport)); }, 'RTCQuicTransport constructor throws if passed a closed RTCIceTransport.'); @@ -44,7 +44,7 @@ test(t => { const iceTransport = makeIceTransport(t); const firstQuicTransport = makeQuicTransport(t, iceTransport); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => makeQuicTransport(t, iceTransport)); }, 'RTCQuicTransport constructor throws if passed an RTCIceTransport that ' + 'already has an active RTCQuicTransport.'); @@ -59,7 +59,7 @@ promise_test(async t => { await doSignalingHandshake(pc1, pc2); const iceTransport = pc1.sctp.transport.iceTransport; - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => makeQuicTransport(t, iceTransport)); }, 'RTCQuicTransport constructor throws if passed an RTCIceTransport that ' + 'came from an RTCPeerConnection.'); @@ -109,28 +109,28 @@ test(t => { test(t => { const quicTransport = makeStandaloneQuicTransport(t); quicTransport.connect(); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => quicTransport.connect()); }, 'connect() throws if already called connect().'); test(t => { const quicTransport = makeStandaloneQuicTransport(t); quicTransport.listen(new Uint8Array([12345])); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => quicTransport.connect()); }, 'connect() throws if already called listen().'); test(t => { const quicTransport = makeStandaloneQuicTransport(t); quicTransport.stop(); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => quicTransport.connect()); }, 'connect() throws after stop().'); test(t => { const quicTransport = makeStandaloneQuicTransport(t); quicTransport.transport.stop(); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => quicTransport.connect()); }, 'connect() throws if called after RTCIceTransport has stopped.'); @@ -143,28 +143,28 @@ test(t => { test(t => { const quicTransport = makeStandaloneQuicTransport(t); quicTransport.connect(); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => quicTransport.listen(new Uint8Array([12345]))); }, 'listen() throws if already called connect().'); test(t => { const quicTransport = makeStandaloneQuicTransport(t); quicTransport.listen(new Uint8Array([12345])); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => quicTransport.listen(new Uint8Array([12345]))); }, 'listen() throws if already called listen().'); test(t => { const quicTransport = makeStandaloneQuicTransport(t); quicTransport.stop(); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => quicTransport.listen(new Uint8Array([12345]))); }, 'listen() throws after stop().'); test(t => { const quicTransport = makeStandaloneQuicTransport(t); quicTransport.transport.stop(); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => quicTransport.listen(new Uint8Array([12345]))); }, 'listen() throws if called after RTCIceTransport has stopped.'); @@ -177,7 +177,7 @@ test(t => { test(t => { const quicTransport = makeStandaloneQuicTransport(t); const key = new Uint8Array(); - assert_throws('NotSupportedError', + assert_throws_dom('NotSupportedError', () => quicTransport.listen(key)); }, 'listen() throws if given an empty key.'); @@ -282,7 +282,7 @@ promise_test(async t => { test(t => { const quicTransport = makeStandaloneQuicTransport(t); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => quicTransport.sendDatagram(new Uint8Array([1]))); }, `sendDatagram() throws InvalidStateError if called before 'connected'.`); @@ -290,7 +290,7 @@ test(t => { const quicTransport = makeStandaloneQuicTransport(t); quicTransport.stop(); assert_equals(quicTransport.state, 'closed'); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => quicTransport.sendDatagram(new Uint8Array([1]))); }, `sendDatagram() throws InvalidStateError if called when 'closed'.`); @@ -309,7 +309,7 @@ promise_test(async t => { const [ localQuicTransport, remoteQuicTransport ] = await makeTwoConnectedQuicTransports(t); const bigData = new Uint8Array(localQuicTransport.maxDatagramLength + 1); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => localQuicTransport.sendDatagram(bigData)); }, 'sendDatagram() throws InvalidStateError if called with data larger ' + 'than maxDatagramLength()'); diff --git a/tests/wpt/web-platform-tests/webrtc/RTCCertificate-postMessage.html b/tests/wpt/web-platform-tests/webrtc/RTCCertificate-postMessage.html index ee8347c97ac..6cca2400576 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCCertificate-postMessage.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCCertificate-postMessage.html @@ -71,7 +71,7 @@ iframe.contentWindow.postMessage(null, "*"); let certificate2 = await promise; - assert_throws("InvalidAccessError", () => { new RTCPeerConnection({certificates: [certificate2]}) }); + assert_throws_dom("InvalidAccessError", () => { new RTCPeerConnection({certificates: [certificate2]}) }); iframe.remove(); }, "Check cross-origin created RTCCertificate"); </script> diff --git a/tests/wpt/web-platform-tests/webrtc/RTCCertificate.html b/tests/wpt/web-platform-tests/webrtc/RTCCertificate.html index a33ba9ae5f2..6b7626c92e7 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCCertificate.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCCertificate.html @@ -100,7 +100,7 @@ expires: 0 }).then(cert => { assert_less_than_equal(cert.expires, Date.now()); - assert_throws('InvalidAccessError', () => + assert_throws_dom('InvalidAccessError', () => new RTCPeerConnection({ certificates: [cert] })); }); }, 'Constructing RTCPeerConnection with expired certificate should reject with InvalidAccessError'); @@ -126,12 +126,12 @@ certificates: [cert1] }); - assert_throws('InvalidModificationError', () => + assert_throws_dom('InvalidModificationError', () => pc.setConfiguration({ certificates: [cert2] })); - assert_throws('InvalidModificationError', () => + assert_throws_dom('InvalidModificationError', () => pc.setConfiguration({ certificates: [cert1, cert2] })); diff --git a/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-bundlePolicy.html b/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-bundlePolicy.html index 6b64cf8ddd5..e825d7b4023 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-bundlePolicy.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-bundlePolicy.html @@ -88,12 +88,12 @@ }, `setConfiguration({ bundlePolicy: 'max-bundle' }) with initial bundlePolicy max-bundle should succeed`); test(() => { - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => new RTCPeerConnection({ bundlePolicy: null })); }, `new RTCPeerConnection({ bundlePolicy: null }) should throw TypeError`); test(() => { - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => new RTCPeerConnection({ bundlePolicy: 'invalid' })); }, `new RTCPeerConnection({ bundlePolicy: 'invalid' }) should throw TypeError`); @@ -107,7 +107,7 @@ const pc = new RTCPeerConnection({ bundlePolicy: 'max-bundle' }); assert_idl_attribute(pc, 'setConfiguration'); - assert_throws('InvalidModificationError', () => + assert_throws_dom('InvalidModificationError', () => pc.setConfiguration({ bundlePolicy: 'max-compat' })); }, `setConfiguration({ bundlePolicy: 'max-compat' }) with initial bundlePolicy max-bundle should throw InvalidModificationError`); @@ -116,7 +116,7 @@ assert_idl_attribute(pc, 'setConfiguration'); // the default value for bundlePolicy is balanced - assert_throws('InvalidModificationError', () => + assert_throws_dom('InvalidModificationError', () => pc.setConfiguration({})); }, `setConfiguration({}) with initial bundlePolicy max-bundle should throw InvalidModificationError`); diff --git a/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-iceCandidatePoolSize.html b/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-iceCandidatePoolSize.html index 2e6859d2596..0dccf4c11d2 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-iceCandidatePoolSize.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-iceCandidatePoolSize.html @@ -47,7 +47,7 @@ test(() => { }, "Initialize a new RTCPeerConnection with iceCandidatePoolSize: 255"); test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new RTCPeerConnection({ iceCandidatePoolSize: -1 }); @@ -55,7 +55,7 @@ test(() => { }, "Initialize a new RTCPeerConnection with iceCandidatePoolSize: -1 (Out Of Range)"); test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new RTCPeerConnection({ iceCandidatePoolSize: 256 }); @@ -98,7 +98,7 @@ been implemented). Without this check, these tests will pass incorrectly. test(() => { const pc = new RTCPeerConnection(); assert_equals(typeof pc.setConfiguration, "function", "RTCPeerConnection.prototype.setConfiguration is not implemented"); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { pc.setConfiguration({ iceCandidatePoolSize: -1 }); @@ -108,7 +108,7 @@ test(() => { test(() => { const pc = new RTCPeerConnection(); assert_equals(typeof pc.setConfiguration, "function", "RTCPeerConnection.prototype.setConfiguration is not implemented"); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { pc.setConfiguration({ iceCandidatePoolSize: 256 }); diff --git a/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-iceServers.html b/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-iceServers.html index 3f5c367d3ad..2ef99bf59c8 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-iceServers.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-iceServers.html @@ -58,7 +58,7 @@ }, '{} should succeed'); config_test(makePc => { - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => makePc({ iceServers: null })); }, '{ iceServers: null } should throw TypeError'); @@ -73,17 +73,17 @@ }, '{ iceServers: [] } should succeed'); config_test(makePc => { - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => makePc({ iceServers: [null] })); }, '{ iceServers: [null] } should throw TypeError'); config_test(makePc => { - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => makePc({ iceServers: [undefined] })); }, '{ iceServers: [undefined] } should throw TypeError'); config_test(makePc => { - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => makePc({ iceServers: [{}] })); }, '{ iceServers: [{}] } should throw TypeError'); @@ -219,14 +219,14 @@ server.credential are omitted, then throw an InvalidAccessError. */ config_test(makePc => { - assert_throws('InvalidAccessError', () => + assert_throws_dom('InvalidAccessError', () => makePc({ iceServers: [{ urls: 'turn:turn.example.net' }] })); }, 'with turn server and no credentials should throw InvalidAccessError'); config_test(makePc => { - assert_throws('InvalidAccessError', () => + assert_throws_dom('InvalidAccessError', () => makePc({ iceServers: [{ urls: 'turn:turn.example.net', username: 'user' @@ -234,7 +234,7 @@ }, 'with turn server and only username should throw InvalidAccessError'); config_test(makePc => { - assert_throws('InvalidAccessError', () => + assert_throws_dom('InvalidAccessError', () => makePc({ iceServers: [{ urls: 'turn:turn.example.net', credential: 'cred' @@ -242,14 +242,14 @@ }, 'with turn server and only credential should throw InvalidAccessError'); config_test(makePc => { - assert_throws('InvalidAccessError', () => + assert_throws_dom('InvalidAccessError', () => makePc({ iceServers: [{ urls: 'turns:turn.example.net' }] })); }, 'with turns server and no credentials should throw InvalidAccessError'); config_test(makePc => { - assert_throws('InvalidAccessError', () => + assert_throws_dom('InvalidAccessError', () => makePc({ iceServers: [{ urls: 'turns:turn.example.net', username: 'user' @@ -257,7 +257,7 @@ }, 'with turns server and only username should throw InvalidAccessError'); config_test(makePc => { - assert_throws('InvalidAccessError', () => + assert_throws_dom('InvalidAccessError', () => makePc({ iceServers: [{ urls: 'turns:turn.example.net', credential: 'cred' @@ -285,56 +285,56 @@ transport-ext = 1*unreserved */ config_test(makePc => { - assert_throws(new SyntaxError(), () => + assert_throws_dom("SyntaxError", () => makePc({ iceServers: [{ urls: '' }] })); }, 'with "" url should throw SyntaxError'); config_test(makePc => { - assert_throws(new SyntaxError(), () => + assert_throws_dom("SyntaxError", () => makePc({ iceServers: [{ urls: ['stun:stun1.example.net', ''] }] })); }, 'with ["stun:stun1.example.net", ""] url should throw SyntaxError'); config_test(makePc => { - assert_throws(new SyntaxError(), () => + assert_throws_dom("SyntaxError", () => makePc({ iceServers: [{ urls: 'relative-url' }] })); }, 'with relative url should throw SyntaxError'); config_test(makePc => { - assert_throws(new SyntaxError(), () => + assert_throws_dom("SyntaxError", () => makePc({ iceServers: [{ urls: 'http://example.com' }] })); }, 'with http url should throw SyntaxError'); config_test(makePc => { - assert_throws(new SyntaxError(), () => + assert_throws_dom("SyntaxError", () => makePc({ iceServers: [{ urls: 'turn://example.org/foo?x=y' }] })); }, 'with invalid turn url should throw SyntaxError'); config_test(makePc => { - assert_throws(new SyntaxError(), () => + assert_throws_dom("SyntaxError", () => makePc({ iceServers: [{ urls: 'stun://example.org/foo?x=y' }] })); }, 'with invalid stun url should throw SyntaxError'); config_test(makePc => { - assert_throws(new SyntaxError(), () => + assert_throws_dom("SyntaxError", () => makePc({ iceServers: [{ urls: [] }] })); }, `with empty urls should throw SyntaxError`); config_test(makePc => { - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => makePc({ iceServers: [{ urls: [], credentialType: 'invalid' @@ -343,7 +343,7 @@ // token credentialType was removed from the spec since 20170508 config_test(makePc => { - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => makePc({ iceServers: [{ urls: [], credentialType: 'token' @@ -352,7 +352,7 @@ // Blink and Gecko fall back to url, but it's not in the spec. config_test(makePc => { - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => makePc({ iceServers: [{ url: 'stun:stun1.example.net' }] })); @@ -365,7 +365,7 @@ and abort these steps. */ config_test(makePc => { - assert_throws('InvalidAccessError', () => + assert_throws_dom('InvalidAccessError', () => makePc({ iceServers: [{ urls: 'turns:turn.example.org', credentialType: 'password', @@ -384,7 +384,7 @@ InvalidAccessError and abort these steps. */ config_test(makePc => { - assert_throws('InvalidAccessError', () => + assert_throws_dom('InvalidAccessError', () => makePc({ iceServers: [{ urls: 'turns:turn.example.org', credentialType: 'oauth', diff --git a/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-iceTransportPolicy.html b/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-iceTransportPolicy.html index 74e8b4b2ae7..25d4511f48e 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-iceTransportPolicy.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-iceTransportPolicy.html @@ -85,18 +85,18 @@ }, `setConfiguration({}) with initial iceTransportPolicy relay should set new value to all`); config_test(makePc => { - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => makePc({ iceTransportPolicy: 'invalid' })); }, `with invalid iceTransportPolicy should throw TypeError`); // "none" is in Blink and Gecko's IDL, but not in the spec. config_test(makePc => { - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => makePc({ iceTransportPolicy: 'none' })); }, `with none iceTransportPolicy should throw TypeError`); config_test(makePc => { - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => makePc({ iceTransportPolicy: null })); }, `with null iceTransportPolicy should throw TypeError`); diff --git a/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-rtcpMuxPolicy.html b/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-rtcpMuxPolicy.html index 7d0c81f5eab..5198c9074a0 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-rtcpMuxPolicy.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCConfiguration-rtcpMuxPolicy.html @@ -71,12 +71,12 @@ }, `new RTCPeerConnection({ rtcpMuxPolicy: 'negotiate' }) may succeed or throw NotSupportedError`); config_test(makePc => { - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => makePc({ rtcpMuxPolicy: null })); }, `with { rtcpMuxPolicy: null } should throw TypeError`); config_test(makePc => { - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => makePc({ rtcpMuxPolicy: 'invalid' })); }, `with { rtcpMuxPolicy: 'invalid' } should throw TypeError`); @@ -89,7 +89,7 @@ test(() => { const pc = new RTCPeerConnection({ rtcpMuxPolicy: 'require' }); assert_idl_attribute(pc, 'setConfiguration'); - assert_throws('InvalidModificationError', () => + assert_throws_dom('InvalidModificationError', () => pc.setConfiguration({ rtcpMuxPolicy: 'negotiate' })); }, `setConfiguration({ rtcpMuxPolicy: 'negotiate' }) with initial rtcpMuxPolicy require should throw InvalidModificationError`); @@ -109,7 +109,7 @@ } assert_idl_attribute(pc, 'setConfiguration'); - assert_throws('InvalidModificationError', () => + assert_throws_dom('InvalidModificationError', () => pc.setConfiguration({ rtcpMuxPolicy: 'require' })); }, `setConfiguration({ rtcpMuxPolicy: 'require' }) with initial rtcpMuxPolicy negotiate should throw InvalidModificationError`); @@ -130,7 +130,7 @@ assert_idl_attribute(pc, 'setConfiguration'); // default value for rtcpMuxPolicy is require - assert_throws('InvalidModificationError', () => + assert_throws_dom('InvalidModificationError', () => pc.setConfiguration({})); }, `setConfiguration({}) with initial rtcpMuxPolicy negotiate should throw InvalidModificationError`); diff --git a/tests/wpt/web-platform-tests/webrtc/RTCDTMFSender-insertDTMF.https.html b/tests/wpt/web-platform-tests/webrtc/RTCDTMFSender-insertDTMF.https.html index 62a5f0472c1..be6e3c6e59d 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCDTMFSender-insertDTMF.https.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCDTMFSender-insertDTMF.https.html @@ -75,15 +75,15 @@ promise_test(t => { return createDtmfSender() .then(dtmfSender => { - assert_throws('InvalidCharacterError', () => + assert_throws_dom('InvalidCharacterError', () => // 'F' is invalid dtmfSender.insertDTMF('123FFABC')); - assert_throws('InvalidCharacterError', () => + assert_throws_dom('InvalidCharacterError', () => // 'E' is invalid dtmfSender.insertDTMF('E')); - assert_throws('InvalidCharacterError', () => + assert_throws_dom('InvalidCharacterError', () => // ' ' is invalid dtmfSender.insertDTMF('# *')); }); @@ -99,7 +99,7 @@ const dtmfSender = transceiver.sender.dtmf; transceiver.stop(); - assert_throws('InvalidStateError', () => dtmfSender.insertDTMF('')); + assert_throws_dom('InvalidStateError', () => dtmfSender.insertDTMF('')); }, 'insertDTMF() should throw InvalidStateError if transceiver is stopped'); @@ -127,7 +127,7 @@ await callee.setLocalDescription(answer); await caller.setRemoteDescription(answer); assert_equals(transceiver.currentDirection, 'recvonly'); - assert_throws('InvalidStateError', () => dtmfSender.insertDTMF('')); + assert_throws_dom('InvalidStateError', () => dtmfSender.insertDTMF('')); }, 'insertDTMF() should throw InvalidStateError if transceiver.currentDirection is recvonly'); promise_test(async t => { @@ -142,7 +142,7 @@ const answer = await generateAnswer(offer); await pc.setRemoteDescription(answer); assert_equals(transceiver.currentDirection, 'inactive'); - assert_throws('InvalidStateError', () => dtmfSender.insertDTMF('')); + assert_throws_dom('InvalidStateError', () => dtmfSender.insertDTMF('')); }, 'insertDTMF() should throw InvalidStateError if transceiver.currentDirection is inactive'); /* @@ -180,7 +180,7 @@ dtmfSender = sender.dtmf; pc.removeTrack(sender); pc.close(); - assert_throws('InvalidStateError', () => + assert_throws_dom('InvalidStateError', () => dtmfSender.insertDTMF('123')); }); }, 'insertDTMF() after remove and close should reject'); diff --git a/tests/wpt/web-platform-tests/webrtc/RTCDataChannel-id.html b/tests/wpt/web-platform-tests/webrtc/RTCDataChannel-id.html index 0cf01976ff0..355f6a36eae 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCDataChannel-id.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCDataChannel-id.html @@ -331,9 +331,9 @@ promise_test(async (t) => { // Try creating one further channel on both sides. The attempt should fail since all IDs are // taken. If one ID is available, the implementation probably miscounts (or I did in the test). - assert_throws('OperationError', () => + assert_throws_dom('OperationError', () => pc1.createDataChannel('this is too exhausting!')); - assert_throws('OperationError', () => + assert_throws_dom('OperationError', () => pc2.createDataChannel('this is too exhausting!')); maybeDone(); diff --git a/tests/wpt/web-platform-tests/webrtc/RTCDataChannel-send.html b/tests/wpt/web-platform-tests/webrtc/RTCDataChannel-send.html index 4565a8385fe..406937f33ae 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCDataChannel-send.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCDataChannel-send.html @@ -54,7 +54,7 @@ const pc = new RTCPeerConnection(); const channel = pc.createDataChannel('test'); assert_equals(channel.readyState, 'connecting'); - assert_throws('InvalidStateError', () => channel.send(helloString)); + assert_throws_dom('InvalidStateError', () => channel.send(helloString)); }, 'Calling send() when data channel is in connecting state should throw InvalidStateError'); /* @@ -313,6 +313,6 @@ promise_test(async t => { // "send" method step 4: // If the byte size of "data" exceeds the value of maxMessageSize, throw // a TypeError. - assert_throws('TypeError', () => channel1.send(message)); + assert_throws_dom('TypeError', () => channel1.send(message)); }, 'Calling send() up to max size should succeed, above max size should fail'); </script> diff --git a/tests/wpt/web-platform-tests/webrtc/RTCDataChannelEvent-constructor.html b/tests/wpt/web-platform-tests/webrtc/RTCDataChannelEvent-constructor.html index 03211eccb92..265943ae563 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCDataChannelEvent-constructor.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCDataChannelEvent-constructor.html @@ -9,22 +9,22 @@ test(function() { assert_equals(RTCDataChannelEvent.length, 2); - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, function() { new RTCDataChannelEvent('type'); } ); }, 'RTCDataChannelEvent constructor without a required argument.'); test(function() { - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, function() { new RTCDataChannelEvent('type', { channel: null }); } ); }, 'RTCDataChannelEvent constructor with channel passed as null.'); test(function() { - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, function() { new RTCDataChannelEvent('type', { channel: undefined }); } ); }, 'RTCDataChannelEvent constructor with a channel passed as undefined.'); diff --git a/tests/wpt/web-platform-tests/webrtc/RTCError.html b/tests/wpt/web-platform-tests/webrtc/RTCError.html index 9c7227521ed..bcc5749bf7d 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCError.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCError.html @@ -19,16 +19,16 @@ test(() => { }, 'RTCError constructor\'s message argument is optional'); test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new RTCError(); }); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new RTCError({}); // {errorDetail} is missing. }); }, 'RTCError constructor throws TypeError if arguments are missing'); test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new RTCError({errorDetail:'invalid-error-detail'}, 'message'); }); }, 'RTCError constructor throws TypeError if the errorDetail is invalid'); @@ -45,7 +45,7 @@ test(() => { test(() => { const error = new RTCError({errorDetail:'data-channel-failure'}, 'message'); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { error.errorDetail = 'dtls-failure'; }); }, 'RTCError.errorDetail is readonly.'); @@ -53,7 +53,7 @@ test(() => { test(() => { // Infers what are valid RTCErrorInit objects by passing them to the RTCError // constructor. - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new RTCError({}, 'message'); }); new RTCError({errorDetail:'data-channel-failure'}, 'message'); @@ -80,7 +80,7 @@ nullableAttributes.forEach(attribute => { test(() => { const error = new RTCError({errorDetail:'data-channel-failure'}, 'message'); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { error[attribute] = 42; }); }, 'RTCError.' + attribute + ' is readonly'); diff --git a/tests/wpt/web-platform-tests/webrtc/RTCIceCandidate-constructor.html b/tests/wpt/web-platform-tests/webrtc/RTCIceCandidate-constructor.html index 344007ded2b..6c208e887f4 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCIceCandidate-constructor.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCIceCandidate-constructor.html @@ -15,7 +15,7 @@ // Note that current browsers pass this test but may throw TypeError for // different reason, i.e. they don't accept empty argument. // Further tests below are used to differentiate the errors. - assert_throws(new TypeError(), () => new RTCIceCandidate()); + assert_throws_js(TypeError, () => new RTCIceCandidate()); }, 'new RTCIceCandidate()'); test(t => { @@ -24,13 +24,13 @@ // Note that current browsers pass this test but may throw TypeError for // different reason, i.e. they don't allow undefined candidate string. // Further tests below are used to differentiate the errors. - assert_throws(new TypeError(), () => new RTCIceCandidate({})); + assert_throws_js(TypeError, () => new RTCIceCandidate({})); }, 'new RTCIceCandidate({})'); test(t => { // Checks that manually filling the default values for RTCIceCandidateInit // still throws because both sdpMid and sdpMLineIndex are null - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => new RTCIceCandidate({ candidate: '', sdpMid: null, @@ -41,7 +41,7 @@ test(t => { // Checks that explicitly setting both sdpMid and sdpMLineIndex null should throw - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => new RTCIceCandidate({ sdpMid: null, sdpMLineIndex: null @@ -50,7 +50,7 @@ test(t => { // Throws because both sdpMid and sdpMLineIndex are null by default - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => new RTCIceCandidate({ candidate: '' })); @@ -58,7 +58,7 @@ test(t => { // Throws because the candidate field is not nullable - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => new RTCIceCandidate({ candidate: null })); @@ -66,7 +66,7 @@ test(t => { // Throws because both sdpMid and sdpMLineIndex are null by default - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => new RTCIceCandidate({ candidate: candidateString })); diff --git a/tests/wpt/web-platform-tests/webrtc/RTCIceTransport-extension.https.html b/tests/wpt/web-platform-tests/webrtc/RTCIceTransport-extension.https.html index 94beb992786..40e9f30d170 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCIceTransport-extension.https.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCIceTransport-extension.https.html @@ -39,7 +39,7 @@ test(() => { test(t => { const iceTransport = makeIceTransport(t); - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => iceTransport.gather({ iceServers: null })); }, 'gather() with { iceServers: null } should throw TypeError'); @@ -68,7 +68,7 @@ test(t => { test(t => { const iceTransport = makeIceTransport(t); iceTransport.stop(); - assert_throws('InvalidStateError', () => iceTransport.gather({})); + assert_throws_dom('InvalidStateError', () => iceTransport.gather({})); }, 'gather() throws if closed'); test(t => { @@ -80,7 +80,7 @@ test(t => { test(t => { const iceTransport = makeIceTransport(t); iceTransport.gather({}); - assert_throws('InvalidStateError', () => iceTransport.gather({})); + assert_throws_dom('InvalidStateError', () => iceTransport.gather({})); }, 'gather() throws if called twice'); promise_test(async t => { @@ -133,17 +133,17 @@ const dummyRemoteParameters = { test(() => { const iceTransport = new RTCIceTransport(); iceTransport.stop(); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => iceTransport.start(dummyRemoteParameters)); assert_equals(iceTransport.getRemoteParameters(), null); }, `start() throws if closed`); test(() => { const iceTransport = new RTCIceTransport(); - assert_throws(new TypeError(), () => iceTransport.start({})); - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => iceTransport.start({})); + assert_throws_js(TypeError, () => iceTransport.start({ usernameFragment: 'dummy' })); - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => iceTransport.start({ password: 'dummy' })); assert_equals(iceTransport.getRemoteParameters(), null); }, 'start() throws if usernameFragment or password not set'); @@ -183,14 +183,14 @@ const candidate1 = new RTCIceCandidate({ test(() => { const iceTransport = new RTCIceTransport(); iceTransport.stop(); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => iceTransport.addRemoteCandidate(candidate1)); assert_array_equals(iceTransport.getRemoteCandidates(), []); }, 'addRemoteCandidate() throws if closed'); test(() => { const iceTransport = new RTCIceTransport(); - assert_throws('OperationError', + assert_throws_dom('OperationError', () => iceTransport.addRemoteCandidate( new RTCIceCandidate({ candidate: 'invalid', sdpMid: '' }))); assert_array_equals(iceTransport.getRemoteCandidates(), []); @@ -217,7 +217,7 @@ test(t => { test(t => { const iceTransport = makeIceTransport(t); iceTransport.start(dummyRemoteParameters); - assert_throws('InvalidStateError', + assert_throws_dom('InvalidStateError', () => iceTransport.start(dummyRemoteParameters, 'controlling')); }, 'start() throws if later called with a different role'); diff --git a/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-addTrack.https.html b/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-addTrack.https.html index 3f4f927883d..7585961f31c 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-addTrack.https.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-addTrack.https.html @@ -46,7 +46,7 @@ const [track] = stream.getTracks(); pc.close(); - assert_throws('InvalidStateError', () => pc.addTrack(track, stream)) + assert_throws_dom('InvalidStateError', () => pc.addTrack(track, stream)) }, 'addTrack when pc is closed should throw InvalidStateError'); /* @@ -142,7 +142,7 @@ const [track] = stream.getTracks(); pc.addTrack(track, stream); - assert_throws('InvalidAccessError', () => pc.addTrack(track, stream)); + assert_throws_dom('InvalidAccessError', () => pc.addTrack(track, stream)); }, 'Adding the same track multiple times should throw InvalidAccessError'); /* diff --git a/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-addTransceiver.https.html b/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-addTransceiver.https.html index 3640bfb31cd..bc537c26867 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-addTransceiver.https.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-addTransceiver.https.html @@ -80,7 +80,7 @@ t.add_cleanup(() => pc.close()); assert_idl_attribute(pc, 'addTransceiver'); - assert_throws(new TypeError(), () => pc.addTransceiver('invalid')); + assert_throws_js(TypeError, () => pc.addTransceiver('invalid')); }, 'addTransceiver() with string argument as invalid kind should throw TypeError'); /* @@ -232,7 +232,7 @@ t.add_cleanup(() => pc.close()); assert_idl_attribute(pc, 'addTransceiver'); - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => pc.addTransceiver('audio', { direction: 'invalid' })); }, `addTransceiver() with invalid direction should throw TypeError`); @@ -324,7 +324,7 @@ t.add_cleanup(() => pc.close()); assert_idl_attribute(pc, 'addTransceiver'); - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => pc.addTransceiver('audio', { sendEncodings: [{ rid: '@Invalid!' @@ -337,7 +337,7 @@ t.add_cleanup(() => pc.close()); assert_idl_attribute(pc, 'addTransceiver'); - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => pc.addTransceiver('audio', { sendEncodings: [{ rid: 'a'.repeat(17) diff --git a/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-constructor.html b/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-constructor.html index abea2eb6761..0336837f813 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-constructor.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-constructor.html @@ -24,14 +24,14 @@ const testArgs = { '{}': false, // certificates - '{ certificates: null }': new TypeError, + '{ certificates: null }': TypeError, '{ certificates: undefined }': false, '{ certificates: [] }': false, - '{ certificates: [null] }': new TypeError, - '{ certificates: [undefined] }': new TypeError, + '{ certificates: [null] }': TypeError, + '{ certificates: [undefined] }': TypeError, // iceCandidatePoolSize - '{ iceCandidatePoolSize: toNumberThrows }': new TypeError, + '{ iceCandidatePoolSize: toNumberThrows }': TypeError, } for (const arg in testArgs) { @@ -39,7 +39,7 @@ for (const arg in testArgs) { test(function() { const throws = testArgs[arg]; if (throws) { - assert_throws(throws, function() { + assert_throws_js(throws, function() { eval(expr); }); } else { diff --git a/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-createDataChannel.html b/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-createDataChannel.html index 350f7156782..67b40c9ed8e 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-createDataChannel.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-createDataChannel.html @@ -69,7 +69,7 @@ test(t => { const pc = new RTCPeerConnection(); pc.close(); assert_equals(pc.signalingState, 'closed', 'signaling state'); - assert_throws('InvalidStateError', () => pc.createDataChannel('')); + assert_throws_dom('InvalidStateError', () => pc.createDataChannel('')); }, 'createDataChannel with closed connection should throw InvalidStateError'); /* @@ -597,7 +597,7 @@ test(t => { assert_equals(dc2.id, 43, 'Expect dc2.id to be 43'); - assert_throws('OperationError', () => + assert_throws_dom('OperationError', () => pc.createDataChannel('channel-3', { negotiated: true, id: 42, @@ -634,7 +634,7 @@ promise_test(async t => { assert_equals(dc2.id, 43, 'Expect dc2.id to be 43'); - assert_throws('OperationError', () => + assert_throws_dom('OperationError', () => pc1.createDataChannel('channel-3', { negotiated: true, id: 42, @@ -658,7 +658,7 @@ promise_test(async t => { assert_not_equals(dc1.id, null, 'Expect dc1.id to be assigned after remote description has been set'); - assert_throws('OperationError', () => + assert_throws_dom('OperationError', () => pc1.createDataChannel('channel-2', { negotiated: true, id: dc1.id, diff --git a/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-removeTrack.https.html b/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-removeTrack.https.html index 10b4cfb3a61..9e61ef785ed 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-removeTrack.https.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-removeTrack.https.html @@ -43,7 +43,7 @@ const { sender } = transceiver; pc.close(); - assert_throws('InvalidStateError', () => pc.removeTrack(sender)); + assert_throws_dom('InvalidStateError', () => pc.removeTrack(sender)); }, 'addTransceiver - Calling removeTrack when connection is closed should throw InvalidStateError'); promise_test(async t => { @@ -56,7 +56,7 @@ const sender = pc.addTrack(track, stream); pc.close(); - assert_throws('InvalidStateError', () => pc.removeTrack(sender)); + assert_throws_dom('InvalidStateError', () => pc.removeTrack(sender)); }, 'addTrack - Calling removeTrack when connection is closed should throw InvalidStateError'); promise_test(async t => { @@ -70,7 +70,7 @@ const pc2 = new RTCPeerConnection(); pc2.close(); - assert_throws('InvalidStateError', () => pc2.removeTrack(sender)); + assert_throws_dom('InvalidStateError', () => pc2.removeTrack(sender)); }, 'addTransceiver - Calling removeTrack on different connection that is closed should throw InvalidStateError'); promise_test(async t => { @@ -84,7 +84,7 @@ const pc2 = new RTCPeerConnection(); pc2.close(); - assert_throws('InvalidStateError', () => pc2.removeTrack(sender)); + assert_throws_dom('InvalidStateError', () => pc2.removeTrack(sender)); }, 'addTrack - Calling removeTrack on different connection that is closed should throw InvalidStateError'); /* @@ -102,7 +102,7 @@ const pc2 = new RTCPeerConnection(); t.add_cleanup(() => pc2.close()); - assert_throws('InvalidAccessError', () => pc2.removeTrack(sender)); + assert_throws_dom('InvalidAccessError', () => pc2.removeTrack(sender)); }, 'addTransceiver - Calling removeTrack on different connection should throw InvalidAccessError'); promise_test(async t => { @@ -116,7 +116,7 @@ const pc2 = new RTCPeerConnection(); t.add_cleanup(() => pc2.close()); - assert_throws('InvalidAccessError', () => pc2.removeTrack(sender)); + assert_throws_dom('InvalidAccessError', () => pc2.removeTrack(sender)); }, 'addTrack - Calling removeTrack on different connection should throw InvalidAccessError') /* diff --git a/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-setRemoteDescription.html b/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-setRemoteDescription.html index 464e16d736a..3f335d71b9a 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-setRemoteDescription.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCPeerConnection-setRemoteDescription.html @@ -54,7 +54,7 @@ await pc.setRemoteDescription({ type: 'bogus', sdp: 'bogus' }); t.unreached_func("Should have rejected."); } catch (e) { - assert_throws(new TypeError(), () => { throw e }); + assert_throws_js(TypeError, () => { throw e }); } }, 'setRemoteDescription with invalid type and invalid SDP should reject with TypeError'); @@ -67,7 +67,7 @@ await pc.setRemoteDescription({ type: 'answer', sdp: 'invalid' }); t.unreached_func("Should have rejected."); } catch (e) { - assert_throws('InvalidStateError', () => { throw e }); + assert_throws_dom('InvalidStateError', () => { throw e }); } }, 'setRemoteDescription() with invalid SDP and stable state should reject with InvalidStateError'); diff --git a/tests/wpt/web-platform-tests/webrtc/RTCPeerConnectionIceEvent-constructor.html b/tests/wpt/web-platform-tests/webrtc/RTCPeerConnectionIceEvent-constructor.html index 7de7fcaeb10..447002dca1f 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCPeerConnectionIceEvent-constructor.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCPeerConnectionIceEvent-constructor.html @@ -20,7 +20,7 @@ interface RTCPeerConnectionIceEvent : Event { }; */ test(() => { - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { new RTCPeerConnectionIceEvent(); }); }, "RTCPeerConnectionIceEvent with no arguments throws TypeError"); @@ -109,7 +109,7 @@ test(() => { test(() => { const plain = { candidate, sdpMid, sdpMLineIndex, usernameFragment }; - assert_throws(new TypeError(), () => new RTCPeerConnectionIceEvent("type", { candidate: plain })); + assert_throws_js(TypeError, () => new RTCPeerConnectionIceEvent("type", { candidate: plain })); }, "RTCPeerConnectionIceEvent with non RTCIceCandidate object throws"); test(() => { diff --git a/tests/wpt/web-platform-tests/webrtc/RTCRtpSender-setStreams.https.html b/tests/wpt/web-platform-tests/webrtc/RTCRtpSender-setStreams.https.html index 08592da4d52..45b47d06a6c 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCRtpSender-setStreams.https.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCRtpSender-setStreams.https.html @@ -123,6 +123,6 @@ test(t => { const transceiver = pc.addTransceiver('audio'); pc.close(); - assert_throws('InvalidStateError', () => transceiver.sender.setStreams(stream1, stream2)); + assert_throws_dom('InvalidStateError', () => transceiver.sender.setStreams(stream1, stream2)); }, 'setStreams() fires InvalidStateError on a closed peer connection.'); </script> diff --git a/tests/wpt/web-platform-tests/webrtc/RTCRtpTransceiver-setCodecPreferences.html b/tests/wpt/web-platform-tests/webrtc/RTCRtpTransceiver-setCodecPreferences.html index c553c9d8bc7..dff1eb2c582 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCRtpTransceiver-setCodecPreferences.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCRtpTransceiver-setCodecPreferences.html @@ -81,7 +81,7 @@ const pc = new RTCPeerConnection(); const transceiver = pc.addTransceiver('audio'); const capabilities = RTCRtpSender.getCapabilities('video'); - assert_throws('InvalidModificationError', () => transceiver.setCodecPreferences(capabilities.codecs)); + assert_throws_dom('InvalidModificationError', () => transceiver.setCodecPreferences(capabilities.codecs)); }, `setCodecPreferences() on audio transceiver with codecs returned from getCapabilities('video') should throw InvalidModificationError`); @@ -95,7 +95,7 @@ sdpFmtpLine: '0-15' }]; - assert_throws('InvalidModificationError', () => transceiver.setCodecPreferences(codecs)); + assert_throws_dom('InvalidModificationError', () => transceiver.setCodecPreferences(codecs)); }, `setCodecPreferences() with user defined codec with invalid mimeType should throw InvalidModificationError`); @@ -109,7 +109,7 @@ sdpFmtpLine: '0-15' }]; - assert_throws('InvalidModificationError', () => transceiver.setCodecPreferences(codecs)); + assert_throws_dom('InvalidModificationError', () => transceiver.setCodecPreferences(codecs)); }, `setCodecPreferences() with user defined codec should throw InvalidModificationError`); @@ -126,7 +126,7 @@ sdpFmtpLine: '0-15' }]; - assert_throws('InvalidModificationError', () => transceiver.setCodecPreferences(codecs)); + assert_throws_dom('InvalidModificationError', () => transceiver.setCodecPreferences(codecs)); }, `setCodecPreferences() with user defined codec together with codecs returned from getCapabilities() should throw InvalidModificationError`); @@ -137,7 +137,7 @@ const codecs = [capabilities.codecs[0]]; codecs[0].clockRate = codecs[0].clockRate / 2; - assert_throws('InvalidModificationError', () => transceiver.setCodecPreferences(codecs)); + assert_throws_dom('InvalidModificationError', () => transceiver.setCodecPreferences(codecs)); }, `setCodecPreferences() with modified codec clock rate should throw InvalidModificationError`); @@ -148,7 +148,7 @@ const codecs = [capabilities.codecs[0]]; codecs[0].channels = codecs[0].channels + 11; - assert_throws('InvalidModificationError', () => transceiver.setCodecPreferences(codecs)); + assert_throws_dom('InvalidModificationError', () => transceiver.setCodecPreferences(codecs)); }, `setCodecPreferences() with modified codec channel count should throw InvalidModificationError`); @@ -159,7 +159,7 @@ const codecs = [capabilities.codecs[0]]; codecs[0].sdpFmtpLine = "modifiedparameter=1"; - assert_throws('InvalidModificationError', () => transceiver.setCodecPreferences(codecs)); + assert_throws_dom('InvalidModificationError', () => transceiver.setCodecPreferences(codecs)); }, `setCodecPreferences() with modified codec parameters should throw InvalidModificationError`); @@ -176,7 +176,7 @@ const { channels=2 } = codec; codec.channels = channels+1; - assert_throws('InvalidModificationError', () => transceiver.setCodecPreferences(codecs)); + assert_throws_dom('InvalidModificationError', () => transceiver.setCodecPreferences(codecs)); }, `setCodecPreferences() with modified codecs returned from getCapabilities() should throw InvalidModificationError`); diff --git a/tests/wpt/web-platform-tests/webrtc/RTCTrackEvent-constructor.html b/tests/wpt/web-platform-tests/webrtc/RTCTrackEvent-constructor.html index a0c031eaa5a..c9105e693af 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCTrackEvent-constructor.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCTrackEvent-constructor.html @@ -117,7 +117,7 @@ const { receiver } = transceiver; const { track } = receiver; - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => new RTCTrackEvent('track', { receiver, track })); @@ -129,7 +129,7 @@ const transceiver = pc.addTransceiver('audio'); const { receiver } = transceiver; - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => new RTCTrackEvent('track', { receiver, transceiver })); @@ -142,7 +142,7 @@ const { receiver } = transceiver; const { track } = receiver; - assert_throws(new TypeError(), () => + assert_throws_js(TypeError, () => new RTCTrackEvent('track', { track, transceiver })); diff --git a/tests/wpt/web-platform-tests/websockets/Close-Reason-124Bytes.any.js b/tests/wpt/web-platform-tests/websockets/Close-Reason-124Bytes.any.js index 357748a7c4d..d7fcdcb10c9 100644 --- a/tests/wpt/web-platform-tests/websockets/Close-Reason-124Bytes.any.js +++ b/tests/wpt/web-platform-tests/websockets/Close-Reason-124Bytes.any.js @@ -8,7 +8,7 @@ var isOpenCalled = false; wsocket.addEventListener('open', test.step_func(function(evt) { var reason = "0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123"; assert_equals(reason.length, 124); - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket.close(1000, reason) }); test.done(); diff --git a/tests/wpt/web-platform-tests/websockets/Create-Secure-url-with-space.any.js b/tests/wpt/web-platform-tests/websockets/Create-Secure-url-with-space.any.js index f6ca19e0472..1ff0d259271 100644 --- a/tests/wpt/web-platform-tests/websockets/Create-Secure-url-with-space.any.js +++ b/tests/wpt/web-platform-tests/websockets/Create-Secure-url-with-space.any.js @@ -3,7 +3,7 @@ test(function() { var wsocket; var spaceUrl = "web platform.test"; - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket = CreateWebSocketWithSpaceInUrl(spaceUrl) }); }, "Create Secure WebSocket - Pass a URL with a space - SYNTAX_ERR should be thrown") diff --git a/tests/wpt/web-platform-tests/websockets/Create-asciiSep-protocol-string.any.js b/tests/wpt/web-platform-tests/websockets/Create-asciiSep-protocol-string.any.js index 37657f18dfc..e3f55fbc930 100644 --- a/tests/wpt/web-platform-tests/websockets/Create-asciiSep-protocol-string.any.js +++ b/tests/wpt/web-platform-tests/websockets/Create-asciiSep-protocol-string.any.js @@ -3,7 +3,7 @@ test(function() { var asciiWithSep = "/echo"; var wsocket; - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket = CreateWebSocketWithAsciiSep(asciiWithSep) }); }, "Create WebSocket - Pass a valid URL and a protocol string with an ascii separator character - SYNTAX_ERR is thrown") diff --git a/tests/wpt/web-platform-tests/websockets/Create-invalid-urls.any.js b/tests/wpt/web-platform-tests/websockets/Create-invalid-urls.any.js index 5ae25a2cdc0..5fe0bf4fba8 100644 --- a/tests/wpt/web-platform-tests/websockets/Create-invalid-urls.any.js +++ b/tests/wpt/web-platform-tests/websockets/Create-invalid-urls.any.js @@ -2,31 +2,31 @@ var wsocket; test(function() { - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket = new WebSocket("/echo") }); }, "Url is /echo - should throw SYNTAX_ERR"); test(function() { - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket = new WebSocket("mailto:microsoft@microsoft.com") }); }, "Url is a mail address - should throw SYNTAX_ERR"); test(function() { - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket = new WebSocket("about:blank") }); }, "Url is about:blank - should throw SYNTAX_ERR"); test(function() { - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket = new WebSocket("?test") }); }, "Url is ?test - should throw SYNTAX_ERR"); test(function() { - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket = new WebSocket("#test") }); }, "Url is #test - should throw SYNTAX_ERR"); diff --git a/tests/wpt/web-platform-tests/websockets/Create-non-absolute-url.any.js b/tests/wpt/web-platform-tests/websockets/Create-non-absolute-url.any.js index 9ac9707209f..543ba373167 100644 --- a/tests/wpt/web-platform-tests/websockets/Create-non-absolute-url.any.js +++ b/tests/wpt/web-platform-tests/websockets/Create-non-absolute-url.any.js @@ -2,7 +2,7 @@ test(function() { var wsocket; - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket = CreateWebSocketNonAbsolute() }); }, "Create WebSocket - Pass a non absolute URL - SYNTAX_ERR is thrown") diff --git a/tests/wpt/web-platform-tests/websockets/Create-nonAscii-protocol-string.any.js b/tests/wpt/web-platform-tests/websockets/Create-nonAscii-protocol-string.any.js index 631699413a3..85a8d368917 100644 --- a/tests/wpt/web-platform-tests/websockets/Create-nonAscii-protocol-string.any.js +++ b/tests/wpt/web-platform-tests/websockets/Create-nonAscii-protocol-string.any.js @@ -3,7 +3,7 @@ test(function() { var nonAsciiProtocol = "\u0080echo"; var wsocket; - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket = CreateWebSocketNonAsciiProtocol(nonAsciiProtocol) }); }, "Create WebSocket - Pass a valid URL and a protocol string with non-ascii values - SYNTAX_ERR is thrown") diff --git a/tests/wpt/web-platform-tests/websockets/Create-protocol-with-space.any.js b/tests/wpt/web-platform-tests/websockets/Create-protocol-with-space.any.js index 18f6815a489..e7c1bea4de3 100644 --- a/tests/wpt/web-platform-tests/websockets/Create-protocol-with-space.any.js +++ b/tests/wpt/web-platform-tests/websockets/Create-protocol-with-space.any.js @@ -2,7 +2,7 @@ test(function() { var wsocket; - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket = CreateWebSocketWithSpaceInProtocol("ec ho") }); }, "Create WebSocket - Pass a valid URL and a protocol string with a space in it - SYNTAX_ERR is thrown") diff --git a/tests/wpt/web-platform-tests/websockets/Create-protocols-repeated-case-insensitive.any.js b/tests/wpt/web-platform-tests/websockets/Create-protocols-repeated-case-insensitive.any.js index 1d59015e058..0b9bfecdc72 100644 --- a/tests/wpt/web-platform-tests/websockets/Create-protocols-repeated-case-insensitive.any.js +++ b/tests/wpt/web-platform-tests/websockets/Create-protocols-repeated-case-insensitive.any.js @@ -2,7 +2,7 @@ test(function() { var wsocket; - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket = CreateWebSocketWithRepeatedProtocolsCaseInsensitive() }); }, "Create WebSocket - Pass a valid URL and an array of protocol strings with repeated values but different case - SYNTAX_ERR is thrown") diff --git a/tests/wpt/web-platform-tests/websockets/Create-protocols-repeated.any.js b/tests/wpt/web-platform-tests/websockets/Create-protocols-repeated.any.js index bdaf5606a8b..67cfa1f122f 100644 --- a/tests/wpt/web-platform-tests/websockets/Create-protocols-repeated.any.js +++ b/tests/wpt/web-platform-tests/websockets/Create-protocols-repeated.any.js @@ -2,7 +2,7 @@ test(function() { var wsocket; - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket = CreateWebSocketWithRepeatedProtocols() }); }, "Create WebSocket - Pass a valid URL and an array of protocol strings with repeated values - SYNTAX_ERR is thrown") diff --git a/tests/wpt/web-platform-tests/websockets/Create-wrong-scheme.any.js b/tests/wpt/web-platform-tests/websockets/Create-wrong-scheme.any.js index 78ff7394622..affe346d6e1 100644 --- a/tests/wpt/web-platform-tests/websockets/Create-wrong-scheme.any.js +++ b/tests/wpt/web-platform-tests/websockets/Create-wrong-scheme.any.js @@ -2,7 +2,7 @@ test(function() { var wsocket; - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket = CreateWebSocketNonWsScheme() }); }, "Create WebSocket - Pass a URL with a non ws/wss scheme - SYNTAX_ERR is thrown") diff --git a/tests/wpt/web-platform-tests/websockets/Secure-Close-1005.any.js b/tests/wpt/web-platform-tests/websockets/Secure-Close-1005.any.js index f5f2cbf6e66..dc0d0550f23 100644 --- a/tests/wpt/web-platform-tests/websockets/Secure-Close-1005.any.js +++ b/tests/wpt/web-platform-tests/websockets/Secure-Close-1005.any.js @@ -6,7 +6,7 @@ var wsocket = CreateWebSocket(true, false, false); var isOpenCalled = false; wsocket.addEventListener('open', test.step_func(function(evt) { - assert_throws("INVALID_ACCESS_ERR", function() { + assert_throws_dom("INVALID_ACCESS_ERR", function() { wsocket.close(1005, "1005 - reserved code") }); test.done(); diff --git a/tests/wpt/web-platform-tests/websockets/Secure-Close-2999-reason.any.js b/tests/wpt/web-platform-tests/websockets/Secure-Close-2999-reason.any.js index ee1c756694b..f90a95acf7f 100644 --- a/tests/wpt/web-platform-tests/websockets/Secure-Close-2999-reason.any.js +++ b/tests/wpt/web-platform-tests/websockets/Secure-Close-2999-reason.any.js @@ -5,7 +5,7 @@ var test = async_test("Create Secure WebSocket - Close the Connection - close(29 var wsocket = CreateWebSocket(true, false, false); wsocket.addEventListener('open', test.step_func(function(evt) { - assert_throws("INVALID_ACCESS_ERR", function() { + assert_throws_dom("INVALID_ACCESS_ERR", function() { wsocket.close(2999, "Close not in range 3000-4999") }); test.done(); diff --git a/tests/wpt/web-platform-tests/websockets/Secure-Close-Reason-124Bytes.any.js b/tests/wpt/web-platform-tests/websockets/Secure-Close-Reason-124Bytes.any.js index 0786c295e76..aaaac8e113b 100644 --- a/tests/wpt/web-platform-tests/websockets/Secure-Close-Reason-124Bytes.any.js +++ b/tests/wpt/web-platform-tests/websockets/Secure-Close-Reason-124Bytes.any.js @@ -8,7 +8,7 @@ var isOpenCalled = false; wsocket.addEventListener('open', test.step_func(function(evt) { var reason = "0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123"; assert_equals(reason.length, 124); - assert_throws("SYNTAX_ERR", function() { + assert_throws_dom("SYNTAX_ERR", function() { wsocket.close(1000, reason) }); test.done(); diff --git a/tests/wpt/web-platform-tests/websockets/Secure-Close-onlyReason.any.js b/tests/wpt/web-platform-tests/websockets/Secure-Close-onlyReason.any.js index 029b8d8af8e..66e8a7f6886 100644 --- a/tests/wpt/web-platform-tests/websockets/Secure-Close-onlyReason.any.js +++ b/tests/wpt/web-platform-tests/websockets/Secure-Close-onlyReason.any.js @@ -5,7 +5,7 @@ var test = async_test("Create Secure WebSocket - Close the Connection - close(on var wsocket = CreateWebSocket(true, false, false); wsocket.addEventListener('open', test.step_func(function(evt) { - assert_throws("INVALID_ACCESS_ERR", function() { + assert_throws_dom("INVALID_ACCESS_ERR", function() { wsocket.close("Close with only reason") }); test.done(); diff --git a/tests/wpt/web-platform-tests/websockets/Send-before-open.any.js b/tests/wpt/web-platform-tests/websockets/Send-before-open.any.js index b2f1ea9c3aa..fed8f519932 100644 --- a/tests/wpt/web-platform-tests/websockets/Send-before-open.any.js +++ b/tests/wpt/web-platform-tests/websockets/Send-before-open.any.js @@ -2,7 +2,7 @@ test(function() { var wsocket = CreateWebSocket(false, false, false); - assert_throws("INVALID_STATE_ERR", function() { + assert_throws_dom("INVALID_STATE_ERR", function() { wsocket.send("Message to send") }); }, "Send data on a WebSocket before connection is opened - INVALID_STATE_ERR is returned") diff --git a/tests/wpt/web-platform-tests/websockets/close-invalid.any.js b/tests/wpt/web-platform-tests/websockets/close-invalid.any.js index 8ac1da3f5de..32d6d5d3e29 100644 --- a/tests/wpt/web-platform-tests/websockets/close-invalid.any.js +++ b/tests/wpt/web-platform-tests/websockets/close-invalid.any.js @@ -11,7 +11,7 @@ [true, false].forEach(function(secure) { test(function() { var ws = CreateWebSocket(secure, false, false); - assert_throws("InvalidAccessError", function() { + assert_throws_dom("InvalidAccessError", function() { ws.close(t[0]); }); wsocket.onerror = this.unreached_func(); diff --git a/tests/wpt/web-platform-tests/websockets/constructor/001.html b/tests/wpt/web-platform-tests/websockets/constructor/001.html index 2a868bfa0d3..b82d941c778 100644 --- a/tests/wpt/web-platform-tests/websockets/constructor/001.html +++ b/tests/wpt/web-platform-tests/websockets/constructor/001.html @@ -8,6 +8,6 @@ <div id=log></div> <script> test(function() { - assert_throws(new TypeError(), function(){new WebSocket()}); + assert_throws_js(TypeError, function(){new WebSocket()}); }); </script> diff --git a/tests/wpt/web-platform-tests/websockets/constructor/002.html b/tests/wpt/web-platform-tests/websockets/constructor/002.html index 94015979b0a..59ac675cc58 100644 --- a/tests/wpt/web-platform-tests/websockets/constructor/002.html +++ b/tests/wpt/web-platform-tests/websockets/constructor/002.html @@ -7,14 +7,14 @@ <meta name="variant" content="?wss"> <div id=log></div> <script> -test(function() {assert_throws("SyntaxError", function(){new WebSocket("/test")})}); -test(function() {assert_throws("SyntaxError", function(){new WebSocket("ws://foo bar.com/")})}); -test(function() {assert_throws("SyntaxError", function(){new WebSocket("wss://foo bar.com/")})}); -test(function() {assert_throws("SyntaxError", function(){new WebSocket("http://"+location.host+"/")})}); -test(function() {assert_throws("SyntaxError", function(){new WebSocket("mailto:example@example.org")})}); -test(function() {assert_throws("SyntaxError", function(){new WebSocket("about:blank")})}); -test(function() {assert_throws("SyntaxError", function(){new WebSocket(SCHEME_DOMAIN_PORT+"/#")})}); -test(function() {assert_throws("SyntaxError", function(){new WebSocket(SCHEME_DOMAIN_PORT+"/#test")})}); -test(function() {assert_throws("SyntaxError", function(){new WebSocket("?test")})}); -test(function() {assert_throws("SyntaxError", function(){new WebSocket("#test")})}); +test(function() {assert_throws_dom("SyntaxError", function(){new WebSocket("/test")})}); +test(function() {assert_throws_dom("SyntaxError", function(){new WebSocket("ws://foo bar.com/")})}); +test(function() {assert_throws_dom("SyntaxError", function(){new WebSocket("wss://foo bar.com/")})}); +test(function() {assert_throws_dom("SyntaxError", function(){new WebSocket("http://"+location.host+"/")})}); +test(function() {assert_throws_dom("SyntaxError", function(){new WebSocket("mailto:example@example.org")})}); +test(function() {assert_throws_dom("SyntaxError", function(){new WebSocket("about:blank")})}); +test(function() {assert_throws_dom("SyntaxError", function(){new WebSocket(SCHEME_DOMAIN_PORT+"/#")})}); +test(function() {assert_throws_dom("SyntaxError", function(){new WebSocket(SCHEME_DOMAIN_PORT+"/#test")})}); +test(function() {assert_throws_dom("SyntaxError", function(){new WebSocket("?test")})}); +test(function() {assert_throws_dom("SyntaxError", function(){new WebSocket("#test")})}); </script> diff --git a/tests/wpt/web-platform-tests/websockets/constructor/004.html b/tests/wpt/web-platform-tests/websockets/constructor/004.html index f358021541b..f0cd3418c88 100644 --- a/tests/wpt/web-platform-tests/websockets/constructor/004.html +++ b/tests/wpt/web-platform-tests/websockets/constructor/004.html @@ -9,7 +9,7 @@ <script> // empty string test(function() { - assert_throws("SyntaxError", function() { + assert_throws_dom("SyntaxError", function() { new WebSocket(SCHEME_DOMAIN_PORT + '/empty-message', "") }) }); @@ -17,7 +17,7 @@ test(function() { // chars below U+0020 except U+0000; U+0000 is tested in a separate test for (var i = 1; i < 0x20; ++i) { test(function() { - assert_throws("SyntaxError", function() { + assert_throws_dom("SyntaxError", function() { new WebSocket(SCHEME_DOMAIN_PORT + '/empty-message', "a"+String.fromCharCode(i)+"b") }, 'char code '+i); @@ -26,7 +26,7 @@ for (var i = 1; i < 0x20; ++i) { // some chars above U+007E for (var i = 0x7F; i < 0x100; ++i) { test(function() { - assert_throws("SyntaxError", function() { + assert_throws_dom("SyntaxError", function() { new WebSocket(SCHEME_DOMAIN_PORT + '/empty-message', "a"+String.fromCharCode(i)+"b") }, 'char code '+i); diff --git a/tests/wpt/web-platform-tests/websockets/constructor/007.html b/tests/wpt/web-platform-tests/websockets/constructor/007.html index 6f141a54186..4c8a7cd7f3c 100644 --- a/tests/wpt/web-platform-tests/websockets/constructor/007.html +++ b/tests/wpt/web-platform-tests/websockets/constructor/007.html @@ -8,7 +8,7 @@ <div id=log></div> <script> test(function() { - assert_throws("SyntaxError", function() { + assert_throws_dom("SyntaxError", function() { new WebSocket(SCHEME_DOMAIN_PORT + '/empty-message', 'a' + String.fromCharCode(0) + 'b') }) diff --git a/tests/wpt/web-platform-tests/websockets/constructor/021.html b/tests/wpt/web-platform-tests/websockets/constructor/021.html index 80156540f7a..209b262f985 100644 --- a/tests/wpt/web-platform-tests/websockets/constructor/021.html +++ b/tests/wpt/web-platform-tests/websockets/constructor/021.html @@ -7,5 +7,5 @@ <meta name="variant" content="?wss"> <div id=log></div> <script> -test(function() {assert_throws("SyntaxError", function(){new WebSocket("ws://certo2.oslo.osa/protocol_array",["foobar, foobar"])})}); +test(function() {assert_throws_dom("SyntaxError", function(){new WebSocket("ws://certo2.oslo.osa/protocol_array",["foobar, foobar"])})}); </script> diff --git a/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/constants/005.html b/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/constants/005.html index b3c2e932e6d..8f17deb3785 100644 --- a/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/constants/005.html +++ b/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/constants/005.html @@ -10,7 +10,7 @@ var constants = ['CONNECTING', 'OPEN', 'CLOSING', 'CLOSED']; for (var i = 0; i < constants.length; ++i) { test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { Object.defineProperty(WebSocket.prototype, constants[i], { get: function() { return 'foo'; } }); diff --git a/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/constants/006.html b/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/constants/006.html index 70219345647..0396687736a 100644 --- a/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/constants/006.html +++ b/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/constants/006.html @@ -10,7 +10,7 @@ var constants = ['CONNECTING', 'OPEN', 'CLOSING', 'CLOSED']; for (var i = 0; i < constants.length; ++i) { test(function() { - assert_throws(new TypeError(), function(){ + assert_throws_js(TypeError, function(){ Object.defineProperty(WebSocket.prototype, constants[i], { set: function() { return 'foo'; } }); diff --git a/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/send/001.html b/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/send/001.html index 3a22420ad6c..829a4ed7610 100644 --- a/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/send/001.html +++ b/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/send/001.html @@ -9,7 +9,7 @@ <script> test(function(t) { var ws = new WebSocket(SCHEME_DOMAIN_PORT+'/'); - assert_throws(new TypeError(), function(){ws.send()}); + assert_throws_js(TypeError, function(){ws.send()}); }); </script> diff --git a/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/send/003.html b/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/send/003.html index 08aadbf4665..0077b402005 100644 --- a/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/send/003.html +++ b/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/send/003.html @@ -9,7 +9,7 @@ <script> test(function(t) { var ws = new WebSocket(SCHEME_DOMAIN_PORT+'/'); - assert_throws("INVALID_STATE_ERR", function(){ws.send('a')}); + assert_throws_dom("INVALID_STATE_ERR", function(){ws.send('a')}); }); </script> diff --git a/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/send/004.html b/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/send/004.html index af906b55333..f454f0cda59 100644 --- a/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/send/004.html +++ b/tests/wpt/web-platform-tests/websockets/interfaces/WebSocket/send/004.html @@ -10,16 +10,16 @@ <script> test(function(t) { var ws = new WebSocket(SCHEME_DOMAIN_PORT+'/'); - assert_throws("INVALID_STATE_ERR", function(){ws.send('a\uDC00x')}); + assert_throws_dom("INVALID_STATE_ERR", function(){ws.send('a\uDC00x')}); }, "lone low surrogate"); test(function(t) { var ws = new WebSocket(SCHEME_DOMAIN_PORT+'/'); - assert_throws("INVALID_STATE_ERR", function(){ws.send('a\uD800x')}); + assert_throws_dom("INVALID_STATE_ERR", function(){ws.send('a\uD800x')}); }, "lone high surrogate"); test(function(t) { var ws = new WebSocket(SCHEME_DOMAIN_PORT+'/'); - assert_throws("INVALID_STATE_ERR", function(){ws.send('a\uDC00\uD800x')}); + assert_throws_dom("INVALID_STATE_ERR", function(){ws.send('a\uDC00\uD800x')}); }, "surrogates in wrong order"); </script> diff --git a/tests/wpt/web-platform-tests/websockets/stream-tentative/close.any.js b/tests/wpt/web-platform-tests/websockets/stream-tentative/close.any.js index ddcdc2b2c8f..1442d821148 100644 --- a/tests/wpt/web-platform-tests/websockets/stream-tentative/close.any.js +++ b/tests/wpt/web-platform-tests/websockets/stream-tentative/close.any.js @@ -50,7 +50,7 @@ promise_test(async () => { promise_test(async () => { const wss = new WebSocketStream(ECHOURL); await wss.connection; - assert_throws(new TypeError(), () => wss.close(true), + assert_throws_js(TypeError, () => wss.close(true), 'close should throw a TypeError'); }, 'close(true) should throw a TypeError'); @@ -58,7 +58,7 @@ promise_test(async () => { const wss = new WebSocketStream(ECHOURL); await wss.connection; const reason = '.'.repeat(124); - assert_throws('SyntaxError', () => wss.close({ reason }), + assert_throws_dom('SyntaxError', () => wss.close({ reason }), 'close should throw a TypeError'); }, 'close() with an overlong reason should throw'); @@ -76,7 +76,7 @@ for (const invalidCode of [999, 1001, 2999, 5000]) { promise_test(async () => { const wss = new WebSocketStream(ECHOURL); await wss.connection; - assert_throws('InvalidAccessError', () => wss.close({ code: invalidCode }), + assert_throws_dom('InvalidAccessError', () => wss.close({ code: invalidCode }), 'close should throw a TypeError'); }, `close() with invalid code ${invalidCode} should throw`); } diff --git a/tests/wpt/web-platform-tests/websockets/stream-tentative/constructor.any.js b/tests/wpt/web-platform-tests/websockets/stream-tentative/constructor.any.js index 12a24f25f2c..a5401b30bfc 100644 --- a/tests/wpt/web-platform-tests/websockets/stream-tentative/constructor.any.js +++ b/tests/wpt/web-platform-tests/websockets/stream-tentative/constructor.any.js @@ -3,23 +3,23 @@ // META: global=window,worker test(() => { - assert_throws(new TypeError(), () => new WebSocketStream(), + assert_throws_js(TypeError, () => new WebSocketStream(), 'constructor should throw'); }, 'constructing with no URL should throw'); test(() => { - assert_throws(new SyntaxError(), () => new WebSocketStream('invalid:'), - "constructor should throw"); + assert_throws_dom("SyntaxError", () => new WebSocketStream('invalid:'), + "constructor should throw"); }, 'constructing with an invalid URL should throw'); test(() => { - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => new WebSocketStream(`${BASEURL}/`, true), "constructor should throw"); }, 'constructing with invalid options should throw'); test(() => { - assert_throws(new TypeError(), + assert_throws_js(TypeError, () => new WebSocketStream(`${BASEURL}/`, {protocols: 'hi'}), "constructor should throw"); }, 'protocols should be required to be a list'); diff --git a/tests/wpt/web-platform-tests/webstorage/missing_arguments.html b/tests/wpt/web-platform-tests/webstorage/missing_arguments.html index 38c52cf6275..1c8a1a44815 100644 --- a/tests/wpt/web-platform-tests/webstorage/missing_arguments.html +++ b/tests/wpt/web-platform-tests/webstorage/missing_arguments.html @@ -21,7 +21,7 @@ ]; tests.forEach(function(fun) { test(function() { - assert_throws(new TypeError(), fun); + assert_throws_js(TypeError, fun); }, "Should throw TypeError for " + format_value(fun) + "."); }); </script> diff --git a/tests/wpt/web-platform-tests/webstorage/storage_local_setitem_quotaexceedederr.html b/tests/wpt/web-platform-tests/webstorage/storage_local_setitem_quotaexceedederr.html index b547f3046d1..b55ace2fa21 100644 --- a/tests/wpt/web-platform-tests/webstorage/storage_local_setitem_quotaexceedederr.html +++ b/tests/wpt/web-platform-tests/webstorage/storage_local_setitem_quotaexceedederr.html @@ -17,7 +17,7 @@ var key = "name"; var val = "x".repeat(1024); - assert_throws("QUOTA_EXCEEDED_ERR", function() { + assert_throws_dom("QUOTA_EXCEEDED_ERR", function() { while (true) { index++; localStorage.setItem("" + key + index, "" + val + index); diff --git a/tests/wpt/web-platform-tests/webstorage/storage_session_setitem_quotaexceedederr.html b/tests/wpt/web-platform-tests/webstorage/storage_session_setitem_quotaexceedederr.html index 285a4bea2b5..7096c1610c7 100644 --- a/tests/wpt/web-platform-tests/webstorage/storage_session_setitem_quotaexceedederr.html +++ b/tests/wpt/web-platform-tests/webstorage/storage_session_setitem_quotaexceedederr.html @@ -17,7 +17,7 @@ var key = "name"; var val = "x".repeat(1024); - assert_throws("QUOTA_EXCEEDED_ERR", function() { + assert_throws_dom("QUOTA_EXCEEDED_ERR", function() { while (true) { index++; sessionStorage.setItem("" + key + index, "" + val + index); diff --git a/tests/wpt/web-platform-tests/webstorage/storage_setitem.html b/tests/wpt/web-platform-tests/webstorage/storage_setitem.html index fa38284fd01..be82df1ecdb 100644 --- a/tests/wpt/web-platform-tests/webstorage/storage_setitem.html +++ b/tests/wpt/web-platform-tests/webstorage/storage_setitem.html @@ -96,7 +96,7 @@ storage.clear(); storage.setItem("age", "10"); - assert_throws(test_error, function() { + assert_throws_exactly(test_error, function() { storage.setItem("age", { toString: function() { throw test_error; } }); }); @@ -111,7 +111,7 @@ storage.clear(); storage.setItem("age", "10"); - assert_throws(test_error, function() { + assert_throws_exactly(test_error, function() { storage["age"] = { toString: function() { throw test_error; } }; }); diff --git a/tests/wpt/web-platform-tests/webusb/usbConnectionEvent.https.any.js b/tests/wpt/web-platform-tests/webusb/usbConnectionEvent.https.any.js index 9d4f60abc48..349fd9b75f3 100644 --- a/tests/wpt/web-platform-tests/webusb/usbConnectionEvent.https.any.js +++ b/tests/wpt/web-platform-tests/webusb/usbConnectionEvent.https.any.js @@ -12,9 +12,9 @@ usb_test(() => getFakeDevice() 'Can construct a USBConnectionEvent with a device'); test(t => { - assert_throws(TypeError(), + assert_throws_js(TypeError, () => new USBConnectionEvent('connect', { device: null })); - assert_throws(TypeError(), + assert_throws_js(TypeError, () => new USBConnectionEvent('connect', {})); }, 'Cannot construct a USBConnectionEvent without a device'); diff --git a/tests/wpt/web-platform-tests/webusb/usbInTransferResult.https.any.js b/tests/wpt/web-platform-tests/webusb/usbInTransferResult.https.any.js index 4cdb58e467b..c8f65f1737a 100644 --- a/tests/wpt/web-platform-tests/webusb/usbInTransferResult.https.any.js +++ b/tests/wpt/web-platform-tests/webusb/usbInTransferResult.https.any.js @@ -20,9 +20,9 @@ test(t => { }, 'Can construct a USBInTransferResult without a DataView'); test(t => { - assert_throws(TypeError(), () => new USBInTransferResult('invalid_status')); + assert_throws_js(TypeError, () => new USBInTransferResult('invalid_status')); }, 'Cannot construct USBInTransferResult with an invalid status'); test(t => { - assert_throws(TypeError(), () => new USBInTransferResult()); + assert_throws_js(TypeError, () => new USBInTransferResult()); }, 'Cannot construct USBInTransferResult without a status'); diff --git a/tests/wpt/web-platform-tests/webusb/usbIsochronousInTransferPacket.https.any.js b/tests/wpt/web-platform-tests/webusb/usbIsochronousInTransferPacket.https.any.js index ee992f998b6..55543d11f8c 100644 --- a/tests/wpt/web-platform-tests/webusb/usbIsochronousInTransferPacket.https.any.js +++ b/tests/wpt/web-platform-tests/webusb/usbIsochronousInTransferPacket.https.any.js @@ -18,11 +18,11 @@ test(t => { }, 'Can construct a USBIsochronousInTransferPacket without a DataView'); test(t => { - assert_throws(TypeError(), () => { + assert_throws_js(TypeError, () => { new USBIsochronousInTransferPacket('invalid_status'); }); }, 'Cannot construct USBIsochronousInTransferPacket with an invalid status'); test(t => { - assert_throws(TypeError(), () => new USBIsochronousInTransferPacket()); + assert_throws_js(TypeError, () => new USBIsochronousInTransferPacket()); }, 'Cannot construct USBIsochronousInTransferPacket without a status'); diff --git a/tests/wpt/web-platform-tests/webusb/usbIsochronousInTransferResult.https.any.js b/tests/wpt/web-platform-tests/webusb/usbIsochronousInTransferResult.https.any.js index 25c128a76cc..0aa57d00e6d 100644 --- a/tests/wpt/web-platform-tests/webusb/usbIsochronousInTransferResult.https.any.js +++ b/tests/wpt/web-platform-tests/webusb/usbIsochronousInTransferResult.https.any.js @@ -32,5 +32,5 @@ test(t => { }, 'Can construct a USBIsochronousInTransferResult without a DataView'); test(t => { - assert_throws(TypeError(), () => new USBIsochronousInTransferResult()); + assert_throws_js(TypeError, () => new USBIsochronousInTransferResult()); }, 'Cannot construct a USBIsochronousInTransferResult without packets'); diff --git a/tests/wpt/web-platform-tests/webusb/usbIsochronousOutTransferPacket.https.any.js b/tests/wpt/web-platform-tests/webusb/usbIsochronousOutTransferPacket.https.any.js index d99c8565194..2747a6fa0a4 100644 --- a/tests/wpt/web-platform-tests/webusb/usbIsochronousOutTransferPacket.https.any.js +++ b/tests/wpt/web-platform-tests/webusb/usbIsochronousOutTransferPacket.https.any.js @@ -11,11 +11,11 @@ test(t => { }, 'Can construct USBIsochronousOutTransferPacket'); test(t => { - assert_throws(TypeError(), () => { + assert_throws_js(TypeError, () => { new USBIsochronousOutTransferPacket('invalid_status'); }); }, 'Cannot construct USBIsochronousOutTransferPacket with an invalid status'); test(t => { - assert_throws(TypeError(), () => new USBIsochronousOutTransferPacket()); + assert_throws_js(TypeError, () => new USBIsochronousOutTransferPacket()); }, 'Cannot construct USBIsochronousOutTransferPacket without a status'); diff --git a/tests/wpt/web-platform-tests/webusb/usbIsochronousOutTransferResult.https.any.js b/tests/wpt/web-platform-tests/webusb/usbIsochronousOutTransferResult.https.any.js index 13b94322ed2..692420d9481 100644 --- a/tests/wpt/web-platform-tests/webusb/usbIsochronousOutTransferResult.https.any.js +++ b/tests/wpt/web-platform-tests/webusb/usbIsochronousOutTransferResult.https.any.js @@ -15,5 +15,5 @@ test(t => { }, 'Can construct a USBIsochronousOutTransferResult'); test(t => { - assert_throws(TypeError(), () => new USBIsochronousOutTransferResult()); + assert_throws_js(TypeError, () => new USBIsochronousOutTransferResult()); }, 'Cannot construct a USBIsochronousOutTransferResult without packets'); diff --git a/tests/wpt/web-platform-tests/webusb/usbOutTransferResult.https.any.js b/tests/wpt/web-platform-tests/webusb/usbOutTransferResult.https.any.js index f880a43ea1c..200c0716eb2 100644 --- a/tests/wpt/web-platform-tests/webusb/usbOutTransferResult.https.any.js +++ b/tests/wpt/web-platform-tests/webusb/usbOutTransferResult.https.any.js @@ -11,9 +11,9 @@ test(t => { }, 'Can construct USBOutTransferResult'); test(t => { - assert_throws(TypeError(), () => new USBOutTransferResult('invalid_status')); + assert_throws_js(TypeError, () => new USBOutTransferResult('invalid_status')); }, 'Cannot construct USBOutTransferResult with an invalid status'); test(t => { - assert_throws(TypeError(), () => new USBOutTransferResult()); + assert_throws_js(TypeError, () => new USBOutTransferResult()); }, 'Cannot construct USBOutTransferResult without a status'); diff --git a/tests/wpt/web-platform-tests/webvtt/api/VTTCue/position.html b/tests/wpt/web-platform-tests/webvtt/api/VTTCue/position.html index 4bbf54ea7b3..c0485e7a799 100644 --- a/tests/wpt/web-platform-tests/webvtt/api/VTTCue/position.html +++ b/tests/wpt/web-platform-tests/webvtt/api/VTTCue/position.html @@ -18,7 +18,7 @@ test(function(){ } [-1, -100, -101, 101, 200, 201].forEach(function(invalid) { - assert_throws('IndexSizeError', function() { + assert_throws_dom('IndexSizeError', function() { cue.position = invalid; }); }); diff --git a/tests/wpt/web-platform-tests/webvtt/api/VTTCue/size.html b/tests/wpt/web-platform-tests/webvtt/api/VTTCue/size.html index 26a26f0a8c0..fdb8059c72f 100644 --- a/tests/wpt/web-platform-tests/webvtt/api/VTTCue/size.html +++ b/tests/wpt/web-platform-tests/webvtt/api/VTTCue/size.html @@ -15,7 +15,7 @@ test(function(){ } [-1, -100, -101, 101, 200, 201].forEach(function(invalid) { - assert_throws('IndexSizeError', function() { + assert_throws_dom('IndexSizeError', function() { cue.size = invalid; }); }); diff --git a/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/constructor.html b/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/constructor.html index cddde0a0717..a427f4f7d63 100644 --- a/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/constructor.html +++ b/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/constructor.html @@ -24,18 +24,27 @@ test(function() { assert_equals(region.scroll, ""); checkValues([-1, 101], "IndexSizeError"); - checkValues([-Infinity, Infinity, NaN], new TypeError); + checkValues([-Infinity, Infinity, NaN], TypeError); + + function assert_throws_something(error, func) { + if (typeof error == "string") { + assert_throws_dom(error, func); + } else { + assert_throws_js(error, func); + } + } + function checkValues(invalidValues, exception) { for (var value of invalidValues) { - assert_throws(exception, function() { region.viewportAnchorX = value; }); + assert_throws_something(exception, function() { region.viewportAnchorX = value; }); assert_equals(region.viewportAnchorX, 0); - assert_throws(exception, function() { region.viewportAnchorY = value; }); + assert_throws_something(exception, function() { region.viewportAnchorY = value; }); assert_equals(region.viewportAnchorY, 100); - assert_throws(exception, function() { region.regionAnchorX = value; }); + assert_throws_something(exception, function() { region.regionAnchorX = value; }); assert_equals(region.regionAnchorX, 0); - assert_throws(exception, function() { region.regionAnchorY = value; }); + assert_throws_something(exception, function() { region.regionAnchorY = value; }); assert_equals(region.regionAnchorY, 100); - assert_throws(exception, function() { region.width = value; }); + assert_throws_something(exception, function() { region.width = value; }); assert_equals(region.width, 100); } } diff --git a/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/regionAnchorX.html b/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/regionAnchorX.html index acdb9ef239e..f7663366cbf 100644 --- a/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/regionAnchorX.html +++ b/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/regionAnchorX.html @@ -18,7 +18,7 @@ test(function() { assert_equals(region.regionAnchorX, 1.5); [-1, -100, -150, 101, 200, 250].forEach(function (invalid) { - assert_throws('IndexSizeError', function() { + assert_throws_dom('IndexSizeError', function() { region.regionAnchorX = invalid; }); }); diff --git a/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/regionAnchorY.html b/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/regionAnchorY.html index 9e4728846c8..174ff678901 100644 --- a/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/regionAnchorY.html +++ b/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/regionAnchorY.html @@ -18,7 +18,7 @@ test(function() { assert_equals(region.regionAnchorX, 1.5); [-1, -100, -150, 101, 200, 250].forEach(function (invalid) { - assert_throws('IndexSizeError', function() { + assert_throws_dom('IndexSizeError', function() { region.regionAnchorY = invalid; }); }); diff --git a/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/viewportAnchorX.html b/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/viewportAnchorX.html index 8adf7ba02a5..0786585d468 100644 --- a/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/viewportAnchorX.html +++ b/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/viewportAnchorX.html @@ -18,7 +18,7 @@ test(function() { assert_equals(region.viewportAnchorX, 1.5); [-1, -100, -150, 101, 200, 250].forEach(function (invalid) { - assert_throws('IndexSizeError', function() { + assert_throws_dom('IndexSizeError', function() { region.viewportAnchorX = invalid; }); }); diff --git a/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/viewportAnchorY.html b/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/viewportAnchorY.html index cdbe793f667..de43567b627 100644 --- a/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/viewportAnchorY.html +++ b/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/viewportAnchorY.html @@ -18,7 +18,7 @@ test(function() { assert_equals(region.viewportAnchorY, 1.5); [-1, -100, -150, 101, 200, 250].forEach(function (invalid) { - assert_throws('IndexSizeError', function() { + assert_throws_dom('IndexSizeError', function() { region.viewportAnchorY = invalid; }); }); diff --git a/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/width.html b/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/width.html index fdc663f86a7..97c1c739560 100644 --- a/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/width.html +++ b/tests/wpt/web-platform-tests/webvtt/api/VTTRegion/width.html @@ -18,7 +18,7 @@ test(function(){ assert_equals(region.width, 1.5); [-1, -100, -150, 101, 200, 250].forEach(function (invalid) { - assert_throws('IndexSizeError', function() { + assert_throws_dom('IndexSizeError', function() { region.width = invalid; }); }); diff --git a/tests/wpt/web-platform-tests/webxr/events_session_select.https.html b/tests/wpt/web-platform-tests/webxr/events_session_select.https.html index 396d6b23939..bc501b69349 100644 --- a/tests/wpt/web-platform-tests/webxr/events_session_select.https.html +++ b/tests/wpt/web-platform-tests/webxr/events_session_select.https.html @@ -25,7 +25,7 @@ let testFunction = function(session, fakeDeviceController, t) { t.step(() => { // Frame is active but not an animation frame, so calling getPose is // allowed while getViewerPose is not. - assert_throws('InvalidStateError', () => frame.getViewerPose(currentReferenceSpace)); + assert_throws_dom('InvalidStateError', () => frame.getViewerPose(currentReferenceSpace)); let pose = frame.getPose(xrViewerSpace, currentReferenceSpace); assert_not_equals(pose, null); assert_true(pose instanceof XRPose); diff --git a/tests/wpt/web-platform-tests/webxr/xrDevice_requestSession_no_mode.https.html b/tests/wpt/web-platform-tests/webxr/xrDevice_requestSession_no_mode.https.html index 5ef249c5818..9c1ebb7efd7 100644 --- a/tests/wpt/web-platform-tests/webxr/xrDevice_requestSession_no_mode.https.html +++ b/tests/wpt/web-platform-tests/webxr/xrDevice_requestSession_no_mode.https.html @@ -12,7 +12,7 @@ .then( (controller) => new Promise((resolve) => { navigator.xr.test.simulateUserActivation( () => { t.step_func(() => { - assert_throws(new TypeError(), () => navigator.xr.requestSession()) + assert_throws_js(TypeError, () => navigator.xr.requestSession()) }) resolve() }); diff --git a/tests/wpt/web-platform-tests/webxr/xrFrame_lifetime.https.html b/tests/wpt/web-platform-tests/webxr/xrFrame_lifetime.https.html index 2d706d24848..7c71f0af3dd 100644 --- a/tests/wpt/web-platform-tests/webxr/xrFrame_lifetime.https.html +++ b/tests/wpt/web-platform-tests/webxr/xrFrame_lifetime.https.html @@ -32,8 +32,8 @@ t.step(() => { // Attempting to call a method on the frame outside the callback that // originally provided it should cause it to throw an exception. - assert_throws('InvalidStateError', () => staleFrame.getViewerPose(currentReferenceSpace)); - assert_throws('InvalidStateError', () => staleFrame.getPose(currentViewerSpace, currentReferenceSpace)); + assert_throws_dom('InvalidStateError', () => staleFrame.getViewerPose(currentReferenceSpace)); + assert_throws_dom('InvalidStateError', () => staleFrame.getPose(currentViewerSpace, currentReferenceSpace)); }); // Test does not complete until the this function has executed. diff --git a/tests/wpt/web-platform-tests/webxr/xrRigidTransform_constructor.https.html b/tests/wpt/web-platform-tests/webxr/xrRigidTransform_constructor.https.html index 15a7f2b5771..5e055efc41b 100644 --- a/tests/wpt/web-platform-tests/webxr/xrRigidTransform_constructor.https.html +++ b/tests/wpt/web-platform-tests/webxr/xrRigidTransform_constructor.https.html @@ -96,12 +96,12 @@ let testFunction = coordDict([1.1, 2.1, 3.1, 1.0])); checkTransform(transform, "Created with dict"); - assert_throws(new TypeError(), () => new XRRigidTransform( + assert_throws_js(TypeError, () => new XRRigidTransform( coordDict([1.0, 2.0, 3.0, 0.5]), coordDict([1.1, 2.1, 3.1, 1.0]) ), "Constructor should throw TypeError for non-1 position w values"); - assert_throws("InvalidStateError", () => new XRRigidTransform( + assert_throws_dom("InvalidStateError", () => new XRRigidTransform( coordDict([1.0, 2.0, 3.0, 1.0]), coordDict([0, 0, 0, 0]) ), "Constructor should throw InvalidStateError for non-normalizeable orientation values"); diff --git a/tests/wpt/web-platform-tests/workers/SharedWorker-constructor.html b/tests/wpt/web-platform-tests/workers/SharedWorker-constructor.html index 2bfe7d9b87a..5347891d418 100644 --- a/tests/wpt/web-platform-tests/workers/SharedWorker-constructor.html +++ b/tests/wpt/web-platform-tests/workers/SharedWorker-constructor.html @@ -5,14 +5,14 @@ <script> test(() => { - assert_throws(new Error(), + assert_throws_js(Error, function() { new SharedWorker({toString:function(){throw new Error()}}, "name") }, "toString exception not propagagted"); }, "Test toString exception propagated correctly."); test(() => { - assert_throws(new RangeError(), + assert_throws_js(RangeError, function() { var foo = {toString:function(){new Worker(foo)}} new SharedWorker(foo, name); }, @@ -20,7 +20,7 @@ test(() => { }, "Test recursive worker creation results in exception."); test(() => { - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { new SharedWorker(); }, "Invoking SharedWorker constructor without arguments did not result in an exception."); }, "Test SharedWorker creation without arguments results in exception."); diff --git a/tests/wpt/web-platform-tests/workers/Worker-formdata.any.js b/tests/wpt/web-platform-tests/workers/Worker-formdata.any.js index 3ee42d9f4b7..f14d4ff41a2 100644 --- a/tests/wpt/web-platform-tests/workers/Worker-formdata.any.js +++ b/tests/wpt/web-platform-tests/workers/Worker-formdata.any.js @@ -13,7 +13,7 @@ test(() => { formData.append('key', blob); formData.append('key', blob, 'filename'); - assert_throws("DataCloneError", + assert_throws_dom("DataCloneError", function() { postMessage(formData) }, "Trying to clone formdata inside a postMessage results in an exception." ); },'Test FormData interface object'); diff --git a/tests/wpt/web-platform-tests/workers/Worker-multi-port.html b/tests/wpt/web-platform-tests/workers/Worker-multi-port.html index 138f8f02d4e..725745b0ea4 100644 --- a/tests/wpt/web-platform-tests/workers/Worker-multi-port.html +++ b/tests/wpt/web-platform-tests/workers/Worker-multi-port.html @@ -38,7 +38,7 @@ async_test(function(t) { test(() => { var worker = new Worker("support/Worker-thread-multi-port.js"); - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { worker.postMessage(); }, 'Empty postMessage should throw exception.'); }, 'Test empty postMessage throws exception.'); @@ -46,7 +46,7 @@ test(() => { test(() => { var worker = new Worker("support/Worker-thread-multi-port.js"); var channel = new MessageChannel(); - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { worker.postMessage("null port", [channel.port1, null, channel.port2]); }, @@ -56,7 +56,7 @@ test(() => { test(() => { var worker = new Worker("support/Worker-thread-multi-port.js") var channel = new MessageChannel(); - assert_throws('DataCloneError', + assert_throws_dom('DataCloneError', function() { worker.postMessage("notAPort", [channel.port1, {}, channel.port2]); }, @@ -65,7 +65,7 @@ test(() => { test(() => { var worker = new Worker("support/Worker-thread-multi-port.js"); - assert_throws('DataCloneError', + assert_throws_dom('DataCloneError', function() { worker.postMessage("notASequence", [{length: 3}]) }, 'postMessage without sequence should throw exception.'); }, 'Test postMessage without sequence throws exception'); @@ -73,7 +73,7 @@ test(() => { async_test(function(t) { var worker = new Worker("support/Worker-thread-multi-port.js"); var channel = new MessageChannel(); - assert_throws('DataCloneError', + assert_throws_dom('DataCloneError', function() { worker.postMessage("notAPort", [channel.port1, {}, channel.port2]); }, diff --git a/tests/wpt/web-platform-tests/workers/Worker_cross_origin_security_err.htm b/tests/wpt/web-platform-tests/workers/Worker_cross_origin_security_err.htm index 1a5e260c18b..8417adbefda 100644 --- a/tests/wpt/web-platform-tests/workers/Worker_cross_origin_security_err.htm +++ b/tests/wpt/web-platform-tests/workers/Worker_cross_origin_security_err.htm @@ -12,7 +12,7 @@ async_test(function(t) { assert_true(e instanceof Event); }); } catch (e) { - assert_throws("SecurityError", () => {throw e}, "DOMExceptions thrown on cross-origin Worker construction must be SecurityErrors"); + assert_throws_dom("SecurityError", () => {throw e}, "DOMExceptions thrown on cross-origin Worker construction must be SecurityErrors"); t.done(); } }, "Cross-origin classic workers should fail to fetch"); @@ -24,7 +24,7 @@ async_test(function(t) { assert_true(e instanceof Event); }); } catch (e) { - assert_throws("SecurityError", () => {throw e}, "DOMExceptions thrown on cross-origin module Worker construction must be SecurityErrors"); + assert_throws_dom("SecurityError", () => {throw e}, "DOMExceptions thrown on cross-origin module Worker construction must be SecurityErrors"); t.done(); } }, "Cross-origin module workers should fail to fetch"); diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/no-arguments-ctor.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/no-arguments-ctor.html index eaee870db0e..c189e556019 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/no-arguments-ctor.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/no-arguments-ctor.html @@ -10,7 +10,7 @@ <div id="log"></div> <script> test(function() { - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { var worker = new SharedWorker(); }); }); diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/same-origin.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/same-origin.html index 66747b22fbb..1fc76d5f5e4 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/same-origin.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/same-origin.html @@ -20,13 +20,13 @@ function testSharedWorkerHelper(t, script) { assert_true(e instanceof Event); }); } catch (e) { - assert_throws("SecurityError", () => {throw e}, "DOMExceptions thrown on cross-origin SharedWorker construction must be SecurityErrors"); + assert_throws_dom("SecurityError", () => {throw e}, "DOMExceptions thrown on cross-origin SharedWorker construction must be SecurityErrors"); t.done(); } } test(function() { - assert_throws("SecurityError", function() { new SharedWorker('unsupported:', ''); }); + assert_throws_dom("SecurityError", function() { new SharedWorker('unsupported:', ''); }); }, "unsupported_scheme"); async_test(function() { diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/undefined-arguments.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/undefined-arguments.html index b9a3b3692c3..bc0a75bcfeb 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/undefined-arguments.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/undefined-arguments.html @@ -14,7 +14,7 @@ onconnect = function(e) { var worker = new SharedWorker(undefined, undefined); worker.port.addEventListener('message', this.step_func(function(e) { assert_equals(e.data[0], 'undefined', 'first arg'); - assert_equals(e.data[1], 'undefined', 'second arg'); + assert_equals(e.data[1], '', 'second arg'); this.done(); }), false); worker.port.start(); @@ -22,4 +22,4 @@ onconnect = function(e) { </script> <!-- */ -//--> \ No newline at end of file +//--> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unresolvable-url.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unresolvable-url.html index 2ca3d93d3e8..c392d0e1f7d 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unresolvable-url.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unresolvable-url.html @@ -9,7 +9,7 @@ <div id="log"></div> <script> test(function() { - assert_throws("SyntaxError", function() { + assert_throws_dom("SyntaxError", function() { var worker = new SharedWorker('http://foo bar'); }); }); diff --git a/tests/wpt/web-platform-tests/workers/constructors/Worker/Worker-constructor.html b/tests/wpt/web-platform-tests/workers/constructors/Worker/Worker-constructor.html index e073df76f36..524a0982a9e 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/Worker/Worker-constructor.html +++ b/tests/wpt/web-platform-tests/workers/constructors/Worker/Worker-constructor.html @@ -5,7 +5,7 @@ <script> test(() => { - assert_throws(new Error(), + assert_throws_js(Error, function() { new Worker({toString:function(){throw new Error()}})}, 'toString exception should be propagated'); @@ -22,7 +22,7 @@ test(() => { }, 'Test recursive Worker creation.'); test(() => { - assert_throws(new TypeError(), + assert_throws_js(TypeError, function() { new Worker(); }, 'invoking Worker constructor without arguments should result' + 'in an exception.') @@ -37,7 +37,7 @@ async_test(t => { }, 'Test Worker creation with empty script URL.'); test(() => { - assert_throws(new SyntaxError(), + assert_throws_dom("SyntaxError", function() { var worker = new Worker('http://invalid:123$'); }, 'Invoking Worker constructor with invalid script URL should' + 'result in an exception.'); diff --git a/tests/wpt/web-platform-tests/workers/constructors/Worker/same-origin.html b/tests/wpt/web-platform-tests/workers/constructors/Worker/same-origin.html index 6df5e92fda3..cdc36c17183 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/Worker/same-origin.html +++ b/tests/wpt/web-platform-tests/workers/constructors/Worker/same-origin.html @@ -18,13 +18,13 @@ function testWorkerHelper(t, script) { assert_true(e instanceof Event); }); } catch (e) { - assert_throws("SecurityError", () => {throw e}, "DOMExceptions thrown on cross-origin Worker construction must be SecurityErrors"); + assert_throws_dom("SecurityError", () => {throw e}, "DOMExceptions thrown on cross-origin Worker construction must be SecurityErrors"); t.done(); } } test(function() { - assert_throws("SecurityError", function() { new Worker('unsupported:'); }); + assert_throws_dom("SecurityError", function() { new Worker('unsupported:'); }); }, "unsupported_scheme"); async_test(function() { diff --git a/tests/wpt/web-platform-tests/workers/importscripts_mime.any.js b/tests/wpt/web-platform-tests/workers/importscripts_mime.any.js index 04c63a3a5f6..d7e215853f4 100644 --- a/tests/wpt/web-platform-tests/workers/importscripts_mime.any.js +++ b/tests/wpt/web-platform-tests/workers/importscripts_mime.any.js @@ -46,7 +46,7 @@ for (var test_case of test_cases) { if (test_case[1]) { assert_equals(undefined, importScripts(import_url)); } else { - assert_throws("NetworkError", _ => { importScripts(import_url) }) + assert_throws_dom("NetworkError", _ => { importScripts(import_url) }) } }, "importScripts() requires scripty MIME types: " + test_case[0] + " is " + (test_case[1] ? "allowed" : "blocked") + "."); } diff --git a/tests/wpt/web-platform-tests/workers/interfaces/WorkerUtils/importScripts/002.worker.js b/tests/wpt/web-platform-tests/workers/interfaces/WorkerUtils/importScripts/002.worker.js index 2cecbcb5352..1cacee5ccb5 100644 --- a/tests/wpt/web-platform-tests/workers/interfaces/WorkerUtils/importScripts/002.worker.js +++ b/tests/wpt/web-platform-tests/workers/interfaces/WorkerUtils/importScripts/002.worker.js @@ -2,7 +2,7 @@ importScripts("/resources/testharness.js"); test(function() { var ran = false; - assert_throws("SyntaxError", function() { + assert_throws_dom("SyntaxError", function() { importScripts('data:text/javascript,ran=true','http://foo bar'); }); assert_false(ran, 'first argument to importScripts ran'); diff --git a/tests/wpt/web-platform-tests/workers/modules/dedicated-worker-import-failure.html b/tests/wpt/web-platform-tests/workers/modules/dedicated-worker-import-failure.html index 5e8b152195a..33eeea26189 100644 --- a/tests/wpt/web-platform-tests/workers/modules/dedicated-worker-import-failure.html +++ b/tests/wpt/web-platform-tests/workers/modules/dedicated-worker-import-failure.html @@ -49,12 +49,12 @@ promise_test(async () => { test(() => { const scriptURL = 'http://invalid:123$'; - assert_throws('SyntaxError', () => new Worker(scriptURL, { type: 'module' })); + assert_throws_dom('SyntaxError', () => new Worker(scriptURL, { type: 'module' })); }, 'Worker construction for an invalid URL should throw an exception.'); test(() => { const scriptURL = 'file:///static-import-worker.js'; - assert_throws('SecurityError', () => new Worker(scriptURL, { type: 'module' })); + assert_throws_dom('SecurityError', () => new Worker(scriptURL, { type: 'module' })); }, 'Worker construction for a file URL should throw an exception.'); </script> diff --git a/tests/wpt/web-platform-tests/workers/modules/dedicated-worker-import-meta.html b/tests/wpt/web-platform-tests/workers/modules/dedicated-worker-import-meta.html index 4ed56e279f7..cff8e91488e 100644 --- a/tests/wpt/web-platform-tests/workers/modules/dedicated-worker-import-meta.html +++ b/tests/wpt/web-platform-tests/workers/modules/dedicated-worker-import-meta.html @@ -19,7 +19,7 @@ promise_test(() => { }, 'Test import.meta.url on the top-level module script.'); promise_test(() => { - const script_url = 'import-meta-url-worker.js'; + const script_url = 'import-meta-url-export.js'; const worker = new Worker('resources/dynamic-import-given-url-worker.js', { type: 'module' }); worker.postMessage('./' + script_url); @@ -35,7 +35,7 @@ promise_test(() => { }, 'Test import.meta.url on the imported module script.'); promise_test(() => { - const script_url = 'import-meta-url-worker.js'; + const script_url = 'import-meta-url-export.js'; const worker = new Worker('resources/dynamic-import-given-url-worker.js', { type: 'module' }); worker.postMessage('./' + script_url); diff --git a/tests/wpt/web-platform-tests/workers/modules/dedicated-worker-options-type.html b/tests/wpt/web-platform-tests/workers/modules/dedicated-worker-options-type.html index 74523f4478b..bb37a18f2cc 100644 --- a/tests/wpt/web-platform-tests/workers/modules/dedicated-worker-options-type.html +++ b/tests/wpt/web-platform-tests/workers/modules/dedicated-worker-options-type.html @@ -25,8 +25,8 @@ promise_test(() => { }, 'Test worker construction with the "module" worker type.'); test(() => { - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { new Worker('resources/post-message-on-load-worker.js', { type: '' }); }, @@ -34,8 +34,8 @@ test(() => { }, 'Test worker construction with an empty worker type.'); test(() => { - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { new Worker('resources/post-message-on-load-worker.js', { type: 'unknown' }); diff --git a/tests/wpt/web-platform-tests/workers/modules/resources/dynamic-import-given-url-worker.js b/tests/wpt/web-platform-tests/workers/modules/resources/dynamic-import-given-url-worker.js index 2ea88b80718..55102759352 100644 --- a/tests/wpt/web-platform-tests/workers/modules/resources/dynamic-import-given-url-worker.js +++ b/tests/wpt/web-platform-tests/workers/modules/resources/dynamic-import-given-url-worker.js @@ -1,5 +1,21 @@ // This worker dynamically imports the script URL sent by postMessage(), and // sends back an error name if the dynamic import fails. -self.addEventListener('message', msg_event => { - import(msg_event.data).catch(e => postMessage(e.name)); -}); +if ('DedicatedWorkerGlobalScope' in self && + self instanceof DedicatedWorkerGlobalScope) { + self.onmessage = msg_event => { + import(msg_event.data) + .then(module => postMessage(module.meta_url)) + .catch(e => postMessage(e.name)); + }; +} else if ( + 'SharedWorkerGlobalScope' in self && + self instanceof SharedWorkerGlobalScope) { + self.onconnect = connect_event => { + const port = connect_event.ports[0]; + port.onmessage = msg_event => { + import(msg_event.data) + .then(module => port.postMessage(module.meta_url)) + .catch(e => port.postMessage(e.name)); + }; + }; +} diff --git a/tests/wpt/web-platform-tests/workers/modules/resources/import-meta-url-export.js b/tests/wpt/web-platform-tests/workers/modules/resources/import-meta-url-export.js new file mode 100644 index 00000000000..5287b2e9e84 --- /dev/null +++ b/tests/wpt/web-platform-tests/workers/modules/resources/import-meta-url-export.js @@ -0,0 +1 @@ +export const meta_url = import.meta.url; diff --git a/tests/wpt/web-platform-tests/workers/modules/resources/import-meta-url-worker.js b/tests/wpt/web-platform-tests/workers/modules/resources/import-meta-url-worker.js index 9d909778eda..7887836a6cc 100644 --- a/tests/wpt/web-platform-tests/workers/modules/resources/import-meta-url-worker.js +++ b/tests/wpt/web-platform-tests/workers/modules/resources/import-meta-url-worker.js @@ -1 +1,10 @@ -postMessage(import.meta.url); +if ('DedicatedWorkerGlobalScope' in self && + self instanceof DedicatedWorkerGlobalScope) { + postMessage(import.meta.url); +} else if ( + 'SharedWorkerGlobalScope' in self && + self instanceof SharedWorkerGlobalScope) { + self.onconnect = e => { + e.ports[0].postMessage(import.meta.url); + }; +} diff --git a/tests/wpt/web-platform-tests/workers/modules/shared-worker-import-failure.html b/tests/wpt/web-platform-tests/workers/modules/shared-worker-import-failure.html index 0e0b9b30631..718ea650ec7 100644 --- a/tests/wpt/web-platform-tests/workers/modules/shared-worker-import-failure.html +++ b/tests/wpt/web-platform-tests/workers/modules/shared-worker-import-failure.html @@ -20,14 +20,14 @@ promise_test(async () => { test(() => { const scriptURL = 'http://invalid:123$'; - assert_throws('SyntaxError', - () => new SharedWorker(scriptURL, { type: 'module' })); + assert_throws_dom('SyntaxError', + () => new SharedWorker(scriptURL, { type: 'module' })); }, 'SharedWorker construction for an invalid URL should throw an exception.'); test(() => { const scriptURL = 'file:///static-import-worker.js'; - assert_throws('SecurityError', - () => new SharedWorker(scriptURL, { type: 'module' })); + assert_throws_dom('SecurityError', + () => new SharedWorker(scriptURL, { type: 'module' })); }, 'SharedWorker construction for a file URL should throw an exception.'); </script> diff --git a/tests/wpt/web-platform-tests/workers/modules/shared-worker-import-meta.html b/tests/wpt/web-platform-tests/workers/modules/shared-worker-import-meta.html new file mode 100644 index 00000000000..44cd9df9ee7 --- /dev/null +++ b/tests/wpt/web-platform-tests/workers/modules/shared-worker-import-meta.html @@ -0,0 +1,49 @@ +<!DOCTYPE html> +<title>SharedWorker: import.meta</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script> + +promise_test(() => { + const script_url = 'resources/import-meta-url-worker.js'; + const worker = new SharedWorker(script_url, { type: 'module' }); + return new Promise((resolve, reject) => { + worker.port.onmessage = resolve; + worker.onerror = (error) => reject(error && error.message); + }) + .then(msg_event => assert_true(msg_event.data.endsWith(script_url))); +}, 'Test import.meta.url on the top-level module script.'); + +promise_test(() => { + const script_url = 'import-meta-url-export.js'; + const worker = new SharedWorker( + 'resources/dynamic-import-given-url-worker.js', + { type: 'module' }); + worker.port.postMessage('./' + script_url); + return new Promise((resolve, reject) => { + worker.port.onmessage = resolve; + worker.onerror = (error) => reject(error && error.message); + }) + .then(msg_event => assert_true(msg_event.data.endsWith(script_url))); +}, 'Test import.meta.url on the imported module script.'); + +promise_test(() => { + const script_url = 'import-meta-url-export.js'; + const worker = new SharedWorker( + 'resources/dynamic-import-given-url-worker.js', + { type: 'module' }); + worker.port.postMessage('./' + script_url); + + return new Promise((resolve, reject) => { + worker.port.onmessage = resolve; + worker.onerror = (error) => reject(error && error.message); + }) + .then(msg_event => assert_true(msg_event.data.endsWith(script_url))) + .then(() => { + worker.port.postMessage('./' + script_url + '#1'); + return new Promise(resolve => worker.port.onmessage = resolve); + }) + .then(msg_event => assert_true(msg_event.data.endsWith(script_url))); +}, 'Test import.meta.url on the imported module script with a fragment.'); + +</script> diff --git a/tests/wpt/web-platform-tests/workers/modules/shared-worker-options-type.html b/tests/wpt/web-platform-tests/workers/modules/shared-worker-options-type.html index 25b793c631d..fb46ab5be7e 100644 --- a/tests/wpt/web-platform-tests/workers/modules/shared-worker-options-type.html +++ b/tests/wpt/web-platform-tests/workers/modules/shared-worker-options-type.html @@ -25,8 +25,8 @@ promise_test(() => { }, 'Test worker construction with the "module" worker type.'); test(() => { - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { new SharedWorker('resources/post-message-on-load-worker.js', {type : ''}); @@ -35,8 +35,8 @@ test(() => { }, 'Test worker construction with an empty worker type.'); test(() => { - assert_throws( - new TypeError(), + assert_throws_js( + TypeError, () => { new SharedWorker('resources/post-message-on-load-worker.js', {type : 'unknown'}); diff --git a/tests/wpt/web-platform-tests/workers/postMessage_clone_port_error.htm b/tests/wpt/web-platform-tests/workers/postMessage_clone_port_error.htm index 30012962d86..3558987476b 100644 --- a/tests/wpt/web-platform-tests/workers/postMessage_clone_port_error.htm +++ b/tests/wpt/web-platform-tests/workers/postMessage_clone_port_error.htm @@ -7,7 +7,7 @@ test(function() { var channel = new MessageChannel(); channel.port1.start(); - assert_throws("DataCloneError", function() { + assert_throws_dom("DataCloneError", function() { channel.port1.postMessage("ports", [channel.port1]); }); }); diff --git a/tests/wpt/web-platform-tests/workers/postMessage_ports_readonly_array.htm b/tests/wpt/web-platform-tests/workers/postMessage_ports_readonly_array.htm index 0645ea7ef5f..bd833ede936 100644 --- a/tests/wpt/web-platform-tests/workers/postMessage_ports_readonly_array.htm +++ b/tests/wpt/web-platform-tests/workers/postMessage_ports_readonly_array.htm @@ -11,7 +11,7 @@ async_test(function(t) { targetPort.start(); targetPort.addEventListener("message", t.step_func_done(function(e) { var channel3 = new MessageChannel(); - assert_throws(new TypeError(), () => { + assert_throws_js(TypeError, () => { e.ports.push(channel3.port1); }, "ports is a frozen object"); assert_equals(e.ports.length, 1, "ports is a read only array with length == 1."); diff --git a/tests/wpt/web-platform-tests/workers/support/ImportScriptsNosniffErr.js b/tests/wpt/web-platform-tests/workers/support/ImportScriptsNosniffErr.js index fefbfc73673..22dc9c1ba57 100644 --- a/tests/wpt/web-platform-tests/workers/support/ImportScriptsNosniffErr.js +++ b/tests/wpt/web-platform-tests/workers/support/ImportScriptsNosniffErr.js @@ -1,7 +1,7 @@ importScripts('/resources/testharness.js'); test(t => { - assert_throws('NetworkError', () => { + assert_throws_dom('NetworkError', () => { importScripts("nosiniff-error-worker.py"); }); }, "importScripts throws on 'nosniff' violation"); diff --git a/tests/wpt/web-platform-tests/wpt b/tests/wpt/web-platform-tests/wpt index a24bc83a919..37ab5409ec7 100755 --- a/tests/wpt/web-platform-tests/wpt +++ b/tests/wpt/web-platform-tests/wpt @@ -2,4 +2,11 @@ if __name__ == "__main__": from tools.wpt import wpt - wpt.main() + from sys import version_info, argv, exit + args, extra = wpt.parse_args(argv[1:]) + + if args.py3 and version_info.major < 3: + from subprocess import call + exit(call(['python3', argv[0]] + [args.command] + extra)) + else: + wpt.main() diff --git a/tests/wpt/web-platform-tests/x-frame-options/deny.sub.html b/tests/wpt/web-platform-tests/x-frame-options/deny.sub.html index 626f2043f32..dd8afe8079a 100644 --- a/tests/wpt/web-platform-tests/x-frame-options/deny.sub.html +++ b/tests/wpt/web-platform-tests/x-frame-options/deny.sub.html @@ -31,4 +31,31 @@ document.body.appendChild(i); }, "`XFO: DENY` blocks cross-origin framing."); + + async_test(t => { + var i = document.createElement('iframe'); + i.src = "./support/xfo.py?value=DENY&csp_value=default-src%20'self'"; + + assert_no_message_from(i, t); + + i.onload = t.step_func_done(_ => { + assert_equals(i.contentDocument, null); + i.remove(); + }); + + document.body.appendChild(i); + }, "`XFO: DENY` blocks framing when CSP is present without a frame-ancestors directive."); + + async_test(t => { + var i = document.createElement('iframe'); + i.src = "./support/xfo.py?value=DENY&csp_value=frame-ancestors%20'self'"; + + wait_for_message_from(i, t) + .then(t.step_func_done(e => { + assert_equals(e.data, "Loaded"); + i.remove(); + })); + + document.body.appendChild(i); + }, "`XFO: DENY` does not blocks framing when CSP is present with a frame-ancestors directive."); </script> diff --git a/tests/wpt/web-platform-tests/x-frame-options/support/xfo.py b/tests/wpt/web-platform-tests/x-frame-options/support/xfo.py index e8d8c4eafbc..619cf553e46 100644 --- a/tests/wpt/web-platform-tests/x-frame-options/support/xfo.py +++ b/tests/wpt/web-platform-tests/x-frame-options/support/xfo.py @@ -2,7 +2,10 @@ def main(request, response): headers = [("Content-Type", "text/html"), ("X-Frame-Options", request.GET.first("value"))] if "value2" in request.GET: - headers.append(("X-Frame-Options", request.GET.first("value2"))) + headers.append(("X-Frame-Options", request.GET.first("value2"))) + + if "csp_value" in request.GET: + headers.append(("Content-Security-Policy", request.GET.first("csp_value"))) body = """<!DOCTYPE html> <html> @@ -16,5 +19,3 @@ def main(request, response): </html> """ return (headers, body) - - diff --git a/tests/wpt/web-platform-tests/xhr/FormData-append.html b/tests/wpt/web-platform-tests/xhr/FormData-append.html index a10244fa23d..c64b93cbc7e 100644 --- a/tests/wpt/web-platform-tests/xhr/FormData-append.html +++ b/tests/wpt/web-platform-tests/xhr/FormData-append.html @@ -81,11 +81,11 @@ }, 'testFormDataAppendToFormNull2'); test(function() { var fd = new FormData(document.getElementById("form")); - assert_throws(new TypeError(), () => {fd.append('name', "string", 'filename')}); + assert_throws_js(TypeError, () => {fd.append('name', "string", 'filename')}); }, 'testFormDataAppendToFormString'); test(function() { var fd = new FormData(document.getElementById("form")); - assert_throws(new TypeError(), () => {fd.append('name', new URLSearchParams(), 'filename')}); + assert_throws_js(TypeError, () => {fd.append('name', new URLSearchParams(), 'filename')}); }, 'testFormDataAppendToFormWrongPlatformObject'); test(function() { var before = new Date(new Date().getTime() - 2000); // two seconds ago, in case there's clock drift diff --git a/tests/wpt/web-platform-tests/xhr/XMLHttpRequest-withCredentials.any.js b/tests/wpt/web-platform-tests/xhr/XMLHttpRequest-withCredentials.any.js index 96e95c90faf..27ffa70d5b9 100644 --- a/tests/wpt/web-platform-tests/xhr/XMLHttpRequest-withCredentials.any.js +++ b/tests/wpt/web-platform-tests/xhr/XMLHttpRequest-withCredentials.any.js @@ -23,9 +23,9 @@ async_test(function() { var client = new XMLHttpRequest() client.open("GET", "resources/delay.py?ms=1000") client.send() - assert_throws("InvalidStateError", function() { client.withCredentials = true }) + assert_throws_dom("InvalidStateError", function() { client.withCredentials = true }) client.onreadystatechange = this.step_func(function() { - assert_throws("InvalidStateError", function() { client.withCredentials = true }) + assert_throws_dom("InvalidStateError", function() { client.withCredentials = true }) if (client.readyState === 4) { this.done() } @@ -36,5 +36,5 @@ test(function() { var client = new XMLHttpRequest() client.open("GET", "resources/delay.py?ms=1000", false) client.send(); - assert_throws("InvalidStateError", function() { client.withCredentials = true }) + assert_throws_dom("InvalidStateError", function() { client.withCredentials = true }) }, "setting withCredentials when in DONE state (synchronous)") diff --git a/tests/wpt/web-platform-tests/xhr/access-control-basic-denied.htm b/tests/wpt/web-platform-tests/xhr/access-control-basic-denied.htm index 535762d0eda..970e09d0f57 100644 --- a/tests/wpt/web-platform-tests/xhr/access-control-basic-denied.htm +++ b/tests/wpt/web-platform-tests/xhr/access-control-basic-denied.htm @@ -22,7 +22,7 @@ const xhr = new XMLHttpRequest; xhr.open("GET", get_host_info().HTTP_REMOTE_ORIGIN + path, false); - assert_throws("NetworkError", () => xhr.send()); + assert_throws_dom("NetworkError", () => xhr.send()); assert_equals(xhr.status, 0); }, "Cross-origin request denied"); </script> diff --git a/tests/wpt/web-platform-tests/xhr/access-control-basic-get-fail-non-simple.htm b/tests/wpt/web-platform-tests/xhr/access-control-basic-get-fail-non-simple.htm index a4fe23460d1..97370bd6502 100644 --- a/tests/wpt/web-platform-tests/xhr/access-control-basic-get-fail-non-simple.htm +++ b/tests/wpt/web-platform-tests/xhr/access-control-basic-get-fail-non-simple.htm @@ -18,7 +18,7 @@ xhr.setRequestHeader("x-test", "foobar"); // This fails because the server-side script is not prepared for an OPTIONS request - assert_throws("NetworkError", () => xhr.send()); + assert_throws_dom("NetworkError", () => xhr.send()); assert_equals(xhr.status, 0); }, "Preflighted cross-origin request denied"); </script> diff --git a/tests/wpt/web-platform-tests/xhr/access-control-basic-non-cors-safelisted-content-type.htm b/tests/wpt/web-platform-tests/xhr/access-control-basic-non-cors-safelisted-content-type.htm index 062f8b0bb5b..0e0e971fd4b 100644 --- a/tests/wpt/web-platform-tests/xhr/access-control-basic-non-cors-safelisted-content-type.htm +++ b/tests/wpt/web-platform-tests/xhr/access-control-basic-non-cors-safelisted-content-type.htm @@ -22,7 +22,7 @@ "/xhr/resources/access-control-basic-put-allow.py", false); xhr.setRequestHeader("Content-Type", "application/xml"); - assert_throws("NetworkError", () => xhr.send("FAIL: PUT data received")); + assert_throws_dom("NetworkError", () => xhr.send("FAIL: PUT data received")); assert_equals(xhr.status, 0, "Cross-domain access was denied in 'send'."); }, "Deny cross-origin request with non-CORS-safelisted content type"); </script> diff --git a/tests/wpt/web-platform-tests/xhr/access-control-basic-post-with-non-cors-safelisted-content-type.htm b/tests/wpt/web-platform-tests/xhr/access-control-basic-post-with-non-cors-safelisted-content-type.htm index 0a6df932aa4..f63e6bc924e 100644 --- a/tests/wpt/web-platform-tests/xhr/access-control-basic-post-with-non-cors-safelisted-content-type.htm +++ b/tests/wpt/web-platform-tests/xhr/access-control-basic-post-with-non-cors-safelisted-content-type.htm @@ -29,7 +29,7 @@ xhr.setRequestHeader("Content-Type", "application/xml"); - assert_throws("NetworkError", () => xhr.send()); + assert_throws_dom("NetworkError", () => xhr.send()); assert_equals(xhr.status, 0, "Cross-domain access was denied in 'send'."); }, "CORS request with non-safelisted content type sends preflight and fails"); </script> diff --git a/tests/wpt/web-platform-tests/xhr/access-control-preflight-sync-header-denied.htm b/tests/wpt/web-platform-tests/xhr/access-control-preflight-sync-header-denied.htm index 7948c18a2ef..8697f1ede95 100644 --- a/tests/wpt/web-platform-tests/xhr/access-control-preflight-sync-header-denied.htm +++ b/tests/wpt/web-platform-tests/xhr/access-control-preflight-sync-header-denied.htm @@ -22,7 +22,7 @@ test(() => { xhr.open("GET", url + "&command=header", false); xhr.setRequestHeader("x-test", "foo"); - assert_throws("NetworkError", () => xhr.send()); + assert_throws_dom("NetworkError", () => xhr.send()); xhr = new XMLHttpRequest; xhr.open("GET", url + "&command=complete", false); diff --git a/tests/wpt/web-platform-tests/xhr/access-control-preflight-sync-method-denied.htm b/tests/wpt/web-platform-tests/xhr/access-control-preflight-sync-method-denied.htm index a54c308d9f1..0ca6c5cdf4a 100644 --- a/tests/wpt/web-platform-tests/xhr/access-control-preflight-sync-method-denied.htm +++ b/tests/wpt/web-platform-tests/xhr/access-control-preflight-sync-method-denied.htm @@ -21,7 +21,7 @@ test(() => { xhr = new XMLHttpRequest; xhr.open("DELETE", url + "&command=method", false); - assert_throws("NetworkError", () => xhr.send()); + assert_throws_dom("NetworkError", () => xhr.send()); xhr = new XMLHttpRequest; xhr.open("GET", url + "&command=complete", false); diff --git a/tests/wpt/web-platform-tests/xhr/access-control-preflight-sync-not-supported.htm b/tests/wpt/web-platform-tests/xhr/access-control-preflight-sync-not-supported.htm index bb08296304f..f5df4a2d4b5 100644 --- a/tests/wpt/web-platform-tests/xhr/access-control-preflight-sync-not-supported.htm +++ b/tests/wpt/web-platform-tests/xhr/access-control-preflight-sync-not-supported.htm @@ -21,7 +21,7 @@ test(() => { xhr = new XMLHttpRequest; xhr.open("PUT", url, false); - assert_throws("NetworkError", () => xhr.send("")); + assert_throws_dom("NetworkError", () => xhr.send("")); xhr = new XMLHttpRequest; xhr.open("GET", url + "&command=complete", false); diff --git a/tests/wpt/web-platform-tests/xhr/formdata-blob.htm b/tests/wpt/web-platform-tests/xhr/formdata-blob.htm index 5efef7b615b..92cee55cd2f 100644 --- a/tests/wpt/web-platform-tests/xhr/formdata-blob.htm +++ b/tests/wpt/web-platform-tests/xhr/formdata-blob.htm @@ -38,7 +38,7 @@ // If 3rd argument is given and 2nd is not a Blob, formdata.append() should throw var test = async_test('formdata.append() should throw if value is string and file name is given'); // needs to be async just because the others above are test.step(function(){ - assert_throws(new TypeError(), function(){ + assert_throws_js(TypeError, function(){ create_formdata('a', 'b', 'c'); }); }); diff --git a/tests/wpt/web-platform-tests/xhr/formdata-set.htm b/tests/wpt/web-platform-tests/xhr/formdata-set.htm index ee43e1569f1..d46e44a916f 100644 --- a/tests/wpt/web-platform-tests/xhr/formdata-set.htm +++ b/tests/wpt/web-platform-tests/xhr/formdata-set.htm @@ -81,11 +81,11 @@ }, 'testFormDataSetToFormNull2'); test(function() { var fd = new FormData(document.getElementById("form")); - assert_throws(new TypeError(), () => {fd.set('name', "string", 'filename')}); + assert_throws_js(TypeError, () => {fd.set('name', "string", 'filename')}); }, 'testFormDataSetToFormString'); test(function() { var fd = new FormData(document.getElementById("form")); - assert_throws(new TypeError(), () => {fd.set('name', new URLSearchParams(), 'filename')}); + assert_throws_js(TypeError, () => {fd.set('name', new URLSearchParams(), 'filename')}); }, 'testFormDataSetToFormWrongPlatformObject'); test(function() { var fd = new FormData(); diff --git a/tests/wpt/web-platform-tests/xhr/formdata.htm b/tests/wpt/web-platform-tests/xhr/formdata.htm index 699c11ab783..675203cb1af 100644 --- a/tests/wpt/web-platform-tests/xhr/formdata.htm +++ b/tests/wpt/web-platform-tests/xhr/formdata.htm @@ -39,8 +39,8 @@ } test(() => { - assert_throws(new TypeError(), () => { new FormData(null); }); - assert_throws(new TypeError(), () => { new FormData("string"); }); + assert_throws_js(TypeError, () => { new FormData(null); }); + assert_throws_js(TypeError, () => { new FormData("string"); }); }, "Constructors should throw a type error"); do_test("empty formdata", new FormData(), '\n'); @@ -72,7 +72,7 @@ let counter = 0; form.addEventListener('formdata', e => { ++counter; - assert_throws('InvalidStateError', () => { new FormData(e.target) }); + assert_throws_dom('InvalidStateError', () => { new FormData(e.target) }); }); new FormData(form); assert_equals(counter, 1); diff --git a/tests/wpt/web-platform-tests/xhr/headers-normalize-response.htm b/tests/wpt/web-platform-tests/xhr/headers-normalize-response.htm index 84f2fc85821..3d472f688cf 100644 --- a/tests/wpt/web-platform-tests/xhr/headers-normalize-response.htm +++ b/tests/wpt/web-platform-tests/xhr/headers-normalize-response.htm @@ -9,7 +9,7 @@ function error(val) { test(() => { const client = new XMLHttpRequest(); client.open("GET", "resources/parse-headers.py?my-custom-header="+encodeURIComponent(val), false); - assert_throws("NetworkError", () => client.send()); + assert_throws_dom("NetworkError", () => client.send()); }, "Header value: " + val.replace("\0", "\\0")); } diff --git a/tests/wpt/web-platform-tests/xhr/loadstart-and-state.html b/tests/wpt/web-platform-tests/xhr/loadstart-and-state.html index 460b2bfc990..8b344a58f81 100644 --- a/tests/wpt/web-platform-tests/xhr/loadstart-and-state.html +++ b/tests/wpt/web-platform-tests/xhr/loadstart-and-state.html @@ -7,9 +7,9 @@ async_test(t => { const client = new XMLHttpRequest client.onloadstart = t.step_func(() => { - assert_throws("InvalidStateError", () => client.setRequestHeader("General", "Organa")) - assert_throws("InvalidStateError", () => client.withCredentials = true) - assert_throws("InvalidStateError", () => client.send()) + assert_throws_dom("InvalidStateError", () => client.setRequestHeader("General", "Organa")) + assert_throws_dom("InvalidStateError", () => client.withCredentials = true) + assert_throws_dom("InvalidStateError", () => client.send()) client.onloadstart = null client.open("GET", "data:,BB-8") client.send() diff --git a/tests/wpt/web-platform-tests/xhr/open-method-bogus.htm b/tests/wpt/web-platform-tests/xhr/open-method-bogus.htm index 263e7b6db7e..13bb18bf5c4 100644 --- a/tests/wpt/web-platform-tests/xhr/open-method-bogus.htm +++ b/tests/wpt/web-platform-tests/xhr/open-method-bogus.htm @@ -12,7 +12,7 @@ function method(method) { test(function() { var client = new XMLHttpRequest() - assert_throws("SyntaxError", function() { client.open(method, "...") }) + assert_throws_dom("SyntaxError", function() { client.open(method, "...") }) }, document.title + " (" + method + ")") } method("") diff --git a/tests/wpt/web-platform-tests/xhr/open-method-insecure.htm b/tests/wpt/web-platform-tests/xhr/open-method-insecure.htm index 1a77ff3ec79..a6bf4422481 100644 --- a/tests/wpt/web-platform-tests/xhr/open-method-insecure.htm +++ b/tests/wpt/web-platform-tests/xhr/open-method-insecure.htm @@ -12,7 +12,7 @@ function method(method) { test(function() { var client = new XMLHttpRequest() - assert_throws("SecurityError", function() { client.open(method, "...") }) + assert_throws_dom("SecurityError", function() { client.open(method, "...") }) }, document.title + " (" + method + ")") } method("track") diff --git a/tests/wpt/web-platform-tests/xhr/open-method-responsetype-set-sync.htm b/tests/wpt/web-platform-tests/xhr/open-method-responsetype-set-sync.htm index 0b4d814041c..7858c91409e 100644 --- a/tests/wpt/web-platform-tests/xhr/open-method-responsetype-set-sync.htm +++ b/tests/wpt/web-platform-tests/xhr/open-method-responsetype-set-sync.htm @@ -19,7 +19,7 @@ assert_unreached('No events should fire here') }) client.responseType = type - assert_throws("InvalidAccessError", function() { client.open('GET', "...", false) }) + assert_throws_dom("InvalidAccessError", function() { client.open('GET', "...", false) }) }, document.title + " (" + type + ")") } request("arraybuffer") diff --git a/tests/wpt/web-platform-tests/xhr/open-url-multi-window-2.htm b/tests/wpt/web-platform-tests/xhr/open-url-multi-window-2.htm index ed4ba01576b..fdd91016db8 100644 --- a/tests/wpt/web-platform-tests/xhr/open-url-multi-window-2.htm +++ b/tests/wpt/web-platform-tests/xhr/open-url-multi-window-2.htm @@ -13,7 +13,7 @@ test(function() { var client = new self[0].XMLHttpRequest() document.body.removeChild(document.getElementsByTagName("iframe")[0]) - assert_throws("InvalidStateError", function() { + assert_throws_dom("InvalidStateError", function() { client.open("GET", "folder.txt") }, "open() when associated document's IFRAME is removed") }) diff --git a/tests/wpt/web-platform-tests/xhr/open-url-multi-window-3.htm b/tests/wpt/web-platform-tests/xhr/open-url-multi-window-3.htm index 344434b0e7c..cfce8310dc4 100644 --- a/tests/wpt/web-platform-tests/xhr/open-url-multi-window-3.htm +++ b/tests/wpt/web-platform-tests/xhr/open-url-multi-window-3.htm @@ -13,7 +13,7 @@ var client = new self[0].XMLHttpRequest() client.open("GET", "folder.txt") document.body.removeChild(document.getElementsByTagName("iframe")[0]) - assert_throws("InvalidStateError", function() { + assert_throws_dom("InvalidStateError", function() { client.send(null) }, "send() when associated document's IFRAME is removed") }) diff --git a/tests/wpt/web-platform-tests/xhr/open-url-multi-window-5.htm b/tests/wpt/web-platform-tests/xhr/open-url-multi-window-5.htm index a27d2b366c0..40a3429fbb4 100644 --- a/tests/wpt/web-platform-tests/xhr/open-url-multi-window-5.htm +++ b/tests/wpt/web-platform-tests/xhr/open-url-multi-window-5.htm @@ -19,7 +19,7 @@ count++ self[0].location.reload() } else if(1 == count) { - assert_throws("InvalidStateError", function() { client.open("GET", "...") }) + assert_throws_dom("InvalidStateError", function() { client.open("GET", "...") }) test.done() } }) diff --git a/tests/wpt/web-platform-tests/xhr/open-url-multi-window-6.htm b/tests/wpt/web-platform-tests/xhr/open-url-multi-window-6.htm index 99279639921..d834a048a51 100644 --- a/tests/wpt/web-platform-tests/xhr/open-url-multi-window-6.htm +++ b/tests/wpt/web-platform-tests/xhr/open-url-multi-window-6.htm @@ -31,7 +31,7 @@ } doc.body.appendChild(ifr); } else if(1 == count) { - assert_throws("InvalidStateError", function() { client.open("GET", "...") }) + assert_throws_dom("InvalidStateError", function() { client.open("GET", "...") }) test.done() } }) diff --git a/tests/wpt/web-platform-tests/xhr/overridemimetype-done-state.any.js b/tests/wpt/web-platform-tests/xhr/overridemimetype-done-state.any.js index bdf49e1ca52..5e704924365 100644 --- a/tests/wpt/web-platform-tests/xhr/overridemimetype-done-state.any.js +++ b/tests/wpt/web-platform-tests/xhr/overridemimetype-done-state.any.js @@ -9,7 +9,7 @@ client.onreadystatechange = test.step_func( function() { if (client.readyState !== 4) return; var text = client.responseText; assert_not_equals(text, ""); - assert_throws("InvalidStateError", function() { client.overrideMimeType('application/xml;charset=Shift-JIS'); }); + assert_throws_dom("InvalidStateError", function() { client.overrideMimeType('application/xml;charset=Shift-JIS'); }); if (GLOBAL.isWindow()) { assert_equals(client.responseXML, null); } diff --git a/tests/wpt/web-platform-tests/xhr/overridemimetype-loading-state.htm b/tests/wpt/web-platform-tests/xhr/overridemimetype-loading-state.htm index cce3fa49ef7..06e4d5fec1e 100644 --- a/tests/wpt/web-platform-tests/xhr/overridemimetype-loading-state.htm +++ b/tests/wpt/web-platform-tests/xhr/overridemimetype-loading-state.htm @@ -15,7 +15,7 @@ var client = new XMLHttpRequest(); client.onreadystatechange = test.step_func(function() { if (client.readyState === 3){ - assert_throws("InvalidStateError", function(){ + assert_throws_dom("InvalidStateError", function(){ client.overrideMimeType('application/xml;charset=Shift-JIS'); }); }else if(client.readyState===4){ diff --git a/tests/wpt/web-platform-tests/xhr/progressevent-interface.html b/tests/wpt/web-platform-tests/xhr/progressevent-interface.html index 850d1b23dcf..7552ff73d3f 100644 --- a/tests/wpt/web-platform-tests/xhr/progressevent-interface.html +++ b/tests/wpt/web-platform-tests/xhr/progressevent-interface.html @@ -14,7 +14,7 @@ test(function() { assert_equals(desc.writable, false) assert_equals(desc.enumerable, false) assert_equals(desc.configurable, false) - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { "use strict"; delete ProgressEvent.prototype; }) @@ -31,7 +31,7 @@ attributes.forEach(function(a) { var desc = Object.getOwnPropertyDescriptor(ProgressEvent.prototype, a[1]) assert_equals(desc.enumerable, true) assert_equals(desc.configurable, true) - assert_throws(new TypeError(), function() { + assert_throws_js(TypeError, function() { ProgressEvent.prototype[a[1]] }) }) diff --git a/tests/wpt/web-platform-tests/xhr/resources/send-after-setting-document-domain-window-2.htm b/tests/wpt/web-platform-tests/xhr/resources/send-after-setting-document-domain-window-2.htm index 073268c21c7..cd9f0c6bb70 100644 --- a/tests/wpt/web-platform-tests/xhr/resources/send-after-setting-document-domain-window-2.htm +++ b/tests/wpt/web-platform-tests/xhr/resources/send-after-setting-document-domain-window-2.htm @@ -11,7 +11,7 @@ document.domain = document.domain.replace(/^\w+\./, ""); var client = new XMLHttpRequest(); client.open("GET", location.protocol + "//" + document.domain + location.pathname.replace(/[^\/]*$/, "") + "status.py?content=hello3", false); - assert_throws("NetworkError", function() { + assert_throws_dom("NetworkError", function() { client.send(null); }); }, "loading documents from the origin document.domain was set to should throw"); diff --git a/tests/wpt/web-platform-tests/xhr/resources/send-after-setting-document-domain-window-helper.js b/tests/wpt/web-platform-tests/xhr/resources/send-after-setting-document-domain-window-helper.js index f5c762b042b..0c239cfdbcd 100644 --- a/tests/wpt/web-platform-tests/xhr/resources/send-after-setting-document-domain-window-helper.js +++ b/tests/wpt/web-platform-tests/xhr/resources/send-after-setting-document-domain-window-helper.js @@ -4,10 +4,13 @@ function assert_equals(value, expected) { } } -function assert_throws(expected_exc, func) { +function assert_throws_dom(expected_exc, func) { try { func.call(this); } catch(e) { + if (e.constructor.name != "DOMException") { + throw `Exception ${e.constructor.name || "unknown"} that was not a DOMException was thrown`; + } var actual = e.name || e.type; if (actual != expected_exc) { throw "Got wrong exception.\nExpected '" + expected_exc + "',\ngot '" + actual + "'."; diff --git a/tests/wpt/web-platform-tests/xhr/responsetype.any.js b/tests/wpt/web-platform-tests/xhr/responsetype.any.js index 88bd9189ebe..444c3e3d169 100644 --- a/tests/wpt/web-platform-tests/xhr/responsetype.any.js +++ b/tests/wpt/web-platform-tests/xhr/responsetype.any.js @@ -69,7 +69,7 @@ types.forEach(function(type) { if (isIgnoredType(type)) { xhr.responseType = type; } else { - assert_throws("InvalidStateError", function() { + assert_throws_dom("InvalidStateError", function() { xhr.responseType = type; }); } @@ -90,7 +90,7 @@ types.forEach(function(type) { if (isIgnoredType(type)) { xhr.responseType = type; } else { - assert_throws("InvalidStateError", function() { + assert_throws_dom("InvalidStateError", function() { xhr.responseType = type; }); } @@ -112,7 +112,7 @@ types.forEach(function(type) { xhr.responseType = type; assert_equals(xhr.responseType, expectedType(type)); } else { - assert_throws("InvalidAccessError", function() { + assert_throws_dom("InvalidAccessError", function() { xhr.responseType = type; }); } @@ -126,7 +126,7 @@ types.forEach(function(type) { if (isIgnoredType(type)) { xhr.responseType = type; } else { - assert_throws("InvalidStateError", function() { + assert_throws_dom("InvalidStateError", function() { xhr.responseType = type; }); } diff --git a/tests/wpt/web-platform-tests/xhr/responsexml-non-document-types.htm b/tests/wpt/web-platform-tests/xhr/responsexml-non-document-types.htm index 84d90a8d35a..6d7feea7530 100644 --- a/tests/wpt/web-platform-tests/xhr/responsexml-non-document-types.htm +++ b/tests/wpt/web-platform-tests/xhr/responsexml-non-document-types.htm @@ -20,12 +20,12 @@ client.onload = function(){ test.step(function(){ if(type !== 'document'){ - assert_throws("InvalidStateError", function() { + assert_throws_dom("InvalidStateError", function() { var x = client.responseXML; }, 'responseXML throw for '+type) } if(type !== 'text'){ - assert_throws("InvalidStateError", function() { + assert_throws_dom("InvalidStateError", function() { var x = client.responseText; }, 'responseText throws for '+type) } diff --git a/tests/wpt/web-platform-tests/xhr/send-authentication-basic-cors-not-enabled.htm b/tests/wpt/web-platform-tests/xhr/send-authentication-basic-cors-not-enabled.htm index 68ad5e95ed8..2e7cbaf0340 100644 --- a/tests/wpt/web-platform-tests/xhr/send-authentication-basic-cors-not-enabled.htm +++ b/tests/wpt/web-platform-tests/xhr/send-authentication-basic-cors-not-enabled.htm @@ -18,7 +18,7 @@ user = token() client.open("GET", location.protocol+'//'+urlstart + "resources/auth10/auth.py", false, user, 'pass') client.setRequestHeader("x-user", user) - assert_throws("NetworkError", function(){ client.send(null) }) + assert_throws_dom("NetworkError", function(){ client.send(null) }) assert_equals(client.responseText, '') assert_equals(client.status, 0) assert_equals(client.getResponseHeader('x-challenge'), null) diff --git a/tests/wpt/web-platform-tests/xhr/send-data-es-object.any.js b/tests/wpt/web-platform-tests/xhr/send-data-es-object.any.js index d98a4ca65aa..c6fe5de260c 100644 --- a/tests/wpt/web-platform-tests/xhr/send-data-es-object.any.js +++ b/tests/wpt/web-platform-tests/xhr/send-data-es-object.any.js @@ -10,7 +10,13 @@ function do_test(obj, expected, name) { }); client.open('POST', 'resources/content.py') if (expected.exception) { - assert_throws(expected.exception, function(){client.send(obj)}) + if (expected.exception.identity) { + assert_throws_exactly(expected.exception.identity, + function(){client.send(obj)}) + } else { + assert_throws_js(expected.exception.ctor, + function(){client.send(obj)}) + } test.done() } else { client.send(obj) @@ -43,8 +49,9 @@ var myFakeDoc1 = {valueOf:function(){return document}} do_test(myFakeDoc1, '[object Object]', 'object whose valueOf() returns a document - ignore valueOf(), stringify') var myFakeDoc2 = {toString:function(){return document}} -var expectedError = self.GLOBAL.isWorker() ? new ReferenceError() : new TypeError(); -do_test(myFakeDoc2, {exception:expectedError}, 'object whose toString() returns a document, expected to throw') +var expectedError = self.GLOBAL.isWorker() ? ReferenceError : TypeError; +do_test(myFakeDoc2, {exception: { ctor: expectedError } }, 'object whose toString() returns a document, expected to throw') -var myThrower = {toString:function(){throw {name:'FooError', message:'bar'}}} -do_test(myThrower, {exception:{name:'FooError'}}, 'object whose toString() throws, expected to throw') +var err = {name:'FooError', message:'bar'}; +var myThrower = {toString:function(){throw err;}}; +do_test(myThrower, {exception: { identity: err }}, 'object whose toString() throws, expected to throw') diff --git a/tests/wpt/web-platform-tests/xhr/send-data-readablestream.any.js b/tests/wpt/web-platform-tests/xhr/send-data-readablestream.any.js index cca6e76a042..c53b1071828 100644 --- a/tests/wpt/web-platform-tests/xhr/send-data-readablestream.any.js +++ b/tests/wpt/web-platform-tests/xhr/send-data-readablestream.any.js @@ -3,7 +3,7 @@ function assert_xhr(stream) { const client = new XMLHttpRequest(); client.open("POST", "..."); - assert_throws(new TypeError(), () => client.send(stream)); + assert_throws_js(TypeError, () => client.send(stream)); } test(() => { diff --git a/tests/wpt/web-platform-tests/xhr/send-data-unexpected-tostring.htm b/tests/wpt/web-platform-tests/xhr/send-data-unexpected-tostring.htm index b8a3b4ae690..290ae2065fc 100644 --- a/tests/wpt/web-platform-tests/xhr/send-data-unexpected-tostring.htm +++ b/tests/wpt/web-platform-tests/xhr/send-data-unexpected-tostring.htm @@ -47,7 +47,7 @@ test3.done() }) client.open('POST', 'resources/content.py') - assert_throws('InvalidStateError', function(){ + assert_throws_dom('InvalidStateError', function(){ client.send(objSendsOnStringification) }) }); diff --git a/tests/wpt/web-platform-tests/xhr/send-network-error-sync-events.sub.htm b/tests/wpt/web-platform-tests/xhr/send-network-error-sync-events.sub.htm index b9f4fdf99de..2266eb36e1e 100644 --- a/tests/wpt/web-platform-tests/xhr/send-network-error-sync-events.sub.htm +++ b/tests/wpt/web-platform-tests/xhr/send-network-error-sync-events.sub.htm @@ -19,7 +19,7 @@ xhr.open("POST", "http://nonexistent.{{host}}:{{ports[http][0]}}", false); - assert_throws("NetworkError", function() + assert_throws_dom("NetworkError", function() { xhr.send("Test Message"); }); @@ -33,7 +33,7 @@ xhr.open("GET", "data:text/html;charset=utf-8;base64,PT0NUWVBFIGh0bWw%2BDQo8", false); - assert_throws("NetworkError", function() + assert_throws_dom("NetworkError", function() { xhr.send("Test Message"); }); diff --git a/tests/wpt/web-platform-tests/xhr/send-non-same-origin.htm b/tests/wpt/web-platform-tests/xhr/send-non-same-origin.htm index 6dbbca7477d..bb9f32c174f 100644 --- a/tests/wpt/web-platform-tests/xhr/send-non-same-origin.htm +++ b/tests/wpt/web-platform-tests/xhr/send-non-same-origin.htm @@ -18,7 +18,7 @@ test(function() { var client = new XMLHttpRequest() client.open("GET", url, false) - assert_throws("NetworkError", function() { client.send() }) + assert_throws_dom("NetworkError", function() { client.send() }) }, document.title + " (" + url + ")") } url("mailto:test@example.org") diff --git a/tests/wpt/web-platform-tests/xhr/send-redirect-bogus-sync.htm b/tests/wpt/web-platform-tests/xhr/send-redirect-bogus-sync.htm index a9dc73e5fd7..0f0598b1645 100644 --- a/tests/wpt/web-platform-tests/xhr/send-redirect-bogus-sync.htm +++ b/tests/wpt/web-platform-tests/xhr/send-redirect-bogus-sync.htm @@ -13,7 +13,7 @@ test(function() { var client = new XMLHttpRequest() client.open("GET", "resources/redirect.py?location=" + location + "&code=" + code, false) - assert_throws("NetworkError", function() { client.send(null) }) + assert_throws_dom("NetworkError", function() { client.send(null) }) }, document.title + " (" + code + ": " + location + ")") } redirect("301", "foobar://abcd") diff --git a/tests/wpt/web-platform-tests/xhr/send-redirect-infinite-sync.htm b/tests/wpt/web-platform-tests/xhr/send-redirect-infinite-sync.htm index 6e9e47e55fc..cc6d7a24bf6 100644 --- a/tests/wpt/web-platform-tests/xhr/send-redirect-infinite-sync.htm +++ b/tests/wpt/web-platform-tests/xhr/send-redirect-infinite-sync.htm @@ -15,7 +15,7 @@ test(function() { var client = new XMLHttpRequest() client.open("GET", "resources/infinite-redirects.py?type="+code, false) - assert_throws("NetworkError", function() { client.send(null) }) + assert_throws_dom("NetworkError", function() { client.send(null) }) }, document.title + " (" + code + ")") } redirect("301") diff --git a/tests/wpt/web-platform-tests/xhr/send-send.any.js b/tests/wpt/web-platform-tests/xhr/send-send.any.js index 2bfe40436f4..64b15541809 100644 --- a/tests/wpt/web-platform-tests/xhr/send-send.any.js +++ b/tests/wpt/web-platform-tests/xhr/send-send.any.js @@ -2,6 +2,6 @@ test(function() { var client = new XMLHttpRequest() client.open("GET", "resources/well-formed.xml") client.send(null) - assert_throws("InvalidStateError", function() { client.send(null) }) + assert_throws_dom("InvalidStateError", function() { client.send(null) }) client.abort() }, "XMLHttpRequest: send() - send()"); diff --git a/tests/wpt/web-platform-tests/xhr/setrequestheader-after-send.htm b/tests/wpt/web-platform-tests/xhr/setrequestheader-after-send.htm index 7ccdb3e4c31..174e9ec4196 100644 --- a/tests/wpt/web-platform-tests/xhr/setrequestheader-after-send.htm +++ b/tests/wpt/web-platform-tests/xhr/setrequestheader-after-send.htm @@ -15,7 +15,7 @@ client.open("GET", "resources/delay.py?ms=0") client.onreadystatechange = function() { test.step(function() { - assert_throws("InvalidStateError", function() { client.setRequestHeader("x-test", "test") }) + assert_throws_dom("InvalidStateError", function() { client.setRequestHeader("x-test", "test") }) if(client.readyState == 4) test.done() }) diff --git a/tests/wpt/web-platform-tests/xhr/setrequestheader-before-open.htm b/tests/wpt/web-platform-tests/xhr/setrequestheader-before-open.htm index cbe4b299c9d..5c377fbc100 100644 --- a/tests/wpt/web-platform-tests/xhr/setrequestheader-before-open.htm +++ b/tests/wpt/web-platform-tests/xhr/setrequestheader-before-open.htm @@ -11,7 +11,7 @@ <script> test(function() { var client = new XMLHttpRequest() - assert_throws("InvalidStateError", function() { client.setRequestHeader("x-test", "test") }) + assert_throws_dom("InvalidStateError", function() { client.setRequestHeader("x-test", "test") }) }, 'setRequestHeader invoked before open()') </script> </body> diff --git a/tests/wpt/web-platform-tests/xhr/setrequestheader-bogus-name.htm b/tests/wpt/web-platform-tests/xhr/setrequestheader-bogus-name.htm index 86e55f33a00..ce2308cc67d 100644 --- a/tests/wpt/web-platform-tests/xhr/setrequestheader-bogus-name.htm +++ b/tests/wpt/web-platform-tests/xhr/setrequestheader-bogus-name.htm @@ -27,14 +27,14 @@ test(function() { var client = new XMLHttpRequest() client.open("GET", "...") - assert_throws("SyntaxError", function() { client.setRequestHeader(name, 'x-value') }) + assert_throws_dom("SyntaxError", function() { client.setRequestHeader(name, 'x-value') }) }, "setRequestHeader should throw with header name " + format_value(invalid_headers[i]) + ".") } function try_byte_string(name) { test(function() { var client = new XMLHttpRequest() client.open("GET", "...") - assert_throws(new TypeError(), function() { client.setRequestHeader(name, 'x-value') }) + assert_throws_js(TypeError, function() { client.setRequestHeader(name, 'x-value') }) }, "setRequestHeader should throw with header name " + format_value(invalid_byte_strings[i]) + ".") } var invalid_headers = ["(", ")", "<", ">", "@", ",", ";", ":", "\\", diff --git a/tests/wpt/web-platform-tests/xhr/setrequestheader-bogus-value.htm b/tests/wpt/web-platform-tests/xhr/setrequestheader-bogus-value.htm index 15fbb390525..cba341c5dc6 100644 --- a/tests/wpt/web-platform-tests/xhr/setrequestheader-bogus-value.htm +++ b/tests/wpt/web-platform-tests/xhr/setrequestheader-bogus-value.htm @@ -14,7 +14,7 @@ test(function() { var client = new XMLHttpRequest(); client.open("GET", "..."); - assert_throws("SyntaxError", function() { client.setRequestHeader("x-test", value) }, ' given value ' + value+', '); + assert_throws_dom("SyntaxError", function() { client.setRequestHeader("x-test", value) }, ' given value ' + value+', '); }); } try_value("t\x00t"); @@ -23,13 +23,13 @@ test(function() { var client = new XMLHttpRequest(); client.open("GET", "..."); - assert_throws(new TypeError(), function() { client.setRequestHeader("x-test", "テスト") }, ' given value テスト,'); + assert_throws_js(TypeError, function() { client.setRequestHeader("x-test", "テスト") }, ' given value テスト,'); }); test(function() { var client = new XMLHttpRequest() client.open("GET", "...") - assert_throws(new TypeError(), function() { client.setRequestHeader("x-test") }) + assert_throws_js(TypeError, function() { client.setRequestHeader("x-test") }) }, 'Omitted value argument') </script> </body> diff --git a/tests/wpt/web-platform-tests/xhr/timeout-sync.htm b/tests/wpt/web-platform-tests/xhr/timeout-sync.htm index 9815532c70f..d8b2cc48f36 100644 --- a/tests/wpt/web-platform-tests/xhr/timeout-sync.htm +++ b/tests/wpt/web-platform-tests/xhr/timeout-sync.htm @@ -13,12 +13,12 @@ test(function() { var client = new XMLHttpRequest() client.open('GET', 'folder.txt', false) - assert_throws("InvalidAccessError", function() { client.timeout = 1000 }) + assert_throws_dom("InvalidAccessError", function() { client.timeout = 1000 }) }, 'setting timeout attribute on sync request') test(function() { var client = new XMLHttpRequest() client.timeout = 1000 - assert_throws("InvalidAccessError", function() { client.open('GET', 'folder.txt', false) }) + assert_throws_dom("InvalidAccessError", function() { client.open('GET', 'folder.txt', false) }) }, 'open() with async false when timeout is set') </script> </body> diff --git a/tests/wpt/web-platform-tests/xhr/xmlhttprequest-network-error-sync.htm b/tests/wpt/web-platform-tests/xhr/xmlhttprequest-network-error-sync.htm index c4a887a1ebe..ee367fbe0ee 100644 --- a/tests/wpt/web-platform-tests/xhr/xmlhttprequest-network-error-sync.htm +++ b/tests/wpt/web-platform-tests/xhr/xmlhttprequest-network-error-sync.htm @@ -20,7 +20,7 @@ test(function() { var client = new XMLHttpRequest() client.open("GET", "resources/infinite-redirects.py", false) - assert_throws("NetworkError", function() { client.send(null) }, "send") + assert_throws_dom("NetworkError", function() { client.send(null) }, "send") assert_equals(client.status, 0, "status") assert_equals(client.statusText, "", "statusText") assert_equals(client.getAllResponseHeaders(), "", "getAllResponseHeaders") diff --git a/tests/wpt/web-platform-tests/xhr/xmlhttprequest-unsent.htm b/tests/wpt/web-platform-tests/xhr/xmlhttprequest-unsent.htm index eb52d63eef9..82282b0163e 100644 --- a/tests/wpt/web-platform-tests/xhr/xmlhttprequest-unsent.htm +++ b/tests/wpt/web-platform-tests/xhr/xmlhttprequest-unsent.htm @@ -20,8 +20,8 @@ <script> test(function() { var client = new XMLHttpRequest() - assert_throws("InvalidStateError", function() { client.setRequestHeader("x-test", "test") }, "setRequestHeader") - assert_throws("InvalidStateError", function() { client.send(null) }, "send") + assert_throws_dom("InvalidStateError", function() { client.setRequestHeader("x-test", "test") }, "setRequestHeader") + assert_throws_dom("InvalidStateError", function() { client.send(null) }, "send") assert_equals(client.status, 0, "status") assert_equals(client.statusText, "", "statusText") assert_equals(client.getAllResponseHeaders(), "", "getAllResponseHeaders")